0% found this document useful (0 votes)
162 views57 pages

Project Report On Aaj

This document is a major project report for a Crime Record Management System submitted by Akash Aman Jaysurya to fulfill requirements for a Master's degree. The report includes an introduction to the project, problem statement, proposed work, system requirements analysis, system design including database tables and data flow diagrams, system coding snapshots, system testing plan, and implementation. The project aims to develop a computerized system to manage crime records, investigations, chargesheets and other related information to address limitations of the existing manual system.

Uploaded by

AshutoshSharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views57 pages

Project Report On Aaj

This document is a major project report for a Crime Record Management System submitted by Akash Aman Jaysurya to fulfill requirements for a Master's degree. The report includes an introduction to the project, problem statement, proposed work, system requirements analysis, system design including database tables and data flow diagrams, system coding snapshots, system testing plan, and implementation. The project aims to develop a computerized system to manage crime records, investigations, chargesheets and other related information to address limitations of the existing manual system.

Uploaded by

AshutoshSharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

A MAJOR PROJECT REPORT

ON
CRIME REPORT MANAGEMENT SYSTEM

Submitted in Partial Fulfillment of the Requirement for the


Award of Degree in
Master of Computer Applications
SUBMITTED BY
Name: Akash Aman Jaysurya
Roll No: 1350204004

UNDER THE SUPERVISION OF


Internal Supervisor

External Supervisor

Mr. Amit Taneja


Associate Professor
Invertis University Bareilly

Mr.V.K.Mishra
Technical Head
DUCAT,Noida

INVERTIS INSTITUTE OF COMPUTER APPLICATIONS


INVERTIS UNIVERSITY
Invertis Village, Bareilly- Lucknow, NH-24, Bareilly, Uttar Pradesh 243123

Batch: 2012 2015

CERTIFICATE

This is to certify that Mr. Akash Aman Jaysurya (Roll No.


1350204004), has carried out the major project work presented in
this report entitled Crime Record Management System for the
award of Master of computer Applications, Invertis
University, Bareilly under the supervision of undersigned.

Amit Taneja
Internal Project Supervisor
Associate Professor
Invertis University Bareilly

Ajay Indian
HOD (IICA)
Associate Professor
Invertis University Bareilly

INVERTIS INSTITUTE OF COMPUTER APPLICATIONS

INVERTIS UNIVERSITY, BAREILLY

Preface
The Internets rapid diffusion and digitization of economic activities have led to the
emergence of a new breed of criminals. Economic, political, and social impacts led to
increase the number of crime activity at every face of life .This serious blast in the field of
crime prove to be a epidemic situation for the guards. The biggest problem arises with a
hydra-headed situations .So this project is an attempt to solve a question to management of
the information of the criminal, witness, charge sheets and all other important aspects that
must be kept for a future reference.
For the first time in our civilization, computers and networks, together, constitute an
amplifier of the human mind, where the amplification factor is at a billion and growing fast
with no upper bound in sight. With such formidable potential and power, computers and
networks are destined to fundamentally alter our world even beyond what we can
reasonably imagine.
So this software gather all the resources which provide a easy method to manage and
control .
Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions
about crimes are flawed, unrealistic, and implausible to explain this new form of
criminality. The empirical records regarding crime patterns and strategies to avoid and
fight crimes run counter to the functioning of the cyber world.
Theorists are also debating as to the best way to comprehend the actions of criminals and
hackers and the symbiotic relationships they have with various situation.
An online comprehensive crime reporting system to engage public, NGOs, police and
government agencies to be more quick, proactive and responsive to fight with crime and
criminals.
Conventionally the citizen has to go to Police station in person to report the crimes and
anonymous events like thefts, murder, missing citizens, dead bodies and other
miscellaneous events. Here we are explaining about a crime management system which
will be useful for citizens and police departments .So crimes are solve and conclude in an
effective period

ACKNOWLEGDEMENT
I extend my Thanks to Ducat, Noida who has given me opportunity.
Today I am feeling a great sense of Excitement on my way to successfully
complete my project on Crime Record Management System under the
guidance of Mr. V.K.Mishra Technical Head, Ducat, Noida.
I sincerely thank him for responding great confidence and faith in my work
and being with me to encourage and guide me to successful project
completion.
I should also like to thank Mr. Ajay Indian, HOD, Department of
Computer Applications, Invertis University Bareilly and Mr. Amit Taneja,
Associate Professor, Department of Computer Applications, Invertis
University Bareilly for their support and all my friends and colleagues who
have created an atmosphere to encourage me from time to time making our
work easy.

Thank You..

