User can get help from assistant for any query.
Login:
Registered user can login into the system by providing valid username and password.
Add Crime Details:
Member can add crime details like criminal name, crime type, location etc.
View Crime Details:
All user can view crime details added by member.
Update Crime Details:
Member can update existing crime details.
Delete Crime Details:
Member can delete existing crime details.
Add News:
Admin can add latest news related to crime.
View News:
All user can view latest news added by admin.
Project Report On Online Crime Management Applicationsatvirsandhu9
This presentation represents a project developed using asp .net and sql database. It is very useful for the engineering students and MCA/BCA/PG students for their industrial projects
Online crime reporting system project.pdfKamal Acharya
The objective is to design and develop an application that will help to imp rove the efficiency and effectiveness of the police security measures in keeping criminal records. ABSTRACT The victims can file the FIR through the website under various sections. The user can send photo evidence if any online. There will be an 'SOS 'capability in which, the user can press a button and his/her location will be sent to the nearest Police station. There will be a separate component for the accident victims so that FIR can be registered fast and treatment can be started as soon as possible. In this current system, user's information will be kept confidential and only users complain will be forwarded to its nearest police station. Users complain number will be forwarded from the server side automatically. For identifying location and authentic person, concept of cookies and IP addressing has been used. To eliminate the location conflicts between police station, server will play a vital role. It will search the address table using IP address and forward message to that police location from where the message has been received. We intend to create a project which will help bridge the gap between the police department and the common man. 'Online FIR Registration and SOS system' project will have an app from where the users can file FIR against the offender under the various sections. The main site will be maintained by the admin (from the police) who will then notify the user if the FIR has been registered and the necessary action has been taken.
Online Crime Report Information SystemShiva Prasad
Online Crime Report Information System developed using PHP and MySQL. Using this project people can report crime online. It provides the facility of uploading images or videos of crime scenes so that police can take action immediately. The system will work and update the online complaints, maintain criminal's records, crime details records, and other. The Online Crime Reporting System is an application that covers complete case management system and this project will help in managing all related to crime. With Online Reporting System public can report a crime without any fear and they can easily contact the department where they can solve the problem in effective manner and department can easily catches the criminals by checking the previous record from inferior data.
System Users/Actors
Admin
Police Station
Public Users
- Online Crime Reporting Facility
- Information of Most Wanted Criminals
- Address and Contact Details of police Station of their City
Front end: HTML, CSS, JavaScript
Back end: PHP, MySQL
Installation Steps
1. Download zip file and Unzip file on your local server.
2. Put this file inside "c:/xampp/htdocs/" .
3. Database Configuration
Download this project:
https://www.studentprojects.live/phpscript/online-crime-management-system/
Whatsapp:
https://wa.me/919972853368
The main idea for developing this project is to replace existing manual compliant system with online service support.
This system will increase corporation reputation by providing better services and request feedback from people.
Administrator can view the status of compliant registered by people.
Summary reports periodically forward to respective department.
Project Report On Online Crime Management Applicationsatvirsandhu9
This presentation represents a project developed using asp .net and sql database. It is very useful for the engineering students and MCA/BCA/PG students for their industrial projects
Online crime reporting system project.pdfKamal Acharya
The objective is to design and develop an application that will help to imp rove the efficiency and effectiveness of the police security measures in keeping criminal records. ABSTRACT The victims can file the FIR through the website under various sections. The user can send photo evidence if any online. There will be an 'SOS 'capability in which, the user can press a button and his/her location will be sent to the nearest Police station. There will be a separate component for the accident victims so that FIR can be registered fast and treatment can be started as soon as possible. In this current system, user's information will be kept confidential and only users complain will be forwarded to its nearest police station. Users complain number will be forwarded from the server side automatically. For identifying location and authentic person, concept of cookies and IP addressing has been used. To eliminate the location conflicts between police station, server will play a vital role. It will search the address table using IP address and forward message to that police location from where the message has been received. We intend to create a project which will help bridge the gap between the police department and the common man. 'Online FIR Registration and SOS system' project will have an app from where the users can file FIR against the offender under the various sections. The main site will be maintained by the admin (from the police) who will then notify the user if the FIR has been registered and the necessary action has been taken.
Online Crime Report Information SystemShiva Prasad
Online Crime Report Information System developed using PHP and MySQL. Using this project people can report crime online. It provides the facility of uploading images or videos of crime scenes so that police can take action immediately. The system will work and update the online complaints, maintain criminal's records, crime details records, and other. The Online Crime Reporting System is an application that covers complete case management system and this project will help in managing all related to crime. With Online Reporting System public can report a crime without any fear and they can easily contact the department where they can solve the problem in effective manner and department can easily catches the criminals by checking the previous record from inferior data.
