Sei sulla pagina 1di 55

ONLINE CRIME REPORTING

MCS -044
BY RANJITH S NAIR

Submitted to the School of Computer and Information Sciences, IGNOU

In partial fulfillment of the requirements for the award of the degree

Master of Computer Applications (MCA) 2012

Indira Gandhi National Open University Maidan Garhi, New Delhi 110068

ONLINE CRIME REPORTING

DECLARATION
I hereby declare that this project entitled Online Crime Reporting, submitted to University of IGNOU for the partial fulfillment of the Degree in MCA is a record of original work done by us and that this project work has not formed as the basis for the award of any Degree/Diploma of similar title to any candidate of any University.

Place: Date:

ONLINE CRIME REPORTING

ACKNOWLEDGEMENT
The completion of our project Online Crime Reporting is done with at most contributions and valuable helpings from our lectures and friends. We are thankful to our teachers, our librarian and all other staff in our institution for giving us the necessary guidance and help for completing our project successfully. Moreover we are thankful to all our friends and students in our campus for their valuable suggestions and encouragement. Finally we express our deep gratitude to all those who have helped us directly and indirectly for the successful completion of the project.

ONLINE CRIME REPORTING

ABSTRACT
A society is an assembly of people with different levels of mind. Some may be guilty to crime whereas some may be innocent. As the situation of now days, in review of increasing occurrences of crimes, the value and morale of society is decelerating. Here we are humbly presenting a new method of reporting non-emergency crimes through online facilities. Emergency crimes should be taken in its entire seriousness and urgency. The website Online Crime Reportingprovides a new way for reporting non emergency cases. This site is designed so that a user can do with at most ease. By submitting a complaint a case number will be provided through Email within 1-2 days with which he/she can check the progress of respective complaint. A complaint is registered in its entirety with the personal details of the user along with that of who he/she is on behalf to and with the crime details. The administrator of this web site, naturally a police officer responsible for assigning the case number after accepting the complaint is allowed to access with a protected username and password. Further progresses on the complaint can be remarked by the administrator whereas users can only view the progress. Important actions like closing or rejecting the complaint is a privilege of the administrator.

ONLINE CRIME REPORTING

INDEX
I. II. III. INTRODUCTION OBJECTIVE SYSTEM ENVIRONMENT
1. 2. 3. 4. 5. Hardware specifications Minimum hardware required by the system Software configuration Software requirements Software specifications a) About front end (1) (2) (3) b) .NET framework Visual Basic .NET ASP.NET

About back end (1) Microsoft SQL server 2008

IV.

SYSTEM ANALYSIS
1. 2. 3. 4. 5. 6. 7. Identification of need Existing system Drawbacks of existing system Proposed system Advantages of proposed system Preliminary investigation Feasibility study

V.

SYSTEM DESIGN
1. Algorithm

ONLINE CRIME REPORTING


2. 3. 4. 5. 6. 7. Flowchart Data flow diagrams Entity-relationship diagrams Database design Input design Output design

VI. VII.

SYSTEM DEVELOPMENT SYSTEM TESTING AND IMPLEMENTATION


1. 2. 3. 4. 5. System testing Implementation plan Education and training Training to application software Post implementation review

VIII. IX. X. XI.

FUTURE ENHANCEMENTS CONCLUSION BIBLIOGRAPHY SCREEN LAYOUT


1. 2. User/Public side Administrator/Server side

ONLINE CRIME REPORTING

INTRODUCTION
The world today is better to say machine age, the place where things controlled, formulated and results provided with the essential help of machines viz. computers. As human race finds more time setting up on computers via networks, like internet, on considering the time they spends on zapping through websites, some important facilities is better to provide via online. The project explained in this report Online Crime Reporting is an online facilitation to report non-emergency crimes. The project has its existence in two fragments, as usual, a client/user side and a server/administrator side. The client/user side provides facilities, mainly Report a crime. Here the user can report a crime of the sort of nonemergency along with his personal details, with that of who he/she is on behalf to and with the crime details. The user should check an agreement to ensure that the crime reported is genuine or else he/she will face its consequences and punishments for the act of fraud. Reporting a crime successfully, will provide the user with a case number via Email in 1-2 days with which he/she can check the progress through the Check Progress link in the home page The server side meant to be used by police personnel via username and password is full of facilities to administer on the complaints/crime reported by the clients/users such as accepting the complaint, add progresses of the investigations on the crimes reported, closing or rejecting the complaint under respective circumstances etc.

