SlideShare ist ein Scribd-Unternehmen logo
1 von 46
PROJECT REPORT
ON
CRIME REPORTING SYSTEM
BY
HAROON ALAM CLASS NO. 204
BS (CS)
SESSION 2012-2015
A project report submitted to the IBMS, The University of Agriculture,Peshawar in partial fulfillment
of the requirements for the degree of
BACHELOR OF SCIENCE IN COMPUTER SCIENCE
SUPERVISED BY
Mr. FAWAD ALI
INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE
THE UNIVERSITY OF AGRICULTURE
PESHAWAR, PAKISTAN
FEBRUARY, 2016
PROJECT REPORT
ON
CRIME REPORTING SYSTEM
BY
HAROON ALAM CLASS NO. 204
BS (CS)
SESSION 2012-2015
A project report submitted to the IBMS, The University of Agriculture,Peshawar in partial fulfillment
of the requirements for the degree of
BACHELOR OF SCIENCE IN COMPUTER SCIENCE
Approved By:
_______________________________ (Advisor)
Mr. Fawad Ali
_______________________________ (Member)
Mr. Imran Ud Din
_______________________________ (Member)
Mr. Sadiq Shah
_______________________________ (Incharge CS/IT)
Mr. Muhammad Shahid
_______________________________ (Additional Director IBMS)
Dr. Muhammad Fayaz
INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE
THE UNIVERSITY OF AGRICULTURE
PESHAWAR, PAKISTAN
FEBRUARY, 2016
TABLE OF CONTENTS
CHAPTER 1.........................................................................................................................................1
CHAPTER # 1 Introduction...................................................................................................................2
1.1 Introduction..............................................................................................................................2
1.2 Overview of the Present System.................................................................................................2
1.3 Drawbacks in the Present System...............................................................................................3
1.3.1 Time Consuming.................................................................................................................3
1.3.2 Redundancy of Data (Duplication of Data)............................................................................3
1.3.3 Changing/Removing Of Records...........................................................................................3
1.3.4 Storage Media....................................................................................................................3
1.3.5 Information Updating..........................................................................................................3
1.3.6 Backup and Recovery ..........................................................................................................4
1.3.7 Integrity .............................................................................................................................4
1.3.8 Burden of Work ..................................................................................................................4
1.4 Background...............................................................................................................................4
1.5 Proposed System and Objectives of the System ..........................................................................6
1.6 Advantages of Proposed System.................................................................................................6
1.6.1 Accessibility..................................................................................................................6
1.6.2 Accuracy and Consistency....................................................................................................7
1.6.3 Input Improvements............................................................................................................7
1.6.4 Faster Information Retrieval................................................................................................7
1.6.5 Reduction of Workload........................................................................................................7
1.6.6 Flexibility............................................................................................................................7
1.6.7 Reduced Redundancy..........................................................................................................7
1.6.8 Reductionin Cost................................................................................................................8
1.6.9 Security..............................................................................................................................8
1.6.10 Backup Facilities................................................................................................................8
1.6.11 Data retrieval....................................................................................................................8
1.7 Operational feasibility................................................................................................................8
1.8 Technical Feasibility...................................................................................................................8
1.9 Financial Feasibility....................................................................................................................9
1.10 Requirement Analysis..............................................................................................................9
1.10.1 Requirement Definition.....................................................................................................9
1.10.2 Requirement Specification.................................................................................................9
1.11 Main Components of Our Project ...........................................................................................10
1.12 Tools Used ............................................................................................................................11
CHAPTER # 2 System Design ........................................................................................................13
2.1 Introduction............................................................................................................................13
2.1.1 Logical Design.......................................................................................................................13
2.1.2 Physical Design.....................................................................................................................13
2.2 Input Design............................................................................................................................13
2.3 Data Capturing........................................................................................................................14
2.4 Input Validation ......................................................................................................................14
2.5 Output Design.........................................................................................................................14
2.6 Data Base Design.....................................................................................................................14
2.7 Architectural Design................................................................................................................15
2.8 Conceptual Database Design....................................................................................................15
2.9 Modular Design.......................................................................................................................15
2.10 Internal Data Base Design ......................................................................................................20
2.11 Internal Data Base Design of Crime Reporting System..............................................................20
Figure 2.5 FIR Table.......................................................................................................................20
Figure 2.6 Online FIR Details Table.................................................................................................21
Figure 2.7 Crime Type Table ..........................................................................................................21
Figure 2.8 Admin Login Table.........................................................................................................22
Figure 2.9 FIR Forward Table .........................................................................................................22
Figure 2.10 City Table....................................................................................................................22
2.12 Logical Database Design.........................................................................................................22
2.13 Entity....................................................................................................................................23
2.14 Entity Relationship Model......................................................................................................23
2.15 Entity Relationship Diagram...................................................................................................23
Figure 2.11 Data flow Diagram.......................................................................................................26
CHAPTER # 3 System Implementation................................................................................................28
3.1 Overview ................................................................................................................................28
Figure 3.3 FIR Page........................................................................................................................32
CHAPTER # 4 System Testing.............................................................................................................34
4.1 Introduction................................................................................................................................34
4.2 Testing Objectives...................................................................................................................34
4.3 Testing Strategies....................................................................................................................34
4.3.1 White Box Testing.............................................................................................................35
4.3.2 Stress Testing....................................................................................................................35
4.3.3 Acceptance Testing...........................................................................................................35
4.3.4 Assertion Testing..............................................................................................................36
4.3.5 Unit Testing......................................................................................................................36
4.3.6 System Testing.....................................................................................................................36
4.4 System Evaluation...................................................................................................................36
4.5 Implementation ......................................................................................................................37
4.6 Installation of Computer Equipment’s.......................................................................................37
4.7 Testing the New System...........................................................................................................37
4.7.1 Unit Testing......................................................................................................................37
4.7.2 Integrated Testing.............................................................................................................37
4.7.3 System Testing..................................................................................................................37
4.7.4 Direct/ Cash Conversion ....................................................................................................38
4.8 Conclusion...........................................................................................................................38
Reference List...................................................................................................................................40
List of Figures
Figure 2.1 General Data Entry ...........................................................................................16
Figure 2.2 Delete Module ..................................................................................................17
Figure 2.3 Update Module .................................................................................................18
Figure 2.4 Login Module...................................................................................................19
Figure 2.5 FIR Table........................................................................................................20
Figure 2.6 Online FIR Details Table...................................................................................21
Figure 2.7 Crime Type Table .............................................................................................21
Figure 2.8 Admin Login Table...........................................................................................22
Figure 2.9 FIR Forward Table............................................................................................22
Figure 2.10 City Table ......................................................................................................22
Figure 2.11 Entity Relation Diagram..................................................................................25
Figure 2.12 Data flow Diagram..........................................................................................26
Figure 3.1 User interface...................................................................................................30
Figure 3.2 Admin Page......................................................................................................31
Figure 3.3 FIR Detail Page ................................................................................................32
List of abbreviation:
CRS: Crime Reporting System
FIR: First Information Report
PHP: Hypertext Preprocessor
MYSQL: Structure Query Language
HTML: Hyper Text Markup Language
CSS: Cascading Style Sheet
1
CHAPTER 1
INTRODUCTION
2
CHAPTER # 1 Introduction
1.1 Introduction
Online FIR System is the Computerization of present manual system of Police Stations. There
are many flaws and shortcomings in the present system. The present system is a manual system.
In case of present manual system all the record is kept in documented form and stored in various
types of registers. The manual system has no proper system for record storage and storing the
information about crimes and criminals. The present system of police is not automated. The
documentation of criminal records is done manually. Case files are dumped in heaps while some
are kept on shelves. These important documents quickly get dusty and because of lack of proper
storage, some criminal documents are seriously damaged. With this kind of situation, it becomes
highly difficult and even impossible to track down known criminal, access past criminal history
of a suspect and know the status of some concluded cases.
In police stations all the file work is done by the staff, so burden of work leads to the criminal’s
information to be delayed. There are also problems of record storage, updating, backup and
recovery and redundancy of data. To overcome the problems in present system we design such a
computerized information system, which is free of all the flaws, present in the manual system of
the institute. As computer is one of the leading technologies nowadays, so we propose a
computer based system that will fulfill the requirements of the police stations easily and will be
the solution to the problems faced by Police stations. It will facilitate both the user as well as
administrative staff of the Police Stations. Computerized system provides accuracy, security, and
reduced redundancy, reduction of work load, backup facilities and faster information retrieval.
1.2 Overview of the Present System
The present system of the Police Stations in KPK is a manual system. In order to make a
computerized system, we first check the present system so that we get to know about the flaws
and shortcomings in this system. This study will help us to design such a computerized system
for Police, which is free of all the flaws presented in manual system of the police station and will
facilitate both the user as well as administrative staff of police station.
3
1.3 Drawbacks in the Present System
There are some drawbacks and flaws existing in current manual system. For example, record
about crime cases and FIR’s are recorded manually. There is no proper security of these record
books, because all the record books are stored in the cabinet and anyone can damage them or
anything can possibly damage them, these problems have plagued the police department and
affect the policing system in the country. Some of these problems are enumerated below.
1.3.1 Time Consuming
In the existing system, the information about the crimes is stored in registers. When information
about a particular crimes or FIR’s is required or when some changes are needed in the record,
one has to search many registers for required register. Moreover, it is time consuming task to