System Users/Actors
Admin
Police Station
Public Users
- Online Crime Reporting Facility
- Information of Most Wanted Criminals
- Address and Contact Details of police Station of their City
Front end: HTML, CSS, JavaScript
Back end: PHP, MySQL
Installation Steps
1. Download zip file and Unzip file on your local server.
2. Put this file inside "c:/xampp/htdocs/" .
3. Database Configuration
Download this project:
https://www.studentprojects.live/phpscript/online-crime-management-system/
Whatsapp:
https://wa.me/919972853368
The main idea for developing this project is to replace existing manual compliant system with online service support.
This system will increase corporation reputation by providing better services and request feedback from people.
Administrator can view the status of compliant registered by people.
Summary reports periodically forward to respective department.
Page 1Bigfoot Financial Bank (BFFD)Online BankingSWE410-.docxalfred4lewis58146
Page | 1
Bigfoot Financial Bank (BFFD)
Online Banking
SWE410-1401B-01 Software Processes
11 March 2014
Table of Contents
Project Outline and requirements and function 4-7
Section 2: Project Management Process 8-10
Section 3: Requirements Management (REQM) 11
Section 4 12
Section 5 13-16
Section 6 17
Reference Page 14
Project Outline and Requirements
Big Foot Financial Bank is not a standard financial bank. We run checking and savings account throughout the United States. We have many services and banking needs that can help many customers from the internet banking to the 24 hour ATM design. We can transfer money up 10,000 transactions per day. We will deploy the following online banking to mobile devices and computer laptops and desktops to the homes of people in the United States. Instead of ATM machines we want people to access money markets accounts. Having access to Quicken and or MS Money from application given to them.
We have over one hundred employees and with different location from California to New York We have several tech support personnel on-hand along with the security to help combat virus and spams as well.
Major function: This project will need security logon, a good running computer, Laptop or mobile device to run with memory and internet needs. Some of the Major function of the bank. Will be to download the Statement Activity. Having Quicken and MS Money application users to use to balance their check books.
Also another function will be able to access all the users’ accounts at once. There is also available if a business owner has a business account it can be accessed for that person to see along with their personal accounts. A very well put together will be that the users will be able to pay bills online. All they will have to do is push a button and take a picture of the bill and it will send them to that website according to the picture and pay there bill online from their account. Deposit there checks from their home as well from scanning them somehow.
Constraints: we would have several time and scope along with cost in which we will need to see what the project manager can do to help with starting the project. Another issue would be what team we bring in to acquisition the software when making the mission successful.
Choosing the right PM as well can be slow the process done. However just doing the proposal we need to make every requirement count. Communication can be time costly along with cost will go up if we don’t communicate what we want.
Users have the ability to download their statements from a mobile device.
Requirement one: system shall have the ability to download and view.
Requirement two: system shall have the ability to have the function of a button to push.
Users or have the ability to check their balances of any account on any device.
Requirement one: system shall be able to check their balances and to show on a user interface for any account.
Requirement two: system shall be able to have a f.
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfKamal Acharya
Our vision is to make ONLINE CAR SERVICING SYSTEM is needed for the country as technology grows fast in the world. The purpose is to develop this project to provide a better solution to the problems that the customers faces. This website will provide customers to reserve their car services from their home or from office. Customer feels hard to send their car for the service, either they need to reserve using mail system or walk in to send their car for service.
At the end of these project, a prototype of justified system will develop which will provide a solution for the identify problem to improve the organizations revenue and performance. This system will be web based system where it is able to conduct an overall process of online registration and bookings too. The data will be stored in keep as privacy for each customer who has register.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Page 1Bigfoot Financial Bank (BFFD)Online BankingSWE410-.docxalfred4lewis58146
Page | 1
Bigfoot Financial Bank (BFFD)
Online Banking
SWE410-1401B-01 Software Processes
11 March 2014
Table of Contents
Project Outline and requirements and function 4-7
Section 2: Project Management Process 8-10
Section 3: Requirements Management (REQM) 11
Section 4 12
Section 5 13-16
Section 6 17
Reference Page 14
Project Outline and Requirements
Big Foot Financial Bank is not a standard financial bank. We run checking and savings account throughout the United States. We have many services and banking needs that can help many customers from the internet banking to the 24 hour ATM design. We can transfer money up 10,000 transactions per day. We will deploy the following online banking to mobile devices and computer laptops and desktops to the homes of people in the United States. Instead of ATM machines we want people to access money markets accounts. Having access to Quicken and or MS Money from application given to them.