ONLINE CRIME REPORTING

OBJECTIVE
The Online Crime Reporting website aims to completely computerize manual complaint registering process, especially nonemergency crimes, so as to make time consumption less. The website provides a user friendly environment to register/report complaints. After registering a complaint, the user will receive a case number via Email, if the complaint has been accepted by the website administrator/police department. The manipulations on the registered complaints are done by the website administrator including the determinations like accepting, rejecting, setting progresses and closing of the complaints according to the investigations. The whole details about the user and the crime is made available to the administrator by the user. If any further clarifications needed, telephone calls are done by the police officers to the person who registered the complaint. The main objectives are: Online complaint registration. Fast and easier reporting. Facility for checking progress on the investigation by the user. Facilities for accepting, rejecting, setting progresses and closing the complaints by the administrator. Sending case number to the user via Email while accepting the complaint. Sending Email to the user while rejecting the complaint. Miscellaneous guides to the user such as district map showing police stations, important contacts etc.

ONLINE CRIME REPORTING

SYSTEM ENVIRONMENT
System configuration means the essential facilities for the working of our new website. There are mainly two classifications for system configuration. 1. Hardware specifications. 2. Software specifications. HARDWARE SPECIFICATIONS The following hardware is used for the development of the system. Processor Main memory Hard disk capacity Display : Intel Core i5 : 4 GB : 500 GB : 14.0 HD LED Backlight Display

MINIMUM HARDWARE CONFIGURATION REQUIRED BY THE SYSTEM Platform Processor Main memory Hard disk capacity Printer : Windows 2000/XP : Pentium 3/AMD/above : 256 MB : 4 GB : Dot Matrix/DeskJet/Laser

SOFTWARE CONFIGURATION

ONLINE CRIME REPORTING

The software used for creating this website is ASP.net, Windows 7 Ultimate and Microsoft SQL Server 2008.

SOFTWARE REQUIREMENTS Microsoft Windows with IIS (OS 98 or above). ASP.net (Front end). Microsoft SQL server 2008(Back end).

SOFTWARE SPECIFICATIONS FRONT END BACK END OPERATING SYSTEM : : : ASP.Net with VB.NET SQL SERVER 2008 Windows 7 Ultimate

ABOUT FRONT END .NET framework The .NET Framework is an integral Windows component for building and running the next generation of software applications and Web services. Microsoft .NET is software that connects information, people, systems, and devices. It spans clients, servers, and developer tools. The .Net Framework is a multi-language environment for building, deploying and running XML Web services and applications. It consists of two main parts.

Common Language Runtime: Despite its name, the runtime actually has a role in both a components and runtime and development time experiences. While

10

ONLINE CRIME REPORTING

the component is running, the runtime is responsible for managing memory allocation, starting up and stopping threads and processes, and enforcing security policy, as well as satisfying any dependencies that the component might have on other components. Unified Programming Classes: The Framework provides developers with a unified, object-oriented, hierarchical and extensible set of class libraries (APIs). The .Net Framework is a new computing platform that simplifies application development in the highly distributed environment of the internet. The .Net Framework is designed to fulfill the following objectives: To provide a consistent object oriented programming environment whether object code is stored and executed locally but Internet distributed or executed remotely. To provide code-execution environment that minimizes software deployment and versioning conflicts. To provide code-execution environment that guarantees safe execution of code, including code created by unknown or semi-trusted third party. To provide code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications, such as Windowsbased applications and Webbased applications. Server Application Development Server side applications in the managed world are implemented through runtime hosts. Unmanaged applications host the common language runtime, which allows your custom managed code to control the behavior of the server. This model provides you with all the features