change or update information manually.
Also the present system requires a lot of time to accomplish the task of complaining a report, and
other updating or changing in the current information.
1.3.2 Redundancy ofData (Duplication ofData)
There are a lot of redundant data found in the present system. The data of a crime and criminals
is to be kept at many places; i.e. in many different files. Similarly, the complaint forms and the
other important information about crime or criminal are also produce redundant data.
1.3.3 Changing/Removing OfRecords
If there is an error in a single record then the police department has to make changes in many
files. If they want to remove or change the data, they will have to change them at all place, where
they kept them.
1.3.4 Storage Media
For handling data and related information, several registers are used i.e. the same data is stored at
multiple locations which wastes a lot of stationary.
1.3.5 Information Updating
It is a well-known fact that with the passage of time, old data needs modification. Process of
modification, updating and addition of new information and data are very slow.
4
1.3.6 Backup and Recovery
In the existing manual system there is always a risk of accidental data lost. There is no backup
and recovery facility presented in manual system, so important data may be lost.
1.3.7 Integrity
It has been proved that the manual system of collecting and storing personal information is
devoid of integrity.
1.3.8 Burden ofWork
In police department all the files work is done by the staff, so burden of work leads to the
important works to be delayed.
All the above mentioned drawbacks in the present system lead to an inefficient and time
consuming process of handling records about crimes. The present manual system is not capable
of fulfilling the requirements of the reports about a crime on the basis of particular criteria.
Besides, in time retrieval of crimes and criminal’s complete record is also not possible without
devoting enough time for searching different files. In the existing manual system there is always
a risk of accidental lost of recorded data. If once such information is damaged, then there remain
no backup copies to be used in the future. So it becomes difficult to recover information once
destroyed in the manual system.
1.4 Background
Our Police Stations are still represents 19th century, nothing has changed nor upgraded if you go
there to register the FIR you will witness that same old constabulary system, Same old registers
same old ways Carbon papers kept between two for multiple copies and registering FIR least
takes an hour.
Later when the police forward the registered FIR to designated Investigation officer, he adds up
more papers in it, in which he reviews the crime scene and other technicalities, there is no such
thing as Copy of CNIC attached with Registered FIR by the Complainer, 14 days of duration for
the investigation after which case gets forwarded to the court or either ends up in the record
room.
5
Does it has to be like this all the way since dark ages, to ensure that after FIR has been registered
informing onto the computerized data base doesn’t exists by which all other Police Stations in
other respective areas , cities , town across Pakistan gets to know if they have any information
regarding that issue or suspect?
Even if the government start upgrading the policing and FIR system one by one, I think there
will be a day when people would be able to know the status of their registered FIR online and if
nothing has happened for far, forward the complaint to the courts, but unfortunately nobody
seems to be bothered about Computerized FIR Registration which is must advantages I wouldn’t
be able to list down all but I am sure if you are educated person than you know what is possible
in this age when the data gets Online,
What to expect from such departments ( JUSTICE ) please don’t joke with me, increasing
salaries and benefits reducing the ratio of bribery in this department but until and unless FIR’s
will not get logged Online we wouldn’t be able to know what is actually happening.
I feel like crying after seeing such policing system, 1947 till 2012 only thing which has upgraded
is SHO’s Room with AC rest It’s a place where you can say Timeless world you cannot tell
which year it is when you are in the police station, neither proper place to seat, nor the
environment is good. Over all you will witness yourself that Years even centuries doesn’t matter,
are we improving the System? or we have become the part of it by accepting just the way it is,
beside this what other options to do have, The answer is NONE, Speak up like me, somebody
might hear you out.
Else, only Personal Source is most welcome, if anyone from authorities above IO and SHO read
this would ask them and order them as if without that, it is not their duty to perform on regular
basis. Where are we living some sort of Stone age?
Speak up to improve and for the change by yourself, else nobody is bothered to hear the deeds.
Police Departments of KPK, the overall System is manual .There are many problems in this
manual System all record of crimes and criminals are store in register which is very difficult for
administrative department to find the record of different crimes and criminals.
6
Police Departments of KPK, the overall System is manual .There are many problems in this
manual System all record of crimes and criminals are store in register which is very difficult for
administrative department to find the record of different crimes and criminals. In manual system
also find out the missing criminals and most wanted for Police Department. We want to
computerize this manual system .we developed Online FIR System for Police department which
is user friendly and allots of facility. For Police department it saves the time easy to use and very
easy for the admin as well as for users.
1.5 Proposed System and Objectives of the System
Since we have discussed that present manual system of the Police Station of KPK is lengthy and
time consuming. After a detailed study of the current system, it is a good time to propose a new
system which is based on a computer. As computer is one of the leading technology now a days,
so we propose a computer based system that will fulfill the requirements of the Police Stations of
KPK easily and will be the solution to the problems faced to the Police department. The
proposed system is aimed to remove all the drawbacks and limitations of existing system and
making it more responsive to the users and management needs. In the proposed system, we have
tried our best to meet all the objectives of the Police Department. The major objectives of the
proposed system are to provide the faster means of Crime Compliant Report. It will reduce the
time consumed in preparation of reports and to get benefit from the latest technology of
computers.
The proposed system includes the following features:
1. To provide a secure system to users
2. Complaint registration
3. Online FIR System
4. Giving Feedback to users.
1.6 Advantages of Proposed System
In contrast to old manual system the proposed system has the following advantages:
1.6.1 Accessibility
Accessibility refers to the design of products, devices, services, or environments for people with
disabilities. The concept of accessible design ensures both “direct access” (i.e. unassisted) and
7
"indirect access" meaning compatibility with a person's assistive technology (for example,
computer screen readers).
Accessibility can be viewed as the "ability to access" and benefit from some system or entity.
The concept focuses on enabling access for people with disabilities.
1.6.2 Accuracy and Consistency
The basic advantage of computerized system is its accuracy. A man is vulnerable to mistake
where computer software is free. Similarly, the consistency of the records and transactions make
a computer more advantageous over manual system.
1.6.3 Input Improvements
In the proposed system, all the input data is stored in the appropriate database files. Moreover,
the user can store the same data only at a single location thus reducing consumption and
redundancy and hence the chances of errors are minimized.
1.6.4 Faster Information Retrieval
The data of individual criminals including chest number is stored in a computer and can be
retrieved which is required by the police department. Thus the user can also obtain the required
information by clicking buttons etc in no time in contrast to the manual system.
1.6.5 Reduction ofWorkload
In the proposed system no work is involved. It helps in reducing workload on staff members of
the police department. The computer does all the work of making entry of data of crimes and
criminals… The computers will do the rest of the work.
1.6.6 Flexibility
The proposed system is flexible enough i.e. addition of new records, updating of records and
handling of new application are possible.
1.6.7 Reduced Redundancy
In the new system data is stored centrally. The storage of the same data is done at a single
location. So the redundancy of data has been reduced up to a great extent as compared to the
present system, where the same data has to be stored in different registers and files.
8
1.6.8 Reduction in Cost
The cost of conducting the information manually is greatly reduced. Because computers do all
work then there is no need of paper work. The reduced manual and paper work minimizes the
cost of the process of new entry of criminal record. This reduction in cost is especially important
for all police department.
1.6.9 Security
The proposed system provides enough security against data loss and also ensures that illegal
access to the data is denied.
1.6.10 Backup Facilities
Proposed system provides the facility to back up the data for safety purposes in case of data
corruption or data loss.
1.6.11 Data retrieval
Data retrieval means obtaining data from a database management system such as ODBMS. In
this case, it is considered that data is represented in a structured way, and there is no ambiguity in
data.
1. It will reduce redundancy
2. The users can retrieve information fast and timely.
3. It will reduce workload of employee
4. It will be more flexible
5. It provide more security
6. It has backup facilities
1.7 Operational feasibility
The software is very user-friendly, the admin and user can easily operate the software without
any difficulty. There are somewhat trained computer personal indifferent and some of them are
not familiar with computer and they can be trained.
1.8 Technical Feasibility
This is a web base application. The following technology needed for the system to be developed
and is available to us at our work place.
9
DBMS MYSQL
Operating system Microsoft Windows10
Design and coding tools HTML5, CSS3, JavaScript, PHP5
Documentation tools MSOffice 2016
Designing tools Adobe Photoshop and Paint
1.9 Financial Feasibility
The cost of converting the manual system into a computerized is one of important factor. The
proposed system is financially very visible and feasible. It is not very inexpensive because it is
an individual project .So there are no costs invaded like searching and hiring personal. The
technologies that we are going to use are in common use and are always made available to work
with. So there is no purchase costs involved, no huge cast involved in training. Also no extra
hardware or additional staff is required for the department.
1.10 Requirement Analysis
It is a communication between customer and software development team. To get better
understanding of the requirement, a prototype was made and then we visited to many time in
Police department’s of KPK for requirement gathering, which resulted more benefits and
functionalities which was impossible without requirement specification.
1.10.1 Requirement Definition
In this stage we define different users of the system and their role in operating this software. .i.e.
the administrator can manage the whole system i.e. Administrator manages user, requirements.
While users manage information of his own.
1.10.2 Requirement Specification
Out of various alternatives structured language is used to write down functional requirement.
Structure language which is a restricted form of natural language use template to specify
requirements.
10
A feasibility study is a short focus study that aims to answer of a number of questions
1. Does the system contribute to overall object of organization?
2. Can the system be implemented using current technology and with given cost and
schedule constraints?
3. Can the system integrated with other system which are already in place?
4. You should talk with information source to discover the answer to the question?
5. How would the organization cope if this system not works?
6. What is the problem with current processes and how a new system would help alleviate
these problems?
7. What direct contribution will the system make to the business objective and
requirements?
8. Can information be transform to and from other organizational system?
9. Does the System require technology that has not previously been used in organization?
10. What must be supported by the System and what need not to be supported?
A successful completion and adoption of the automated system will definitely make the work
easier around its field by maintaining all records about police department i.e. FIR management
system, feedback, etc.
The existing manual system will be replaced by automated. As it is mentioned earlier that a
manual system is more laborious, insecure and time consuming. All the information are kept and
derived manually. This system will be able to meet all the requirements of easy to use, easy to
maintain, secure etc. Records and information will be kept and upgraded safely and data will be
processed faster in proposed automated system.
1.11 Main Components of Our Project
1. User
2. Admin
3. FIR System
4. Feedback
5. Program
11
1.12 Tools Used
The tool used in the development of “Crime Reporting System” is MYSQL at the backend.
For front end for window base application we use PHP. Besides these tools we used have the
number of other CASE tools (CSS, HTML, and JavaScript).
12
CHAPTER 2
SYSTEM DESIGN
13
CHAPTER # 2 System Design
2.1 Introduction
The design is a solution, the translation of requirements into center ways of meeting. The design
is actually the process of analyzing, organizing and developing a database model that accurately
reflects the organization functioning in the real world and implementing that model by creating a
database requires an appropriate methodology. System can be divided into two phases:
1. Logical Design
2. Physical Design
2.1.1 Logical Design
The logical design describes the detail specification for the proposed system. We can say that it
describes its own feature. Input, output, file (table) and database in manner that meets the project
needs. In logical design work with users is done to develop general design, choose best design,
develop system flow charts, identify hardware, software and personal needs and revise estimates
etc.
2.1.2 Physical Design
The purpose of physical design is to translate the logical description of data into the technical
specification for storing and retrieving data. The goal is to create design for storing data that will
provide adequate performance and ensure database integrity, security and recovery.
Physical database design does not include implementing files and databases (i.e. creating them
and loading data into them).
2.2 Input Design
The input design specifies the number in which the user enters the data to the system for
processing at later stage. Input design can insure the reliability of the system and provide an
accurate result. The input determines whether the user interacts with the system efficiently or
not. The input design can also be explained as a link between the user and the world. Input
design consists of those steps necessary to put transactions data into usable form of processing.
While designing the input for the Crime Reporting System for police departments of KPK has
the following objectives were kept in mind as guidelines.
14
1. Reducing the amount of input
2. Avoiding errors in data
3. Keeping extra steps
4. Keeping the process simple
5. Avoiding delays
2.3 Data Capturing
In input design only those items are captured which must actually be the subject of input
while designing the input, following points were kept in mind.
1. Crime information
2. Complaint report record
3. Admin information
4. User information
2.4 Input Validation
Input validation is general term given to method, aim for detecting errors in the input. The main
thing, which is considered in the input, is that what the chances of error are? Following are input
validation used for centralized system for Crime Reporting System for police department.
1. Empty entry Control
2. Data Type Validation
3. Not Null
2.5 Output Design
A system is considered to be successful or unsuccessful on the basis of output design. The term
“output” means that after compilation of physical design what errors come out of the computer
system for the user. The output in project is considered as the backbone of the project. All
managerial design is actually made through these reports. Basically the reports are very
important aspect of the output. The user creates various reports in response to queries.
2.6 Data Base Design
Database Design is a creative process of transforming:
15
1. Problems into Solution
2. The description of solution
3. Intelligent database design is perhaps the most critical element of an optimal solution
with respect to performance. In fact, poor design is usually the culprit for poorly
performing solutions.