We have over one hundred employees and with different location from California to New York We have several tech support personnel on-hand along with the security to help combat virus and spams as well.
Major function: This project will need security logon, a good running computer, Laptop or mobile device to run with memory and internet needs. Some of the Major function of the bank. Will be to download the Statement Activity. Having Quicken and MS Money application users to use to balance their check books.
Also another function will be able to access all the users’ accounts at once. There is also available if a business owner has a business account it can be accessed for that person to see along with their personal accounts. A very well put together will be that the users will be able to pay bills online. All they will have to do is push a button and take a picture of the bill and it will send them to that website according to the picture and pay there bill online from their account. Deposit there checks from their home as well from scanning them somehow.
Constraints: we would have several time and scope along with cost in which we will need to see what the project manager can do to help with starting the project. Another issue would be what team we bring in to acquisition the software when making the mission successful.
Choosing the right PM as well can be slow the process done. However just doing the proposal we need to make every requirement count. Communication can be time costly along with cost will go up if we don’t communicate what we want.
Users have the ability to download their statements from a mobile device.
Requirement one: system shall have the ability to download and view.
Requirement two: system shall have the ability to have the function of a button to push.
Users or have the ability to check their balances of any account on any device.
Requirement one: system shall be able to check their balances and to show on a user interface for any account.
Requirement two: system shall be able to have a f.
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfKamal Acharya
Our vision is to make ONLINE CAR SERVICING SYSTEM is needed for the country as technology grows fast in the world. The purpose is to develop this project to provide a better solution to the problems that the customers faces. This website will provide customers to reserve their car services from their home or from office. Customer feels hard to send their car for the service, either they need to reserve using mail system or walk in to send their car for service.
At the end of these project, a prototype of justified system will develop which will provide a solution for the identify problem to improve the organizations revenue and performance. This system will be web based system where it is able to conduct an overall process of online registration and bookings too. The data will be stored in keep as privacy for each customer who has register.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
Suryansh.docx
1. PROJECT REPORT
on
Online Crime Report
for
Nucleus System Pvt.Ltd
towards partial fulfillment of the requirement
for the award of degree of
Bachelor of Computer Applications
from
Babu Banarasi Das University
Lucknow
Academic Session 2017 - 18
School of Computer Applications
I Floor, H-Block, BBDU, BBD City, Faizabad Road, Lucknow (U. P.) INDIA 226028
PHONE: HEAD: 0522-3911127, 3911321 Dept. Adm. & Exam Cell: 0522-3911326 Dept. T&P Cell: 0522-3911128; E-Mail: head.sca@gmail.com
w w w . b b d u . a c . i n
2. PROJECT SYNOPSIS
on
Online Crime Reporting
towards partial fulfillment of the requirement
for the award of degree of
Bachelor of Computer Applications
from
Babu Banarasi Das University
Lucknow
Submitted by : Under Guidance of
Jay Prakash
Suryansh Chauhan
3. Babu Banarasi Das University
Lucknow
CERTIFICATE
This is to certify that Project Report entitled
ONLINE CRIME REPORT
being submitted by
SURYANSH CHAUHAN
towards the partial fulfillment of the requirement
for the award of the degree of
Bachelor of Computer Applications
to
Babu Banarasi Das University
Lucknow
in the Academic Year 2017-18
is a record of the student’s own work carried out at
NULCLEUS SYSTEMS PVT LTD
and to the best of our knowledge the work reported herein does not form a
part of any other thesis or work on the basis of which degree or award was
conferred on an earlier occasion to this or any other candidate.
4. Prabhash Ch. Pathak
HEAD (School of Computer Applications)
Acknowledgement
It gives me great pleasure to express my gratitude and heart full thanks to all those
who helped me in completing this project.
I am extremely thankful to NCL Technologies pvt. Ltd for giving me the opportunity
to make this project.
I want to thank Ms. Jay Prakash, who have always encouraged and helped me to
make this project. In addition to this, I am grateful to other faculties too who made
me move in right direction and gave me their precious time and expert guidance
whenever necessary through which I could achieve this extent.
At last but not the least, I am feeling glad to say about my family, whose wishes are
always with me, without which, it was not possible for me to reach to this extent.