11

ONLINE CRIME REPORTING

of the common language runtime and class library while gaining the performance and scalability of the host server. When building applications or re-usable types (components) for the .NET Framework, you must first select a programming language that you intend to write your source code in. Fortunately, the .NET Framework supports many different programming languages including C#, C++ with Managed Extensions, Visual Basic .NET, Cobol, APL, Perl, and many more. The language you choose will determine how you express your intentions to the .NET Framework. Unified Programming Classes: The Framework provides developers with a unified, object-oriented, hierarchical and extensible set of class libraries (APIs). The .Net Framework is a new computing platform that simplifies application development in the highly distributed environment of the internet. The .Net Framework is designed to fulfill the following objectives: To provide a consistent object oriented programming environment whether object code is stored and executed locally but Internet distributed or executed remotely. To provide code-execution environment that minimizes software deployment and versioning conflicts. To provide code-execution environment that guarantees safe execution of code, including code created by unknown or semi-trusted third party. To provide code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications, such as Windowsbased applications and Webbased applications.

12

ONLINE CRIME REPORTING

Visual Basic .NET Visual Basic.NET programming language closely related to Visual Basic Programming Language but the two languages are not the same. The VB.NET programming language has a syntax that is similar to English which promotes the clarity and readability of Visual Basic code. It can be either a strongly typed or loosely typed language. Loose typing defers much of the burden of type checking until a program is already running. This includes not only type checking of conversions but also of method calls, meaning that the binding of a method can be deferred until runtime. This is useful when building prototypes or other programs in which speed development is more important than execution speed. Features of VB.NET VB.NET is a program that is advanced version of VB 6.0. The main features of the VB.NET are, Object Oriented Language Powerful language for development of application programs. More security. Multithreading and Multitasking Internet Programming Interpretability Easily understanding coding

ASP.NET ASP.NET is the hosting environment that enables developers to use the .NET Framework to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a complete architecture

13

ONLINE CRIME REPORTING

for developing Web sites and Internet-distributed objects using managed code. About ASP.NET Active Server Pages is an open, compile-free application environment in which we can combine HTML, scripts, and reusable ActiveX server components to create dynamic and powerful Web-based business solutions. ASP.Net, the latest version of Asp is Microsofts technology for building dynamic, database-driven web sites. The reason that Microsoft named the technology Active Server Pages is because it very basically describes what the technology is all about ASP.NET is a part of Microsofts overall. NET framework, which contains a vast set of programming classes designed to satisfy any conceivable programming need. Significant features of ASP.NET ASP.NET uses complied code written in Common Language Runtime Language such as Visual Basic and c#. ASP.NET pages are built on server-side controls.

ASP.NET includes a new technology called Web services. Web services can be used to access methods and properties and transfer database data across the Internet. ASP.NET includes page and data caching mechanisms.

When an ASP.NET page is compiled, it is not compiled directly into machine code. Instead it is compiled into an Intermediate-level language called Microsoft Intermediate Language (MSIL). All .NET-compatible languages are compiled into this Intermediate Language. Several of the highest traffic Web Sites on the Internet employs Active Server Pages.

14

ONLINE CRIME REPORTING

Examples include Dell Online, Barnes and Noble, 1-800-Flowers, and the Microsoft site itself. Both Web Forms and XML Web services use IIS and ASP.NET as the publishing mechanism for applications, and both have a collection of supporting classes in the .NET Framework.