4. Designer of the database should satisfy the user.
2.7 Architectural Design
The primary objective of architectural design is to develop a modular program structure and
represent the control relationship between them.
2.8 Conceptual Database Design
Tells the user exactly
1. What the system will do
2. Describe the functions of the systems
3. The system will work in the following areas
4. Unique authorized access to all registered users
5. Purchasing of products
6. Data Validation checks
7. The system is defined by its boundaries, entities, attributes, and relationship
2.9 Modular Design
Modular design occurs after data; architecture and interface designs have been established. In
and world, the modular specification required to be define algorithmic details would be stated in
a natural language such as English because it is easily understandable. And then that straight
forward plain English are converted to diagrams.
There is no question that graphics tools such as flow charts or box diagrams provide excellent
pictorial patterns that readily depict modular details. However graphical tools are misused, the
wrong picture may lead to wrong software. In this section we will demonstrate some of our basic
modules by using Flow Charts. Such as form entry, deletion, insertion, updating and reports.
16
YES
NO
Back
Figure 2.1 General data entry
Start
Form
Stored in database
Confirmation
Message
End
Enter Data
Is Valid?
Form
17
No
Back
Yes
Figure 2.2 Delete Module
Start
Runs Delete
Module
Is Found?
Load Data
Form
Delete
Confirmation
Message
End
18
No
Yes
Store
Figure 2.3 Update Module
Start
Is Found?
Load Data
Form
Runs Update
Module
Update
Confirmation
Message
End
19
Back
No
Yes
Figure 2.4 Login Module
Start
LOGIN
Enter User
Name and
Password
Form
Incorrect
Message
Is Correct?
Runs Login
Module
Logins
End
20
2.10 Internal Data Base Design
The purpose of the Internal or physical database design is to translate the logical description of
data into the technical specification for storing and retrieving data. As we know that the physical
database design requires several critical decisions that will affect the integrity and performance
of the application system. One of those decisions is the storage format (data type). So for our
project we have taken the decision to the following data types and length for the attributes. The
following are the tables, their attributes and the primary and foreign keys in the table
2.11 Internal Data Base Design of Crime Reporting System
Tables
Column Type Null Default
Id int(11) No
first_name varchar(50) No
last_name varchar(50) No
Gender varchar(10) No
date_of_crime Date No
time_of_crime varchar(50) No
Address varchar(300) No
City varchar(50) No
contact_no varchar(20) No
Email varchar(50) No
crime_type varchar(50) No
crime_location varchar(200) No
Incident Text No
photo1 varchar(200) No
photo2 varchar(200) No
Figure 2.5 FIR Table
21
Column Type Null Default
F_id int(10) No
date Datetime No
time Datetime No
description varchar(45) Yes NULL
status varchar(45) Yes NULL
crime_id int(10) No
id_proof varchar(45) No
id_proof_no int(10) No
crimephoto1 varchar(255) Yes NULL
crimephoto2 varchar(255) Yes NULL
crimelocation varchar(45) No
reg_id int(10) No
claim_id int(10) No
victim_id int(10) No
dt_time Datetime Yes NULL
area_id int(10) Yes NULL
Figure 2.6 Online FIR Details Table
Column Type Null Default
crime_id int(10) No
crime_type varchar(45) No
description varchar(45) No
Figure 2.7 Crime Type Table
22
Column Type Null Default
Username varchar(45) No
Password varchar(45) No
Type varchar(15) Yes NULL
Status varchar(10) Yes NULL
last_logindatetime datetime Yes NULL
Figure 2.8 Admin Login Table
Column Type Null Default
F_id int(10) No
username varchar(45) No
status varchar(15) Yes NULL
description varchar(45) No
dt_time Datetime Yes NULL
from varchar(45) No
Figure 2.9 FIR Forward Table
Column Type Null Default
city_id int(10) No
city_name varchar(45) No
Figure 2.10 City Table
2.12 Logical Database Design
Logical design describes the detail specification for the proposed system. We can say that it
describes its own features. Input output tables and database in a manner that meets the project
needs. In logical design work with users is done to develop general system design, choose best
23
design, develop system flowcharts, identify hardware, software and personal needs and revise
estimates etc.
2.13 Entity
Anything that produces or consumes information is called entity. The representation of any
composite information that must be understood by software is called data object, by composite
information we mean something that has a number of different properties or attributes.
We have used the following entities in our project.
1. FIR
2. Login
3. Get Crime Alert
4. Join us
5. About us
6. FAQs
7. Paragraph
8. Emergency contact Numbers
9. Services
10. Quick links
11. Online Registration
2.14 Entity Relationship Model
The entity relationship model is a tool for analyzing the semantic feature of an application that is
independent of events. Entity-relationship modeling helps reduce data redundancy. This
approach includes a graphical notation, which depicts entity classes as rectangles, relationships
as diamonds and attributes as ovals. For example situations a partial entity relationship diagram
may be used to present a summary of the entities and relationships but not include the details of
the attributes.
2.15 Entity Relationship Diagram
The entity relationship diagram provides a convenient method for visualizing the inter-
relationship among entities in a given application. This tool has proven useful in making the
transition from an information application description to a formal database schema. The entity
24
relationship model is used for describing the conceptual scheme of an enterprise without
attention to the efficiency of the physical database design. The entity relationship diagrams are
later turned into a conceptual schema in one of the other models in which the database is actually
implemented.
25
M
M
M M 1
M
M
M
Figure 2.11 ERD
Last
Name
FIR
CityD_Incident
ID
Contact
First
Name
Crime
Type
Picture
Address
Time
Incident
Location
DetailGender
Manage
FIR
Register
Admin
Password
User
name
ID
User
Feedback
GiveReceive
Contact
MessageEmailName
ID
Subject
26
Figure 2.12 Data flow Diagram
27
CHAPTER 3
SYSTEM IMPLEMENTATION
28
CHAPTER # 3 System Implementation
3.1 Overview
It is particularly important first to design how the system will look and respired to user before
designing the software structure. The most critical and creative aspect of development is to
design the user interface. User interface design determines how the system will look the user
from outside.
The interface design create in effective communicate medium between human and a computer,
following a set of design principle. The design identifier interface objects action and then creates
a screen layout that formats the basic for a user interface prototype. User interface begins with
the identification of user, tasks and environment requirements. User interface for the software
should be design in such a way that is friendly to the user, easy to use and easy to understand. It
should provide high quality interface between the user and the system. The results produce by
our software should be consistence.
In designing the user interface it has been kept in mind that non-technical personnel will operate
the system with very little or no technical knowledge. Therefore the user interface has been
designed is user friendly as possible that facilitate easy and quick and has been used and
designing the screen are:
1. Home
2. Join Us
3. Get Crime Alert
4. FIR
5. Services
6. Emergency Contacts
7. About Us
8. Missing Citizens
9. Police Initiatives
10. Traffic Warden Service
29
11. Rapid Responsive Force
12. Dispute Resolution Council
13. Help Prevent Crime
14. Police Access Services
15. Police Services Lines
16. Elite Women Commandos
17. CNIC verification
18. Vehicle verification system
19. Reporting Room
20. Geo Tagging
30
Figure: 3.1 Crime Reporting System
31
Figure: 3.2 Admin Page
32
Figure 3.3 FIR Page
33
CHAPTER 4
SYSTEM TESTING
34
CHAPTER # 4 System Testing
4.1 Introduction
System testing is essential step for the development of a reliable and error free system .in a
software development project ,errors can be introduced at any stage during the development
.Each phase has its own techniques for the detection and correction of errors in that phase .
However, some requirements errors and design errors are likely to remain undetected.
Ultimately these errors will be reflected in a code. Since code is the only product that can be
executed and whose actual behavior can be observed, testing is the phase where the errors
remaining from the early phases also must be detected. Testing is the process of detecting
and correcting as many errors as possible in the developed software before delivery to the
customer. Test case is specification of the test and the output from the system plus a
statement of what is being tested. Test data are the inputs which have devised to test the
system.
4.2 Testing Objectives
1. To find errors in the developed software.
2. To check that working of the software function is according to the specifications. Their
behavior and performance requirement are fulfilled.
3. To check the reliability and quality of the software.
4.3 Testing Strategies
Following are the basics strategies that were used for testing of the software.
Black box testing
White box testing
Stress testing
Acceptance testing
Assertion testing
35
Can only be determined by studying its inputs and the related outputs. It is called functional
testing because here the tester has only concerned with functionality and not with the
implementation of the software.
In black box testing only the functionality of the software was tested without a record to the
code .If the functionality which was expected from a component is provided then the black
box testing is completed.
4.3.1 White Box Testing
White box testing is also called glass box testing and structural testing .The objective of
white box testing is not to exercise all the different input or output condition but to exercise
the different programming and data structure used in the program.
In white box testing internal code return in every component was tested and it was checked
that the code written is efficient in utilizing various resources of the system like memory etc.
4.3.2 Stress Testing
Stress test is designed to confront program with abnormal situation. Stress testing executes
system in a manner that demands rescore in abnormal quality, frequency or volumes. For
example:
1: Input data rates may increase to determine how input function will respond
2: Tests that’s requires maximum memory or other resources are executed.
Basically, the tester wants to break the program.
In stress testing the software was tested against the boundary conditions. Various inputs
fields were tested against
Abnormal values and it was tested that the software does not behave abnormally at any time.
4.3.3 Acceptance Testing
Acceptance testing is performed with realistic data of the client to demonstrate that the
software is working properly.
36
In acceptance testing the software was checked for completeness that it is ready. Quality
assurance department performs the acceptance testing that the software is ready and can be
given to the customer.
4.3.4 Assertion Testing
In assertion testing the software is tested against the possible assertion. Assertion is used to
check the program and various locations that whether the state of the program at a particular
point is the same as expected or not.
4.3.5 Unit Testing
Unit testing focuses verification effort on software component or module which is the
smallest unit of software design. The unit testing is white box oriented and it can be
conducted in parallel for multiple components.
In unit testing we checked that all individual components were working properly. Before
integration of all components unit testing is essential because it gives a confidence that all the
components individually are working fine and ready to be integrated with the other ones.
4.3.6 System Testing
System testing is actually a series of different tests whose primary purpose is to fully exercise
the computer based system. Although each test has a different purpose, all work to verify that
system elements have been properly integrated and perform allocated functions.
When all the units were working properly and unit testing was performed and checked all the
integrated components as a whole and looked for possible discrepancies, which could have
arisen after the integration.
4.4 System Evaluation
The objectives of the system evaluation is to determine whether the desired of objectives
have been accomplished or not. Determining the merits and demerits of the proposed system
over the existing system is also covered in system evaluations. This is concerned with the
detailed study of the developed system, from implementation point of view.
37
4.5 Implementation
This phase consists of bringing the new system in operation and turning it over the users.
Briefly involves the following steps.
Training: It involves
1. User group
2. Administrator
4.6 Installation of Computer Equipment’s
It involves
1. Locations
2. Power supply
3. Space requirements
4. Air conditioning
4.7 Testing the New System
System testing of the developed system was performed in these three steps.
4.7.1 Unit Testing
In unit testing the different modules of software were tested independently to locate errors.
This helps in locating errors, in coding and logic that were contained within a particular
module.
4.7.2 Integrated Testing
After unit testing, combined testing of all modules was carried out. The purpose was to
determine that all the modules are correctly integrating with each other.
4.7.3 System Testing
Final testing was done on the entire system to check that whether the desired specification
and requirements are met or not. The main aim here was to determine the inconsistencies in
the developed system. Hence the whole system was tested. Put the New System into
38
Operation At this point, a final dress rehearsal sometimes runs. It is done in the following
ways.
4.7.4 Direct/ Cash Conversion
In this approach, as entire new system is installed, the old system is completely dismantled,
leaving the organization suddenly to rely on the new system alone. The advantage of the
crash conversion is that when the old system is seriously inadequate or radically different
from the new system and when the conversion will be so rapid that it will not severely
disrupt operations. The crash conversion also has advantages i.e. the crash conversion is
risky, and even for minor problem can seriously delay the implementation schedule. Careful
planning and attention to detail are necessary for a successful crash conversion.
4.8 Conclusion
The project titled as “Crime Reporting System” is a web based application. This
software provides facility for reporting online crimes, complaints, missing persons, show
criminal details. This software is developed with scalability in mind. Additional modules can be
easily added when necessary. The software is developed with modular approach. All modules in
the system have been tested with valid data and invalid data and everything work successfully.
Thus the system has fulfilled all the objectives identified and is able to replace the existing
system.
The project has been completed successfully with the maximum satisfaction of the organization.
The constraints are met and overcome successfully. The system is designed as like it was decided
in the design phase. The project gives good idea on developing a full-fledged application
satisfying the user requirements. The system is very flexible and versatile. This software has a
user-friendly screen that enables the user to use without any inconvenience. Validation checks
induced have greatly reduced errors. Provisions have been made to upgrade the software.
The application
has been tested with live data and has provided a successful result. Hence the software has prove
to work efficiently.
An effective criminal justice response to hate crimes involves a number of important elements:
close police-community relations, public confidence in the effectiveness of the police response to
reports of hate crimes as well as appropriate processing of those reports by the courts. The
quality of the police response to hate crimes is critical, as is the public perception of that
response. If people feel that the criminal justice system is not responding appropriately and
vigorously to the problem of hate crimes, these incidents will remain unreported. However,
39
nothing is more critical than having an accurate idea of the true nature and full extent of the
problem. This can only come about if a greater effort is made to collect comprehensive hate
crime statistics. At the present, KPK lags behind other provinces in this regard. The present
report represents the first, small step towards documenting the incidence of this pernicious form
of criminal activity, which, by its very nature, strikes at the heart of a multicultural society.
40
Reference List
1. http://www.w3school.com
2. http://en.wikipedia.org/wiki/Waterfall_model
3. http://en.wikipedia.org/wiki/Software_development_process,
4. http://en.wikipedia.org/wiki/Spiral_model
5. http://en.wikipedia.org/wiki/Prototype
6. https://www.google.com.pk/?gws_rd=cr,ssl&ei=ey3HVPXGC6HmyQOCxIDQCA#q=prototype
+model+diagrams
7. https://www.google.com.pk/?gws_rd=cr,ssl&ei=9LXNVMaeI9bnatzKgng#q=history%20of%20o
nline%20fir%20system%20in%20pakistan
8. http://www.incpak.com/editorial/govt-must-upgrade-police-computerized-fir-online-record/