Thank You
5. INDEX
S. No CONTENTS PAGE NO.
1. Acknowledgement 3
2. Company Profile 4
3. Introduction 5
4. Identification of Need 6-7
5. Objective and Scope of Project 8
6. Problem Statement 9
7. System Analysis 10-15
Preliminary investigation
Feasibility study
8. Software Requirement Specification 16-32
Introduction
Overall Description
Requirement Analysis and Planning Steps
GANTT Chart
PERT Chart
System Feature
External Interface Requirement
Software Quality Attribute
Other Non-Functional Requirements
Other Requirements
7. 2. Company Profile
About the Organization
NCL Technologies Limited is a software development and business process consulting company
providing business process re-engineering consultancy and services, enterprise solutions, ERP,
Engineering Services, e-business intelligence, data warehousing, ecommerce solutions and CAD
solutions.
NCL was incorporated with the prime objective of providing on-site and off-site professional
services specializing in system integration, application development, and CAD and web services.
Company Mission:
To Make Technology More Useful for our Clients. This is the mission for each and every NCL
employee.
e. Soft deliver premium IT services, CAD services and software solutions that clearly execute
the strategic business objectives of their clients and want to be the technology partner that
empowers businesses to succeed. Soft accurately reflect your business vision through IT
implementations. e. Soft Technologies was initially formed to leverage experience solving complex
IT issues. Designing, developing and delivering solid solutions has become our forte. Custom
application development, web solutions, Business Intelligence software, ecommerce and CAD are
our specialties. NCL can move your company through the analysis phase and help you to clearly
define your requirements before investing in the more costly development phases. The resulting
solution will accurately reflect your vision.
8. 1. Introduction
We see that when a group or society is formed then some rules and laws are made by the people, for the
people and to the people. The purpose of these rules and laws are to give a comfortable life to all who
are living in that society. Whenever any law is violated by any one then we say that crime is committed
and who break that law is called CRIMINAL and to realize that person his/her mistake, there is also a
criteria of punishment.
Some times these crimes are committed by same/different people in same /different manner repeatedly.
So we have to manage a record of such type of people so that when any special type of crime is committed
then that criminal can easily traced out and punish them so that they do not do that crime in future.
The basic entity of this System is FIR. Any victim can lodge a request for FIR through INTERNET from
any place. It is not necessary that it should be lodged at same place where the crime occurred. As request
lodged, it will automatically reached to the server of the nearest Police Station from the place of crime
occurred with the help of information given in the Request Form. At the server side this request will be
converted into an FIR and the case will hand over to the Investigation Officer of that Police Station. The
IO will investigate the case on the basis of information given in FIR, arrest the suspect or criminal, collect
the evidences, inquire the people on the spot and maintain his/her case diary, give his/her report on that
case to Magistrate and case will be transfer to COURT where the final decision will taken out on that case
and if suspect is proved CRIMINAL, the court will punish him/her. On the basis of court decision the
information records such as crime record, criminal record are maintained.
9. 2. Identification of Need
Problem with the Current (Existing) System:
There are some problems arises with the Existing System:
:
• Existing system of Complain register and FIR register was not user friendly.
• System was not well organized .
• System are not responsible.
• Information was redundant and inconsistent.
• It didn’t integrated all the modules.
Need For Automation:
To overcome the limitations of the existing system that will provide the user the facility of
register complain online through our android UP police citizen service.
Online Status of FIR & vehicle.
It will maintain the information of the users who are registered.
Automated Processes:
Automated process is a process which is executed automatically by the system. After
completion of interaction with the user, the system will perform some automated processes.
In the user registration process, user is asked to fill a registration form. After filling the form his
registration will be completed by the system.
After the user register the compalin or FIR it's status will be checked by the app itself.
Non-Automated Processes:
Non-automated Process is a process, which is completely executed by the human action. If any
modifications are required to the System then the human action will handle them.
Registration and login are to be done manually.
Bid can only be approved by admin.
10. Scope:
All the control is under the administrator and the no other member has the rights to access the
records.
No one can add or search their information about the criminals .Since illegal access may corrupt the
database. So login window has tobe given in this project.
In this project we can generate reports on the basis of that criminals arerelated to the particular
district or the particular Police station.
We can see also the criminal’s photographs. Administrator can changephotograph by uploading new
one from the computer.
The new system will be designed to provide the following ;
The system would provide fast complain registration
It will provide a tracking facility of FIR.