ABOUT BACK END Microsoft SQL Server 2008 Features of SQL server 2008 1. Policy-Based Management Management is centralized, thereby reducing the need to configure each server separately Administration is simplified, reducing the effort required to maintain standardization and compliance, even in complex environments Configuration is straightforward and can be done entirely within SQL Server Management Studio Out-of-the-box predefined policies make it easy to get started Backwards compatibility supports managing instances of SQL Server 2008, SQL Server 2005, and SQL Server 2000 2. Performance Data Collection (Data Collector) Setup wizard makes configuration simple Data collection is automated by using set of SQL Server Agent jobs and SQL Server Integration Services packages Management is centralized so data collection can be easily configured and results can be viewed in one place Performance impact is minimal because the data collected can be cached and uploaded to the data warehouse later

15

ONLINE CRIME REPORTING

3. Data Compression Save disk storage Enable compression option for individual tables or indexes Configuration is easy using the Data Compression wizard Applications do not need to be reconfigured as SQL Server handles compression and decompression of data Compression can improve disk I/O and memory utilization 4. Resource Governor Prioritize applications, users, and computers competing for the same resources Prevent runaway queries that hold resources for extended periods of time Limitations are not enforced when there is no competition for resources 5. Transparent Data Encryption Implements strong encryption keys and certificates to secure data Applications do not need to be modified to support Transparent Data Encryption Enables compliance with data privacy regulations Does not increase the size of the database 6. External Key Management / Extensible Key Management Helps organizations comply with data privacy regulations Reduces administration requirements when there are multiple keys and certificates to manage Standard interface supports third party hardware security modules 7. Data Auditing

16

ONLINE CRIME REPORTING

Enables compliance with security regulations Simple configuration using SQL Server Management Studio Minimal impact on performance because audit data is stored outside of SQL Server database files 8. Hot-Add CPUs and Hot-Add Memory Dynamically add memory and processors to servers without incurring downtime 9. Streamlined Installation Easier to install SQL Server Setup now advises of configuration problems such as installation pre-requisites, which helps streamline the installation process 10. Backup Compression Save storage space Compressed backups can be stored on tape or on disk Simple configuration using SQL Server Management Studio Default state of all backups on a server to be compressed can be configured

17

ONLINE CRIME REPORTING

SYSTEM ANALYSIS
System study or system analysis is the process of gathering and interpreting facts, and using the information of recommended improvements on the system. System analysis is a problem solving activity that requires intensive communication between the system users and system developers. The system analyst plays the role of an interrogator and dwells deep into the working of present system. The system is viewed as a whole and the inputs to the system are identified. The outputs from the organizations are traced through various phases of the processing of inputs. A detailed study of this processes must be made by the various techniques like interviews, questionnaires etc. The conclusion is an understanding of how the system functions. Now, the existing system is subjected to close study and the areas are identified. Preliminary Study is the process of gathering and interpreting facts, using the information for further study on the system. Preliminary Study is a problem solving activity that requires intensive communication between the system users and the system developers. It does various feasibility studies. In the studies a rough figure of the system activities can be obtained, from which the decision about the strategies to be followed for the Effective System Study and Analysis can be taken. Here in this secured data transmission project, a detailed study of the existing system is carried along with the all the steps in the system analysis. The importance of System Analysis phase is establishment of the requirements for the system to be developed and installed. Analyzing the project to understand the complexity forms the vital part of the

18

ONLINE CRIME REPORTING

system study. Problematic areas are identified and information is collected. Fact finding or gathering is essential to an analysis of requirements. System analysis is the system approach to study and solution of requirements. System analysis is the system approach to study and solution of problem using computer based system. A system is an orderly grouping of independent components linked together according to a plan to achieve a specific objective. Each component is a part of the total system and has to do its share of work for the system to achieve the desired goal. This process also referred to as the life cycle methodology. Different stages of life cycles: Identification of need: One must know what the objective is, before it can be achieved. Feasibility: A test of the system proposal according to its workability impact and orientation ability to meet user needs and effective use of resource. Analysis: Its a detail study of various operations performed by the system and their relationships within and outside the system. Design: Decides the format to which the output is to be produced. Implementation: It involves user training, site preparation and file conversion. IDENTIFICATION OF NEED The objectives of the system analysis phase are the establishment of the requirements for the system to be acquired, developed and installed. All sectors have been computerized. In order to automate and improve the efficiency of the work, appropriate systems are required. So workload can be minimized. The current/present method is much time consuming. EXISTING SYSTEM