Weitere ähnliche Inhalte

Was ist angesagt?

Police Management System
Police Management SystemPolice Management System
Police Management SystemShane Williams
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management systemJawhar Ali
 
Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year projectBeresa Abebe
 
SRS for Hospital Management System
SRS for Hospital Management SystemSRS for Hospital Management System
SRS for Hospital Management Systemkataria Arvind
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...Showrav Mazumder
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
 
Scholarship Information System documentation
Scholarship Information System documentationScholarship Information System documentation
Scholarship Information System documentationKasi Annapurna
 
Final Project Report of College Management System
Final Project Report of College Management SystemFinal Project Report of College Management System
Final Project Report of College Management SystemMuhammadHusnainRaza
 
online Blood Bank management system
online Blood Bank management system online Blood Bank management system
online Blood Bank management system amarsajid
 
University management system
University management systemUniversity management system
University management systemVINITSAMMIR
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record ManagementKhokan Sardar
 
Ppt of online job portal
Ppt of online job portalPpt of online job portal
Ppt of online job portalIqra Naseer
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination systemlunarrain
 

Was ist angesagt? (20)

Online FIR System
Online FIR SystemOnline FIR System
Online FIR System
 
CRMS
CRMSCRMS
CRMS
 
Police Management System
Police Management SystemPolice Management System
Police Management System
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
 
Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year project
 
Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)
 
SRS for Hospital Management System
SRS for Hospital Management SystemSRS for Hospital Management System
SRS for Hospital Management System
 
Crime report
Crime reportCrime report
Crime report
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...
Blood Bank Management Information System [Web-Url: http://infobloodbank.somee...
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
 
Scholarship Information System documentation
Scholarship Information System documentationScholarship Information System documentation
Scholarship Information System documentation
 
Online bus ticket booking
Online bus ticket bookingOnline bus ticket booking
Online bus ticket booking
 
Event management system
Event management systemEvent management system
Event management system
 
Final Project Report of College Management System
Final Project Report of College Management SystemFinal Project Report of College Management System
Final Project Report of College Management System
 
online Blood Bank management system
online Blood Bank management system online Blood Bank management system
online Blood Bank management system
 
University management system
University management systemUniversity management system
University management system
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Ppt of online job portal
Ppt of online job portalPpt of online job portal
Ppt of online job portal
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination system
 

Ähnlich wie Crime Reporting System

Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Minhas Kamal
 
Aspen utilities user guide v7 2
Aspen utilities user guide v7 2Aspen utilities user guide v7 2
Aspen utilities user guide v7 2A.S.M. Abdul Hye
 
Food delivery application report
Food delivery application reportFood delivery application report
Food delivery application reportAshwinBicholiya
 
online examination management system
online examination management systemonline examination management system
online examination management systemPraveen Patel
 
Fruit Product Management System
Fruit Product Management SystemFruit Product Management System
Fruit Product Management Systemsaiyadsanobar
 
Accenture Case Study Solution by Amit Bhardwaj
Accenture Case Study Solution by Amit BhardwajAccenture Case Study Solution by Amit Bhardwaj
Accenture Case Study Solution by Amit BhardwajAmit Bhardwaj
 