11. 3. Problem Statement
There are some problems arises with the Existing System :
In the existing system the no sign that your Complain or FIR is registered. There is chance that
your complain is not registered by the local police station . There are so many limitations in the
existing system.
There are some problems arises with the Existing System:
.
• Registration of complain and FIR is to complex.
• Too many step for simple complain..
• Police station may refuse to accept your complain or FIR.
• There may be a possibility that your complain is lost from record of police.
• Not sure that your complain is registered in police record.
12. 4. System Analysis
System is created to solve problems. One can think of the systems approach as an organized way of
dealing with a problem. In this dynamic world, the subject system analysis and design, mainly deals
with the software development activities.
Since a new system is to be developed, the one most important phases of software development life
cycle is system requirement gathering and analysis. Analysis involves detailed study of the current
system, leading to specification of a new system. Analysis is a detailed study of various operations
performed by a system and their relationship within and outside the system. Using the following
steps it becomes easy to draw the exact boundary of the new system under consideration.
Keeping in view the problems and new requirements, workout the pros and cons including new area
of the system.
All procedures, requirements must be analysed and documented in the form of detailed DFDs,
logical data structure and miniature specifications.
System analyses also include sub-dividing of complex process involving the entire system,
identification of data store and manual processes.
System Analysis is conducted with the following steps
Information gathering
The tools of structured analysis
Identification of Need
System Planning and initial investigation
Feasibility study
Information Gathering:
Information about the firm
Information about the workflow
Various tools used are:
o Review of literature
o Procedure
o Forms
13. The tools of structured analysis:
DFD
Data Dictionary
Decision Tree and Structured English
Initial investigation:
Problem definition and project initiation
Determining the requirements
Needs identification
Dimension of planning
Determination of feasibility
Feasibility Analysis:
System Performance definition
Identification of system objectives
Description of outputs
Preliminary Investigation:
Evaluation of project request is major purpose of preliminary investigation.
It is the collecting information that helps committee members to evaluate merits of the
project request and make judgment about the feasibility of the proposed projects.
To answer the above questions, system analysts discuss with different category of person to
collect facts about their business and their operations.
When the request is made, the first activity the preliminary investigation begins.
Preliminary investigation has three parts-
1. Request clarification
2. Feasibility study
3. Request approval
14. Request Clarification:
An information system is intended to meet needs of an organization. Thus the first step
is in this phase is to specify these needs and requirements.
The next step is to determine the requirements met by the system. Many requests
from employees and users in the organizations are not clearly defined. Therefore,
it become necessary that project request must examine and clarified properly
before considering system investigation.
Information related to different needs of the System can be obtained by different
users of the system. This can be done by reviewing different organization’s
documents such as current method of storing sales data, complaint data etc. By
observing the onsite activities the analyst can get close information related to real
system.
Feasibility Study:
The feasibility report of the project holds the advantages and flexibility of the project. This is
divided into three sections:
Economical Feasibility
Technical Feasibility
Operational Feasibility
1. Economical Feasibility:
A systems financial benefit must exceed the cost of developing that system. i.e. a new
system being developed should be a good investment for the organization.
The proposed system is economically feasible because:
i. The system requires very less time factors.
ii. The System reduce paper cost.
15. iii. The system will provide fast and efficient automated environment instead of slow and
error prone manual system, thus reducing both time and man power spent in running
the system.
iii. The system will have GUI interface and very less user-training is required to learn it
iv. The system will provide service to view various information for proper managerial decision
making.
2. Technical Feasibility:
Technical feasibility centres around the existing computer system ((hardware and software)
whether it can support the addition of proposed system, if not, to what extent it can support and the
organization’s capacity to acquire additional components.
Our proposed system is technically feasible because –
The hardware and software required are easy to install and handle
The necessary hardware configuration and software platform is already there
The system supports interactivity with the user through GUI
Proposed system is technically feasible because of the following reasons:-
i. It’s required less system resources.
ii. Expandability will be maintained in the new system. New modules can be added later on the
application, if required in the future.
iii. The application will have User-friendly Forms and Screens, all validation checks. So the new
system guarantees accuracy, reliability, ease of access and data security.
16. 3. Behavioural Feasibility:
Behavioural feasibility determines how much effort will go in the proposed information system, and
in educating and training the users on the new system, along with the new ways of conducting the
business. Behavioural study strives on ensuring that the equilibrium of the organization and status
quo in the organization neither are nor disturbed and changes are readily accepted by the users.