19

ONLINE CRIME REPORTING

The existing system is manual work in which written complaints are submitted directly by hand/in person or telephony through the link 100. This way of reporting is more time consuming. All records are kept manually and are maintained at different law and order institutions. A lot of time is also consuming while trying to get information such as current status of a complaint. DRAWBACKS OF EXISTING SYSTEM 1. 2. 3. 4. 5. It is time consuming. It is very much laborious. Record keeping is such a tedious job. Existing website with inactive links for reporting crimes. Much more difficulty in gathering information about the progresses of the registered complaint.

PROPOSED SYSTEM The proposed system is an effort to find solutions to most of the inconveniences occurred/occurring in existing system. Lot of savings in space by avoiding the registers, books etc, in time, by enhancing the speed from man to machine can be achieved by developing this Online Crime Reporting website. By computerizing the system, it is easy to store and retrieve data. It is connected through internet, so time can be saved. All data can be stored with the help of reporting pages of website. In our proposed Online Crime Reporting system, the user can enter the website, register new complaints/newly report crimes and check the status of previously registered complaints. The task of updating the status of a complaint is accomplished by the administrator of the website. Submitting a complaint/report in Online Crime Reporting website, stores the user (who registers the complaint) information and complaint information to the database. A case number is assigned to a newly accepted complaint and is sent to the user via Email. The user can check the progress of the complaint later using this

20

ONLINE CRIME REPORTING

case number. The website would facilitate faster data manipulation at reduced cost.

ADVANTAGES OF THE PROPOSED SYSTEM 1. Manipulation, storing and retrieval of information are made quick and simple. 2. Lesser labor required. 3. Online facility saves time. 4. Saves space by eliminating the usages of books, records, sheets etc. 5. Miscellaneous guides to the users like district map showing police stations, important contacts (telephone numbers of the police stations in Ernakulam district) etc. PRELIMINARY INVESTIGATION A detailed examination on the current system was conducted for preliminary investigation by, gathering information about the needs, as an effort to understand the complete details and implications. The tools used for data collection are: Review of written documents Much documentation such as forms, records, complaints etc are reviewed, organized and evaluated. The methods of recording each and every process were studied and noted. On site observation Here the operation and physical layout of the current system were studied by direct observations. This method is directed towards describing and understanding events and behaviors as they occur.

21

ONLINE CRIME REPORTING

Recording of information and other relevant operations were observed and studied directly. Interviews and questionnaires People usually provide a best sort of information through this activity and hence official and personal interviews with several police officers and social workers including politicians were conducted. With the list of questions well formulated before the interviews could focus on collecting pertinent answers. FEASIBILITY STUDY Feasibility study is a system proposal according to work ability, impact on the operation, ability to meet users need and efficient use of resources. The three key consideration involved in feasibility analysis are Technical Feasibility It deals with the hardware as well as software requirements. A feasibility study deals with the scope was whether the work for the project is done with current equipments or with the existing software technology. Here we wants .net platform only. Operational Feasibility The purpose of the operational feasibility study was to determine whether the new system need is developed and implemented? Will there be a resistance from resource that will undermine the possible application benefits? This positive exposure from them encouraged the development of the new system Economical feasibility It is the most frequently used method for evaluating effectiveness of the software. It is most commonly known as the cost benefit analysis. The procedure is to determine the benefits and savings that are expected from a candidate system and compare them with cost. If

22

ONLINE CRIME REPORTING

benefits outweigh cost, the decision is made to design and implement the system. Otherwise, further alternatives will have to be made.