Online Hotel Room Booking System
Online Hotel Room Booking SystemOnline Hotel Room Booking System
Online Hotel Room Booking SystemAbhishek Kumar
 
Automated Expert System For Ambulance Management In Arba A Senior Project
Automated Expert System For Ambulance Management In Arba A Senior ProjectAutomated Expert System For Ambulance Management In Arba A Senior Project
Automated Expert System For Ambulance Management In Arba A Senior ProjectKelly Lipiec
 
Dabur Visual Merchnadising Report
Dabur Visual Merchnadising ReportDabur Visual Merchnadising Report
Dabur Visual Merchnadising Reportsa_kiv
 
System Proposal - Ayamas IMS
System Proposal - Ayamas IMSSystem Proposal - Ayamas IMS
System Proposal - Ayamas IMSKu Amirul
 
BITS MS- Dissertation Final Report
BITS MS- Dissertation Final ReportBITS MS- Dissertation Final Report
BITS MS- Dissertation Final ReportAnnie Sofia
 
Engineering Services Outsourcing: Financial Performance Review
Engineering Services Outsourcing: Financial Performance ReviewEngineering Services Outsourcing: Financial Performance Review
Engineering Services Outsourcing: Financial Performance ReviewValueNotes
 
Sap tm enhancement guide
Sap tm enhancement guideSap tm enhancement guide
Sap tm enhancement guidezhijian yu
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants ProposalSarah Killey
 
Vss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easyVss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easyLaurie LeBlanc
 
Portfolio BI Launchpad Training_Participants Guide_8.27.15
Portfolio BI Launchpad Training_Participants Guide_8.27.15Portfolio BI Launchpad Training_Participants Guide_8.27.15
Portfolio BI Launchpad Training_Participants Guide_8.27.15Mehwish Qureshi, MPP
 

Ähnlich wie Crime Reporting System (20)

Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)
 
Print
PrintPrint
Print
 
Aspen utilities user guide v7 2
Aspen utilities user guide v7 2Aspen utilities user guide v7 2
Aspen utilities user guide v7 2
 
MSSMT
MSSMTMSSMT
MSSMT
 
Food delivery application report
Food delivery application reportFood delivery application report
Food delivery application report
 
online examination management system
online examination management systemonline examination management system
online examination management system
 
Entitlements and balancing
Entitlements and balancingEntitlements and balancing
Entitlements and balancing
 
Fruit Product Management System
Fruit Product Management SystemFruit Product Management System
Fruit Product Management System
 
Accenture Case Study Solution by Amit Bhardwaj
Accenture Case Study Solution by Amit BhardwajAccenture Case Study Solution by Amit Bhardwaj
Accenture Case Study Solution by Amit Bhardwaj
 
Online Hotel Room Booking System
Online Hotel Room Booking SystemOnline Hotel Room Booking System
Online Hotel Room Booking System
 
Automated Expert System For Ambulance Management In Arba A Senior Project
Automated Expert System For Ambulance Management In Arba A Senior ProjectAutomated Expert System For Ambulance Management In Arba A Senior Project
Automated Expert System For Ambulance Management In Arba A Senior Project
 
Dabur Visual Merchnadising Report
Dabur Visual Merchnadising ReportDabur Visual Merchnadising Report
Dabur Visual Merchnadising Report
 
System Proposal - Ayamas IMS
System Proposal - Ayamas IMSSystem Proposal - Ayamas IMS
System Proposal - Ayamas IMS
 
BITS MS- Dissertation Final Report
BITS MS- Dissertation Final ReportBITS MS- Dissertation Final Report
BITS MS- Dissertation Final Report
 
Engineering Services Outsourcing: Financial Performance Review
Engineering Services Outsourcing: Financial Performance ReviewEngineering Services Outsourcing: Financial Performance Review
Engineering Services Outsourcing: Financial Performance Review
 
Sap tm enhancement guide
Sap tm enhancement guideSap tm enhancement guide
Sap tm enhancement guide
 
Identity Management Project Roadmap
Identity Management Project RoadmapIdentity Management Project Roadmap
Identity Management Project Roadmap
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants Proposal
 
Vss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easyVss wht paper sustainable sox c ompliance made easy
Vss wht paper sustainable sox c ompliance made easy
 
Portfolio BI Launchpad Training_Participants Guide_8.27.15
Portfolio BI Launchpad Training_Participants Guide_8.27.15Portfolio BI Launchpad Training_Participants Guide_8.27.15
Portfolio BI Launchpad Training_Participants Guide_8.27.15
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Crime Reporting System