The proposed system is behaviourally feasible because of the following:
The users will accept it because they are already acquainted with computers.
This system is also meant for the general user. Nowadays the Internet is almost
familiar to everyone. So, it is not difficult for the user to use the system, in fact they
feel comfortable in using this system.
Most of the users are familiar with the web browser and the process of booking the
auditorium will be simplified for the users. The organization is definitely ready to
welcome the computerized system.
Software Requirement Specification
Introduction:
This app is a collect data & item from different User and admin.
It will take advantage of the Internet to radically improve the way the way of register complain.
Purpose:
17. Minimize the efforts of the user to register complain and carryout various activities carry out in
police station (e.g., vehicle status) by maximizing automation and thus minimizing paper and file
work.
Document Conventions:
• The purpose of this document is to write down formally the requirements considered to be
necessary for building.
• The first section provides a brief idea about the working of the project along acronyms,
definitions, abbreviations, and reference materials.
• Section 2 provides overview of the system, and a brief description of all the system
functions.
• Section 3 gives a detailed description of the components.
• Intended Audience and Reading Suggestions:
• This SRS would be used by the following people-
• Developers: The developers would use this document to implement the functionalities and
to ensure traceability of the software.
• Testers: The testers would use this document to know the interfaces and to test the
software accordingly.
• Users: The users would use this document to verify if the requirements specified satisfy
their needs.
•
Scope:
Nowadays, India is in a completely growing stage of development and we need to update our
method to the growing needs of the new generation. ‘Incredible India has now got a new name –
‘DIGITAL India’. There is a huge Android app. The current generation completely belongs to e-
services. Today, every system and service is going the ‘internet’ way. Everyone prefers e-services
and e-governance which are the most preferred ways to connect to the people around the world.
18. Existing System with Limitations:
In the present system of police the system is not supported the local police station to take and
register complain online. The process of checking status complain for user in current system is
difficult and time taking.
References:
www.google.com
www.yahoo.com
https://digitalpolice.gov.in
www.fbi.gov
www.homeofficegov.uk/crime
www.met.police.uk
www.dailycrimereport.com
19. Process Description:
The major modules of the project are:-
USER SPECIFICATION:
Admin:
Admin will be Protected by username and password. ordinary user of
website will not be permitted to enter into the application. Admin can
manage all record related to application that manage the crime detail .
• Member:
Member can add crime
detail of criminal. Member
can manage crime details
and question
Visitor:
Visitor can view all crime details, view news, Post question, add
inquiry and give answer of question and feedback.
20. •MODULE SPECIFICATION:
•Registration:
New user can register in the system.
Login Module:
Using the username And password admin and all Member can
login in The system and manage the application.
• Member Module:
Each of member view the criminal records and status
22. Admin
Hardware Requirement:-
It is recommended that the minimum configuration for clients is as appended below:
Processor : Pentium Series (1GHz or above)
RAM : 3 GB RAM minimum
Hard Disk : With 80GB or above
Monitor : SVGA Monitor
CD Drive : 52X or above
Lodge FIR
Manage Fir
View complain
View User
Update Service
Add Police Station
/Manage Police Station
24. Design Implementation and Constraints:
Login and password is used for identification of registered users and there is no facility for
non-registered users to login.
This system works only on a single server.
GUI is in Hindi and English.
User Documentation:
A user document should be provided at the end of the development. It should have the following
1. A read me file to help the user about the product
2. A well documented user manual.
Requirement Analysis and Planning Steps:
GANTT Chart:
A standard technique employed in recent times to keep track of a project's progress is the Gantt
chart named after the industrial engineer Henry Gantt (1861-1919). They are easy to draw, easy to
understand and readily adaptable to other planning approaches (e.g. Pert Charts).
Each task displayed in the GANTT chart is listed:
1.1 Identify needs and benefits
Identification of Need and Project Constraints
Meet with victim
Register complain
Milestone: Register complain through app
Preparing Feasibility Study
Milestone: Feasibility Study Completed
1.2 Preparing Software & Hardware Requirement Study
Define app Scope
Information Description
Functional Description
Behavioural Description
Validation Criteria
25. Hardware Requirement Study
Milestone: SRS Complete
1.3 Define desired output/control/input (OCI)
Define Keyboard functions
Define modes of interaction.
