Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CHAPTER 1
Gathering & Analyzing Info
1.1 INTRODUCTION
Crime Investigation Reporting System is used to map the reported crime to identify the crime
clusters’ have designed a mobile lead solution where users from the each of 4 Police station’s
in Rahim yar khan can geo-tag the crime location, nature of the crime, date and time when
crime was committed along with a snapshot from the location.
Connecting the data from the Android lead reporting to the web dashboard, the crime
investigation authorities can now see the patterns of crimes, strongholds of street crimes or
customized reports on the rise of a specific kind of crime in any specific area/range. Based on
the heat map, the authorities are then taking serious steps to curb the strongholds of the
criminals and take necessary steps. This also helps the senior police officers monitor and
inquire about the progress of the police stations of the critical areas in the light of the up to
date crime database.
The software is assisting the police to record daily crimes on their online repository through
their mobile application. The officer and/or the witness record the crime through the
web application from the place of incident with a picture location on the Google Map
along with date of incident and the sections of law applicable. Daily reporting on the
software creates crime patterns across Rahim yar khan identifying the crime pockets,
the high time of increased crime rate and the areas that are hotspots. Further, the online
data warehouse has not only enabled the investigation teams to nab down the culprits
involved but police has also been able to improve their traditional techniques and
strategies to protect the citizens from various street crimes. Thus, the crime mapping
software has benefited in monitoring and eliminating the growth of overall crime to a
great extent. Moreover, by creating an online data warehouse, the software team has
reduced the corruption and stigmatization of the law enforcement agencies in Rahim
yar khan.
Administrator
DPO
SHO will be able to see the crime record of his own police station
SHO will be able to see the crimes on map of his police station
Field Officer
Administrator:
DPO:
SHO:
Field Officer:
System Diagram:
Scenario No 1:
Pre-Condition
Scenario No 2:
Saved Successfully,
Scenario No 3:
SHO
Use Case Name :
Open Dashboard,
View crimes related reports of his police station on map,
Flow of Events
See All latest entry,
Scenario No 4:
The Islamiya University of Bahawalpur RYK Campus Page 13
Crime Investigation System
Successfully Inserted.
Post-Condition
1.6.1.1. DPO
DPO should be allowed to sign in for the system as a DPO to perform the
activities.
DPO should be allowed to visit all maps view to a visitor or guest.
DPO should be allowed to filter all crime category on map.
1.6.1.2. Administrator:
Administrator should be allowed to Register/Manage users.
Administrator should be allowed to access all features of the web
application.
Administrator should be allowed to edit entry of field officer.
Administrator should be able to allocate the role of each user.
1.6.1.3. SHO
Should be able to see crime reports of his own police station.
Should be able to see all map views.
Should be able to add crime location where the crime was committed and
all information related to that crime.
Additional specifications imprison requirements that are not included in the use cases. These
are usually called non functional requirements. Requirements which are necessary for the
software to run or work properly are described here.
1.6.2.1. Usability:
Website should be use with customer satisfaction. It should have simple and independent
code that can be reused if needed. Simple GUI should be used.
It must be user friendly.
1.6.2.2. Reliability:
The reliability of the proposed system will be high due to the above functional reasons. The
reason for the increased reliability of the system is that now there would be proper storage of
information. The system shall be available all the time.
1.6.2.3 Performance:
The performance is at its best if stored locally, as the response time will be much faster. If the
product accessed via Internet, the performance is limited by the connection speed. The only
foreseen limitation is that of web server response. The system shall give responses in 1
second after checking the Customer’s or web information.
1.6.2.4 Security:
Any user who uses the system shall have a Login ID and password. Any modification (Insert,
delete and update) for the site shall be synchronized and done only by the administrator.
Registered Users shall only be able to view all information and the information as they are
permitted to do anything.
1.6.2.5 Maintainability:
The system shall provide the capability to back-up the Data. The system shall keep a log of
all errors.
CHAPTER 2
Envisioning the Solution
2.1.1 Registration
Users can registered by the admin. Each user is signed in to the web application by using his
unique id and password associated by the system.
The objectives of the project describe that what is to be ultimately achieved from the
development of the project. It is always essential and helpful for designing a computer based
system, to understand all the objectives and the requirements that the computer based system
is expected to satisfy in addition, the relative importance of each objective should also be
understood. The system is required to fulfill the following objectives.
1. To assure the availability of the right information at the right time.
2 .To make the information storage, processing and retrieval efficient.
3. To provide a system with a user-friendly interface which is simple to
Understand and efficient to use.
4. To provide a system which can easily modified for the future enhancement.
MYSQL Server is used for the back-end as a database. Which is a true relational Database
tool, so all requests to insert data in a table, or to update, delete or view data in a table must
be routed through RDBMS engine only. Direct calls for data, cannot be made through tables
themselves. Since there is a single point of control for data manipulation, therefore it provides
excellent data security.