  • 1. PROJECT REPORT ON CRIME REPORTING SYSTEM BY HAROON ALAM CLASS NO. 204 BS (CS) SESSION 2012-2015 A project report submitted to the IBMS, The University of Agriculture,Peshawar in partial fulfillment of the requirements for the degree of BACHELOR OF SCIENCE IN COMPUTER SCIENCE SUPERVISED BY Mr. FAWAD ALI INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE THE UNIVERSITY OF AGRICULTURE PESHAWAR, PAKISTAN FEBRUARY, 2016
  • 2. PROJECT REPORT ON CRIME REPORTING SYSTEM BY HAROON ALAM CLASS NO. 204 BS (CS) SESSION 2012-2015 A project report submitted to the IBMS, The University of Agriculture,Peshawar in partial fulfillment of the requirements for the degree of BACHELOR OF SCIENCE IN COMPUTER SCIENCE Approved By: _______________________________ (Advisor) Mr. Fawad Ali _______________________________ (Member) Mr. Imran Ud Din _______________________________ (Member) Mr. Sadiq Shah _______________________________ (Incharge CS/IT) Mr. Muhammad Shahid _______________________________ (Additional Director IBMS) Dr. Muhammad Fayaz INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE THE UNIVERSITY OF AGRICULTURE PESHAWAR, PAKISTAN FEBRUARY, 2016
  • 3. TABLE OF CONTENTS CHAPTER 1.........................................................................................................................................1 CHAPTER # 1 Introduction...................................................................................................................2 1.1 Introduction..............................................................................................................................2 1.2 Overview of the Present System.................................................................................................2 1.3 Drawbacks in the Present System...............................................................................................3 1.3.1 Time Consuming.................................................................................................................3 1.3.2 Redundancy of Data (Duplication of Data)............................................................................3 1.3.3 Changing/Removing Of Records...........................................................................................3 1.3.4 Storage Media....................................................................................................................3 1.3.5 Information Updating..........................................................................................................3 1.3.6 Backup and Recovery ..........................................................................................................4 1.3.7 Integrity .............................................................................................................................4 1.3.8 Burden of Work ..................................................................................................................4 1.4 Background...............................................................................................................................4 1.5 Proposed System and Objectives of the System ..........................................................................6 1.6 Advantages of Proposed System.................................................................................................6 1.6.1 Accessibility..................................................................................................................6 1.6.2 Accuracy and Consistency....................................................................................................7 1.6.3 Input Improvements............................................................................................................7 1.6.4 Faster Information Retrieval................................................................................................7 1.6.5 Reduction of Workload........................................................................................................7 1.6.6 Flexibility............................................................................................................................7 1.6.7 Reduced Redundancy..........................................................................................................7 1.6.8 Reductionin Cost................................................................................................................8 1.6.9 Security..............................................................................................................................8 1.6.10 Backup Facilities................................................................................................................8 1.6.11 Data retrieval....................................................................................................................8 1.7 Operational feasibility................................................................................................................8 1.8 Technical Feasibility...................................................................................................................8
  • 4. 1.9 Financial Feasibility....................................................................................................................9 1.10 Requirement Analysis..............................................................................................................9 1.10.1 Requirement Definition.....................................................................................................9 1.10.2 Requirement Specification.................................................................................................9 1.11 Main Components of Our Project ...........................................................................................10 1.12 Tools Used ............................................................................................................................11 CHAPTER # 2 System Design ........................................................................................................13 2.1 Introduction............................................................................................................................13 2.1.1 Logical Design.......................................................................................................................13 2.1.2 Physical Design.....................................................................................................................13 2.2 Input Design............................................................................................................................13 2.3 Data Capturing........................................................................................................................14 2.4 Input Validation ......................................................................................................................14 2.5 Output Design.........................................................................................................................14 2.6 Data Base Design.....................................................................................................................14 2.7 Architectural Design................................................................................................................15 2.8 Conceptual Database Design....................................................................................................15 2.9 Modular Design.......................................................................................................................15 2.10 Internal Data Base Design ......................................................................................................20 2.11 Internal Data Base Design of Crime Reporting System..............................................................20 Figure 2.5 FIR Table.......................................................................................................................20 Figure 2.6 Online FIR Details Table.................................................................................................21 Figure 2.7 Crime Type Table ..........................................................................................................21 Figure 2.8 Admin Login Table.........................................................................................................22 Figure 2.9 FIR Forward Table .........................................................................................................22 Figure 2.10 City Table....................................................................................................................22 2.12 Logical Database Design.........................................................................................................22 2.13 Entity....................................................................................................................................23 2.14 Entity Relationship Model......................................................................................................23 2.15 Entity Relationship Diagram...................................................................................................23 Figure 2.11 Data flow Diagram.......................................................................................................26 CHAPTER # 3 System Implementation................................................................................................28 3.1 Overview ................................................................................................................................28 Figure 3.3 FIR Page........................................................................................................................32
  • 5. CHAPTER # 4 System Testing.............................................................................................................34 4.1 Introduction................................................................................................................................34 4.2 Testing Objectives...................................................................................................................34 4.3 Testing Strategies....................................................................................................................34 4.3.1 White Box Testing.............................................................................................................35 4.3.2 Stress Testing....................................................................................................................35 4.3.3 Acceptance Testing...........................................................................................................35 4.3.4 Assertion Testing..............................................................................................................36 4.3.5 Unit Testing......................................................................................................................36 4.3.6 System Testing.....................................................................................................................36 4.4 System Evaluation...................................................................................................................36 4.5 Implementation ......................................................................................................................37 4.6 Installation of Computer Equipment’s.......................................................................................37 4.7 Testing the New System...........................................................................................................37 4.7.1 Unit Testing......................................................................................................................37 4.7.2 Integrated Testing.............................................................................................................37 4.7.3 System Testing..................................................................................................................37 4.7.4 Direct/ Cash Conversion ....................................................................................................38 4.8 Conclusion...........................................................................................................................38 Reference List...................................................................................................................................40
  • 6. List of Figures Figure 2.1 General Data Entry ...........................................................................................16 Figure 2.2 Delete Module ..................................................................................................17 Figure 2.3 Update Module .................................................................................................18 Figure 2.4 Login Module...................................................................................................19 Figure 2.5 FIR Table........................................................................................................20 Figure 2.6 Online FIR Details Table...................................................................................21 Figure 2.7 Crime Type Table .............................................................................................21 Figure 2.8 Admin Login Table...........................................................................................22 Figure 2.9 FIR Forward Table............................................................................................22 Figure 2.10 City Table ......................................................................................................22 Figure 2.11 Entity Relation Diagram..................................................................................25 Figure 2.12 Data flow Diagram..........................................................................................26 Figure 3.1 User interface...................................................................................................30 Figure 3.2 Admin Page......................................................................................................31 Figure 3.3 FIR Detail Page ................................................................................................32 List of abbreviation: CRS: Crime Reporting System FIR: First Information Report PHP: Hypertext Preprocessor MYSQL: Structure Query Language HTML: Hyper Text Markup Language CSS: Cascading Style Sheet
  • 8. 2 CHAPTER # 1 Introduction 1.1 Introduction Online FIR System is the Computerization of present manual system of Police Stations. There are many flaws and shortcomings in the present system. The present system is a manual system. In case of present manual system all the record is kept in documented form and stored in various types of registers. The manual system has no proper system for record storage and storing the information about crimes and criminals. The present system of police is not automated. The documentation of criminal records is done manually. Case files are dumped in heaps while some are kept on shelves. These important documents quickly get dusty and because of lack of proper storage, some criminal documents are seriously damaged. With this kind of situation, it becomes highly difficult and even impossible to track down known criminal, access past criminal history of a suspect and know the status of some concluded cases. In police stations all the file work is done by the staff, so burden of work leads to the criminal’s information to be delayed. There are also problems of record storage, updating, backup and recovery and redundancy of data. To overcome the problems in present system we design such a computerized information system, which is free of all the flaws, present in the manual system of the institute. As computer is one of the leading technologies nowadays, so we propose a computer based system that will fulfill the requirements of the police stations easily and will be the solution to the problems faced by Police stations. It will facilitate both the user as well as administrative staff of the Police Stations. Computerized system provides accuracy, security, and reduced redundancy, reduction of work load, backup facilities and faster information retrieval. 1.2 Overview of the Present System The present system of the Police Stations in KPK is a manual system. In order to make a computerized system, we first check the present system so that we get to know about the flaws and shortcomings in this system. This study will help us to design such a computerized system for Police, which is free of all the flaws presented in manual system of the police station and will facilitate both the user as well as administrative staff of police station.