Define import functions
Review OCI with customer
Milestone: OCI define
1.4 Isolate software elements
Milestone: Software elements defined
Research availability of existing software
Research text editing components
Research image editing components
Research MS Word document migration components
Milestone: Reusable components identified
1.5 Database preparation
Milestone: Database preparation complete
1.6 Coding
Milestone: Coding completes
1.7 Implementation of System Security Measures
Milestone: System Security Measures implemented
1.8 Testing Application
Milestone: Testing Software Complete
Tabular description of Gantt chart is given below:
26. PERT Chart:
A PERT chart is a project management tool used to schedule, organize, and coordinate tasks
within a project. PERT(stands for Program Evaluation Review Technique), a methodology
developed by the U.S. Navy in the 1950s to manage the Polaris submarine missile program.
A PERT chart presents a graphic illustration of a project as a network diagram consisting of
numbered nodes (either circles or rectangles) representing events, or milestones in the
project linked by labelled vectors (directional lines) representing tasks in the project. The
direction of the arrows on the lines indicates the sequence of tasks.
27. A PERT chart presents a graphic illustration of a project as a network diagram consisting of
numbered nodes (either circles or rectangles) representing events, or milestones in the project
linked.
The PERT chart is sometimes preferred over the Gantt chart, another popular project management
charting method, because it clearly illustrates task dependencies. On the other hand, the PERT chart
can be much more difficult to interpret, especially on complex projects. Frequently, project
managers use both techniques.
System Feature:
Description and Priority:
The product offers the following Key features:
Web based Application
Client-server architecture
28. Supports for both intranet and internet operations
Highly scalable and extendible
6.Software Engineering Paradigm Applied
Software engineering is a layered technology. The foundation for software engineering is the
process layer. Software engineering processes the glue that holds the technology layers together and
enables ratios and timely development of computer software. Process defines a framework for a set
of key process areas that must be established for effective delivery of software engineering
technology.
Software engineering methods provide the technical how-to’s for building software. Methods
encompass a broad array of tasks that include requirements analysis, design, program construction,
testing and support. Software engineering tools provide automated or semi-automated support for
the process and the methods. When tools are integrated so that information created by one tool can
be used by another tool, a system for the support of software development, called computer-aided
software engineering is established.
The following paradigms are available:
1. The Waterfall Model
2. The Prototyping Model
The Waterfall Model:
• The waterfall Model originally proposed by bohem is a software process models
that tuples.
• The iterative nature of prototyping with the controlled and systematic aspects
of the linear.
• Sequential model.
• Using the waterfall model website is developed in a series of incremental
releases.
This model is also known as Linear Sequential Model. In this model the software development is
carried out in six phases. This classical model suggests well-defined activities to be carried out in
29. every phase of development. This method is called waterfall model because it is similar to a waterfall
and all the activities are done sequentially.
Feasibility Study
Requirement Analysis
Design
Coding
Testing
Implementation & Maintenance
The Prototyping Model:
The Prototyping model is similar to the waterfall model with some differences. It has been
noticed by several system analysts that most of the time, the customer is not sure about the
functionality he requires in the software product. In such cases, it is not considered a good practice
to develop a product as only perceived by the software development team. Before preparing the SRS
documents, the customers must also understand the functionality of the product. Under such
circumstances, the prototyping model for software development is used. In this approach a quick
design of the product is prepared and shown to the customer. Prototype is a toy representation of
the software modified. As per the suggestion of the customer, the prototype is rebuilt and modified.
Once the customer accepts the design, the design phase according to the waterfall model starts.
Feasibility
Study
Requiremen
t Analysis
Design
Coding
Testing
Implementati
on &
Maintenance
Fig.: The Waterfall Model
30. Initial Requirement & Specification
Rapid Design
Construct
Prototyp
e
Evaluation of
Prototype
Refine
Requirement
Design
Coding
Testing
Implementation and
Maintenance
Building a
Prototype
Fig: The Prototype Model
31. The Project is based on Prototype Model as:
The basic idea of prototyping is that instead of freezing the requirements before any design or
coding can proceed, a throwaway prototype is build to help understand the requirements. This
prototype is developed based on the prototype obviously undergoes design, coding & testing, but
each of these phases is not done very formally or thoroughly. By using this prototype the client can
get an actual feel of the system, because the interactions with the prototype can enable the client to
better understand the requirements of the desired system.
Design Code Test
In this Project used Prototype Model because the system is complicated and large and there is no
existing system (computerized) prototyping is an attractive idea. In this situation letting the client
test the prototype provides the variable inputs, which help in determining the requirements of the
system. It is also an effective method of demonstrating the feasibility of a certain approach.
Some Advantages of Prototype model:
Reduces development time.