SYSTEM DESIGN
Its the step by step implementation of the recommendations given after the feasibility study of the software along with procedural details and understanding. Naturally it is defined as the first step in the development of final system. The system proposal given through user oriented documentation is transformed into the perspective of programmers. This phase visualizes the transformation from the logical views to physical specifications through development. The blueprint of the upcoming system along with the relations of the components is formulated. Development and formulation of the system is done with at most care such that the potential of acceptability by the user is high. The system design performed has following steps/stages. 1. 2. 3. 4. 5. Data Flow Diagram Design. Entity Relationship Diagram. Database Design. Input Design. Output Design.

23

ONLINE CRIME REPORTING

DATA FLOW DIAGRAM A data flow diagram is of networks that describe the flow of data and the processes that change or transforms data through system. It is the formal and logical abstract of a system that may have many possible physical configurations, so some set of symbols without any physical sense are used to represent data sources, data flow, data transmission and data storage.

The basic structures used in DFDs are:

To represent data process

To represent external interactor

To represent data store/database

To represent data flow

24

ONLINE CRIME REPORTING

DFD Level 0

DFD Level 1.0

25

ONLINE CRIME REPORTING

26

ONLINE CRIME REPORTING

DFD Level 1.1

DFD Level 2.0

DFD Level 2.1

27

ONLINE CRIME REPORTING

DFD Level 2.2

ENTITY RELATIONSHIP DIAGRAM

28

ONLINE CRIME REPORTING

An ER diagram can express the overall structure of the database graphically. ER diagrams are simple and clear. The ER diagram used in this project is given below.

29

ONLINE CRIME REPORTING

30

ONLINE CRIME REPORTING

DATABASE DESIGN Database design mainly aims at handling large volumes of information, involving the definitions for the structure of storage and provisions for the manipulation of information, providing safety of information despite of system crashes due to unauthorized accesses. Some conditions are satisfied in database design stage. Controlled redundancy. Ease of use. Data independency. Accuracy and integrity. Recovery from failure. Security and privacy. Performance.

As interfering whole, the database has a general theme as to handle information, as a collection of interrelated data stored with minimum redundancy for quick and efficient usages. Application design also runs parallel to database design, which is met with at most care and security during the designing. A better effort is to be done in making the minimum number of databases for maximum efficiency of the system.

31

ONLINE CRIME REPORTING

Table: Users

Table: Complaints

32

ONLINE CRIME REPORTING

Table: ComplaintProgresses

Table: ComplaintClosedDetails

Table: AdminUsers

Table: PoliceStations

33

ONLINE CRIME REPORTING

INPUT DESIGN The creation of website is made such a way that provisions are made in act in order to prevent the entrance/entry of wrong input; As example, when a wrong input is passed, facilities to display error messages are made. As the stage input design is the one that makes the users to interact with the website, it consists of developing procedures and specifications for processing. The main steps in input design are: Controlling the amount of inputs. Avoiding inordinate delay.

OUTPUT DESIGN Outputs from the system as information and results are referred in this phase. Here the determination is taken about the type and format of the output. It is needed to remember that the user evaluates the usefulness of the system only through the output it generates. The distribution specifications of the output to intended recipients are determined here. The user friendliness of the screens with necessary controls and layouts fits for these purpose.

34

ONLINE CRIME REPORTING

SYSTEM DEVELOPMENT
The development phase is the third of four phases in the system development life cycle. In this phase the computer information system is constructed from the detailed specification prepared in the design phase. The largest product expenditures occur during the development phase. The principle activity of the development phase is coding and testing the computer programs that make up the computer components of the overall system. Other important activities include implementation, planning, equipment acquisition and system testing. This system is providing with the password facility, which assure better security to the system. The main aim of the development phase is to design the coding into corresponding programming language. Simplicity and clarity is the main property of the coding. The coding depends on the logical and detailed design of the system in the system design phase. During the development phase of our project we created the forms and database. At present we are unable to provide connection between front end and back end. So we cannot implement our software. In development phase, we develop our proposed system as according to the design specification. For this we have to provide a working environment. There may be changes in our ideas and concepts we move from design to development phase. In order to working environment, our first aim was to install frontend tools (ASP with VB.NET). We succeeded in the process. Then we could make a connection between front-end and backend, so that we could fulfill our ideas.