Financial Feasibility
1. Sublime Text 3
2. MYSQL Server
3. Codeignitor (PHP)
For which the organization has to purchase the license and no other expensive development
tools, Software or Hardware is used, so the project is very much feasible economically and
financially.
Operation Feasibility
The proposed system will be operationally feasible because it will be efficient, accurate and
reliable and will provide more facilities than other existing systems. The proposed system
will be user friendly and easy to understand, so average person would be able to understand
and use this system easily, no high computer knowledge would be required for it.
CHAPTER 3
Planning the Solution
In functional specification declare all functions and needs of software as that given below.
All users it mean teacher and students need a proper channel for best understanding internally
working of Circuits Such as teacher wants to deliver his lecture in such way his students can
easily understand his lecture and give a good response And students want to understand
everything about circuits making, and wants to see graphically working anything about it that
make them able. They raise the image of their institute.
For operational requirements it is necessary for software engineer that he take a good view
about that what the necessities are for make such software that fulfill the needs the needs of
user requirements. For this purpose I when I take a deep view of user requirements so decide
I will make a system that show graphically internal working of gates or functions that are
using in inside the circuits. So I select Visual Studio and SQL server because I find it suitable
for my software requirements, and I start working on it.
DESIGN:
I divided this phase into two steps:
The Islamiya University of Bahawalpur RYK Campus Page 22
Crime Investigation System
Logical Design
Physical Design
By considering all the options I made layouts on the paper. This stage was totally on
hard paper. After having made all the layouts I get it checked from the client and by
having a compliment from their side I proceeded to next part of the design phase.
In this stage I converted all the logical design that was on the paper to computer and
made a soft copy of it. After matching the specified pages. I defined their relevant
features, wording and pictures that made it more attractive. By having it approved
from my client I started for the development phase.
Logical Design
In master plan of my project I want to develop complete system software that solve all
electronics students problem as graphical point of view and they could easily use
every functions that I mention and develop in my project and they give input for every
function and could view every function output as graphically and it is interesting for
them they use good looking software for their work.
Purpose of RM:
When managing projects, one of the first steps is to evaluate the risk attaching to the
project and then managing that risk. Risk tends to be high early in a project when
expenditures are low. Conversely, risk tends to be low later in a project when
expenditures are high. Accordingly, it is important that an early effort be made to
minimize project risk. This must be done early in the project when expenditure is low,
rather than later when the expenditure is high. In other words, risk should be dealt
with during the project initiation phase and then shifted “upstream” into the later
project stages. Frequency of reporting should be highest when risk is highest.
The objective of this document is to identify, contain and eliminate risks on a project.
Also to ensure that risks are identified and assessed as early as possible in the project
which allows the project manager to make informed decisions as to the direction of
the project so that it may lead to a successful conclusion?
The Major Risk is covering the sales Record, Purchase Record or main is Product
Available in Record.
CHAPTER 4
Development
Project life cycle consists of number of phases for that, there to exit some theories. According
to David I. Cleland and William Richard king, that phase of effective product management
include,
Conceptual Phase
Definition Phase
Production Phase
Operational Phase
Divestment Phase
The conceptual phase is when the design team is working with the customer to determine the
overall requirements for the product and potential deficiencies of existing processes and
products. The initial: One example would be the recent development of super fast partial BDS
system. Conceptual these systems were conceived many years ago but only recently have
become a reality. The reason is that the available technology could not support it. Now that
computer has multiple gigabyte memory available these calculations can be completed
directly in the active memory core without incurring the slowdown of the reading and writing
to the hard device.
In the conceptual phase the project team provides the answer to
What will the product cost?
When the product will available?
What will the product do?
How can the product be integrated into the exists system?
The overall design and production approach is determined during this phase and an initial
statement of work is prepared for the further detail in the definition phase.
The definition phase is when detail plain is prepared that determine the realistic cost,
Schedule and performance requirement for human and other critical resources. A good
Project manager will also identify those areas that risky or cause for concern. These areas are
then further detailed for recovery and contingency plan. This is very difficult than the
traditional BDS system environment where the teachers teach students their as usual way
they not show any graphical environment. In the traditional BDS environment the assumption
is that everything will worked exactly as planned.
In the definition phase the detailed statement of works is developed and broken down to the
necessary level for control purposes. An effective statement of works (SOW) should be
clearly define the objectives for the project and how success will be measured. The statement
of work should include cost and schedule target as well as quality target and usually become
the contractual statement of work.
Since revenue is directly related to the statement of work it is very important to have
agreement with the customer on the definition of keywords.
Once statement has been define and approved the work began on the work breakdown
structure. A graphical representation of work breakdown into structure.