  • 9. 3 1.3 Drawbacks in the Present System There are some drawbacks and flaws existing in current manual system. For example, record about crime cases and FIR’s are recorded manually. There is no proper security of these record books, because all the record books are stored in the cabinet and anyone can damage them or anything can possibly damage them, these problems have plagued the police department and affect the policing system in the country. Some of these problems are enumerated below. 1.3.1 Time Consuming In the existing system, the information about the crimes is stored in registers. When information about a particular crimes or FIR’s is required or when some changes are needed in the record, one has to search many registers for required register. Moreover, it is time consuming task to change or update information manually. Also the present system requires a lot of time to accomplish the task of complaining a report, and other updating or changing in the current information. 1.3.2 Redundancy ofData (Duplication ofData) There are a lot of redundant data found in the present system. The data of a crime and criminals is to be kept at many places; i.e. in many different files. Similarly, the complaint forms and the other important information about crime or criminal are also produce redundant data. 1.3.3 Changing/Removing OfRecords If there is an error in a single record then the police department has to make changes in many files. If they want to remove or change the data, they will have to change them at all place, where they kept them. 1.3.4 Storage Media For handling data and related information, several registers are used i.e. the same data is stored at multiple locations which wastes a lot of stationary. 1.3.5 Information Updating It is a well-known fact that with the passage of time, old data needs modification. Process of modification, updating and addition of new information and data are very slow.
  • 10. 4 1.3.6 Backup and Recovery In the existing manual system there is always a risk of accidental data lost. There is no backup and recovery facility presented in manual system, so important data may be lost. 1.3.7 Integrity It has been proved that the manual system of collecting and storing personal information is devoid of integrity. 1.3.8 Burden ofWork In police department all the files work is done by the staff, so burden of work leads to the important works to be delayed. All the above mentioned drawbacks in the present system lead to an inefficient and time consuming process of handling records about crimes. The present manual system is not capable of fulfilling the requirements of the reports about a crime on the basis of particular criteria. Besides, in time retrieval of crimes and criminal’s complete record is also not possible without devoting enough time for searching different files. In the existing manual system there is always a risk of accidental lost of recorded data. If once such information is damaged, then there remain no backup copies to be used in the future. So it becomes difficult to recover information once destroyed in the manual system. 1.4 Background Our Police Stations are still represents 19th century, nothing has changed nor upgraded if you go there to register the FIR you will witness that same old constabulary system, Same old registers same old ways Carbon papers kept between two for multiple copies and registering FIR least takes an hour. Later when the police forward the registered FIR to designated Investigation officer, he adds up more papers in it, in which he reviews the crime scene and other technicalities, there is no such thing as Copy of CNIC attached with Registered FIR by the Complainer, 14 days of duration for the investigation after which case gets forwarded to the court or either ends up in the record room.
  • 11. 5 Does it has to be like this all the way since dark ages, to ensure that after FIR has been registered informing onto the computerized data base doesn’t exists by which all other Police Stations in other respective areas , cities , town across Pakistan gets to know if they have any information regarding that issue or suspect? Even if the government start upgrading the policing and FIR system one by one, I think there will be a day when people would be able to know the status of their registered FIR online and if nothing has happened for far, forward the complaint to the courts, but unfortunately nobody seems to be bothered about Computerized FIR Registration which is must advantages I wouldn’t be able to list down all but I am sure if you are educated person than you know what is possible in this age when the data gets Online, What to expect from such departments ( JUSTICE ) please don’t joke with me, increasing salaries and benefits reducing the ratio of bribery in this department but until and unless FIR’s will not get logged Online we wouldn’t be able to know what is actually happening. I feel like crying after seeing such policing system, 1947 till 2012 only thing which has upgraded is SHO’s Room with AC rest It’s a place where you can say Timeless world you cannot tell which year it is when you are in the police station, neither proper place to seat, nor the environment is good. Over all you will witness yourself that Years even centuries doesn’t matter, are we improving the System? or we have become the part of it by accepting just the way it is, beside this what other options to do have, The answer is NONE, Speak up like me, somebody might hear you out. Else, only Personal Source is most welcome, if anyone from authorities above IO and SHO read this would ask them and order them as if without that, it is not their duty to perform on regular basis. Where are we living some sort of Stone age? Speak up to improve and for the change by yourself, else nobody is bothered to hear the deeds. Police Departments of KPK, the overall System is manual .There are many problems in this manual System all record of crimes and criminals are store in register which is very difficult for administrative department to find the record of different crimes and criminals.
  • 12. 6 Police Departments of KPK, the overall System is manual .There are many problems in this manual System all record of crimes and criminals are store in register which is very difficult for administrative department to find the record of different crimes and criminals. In manual system also find out the missing criminals and most wanted for Police Department. We want to computerize this manual system .we developed Online FIR System for Police department which is user friendly and allots of facility. For Police department it saves the time easy to use and very easy for the admin as well as for users. 1.5 Proposed System and Objectives of the System Since we have discussed that present manual system of the Police Station of KPK is lengthy and time consuming. After a detailed study of the current system, it is a good time to propose a new system which is based on a computer. As computer is one of the leading technology now a days, so we propose a computer based system that will fulfill the requirements of the Police Stations of KPK easily and will be the solution to the problems faced to the Police department. The proposed system is aimed to remove all the drawbacks and limitations of existing system and making it more responsive to the users and management needs. In the proposed system, we have tried our best to meet all the objectives of the Police Department. The major objectives of the proposed system are to provide the faster means of Crime Compliant Report. It will reduce the time consumed in preparation of reports and to get benefit from the latest technology of computers. The proposed system includes the following features: 1. To provide a secure system to users 2. Complaint registration 3. Online FIR System 4. Giving Feedback to users. 1.6 Advantages of Proposed System In contrast to old manual system the proposed system has the following advantages: 1.6.1 Accessibility Accessibility refers to the design of products, devices, services, or environments for people with disabilities. The concept of accessible design ensures both “direct access” (i.e. unassisted) and
  • 13. 7 "indirect access" meaning compatibility with a person's assistive technology (for example, computer screen readers). Accessibility can be viewed as the "ability to access" and benefit from some system or entity. The concept focuses on enabling access for people with disabilities. 1.6.2 Accuracy and Consistency The basic advantage of computerized system is its accuracy. A man is vulnerable to mistake where computer software is free. Similarly, the consistency of the records and transactions make a computer more advantageous over manual system. 1.6.3 Input Improvements In the proposed system, all the input data is stored in the appropriate database files. Moreover, the user can store the same data only at a single location thus reducing consumption and redundancy and hence the chances of errors are minimized. 1.6.4 Faster Information Retrieval The data of individual criminals including chest number is stored in a computer and can be retrieved which is required by the police department. Thus the user can also obtain the required information by clicking buttons etc in no time in contrast to the manual system. 1.6.5 Reduction ofWorkload In the proposed system no work is involved. It helps in reducing workload on staff members of the police department. The computer does all the work of making entry of data of crimes and criminals… The computers will do the rest of the work. 1.6.6 Flexibility The proposed system is flexible enough i.e. addition of new records, updating of records and handling of new application are possible. 1.6.7 Reduced Redundancy In the new system data is stored centrally. The storage of the same data is done at a single location. So the redundancy of data has been reduced up to a great extent as compared to the present system, where the same data has to be stored in different registers and files.
  • 14. 8 1.6.8 Reduction in Cost The cost of conducting the information manually is greatly reduced. Because computers do all work then there is no need of paper work. The reduced manual and paper work minimizes the cost of the process of new entry of criminal record. This reduction in cost is especially important for all police department. 1.6.9 Security The proposed system provides enough security against data loss and also ensures that illegal access to the data is denied. 1.6.10 Backup Facilities Proposed system provides the facility to back up the data for safety purposes in case of data corruption or data loss. 1.6.11 Data retrieval Data retrieval means obtaining data from a database management system such as ODBMS. In this case, it is considered that data is represented in a structured way, and there is no ambiguity in data. 1. It will reduce redundancy 2. The users can retrieve information fast and timely. 3. It will reduce workload of employee 4. It will be more flexible 5. It provide more security 6. It has backup facilities 1.7 Operational feasibility The software is very user-friendly, the admin and user can easily operate the software without any difficulty. There are somewhat trained computer personal indifferent and some of them are not familiar with computer and they can be trained. 1.8 Technical Feasibility This is a web base application. The following technology needed for the system to be developed and is available to us at our work place.
  • 15. 9 DBMS MYSQL Operating system Microsoft Windows10 Design and coding tools HTML5, CSS3, JavaScript, PHP5 Documentation tools MSOffice 2016 Designing tools Adobe Photoshop and Paint 1.9 Financial Feasibility The cost of converting the manual system into a computerized is one of important factor. The proposed system is financially very visible and feasible. It is not very inexpensive because it is an individual project .So there are no costs invaded like searching and hiring personal. The technologies that we are going to use are in common use and are always made available to work with. So there is no purchase costs involved, no huge cast involved in training. Also no extra hardware or additional staff is required for the department. 1.10 Requirement Analysis It is a communication between customer and software development team. To get better understanding of the requirement, a prototype was made and then we visited to many time in Police department’s of KPK for requirement gathering, which resulted more benefits and functionalities which was impossible without requirement specification. 1.10.1 Requirement Definition In this stage we define different users of the system and their role in operating this software. .i.e. the administrator can manage the whole system i.e. Administrator manages user, requirements. While users manage information of his own. 1.10.2 Requirement Specification Out of various alternatives structured language is used to write down functional requirement. Structure language which is a restricted form of natural language use template to specify requirements.
  • 16. 10 A feasibility study is a short focus study that aims to answer of a number of questions 1. Does the system contribute to overall object of organization? 2. Can the system be implemented using current technology and with given cost and schedule constraints? 3. Can the system integrated with other system which are already in place? 4. You should talk with information source to discover the answer to the question? 5. How would the organization cope if this system not works? 6. What is the problem with current processes and how a new system would help alleviate these problems? 7. What direct contribution will the system make to the business objective and requirements? 8. Can information be transform to and from other organizational system? 9. Does the System require technology that has not previously been used in organization? 10. What must be supported by the System and what need not to be supported? A successful completion and adoption of the automated system will definitely make the work easier around its field by maintaining all records about police department i.e. FIR management system, feedback, etc. The existing manual system will be replaced by automated. As it is mentioned earlier that a manual system is more laborious, insecure and time consuming. All the information are kept and derived manually. This system will be able to meet all the requirements of easy to use, easy to maintain, secure etc. Records and information will be kept and upgraded safely and data will be processed faster in proposed automated system. 1.11 Main Components of Our Project 1. User 2. Admin 3. FIR System 4. Feedback 5. Program
  • 17. 11 1.12 Tools Used The tool used in the development of “Crime Reporting System” is MYSQL at the backend. For front end for window base application we use PHP. Besides these tools we used have the number of other CASE tools (CSS, HTML, and JavaScript).
  • 19. 13 CHAPTER # 2 System Design 2.1 Introduction The design is a solution, the translation of requirements into center ways of meeting. The design is actually the process of analyzing, organizing and developing a database model that accurately reflects the organization functioning in the real world and implementing that model by creating a database requires an appropriate methodology. System can be divided into two phases: 1. Logical Design 2. Physical Design 2.1.1 Logical Design The logical design describes the detail specification for the proposed system. We can say that it describes its own feature. Input, output, file (table) and database in manner that meets the project needs. In logical design work with users is done to develop general design, choose best design, develop system flow charts, identify hardware, software and personal needs and revise estimates etc. 2.1.2 Physical Design The purpose of physical design is to translate the logical description of data into the technical specification for storing and retrieving data. The goal is to create design for storing data that will provide adequate performance and ensure database integrity, security and recovery. Physical database design does not include implementing files and databases (i.e. creating them and loading data into them). 2.2 Input Design The input design specifies the number in which the user enters the data to the system for processing at later stage. Input design can insure the reliability of the system and provide an accurate result. The input determines whether the user interacts with the system efficiently or not. The input design can also be explained as a link between the user and the world. Input design consists of those steps necessary to put transactions data into usable form of processing. While designing the input for the Crime Reporting System for police departments of KPK has the following objectives were kept in mind as guidelines.
  • 20. 14 1. Reducing the amount of input 2. Avoiding errors in data 3. Keeping extra steps 4. Keeping the process simple 5. Avoiding delays 2.3 Data Capturing In input design only those items are captured which must actually be the subject of input while designing the input, following points were kept in mind. 1. Crime information 2. Complaint report record 3. Admin information 4. User information 2.4 Input Validation Input validation is general term given to method, aim for detecting errors in the input. The main thing, which is considered in the input, is that what the chances of error are? Following are input validation used for centralized system for Crime Reporting System for police department. 1. Empty entry Control 2. Data Type Validation 3. Not Null 2.5 Output Design A system is considered to be successful or unsuccessful on the basis of output design. The term “output” means that after compilation of physical design what errors come out of the computer system for the user. The output in project is considered as the backbone of the project. All managerial design is actually made through these reports. Basically the reports are very important aspect of the output. The user creates various reports in response to queries. 2.6 Data Base Design Database Design is a creative process of transforming:
  • 21. 15 1. Problems into Solution 2. The description of solution 3. Intelligent database design is perhaps the most critical element of an optimal solution with respect to performance. In fact, poor design is usually the culprit for poorly performing solutions. 4. Designer of the database should satisfy the user. 2.7 Architectural Design The primary objective of architectural design is to develop a modular program structure and represent the control relationship between them. 2.8 Conceptual Database Design Tells the user exactly 1. What the system will do 2. Describe the functions of the systems 3. The system will work in the following areas 4. Unique authorized access to all registered users 5. Purchasing of products 6. Data Validation checks 7. The system is defined by its boundaries, entities, attributes, and relationship 2.9 Modular Design Modular design occurs after data; architecture and interface designs have been established. In and world, the modular specification required to be define algorithmic details would be stated in a natural language such as English because it is easily understandable. And then that straight forward plain English are converted to diagrams. There is no question that graphics tools such as flow charts or box diagrams provide excellent pictorial patterns that readily depict modular details. However graphical tools are misused, the wrong picture may lead to wrong software. In this section we will demonstrate some of our basic modules by using Flow Charts. Such as form entry, deletion, insertion, updating and reports.
  • 22. 16 YES NO Back Figure 2.1 General data entry Start Form Stored in database Confirmation Message End Enter Data Is Valid? Form
  • 23. 17 No Back Yes Figure 2.2 Delete Module Start Runs Delete Module Is Found? Load Data Form Delete Confirmation Message End
  • 24. 18 No Yes Store Figure 2.3 Update Module Start Is Found? Load Data Form Runs Update Module Update Confirmation Message End
  • 25. 19 Back No Yes Figure 2.4 Login Module Start LOGIN Enter User Name and Password Form Incorrect Message Is Correct? Runs Login Module Logins End
  • 26. 20 2.10 Internal Data Base Design The purpose of the Internal or physical database design is to translate the logical description of data into the technical specification for storing and retrieving data. As we know that the physical database design requires several critical decisions that will affect the integrity and performance of the application system. One of those decisions is the storage format (data type). So for our project we have taken the decision to the following data types and length for the attributes. The following are the tables, their attributes and the primary and foreign keys in the table 2.11 Internal Data Base Design of Crime Reporting System Tables Column Type Null Default Id int(11) No first_name varchar(50) No last_name varchar(50) No Gender varchar(10) No date_of_crime Date No time_of_crime varchar(50) No Address varchar(300) No City varchar(50) No contact_no varchar(20) No Email varchar(50) No crime_type varchar(50) No crime_location varchar(200) No Incident Text No photo1 varchar(200) No photo2 varchar(200) No Figure 2.5 FIR Table
  • 27. 21 Column Type Null Default F_id int(10) No date Datetime No time Datetime No description varchar(45) Yes NULL status varchar(45) Yes NULL crime_id int(10) No id_proof varchar(45) No id_proof_no int(10) No crimephoto1 varchar(255) Yes NULL crimephoto2 varchar(255) Yes NULL crimelocation varchar(45) No reg_id int(10) No claim_id int(10) No victim_id int(10) No dt_time Datetime Yes NULL area_id int(10) Yes NULL Figure 2.6 Online FIR Details Table Column Type Null Default crime_id int(10) No crime_type varchar(45) No description varchar(45) No Figure 2.7 Crime Type Table
  • 28. 22 Column Type Null Default Username varchar(45) No Password varchar(45) No Type varchar(15) Yes NULL Status varchar(10) Yes NULL last_logindatetime datetime Yes NULL Figure 2.8 Admin Login Table Column Type Null Default F_id int(10) No username varchar(45) No status varchar(15) Yes NULL description varchar(45) No dt_time Datetime Yes NULL from varchar(45) No Figure 2.9 FIR Forward Table Column Type Null Default city_id int(10) No city_name varchar(45) No Figure 2.10 City Table 2.12 Logical Database Design Logical design describes the detail specification for the proposed system. We can say that it describes its own features. Input output tables and database in a manner that meets the project needs. In logical design work with users is done to develop general system design, choose best
  • 29. 23 design, develop system flowcharts, identify hardware, software and personal needs and revise estimates etc. 2.13 Entity Anything that produces or consumes information is called entity. The representation of any composite information that must be understood by software is called data object, by composite information we mean something that has a number of different properties or attributes. We have used the following entities in our project. 1. FIR 2. Login 3. Get Crime Alert 4. Join us 5. About us 6. FAQs 7. Paragraph 8. Emergency contact Numbers 9. Services 10. Quick links 11. Online Registration 2.14 Entity Relationship Model The entity relationship model is a tool for analyzing the semantic feature of an application that is independent of events. Entity-relationship modeling helps reduce data redundancy. This approach includes a graphical notation, which depicts entity classes as rectangles, relationships as diamonds and attributes as ovals. For example situations a partial entity relationship diagram may be used to present a summary of the entities and relationships but not include the details of the attributes. 2.15 Entity Relationship Diagram The entity relationship diagram provides a convenient method for visualizing the inter- relationship among entities in a given application. This tool has proven useful in making the transition from an information application description to a formal database schema. The entity
  • 30. 24 relationship model is used for describing the conceptual scheme of an enterprise without attention to the efficiency of the physical database design. The entity relationship diagrams are later turned into a conceptual schema in one of the other models in which the database is actually implemented.
  • 31. 25 M M M M 1 M M M Figure 2.11 ERD Last Name FIR CityD_Incident ID Contact First Name Crime Type Picture Address Time Incident Location DetailGender Manage FIR Register Admin Password User name ID User Feedback GiveReceive Contact MessageEmailName ID Subject
  • 32. 26 Figure 2.12 Data flow Diagram
  • 34. 28 CHAPTER # 3 System Implementation 3.1 Overview It is particularly important first to design how the system will look and respired to user before designing the software structure. The most critical and creative aspect of development is to design the user interface. User interface design determines how the system will look the user from outside. The interface design create in effective communicate medium between human and a computer, following a set of design principle. The design identifier interface objects action and then creates a screen layout that formats the basic for a user interface prototype. User interface begins with the identification of user, tasks and environment requirements. User interface for the software should be design in such a way that is friendly to the user, easy to use and easy to understand. It should provide high quality interface between the user and the system. The results produce by our software should be consistence. In designing the user interface it has been kept in mind that non-technical personnel will operate the system with very little or no technical knowledge. Therefore the user interface has been designed is user friendly as possible that facilitate easy and quick and has been used and designing the screen are: 1. Home 2. Join Us 3. Get Crime Alert 4. FIR 5. Services 6. Emergency Contacts 7. About Us 8. Missing Citizens 9. Police Initiatives 10. Traffic Warden Service
  • 35. 29 11. Rapid Responsive Force 12. Dispute Resolution Council 13. Help Prevent Crime 14. Police Access Services 15. Police Services Lines 16. Elite Women Commandos 17. CNIC verification 18. Vehicle verification system 19. Reporting Room 20. Geo Tagging
  • 36. 30 Figure: 3.1 Crime Reporting System
  • 40. 34 CHAPTER # 4 System Testing 4.1 Introduction System testing is essential step for the development of a reliable and error free system .in a software development project ,errors can be introduced at any stage during the development .Each phase has its own techniques for the detection and correction of errors in that phase . However, some requirements errors and design errors are likely to remain undetected. Ultimately these errors will be reflected in a code. Since code is the only product that can be executed and whose actual behavior can be observed, testing is the phase where the errors remaining from the early phases also must be detected. Testing is the process of detecting and correcting as many errors as possible in the developed software before delivery to the customer. Test case is specification of the test and the output from the system plus a statement of what is being tested. Test data are the inputs which have devised to test the system. 4.2 Testing Objectives 1. To find errors in the developed software. 2. To check that working of the software function is according to the specifications. Their behavior and performance requirement are fulfilled. 3. To check the reliability and quality of the software. 4.3 Testing Strategies Following are the basics strategies that were used for testing of the software. Black box testing White box testing Stress testing Acceptance testing Assertion testing
  • 41. 35 Can only be determined by studying its inputs and the related outputs. It is called functional testing because here the tester has only concerned with functionality and not with the implementation of the software. In black box testing only the functionality of the software was tested without a record to the code .If the functionality which was expected from a component is provided then the black box testing is completed. 4.3.1 White Box Testing White box testing is also called glass box testing and structural testing .The objective of white box testing is not to exercise all the different input or output condition but to exercise the different programming and data structure used in the program. In white box testing internal code return in every component was tested and it was checked that the code written is efficient in utilizing various resources of the system like memory etc. 4.3.2 Stress Testing Stress test is designed to confront program with abnormal situation. Stress testing executes system in a manner that demands rescore in abnormal quality, frequency or volumes. For example: 1: Input data rates may increase to determine how input function will respond 2: Tests that’s requires maximum memory or other resources are executed. Basically, the tester wants to break the program. In stress testing the software was tested against the boundary conditions. Various inputs fields were tested against Abnormal values and it was tested that the software does not behave abnormally at any time. 4.3.3 Acceptance Testing Acceptance testing is performed with realistic data of the client to demonstrate that the software is working properly.
  • 42. 36 In acceptance testing the software was checked for completeness that it is ready. Quality assurance department performs the acceptance testing that the software is ready and can be given to the customer. 4.3.4 Assertion Testing In assertion testing the software is tested against the possible assertion. Assertion is used to check the program and various locations that whether the state of the program at a particular point is the same as expected or not. 4.3.5 Unit Testing Unit testing focuses verification effort on software component or module which is the smallest unit of software design. The unit testing is white box oriented and it can be conducted in parallel for multiple components. In unit testing we checked that all individual components were working properly. Before integration of all components unit testing is essential because it gives a confidence that all the components individually are working fine and ready to be integrated with the other ones. 4.3.6 System Testing System testing is actually a series of different tests whose primary purpose is to fully exercise the computer based system. Although each test has a different purpose, all work to verify that system elements have been properly integrated and perform allocated functions. When all the units were working properly and unit testing was performed and checked all the integrated components as a whole and looked for possible discrepancies, which could have arisen after the integration. 4.4 System Evaluation The objectives of the system evaluation is to determine whether the desired of objectives have been accomplished or not. Determining the merits and demerits of the proposed system over the existing system is also covered in system evaluations. This is concerned with the detailed study of the developed system, from implementation point of view.
  • 43. 37 4.5 Implementation This phase consists of bringing the new system in operation and turning it over the users. Briefly involves the following steps. Training: It involves 1. User group 2. Administrator 4.6 Installation of Computer Equipment’s It involves 1. Locations 2. Power supply 3. Space requirements 4. Air conditioning 4.7 Testing the New System System testing of the developed system was performed in these three steps. 4.7.1 Unit Testing In unit testing the different modules of software were tested independently to locate errors. This helps in locating errors, in coding and logic that were contained within a particular module. 4.7.2 Integrated Testing After unit testing, combined testing of all modules was carried out. The purpose was to determine that all the modules are correctly integrating with each other. 4.7.3 System Testing Final testing was done on the entire system to check that whether the desired specification and requirements are met or not. The main aim here was to determine the inconsistencies in the developed system. Hence the whole system was tested. Put the New System into
  • 44. 38 Operation At this point, a final dress rehearsal sometimes runs. It is done in the following ways. 4.7.4 Direct/ Cash Conversion In this approach, as entire new system is installed, the old system is completely dismantled, leaving the organization suddenly to rely on the new system alone. The advantage of the crash conversion is that when the old system is seriously inadequate or radically different from the new system and when the conversion will be so rapid that it will not severely disrupt operations. The crash conversion also has advantages i.e. the crash conversion is risky, and even for minor problem can seriously delay the implementation schedule. Careful planning and attention to detail are necessary for a successful crash conversion. 4.8 Conclusion The project titled as “Crime Reporting System” is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, show criminal details. This software is developed with scalability in mind. Additional modules can be easily added when necessary. The software is developed with modular approach. All modules in the system have been tested with valid data and invalid data and everything work successfully. Thus the system has fulfilled all the objectives identified and is able to replace the existing system. The project has been completed successfully with the maximum satisfaction of the organization. The constraints are met and overcome successfully. The system is designed as like it was decided in the design phase. The project gives good idea on developing a full-fledged application satisfying the user requirements. The system is very flexible and versatile. This software has a user-friendly screen that enables the user to use without any inconvenience. Validation checks induced have greatly reduced errors. Provisions have been made to upgrade the software. The application has been tested with live data and has provided a successful result. Hence the software has prove to work efficiently. An effective criminal justice response to hate crimes involves a number of important elements: close police-community relations, public confidence in the effectiveness of the police response to reports of hate crimes as well as appropriate processing of those reports by the courts. The quality of the police response to hate crimes is critical, as is the public perception of that response. If people feel that the criminal justice system is not responding appropriately and vigorously to the problem of hate crimes, these incidents will remain unreported. However,
  • 45. 39 nothing is more critical than having an accurate idea of the true nature and full extent of the problem. This can only come about if a greater effort is made to collect comprehensive hate crime statistics. At the present, KPK lags behind other provinces in this regard. The present report represents the first, small step towards documenting the incidence of this pernicious form of criminal activity, which, by its very nature, strikes at the heart of a multicultural society.
  • 46. 40 Reference List 1. http://www.w3school.com 2. http://en.wikipedia.org/wiki/Waterfall_model 3. http://en.wikipedia.org/wiki/Software_development_process, 4. http://en.wikipedia.org/wiki/Spiral_model 5. http://en.wikipedia.org/wiki/Prototype 6. https://www.google.com.pk/?gws_rd=cr,ssl&ei=ey3HVPXGC6HmyQOCxIDQCA#q=prototype +model+diagrams 7. https://www.google.com.pk/?gws_rd=cr,ssl&ei=9LXNVMaeI9bnatzKgng#q=history%20of%20o nline%20fir%20system%20in%20pakistan 8. http://www.incpak.com/editorial/govt-must-upgrade-police-computerized-fir-online-record/