35

ONLINE CRIME REPORTING

SYSTEM TESTING AND IMPLEMENTATION


Real time data is used from various systems for testing purpose and results are compared with those obtained manually. Variations between these are voided subsequently. A perfect system cannot accept invalid data, so it is also put into test in order to clear the mistakes in proportion. So a reconstruction is made such that the system is fully compatible to correct inputs and can tackle the wrong/incorrect ones. As the system is comprised of numerous procedures, in order to attain the proper working, minute errors are treated in its seriousness and checked carefully. The implementation of system is done after the testing phase along giving accurate training to the system users and postimplementation reviews are made. System testing (and enhancement) has five parts. System testing Implementation plan. Education and training. Training on application software. Post implementation review.

SYSTEM TESTING Assurance of quality of the system through testing includes the ultimate specification reviews, design and coding of the software, with the initiative of finding errors. On saying with probability, a better testing has high probability of finding errors. Main objectives Ensuring the working of system as per the operational specifications. Ensuring user requirements are concerned whilst operation. Ensuring the actual functionality of the controls.

36

ONLINE CRIME REPORTING

Ensuring input-output accuracy. Ensuring tackling of incorrect inputs eventually. The upcoming system is made for various testing for integrity and result validations. Unit testing The developer performs this first level of testing which focuses on the proper working of various modules as a whole, which is done during code development. The success of this testing is in finding the correctness of the internal logic of the system. Interface testing The assurance for the proper flow of information in and out of the program is made through this test. Data structure test Through this testing it is made ensured that the existence of temporary data doesnt scrambles the integrity of the program during all steps, so the data structure is thoroughly examined. Accuracy in the storage of data in underlying tables is also taken in concern. Independent path test Assurances of proper working of all individual paths through out the program at module boundaries are tested.

Code testing A well planned top-down sequenced testing is done for the program code, until the programs are assembled as a component that can be tested as a unit. The sub-modules in each main module are tested with developed test cases for the correct output without any break in the flow of execution.

37

ONLINE CRIME REPORTING

Combine module testing The goal of this important sort of testing is dealing with the capability of integrating modules properly. For a satisfactory result, the test is conducted by combining modules into sub-systems. Validation testing The restrictions for the invalid data are tested for proclaiming the system perfect. The improper blocks are made reconstructed until it is ready to respond accurately against valid and invalid data. Specification testing The performance of system under various circumstances and conditions are tested. User acceptance testing Without emphasizing on the internal logical constraints, the external behavior of the system is tested for the purpose of exercising the total system, by leaving the program under real time environmental conditions. The specifications for this test are made by the user and responsible for conducting. This gives surety for the user about the readiness of the system as for operating. IMPLEMENTATION PLAN The transformation from theoretical designs to working system is done in this stage. Developed package of system is tested with simple data, accurate error identification and then through proposed change from the user, training to the user etc. A dress rehearsal like working of system is done, so as the system is scrutinized, for pointing out errors and modifications required if any keeping in mind the expectations and specifications from the system. EDUCATION AND TRAINING The expectations from the system are made achieved by the people who will be involved to be confident of their role in the new
38

ONLINE CRIME REPORTING

system. The complexity of the system is directly proportional to the amount of training and education given for the users. Education is different from the training, as the user through education can be a part of the development of the system. Education have the capability to make training more interesting, and its needed to make confidence in the people that they can make important contributions in system changes. Training just means to give user specific skills in order to meet their new job requirements. The role of system analyst in training will make it more understandable and effective. Training provides a better overview of new system and its present objectives. TRAINING ON THE APPLICATION SOFTWARE Awareness about the new system is made to the users through training, and with the underlying philosophy of the system (screen design, flow, error types during inputs, validation checks etc) Application training means covering of the information needed for a specific user to use the system, as the users of the system may be of at different levels of hierarchy. POST IMPLEMENTATION REVIEW System performance v/s expected requirements are evaluated. The implementation problems if any is taken seriously and taken care of along with admiring the achievements, failures etc. The works done here are used to improve the efficiency and user friendliness of the system.