4.2.1. Admin
Login
Invalid
valid
Manage/Register Manage Crime Manage Crime View Simple Map View pie View Line
User Detail Category and heat map charts Graph
Logout
Field Officer
Login
Save
Logout
DPO
Login
Select police
view map Filter Crimes view charts view graphs
station
Logout
Login
Verify
Add/ Edit
Police offi cer's
detail's stored
details
Details Stored
Successfully Response
Add/ Edit
Police-stations Detail stored
detai ls
Response
Details stored
successfully
Show Request
-
all feedback response
Logout
Logout
successfull
Login Verify
Crime detail
Request
Logout
Logout Succesfully
CHAPTER 5
Stabilizing
5.2. Objective
This document describes the plan for testing Inventory System. This Test Plan document
supports the following objectives:
Identify that system is now error free.
Program fulfills our customer requirements.
Identify the software components that should be tested.
Recommend and describe the testing strategies to be employed.
Identify that all covered functions of BDS working properly.
5.3. Scope
This test plan applies to the integration and system tests that will be conducted on
procurement of DLD learning system. It is assumed that unit testing already provided through
black box testing through extensive coverage of source code and testing of all functions of
interfaces.
The listing below identifies use cases, functions requirements that have been identified as
target of testing. This list represents what will be tested.
In verification testing test that when user login system check user name or password then
give him permission for login.
The system shall support the maximum simultaneous against the Atomized System at any
given time.
The test strategy presents the recommended approach to the testing of the software
applications. The previous section of Test requirements describes what will be tested; this
describes how it will be tested.
The main considerations for the test strategy are the techniques to be used and the criterion
for knowing when the testing is completed.
In addition to the considerations provided for each test below, testing should only be executed
using known, controlled system, in secured environments.
System Testing:
Testing of the application should focus on any target requirements that can be traced directly
to use cases (or business functions), and business rules. The goals of these tests are to verify
proper data acceptance, processing, and the retrieval, and the appropriate implementation of
the business rules. This type of testing is based upon black box a technique that is verifying
the application (and its internal processes) by interacting with the application via the GUI and
analyzing the output (results). Identified below is an outline of the testing recommended for
each application?
User interface testing verifies a user’s interaction with the software. The goal of UI Testing is
to ensure that the User Interface provides the user with the appropriate access and navigation
through the functions of the applications. In addition, UI Testing ensures that the objects
within the UI function and expected and conform to corporate or industry standards.
Performance Testing:
Performance testing measures response times, transaction rates, and other time sensitive
requirements. The goal of Performance testing is to verify and validate the performance
requirements have been achieved. Performance testing is usually executed several times, each
using a different “background load” on the system. The initial test should be performed with
a “normal” load, similar to the normal load experienced (or anticipated) on the target system.
A second performance test is run using a peak load.
Load Testing:
Load testing measures subjects the system under test to verifying workloads to evaluate
system’s ability to continue to function properly under these different workloads. The goal of
load testing is to determine and ensure that the system functions properly beyond the
expected maximum workload. Additionally, load testing evaluates the performance
Characteristics (response times, transaction rates, and other time sensitive issues).
Stress Testing:
Stress testing is intended to find errors due to low resources and competition for resources.
Low memory or disk space may reveal defects in the software that are not apparent under
Normal conditions. Other defects might results from competition for shared resource.
All planned tests are executed and specified system limits are
1 User wants add whole crime All Corresponding This information None
report and all information about category of crime is displayed on
the particular crime committed. is displayed. map.
1 User adds an invalid Area. System does not Error is displayed Information
accept an invalid according to the entered is invalid
area. case. or field is empty.
1 User clicks on logout from the User successfully User successfully Nil
system. logout. logout.
CHAPTER 6
Deployment
6.1. Screenshots:
6.2. APPENDIX
Activity:
A unit of work that a worker may be asked to perform.
Actor (instance):
Someone or something outside the system or business that interacts with the system or
business.
Actor class:
A class that defines a set of actor instances in which each actor instance playa the same role
in relation to the system or business.
Architectural pattern:
A description of an archetypal solution to a recurrent design problem that reflects well-
proved design experience.
Artifact:
A piece of information that is produced, modified, or used by a process, defines an area of
responsibility, and is subject to version control. An artifact can be a model, a model element,
or a document.
Actor:
Anything with behavior such a person, computer system or organization. The third phase of
Unified Rational Process, in which the software is brought from an executable architectural
baseline to the point at which it is ready to be transitioned to the user community.
Design:
The part of the software development process whose primary purpose is to decide how the
system will be implemented. During design, strategic and tactical decisions are made to meet
the required functional and quality requirements of a system.
Design model:
An object model that describes the realization of use cases; serves as an abstraction of the
implementation model and its source code.
Development Case:
Object model:
An abstraction of a system’s implementation.
6.3. REFERENCES
Online References
http://www.google.com
http://www.maps.google.com
http://www.developers.google.com/maps/
http://www.stackoverflow.com
http://www.codeignitor.com
http://www.getbootstrap.com
http://www.wikipedia.com