Reduces development costs.
Requires user involvement.
Developers receive quantifiable user feedback.
Facilitates system implementation since users knows what to expect.
Results in higher user satisfaction.
Exposes developers to potential future system enhancements.
32.
33. 10. High Level Design
1.Data Flow Diagrams:
Context/Zero Level DFD:
Admin User/Citizens
Online
Crime
Report
Manages
Pages
View recent
firs
Register/Logi
n
File Fir And
View Status
36. DATA DICTIONARY
Table Name:FIR
Table Name:: Fir 1
FIELD TYPE Constraint DESCRIPTION
Name Varchar NULL Holds name
Address Varchar NULL Holds asdress
E mail Varchar NULL Holds e mail
Phone Int NULL Holds phone
Contact Int NULL Holds contact no of
the investigating
officer
Detail Varchar NULL Holds complete detail
of fir
Firno Int NULL Hold fir no that must
be given or assigned
FIELD TYPE Constraint DESCRIPTION
State Varchar NULL Holds the state name
City Varchar NULL Holds the city name
Police Station Varchar NULL Holds the station name
Fir Type Varchar NULL Holds the types of FIR
User ID Varchar NULL Holds the id
FIELD TYPE Constraint DESCRIPTION
State Varchar NULL Holds the state name
City Varchar NULL Holds the city name
Police Station Varchar NULL Holds the station name
Fir Type Varchar NULL Holds the types of FIR
User ID Varchar NULL Holds the id
FIELD TYPE Constraint DESCRIPTION
State Varchar NULL Holds the state name
37. Table Name:: Fir Track
FIELD TYPE Constraint DESCRIPTION
Id Int null Holds the id of the fir
Status Varchar null Holds the current
status of the fir
Table Name:: Person Verification
FIELD TYPE Constraint DESCRIPTION
Name Varchar NULL Holds name
Address Varchar NULL Holds asdress
City Varchar NULL Holds the city name
State Varchar NULL Holds the state name
Country Varchar NULL Holds the country
name
Picture Varchar NULL Holds the picture of
theaccused
38. Table Name:: PoliceStations
FIELD TYPE Constraint DESCRIPTION
Id Int null Holds the id of the
police station
Name Varchar NULL Holds name
Address Varchar NULL Holds address
City Varchar NULL Holds the city name
State Varchar NULL Holds the state name
Pin Varchar NULL Holds the Pin
E mail Varchar NULL Holds e mail
Phone Int NULL Holds phone
Contact Int NULL Holds contact no of the
police station
User ID Varchar NULL Holds the id
Password Varchar NULL Holds the Password
39. Table Name:: Registration
FIELD TYPE Constraint DESCRIPTION
Name Varchar NULL Holds name
E mail Varchar NULL Holds e mail
Password Varchar NULL Holds the Password
Mobile No Int NULL Holds the Mob no of
the person which is
going to register
Gender Varchar NULL Holds the Gender
40. CONCLUSION:
Effective implementation of this software will take care of the basic requirements citizen service by
Up police management system because it is capable of providing easy and effective storage of
information related to criminal activities happening in the area. With these, the objectives of the
system design will be achieved.
Improving the efficiency of the system by ensuring effective monitoring of services and activities.
To ensure that there exists a level of restricted access based on functionality and role.
To ensure that the system is user friendly.
Project History
Project ID GPMC
Test Case History
Created By Date Created By 25-04- 2018
Reviewed By Date Reviewed By 30-04-2018
Approved By Date Last Updated 30-04-2018
Test Executed
By
1. Test Case Name: Buyer Login Operation
Test Case Objective: Verify Login operation
TC# Test Design Input Data Expected
Result
Actual
Result
Pass Fail Comments Bug
TC_01 Click on
Select
language
Hindi/English
Click on
Radio
Button
Should
display
Text
content in
Selected
language
Showing
Text
content
in
selected
language
Pass If no
language is
selected
English will
be default
language
47. BIBLIOGRAPHY
17. Bibliography
Books:
I. “Complete Reference”, Herbert Schildt
II. Khalid Mughal-new.PDF
III. Database Programming With JDBC And Java, 2nd_Edition.pdf
Websites:
I. www.google.com
II. www.wikipidea.com
III. www.yahoo.com
IV. https://digitalpolice.gov.in
V. www.fbi.gov
VI. www.homeofficegov.uk/crime
VII. www.met.police.uk
VIII. www.dailycrimereport.com
IX. Up dial 100 ppt