39

ONLINE CRIME REPORTING

FUTURE ENHANCEMENTS
Future enhancements in the Online Crime Reporting website include live video conferencing/chatting and telephony with Police officers and officers of Crime Stopper Branch. Another important enhancement will be proposed in future is reopening of closed/.rejected cases. A user will be made possible to reopen cases that were once closed.

40

ONLINE CRIME REPORTING

CONCLUSION
At the finishing stage of this project, we are proud to present before everybody an attempt for facilitating the complaint registering process via online. The website ONLINE CRIME REPORTING is our humble forward to the society. It is natural to have mistakes and the occurrences of drawbacks as we lack the practice and experience. But we have done our best to tackle those and to rectify them with maximum user friendliness in design and program execution.

41

ONLINE CRIME REPORTING

BIBLIOGRAPHY
Web Sites www.msdn.microsoft.com/ASP.net www.vbcity.com www.codeguru.com www.codeproject.com

Books Steven Holzner-Visual Basic 2005 Black Book Evjen Henselman-Professional Asp.Net 2.0,Wrox Publications Paul Nielson-Ms SQL Server Bible, Wrox Publications Rojer S. Pressman-Software Engineering A Practical Approach, McGraw Hill. Fifth Edition C. J. Date-An Introduction to Database Systems, Addison Wesley Richard Fairly-Software Engineering, McGraw Hill

Applications MSDN Library for Visual Studio 2008 Beta 2 - ENU

42

ONLINE CRIME REPORTING

SCREEN LAYOUTS

43

ONLINE CRIME REPORTING

USER/PUBLIC SIDE Online Crime Reporting-Website-Home page

44

ONLINE CRIME REPORTING

Online Crime Reporting-Website-Conditions page

Online Crime Reporting-Website-Enter user details page

45

ONLINE CRIME REPORTING

Online Crime Reporting-Website-Enter crime details

Online Crime Reporting-Website-User check progress login

46

ONLINE CRIME REPORTING

Online Crime Reporting-Website-User progress view

Online Crime Reporting-Website-About site page

47

ONLINE CRIME REPORTING

Online Crime Reporting-Website-History of police

Online Crime Reporting-Website-Important contacts page

48

ONLINE CRIME REPORTING

ADMINISTRATOR/SERVER SIDE Online Crime Reporting-Website-Administrator login page

49

ONLINE CRIME REPORTING

Online Crime Reporting-Website-Administrator home page

Online Crime Reporting-Website-Administrator set progress page

50

ONLINE CRIME REPORTING

Online Crime Reporting-Website-Administrator view progress page

Online Crime Reporting-Website-Administrator closing complaintsw

51

ONLINE CRIME REPORTING

ALGORITHM
Report a crime: 1. 2. 3. 4. 5. Start Input user details Input crime details Register crime Stop

Check crime progress: 1. 2. 3. 4. Start Input case number View case progress details Stop

Set progress: 1. 2. 3. 4. Start Input case number Set progress as accepted or rejected Stop

52

ONLINE CRIME REPORTING

FLOWCHART
Report a crime:

Start

Input user details

Input crime details

Register crime

Stop

Check progress: Start

Input case number

View case progress

Stop

53

ONLINE CRIME REPORTING

Set case progress:

Start

Input case number

Set case progress

Stop

54

ONLINE CRIME REPORTING

55

Potrebbero piacerti anche