Akash Aman Jaysurya


1350204004

Table of Contents
1. Introduction of project
a. Problem Statement
b. Proposed Work
2. Organization Profile
3. System Requirements And Analysis
a. System Analysis
b. Requirements Analysis
4. System Design
a. Database Tables
b. Data Flow Diagrams
5. System Coding/Snapshots
6. System Testing
a. Test Cases
b. Test techniques
7. Implementation
Bibliography

List of Tables

1
5
7
10
25
40
44

1. Crime sequence (tbl_cirmeSeqEstimationMaster)

10

2. Crime Category (tbl_crimeCategoryMaster)

11

3. Crime Nature ( tbl_crimeCategoryNatureMaster)

11

4. Crime Chargesheet ( tbl_crimeChargesheetMaster)

12

5. Crime Witness ( tbl_crimeWitnessMaster)

12

6. Department Employee ( tbl_departmentEmployeemaster)

13

7. Departments ( tbl_departmentMaster)

13

8. Designations ( tbl_designationMaster)

14

9. Evidences (tbl_evidenceMaster)

14

10. Evidences Type (tbl_evidenceTypeMaster)

15

11. Investigation ( tbl_investigationMaster)

15

12. Users ( tbl_loginMaster)

16

13. Police Stations (tbl_policeStationMaster)

16

14. Territory (tbl_territoryMaster)

17

15. Victims (tbl_victimesMaster)

17

16. Victims FIR (tbl_victimsFirMaster)

18

List of Figures

1.Login Page(frmLoginPage.aspx)

25

2. Designation Page(frmDesignationMaster.aspx)

26

3. Department Employee Page(frmDepEmpMaster.aspx)

27

4.Crime Category Page (crimeCategorymaster.aspx)

28

5.Crime category Nature page(CrimeCategorynatureMaster.aspx)

29

6.Victim Page(VictimMaster.aspx)

30

7.Victim FIR Page(frmVictimFirMaster.aspx)

31

8. Investigation page(frmInvestigationMaster.aspx)

32

9. Crime sequence Page(frmCrimeSequenceEstimationMaster.aspx)

33

10. Crime Witness Page(frmCrimeWitnessMaster.aspx)

34

11. Evidence Page(frmEvidenceMaster.aspx)

35

12. Evidence Type Page(frmEvidenceTypeMaster.aspx)

36

13. Crime Chargesheet page(frmCrimeChargeSheetmaster.aspx

37

14. Add User Page(frmUserAdd.aspx)

38

15. Home Page(frmHomePage.aspx)

39

List of Abbreviation

sequenceId

Sequence Id

firNo

FIR Number

description

Description

crimeCategoryId

Crime Category Id

crimeCategory

Crime category

natureId

Nature Id

categoryId

Category Id

crimeName

Crime Name

chargeSheetNo

Chargesheet Number

chaegeSheetDate

Chargesheet Date

chargeSheetDes

Chargesheet Description

produceCourtName

Name of Court

chargeSheetFieldBy

Chargesheet Field By

witnessed

Witness Id

witnessCollectedDate

Witness Collected Date

witnessInfo

Witness Information

employeeNo

Employee Number

employeeName

Employee Name

designationId

Designation Id

departmentNo

Department Number

dateOfbirth

Date Of Birth

dateOfJoin

Date Of Join

emailId

Email Id

highestDesgId

Highest Designation Id

evidenceTypeId

Evidence Type Id

evidenceCollecteddate

Evidence Collection Date

evidenceName

Evidence Name

startDate

Start Date

endDate

End Date

mac

MAC Address

loginOldPw

Login Old Password

loginCurrentPw

Login Current Password

inchargeId

Incharge ID

policeStationId

Police Station Id

Introduction of Project

The Crime Records Management System applies to Police Stations all across the country
and specifically looks into the subject crime prevention, detection, conviction of criminals
depending on a highly responsive backbone of Information Management. The efficiency of
the Police and the effectiveness with which it tackles crime depend on what quality of
information it can derive from its existing records and how fast it can have access to it.
I had done this project using ASP.NET as front end and SQL Server as back end easing the
effort of user.
Modules of the Project
1) Department module
In this module we have three sub modules Designation , Department employee and
police stations. In these modules we store designations of department, their description,
employee in department and police stations details with incharge of that station.
2) Investigation module
This module is used for storing investigation details. It contains all information related to
investigation just like evidence, evidence type, evidence description, witness, witness
details, investigation duration etc.
3) Crime module
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, Nature of Crime, Location of the Crime etc.
4) Chargesheet module
In this module we store the chargesheet information. It contains chargesheet number,
chargesheet date, fir number, who filled the chargesheet etc.
5) Administrator Module
The module will be protected by user ID and password. Ordinary will not be permitted to
enter into this area. The module will be focusing on the maintenance like Master Data
Maintenance, Removal of old and outdated data from the software etc.
6) Security Module
The module contains the user details.Administrator can add a new user by providing a
new user name and password,can delete any user.

Problem Statement

In the existing crime management system, most of the operations are done manually like
send complaints, taking actions against crimes, view status etc. So with the existing
system if anybody wants to complaint against crimes he must do it through the police.
If we are doing the system manually, so many minor errors will occur. Error detection in
the previous entries made and data cross verification is another important function. These
are done manually, and it would take time.
Drawbacks of the existing system can be concluded as follows:

The existing system is time consuming and not very user friendly.
The FIR brought by a person hailing from a family beyond poverty, the existing system
shows ignorance for the same
The officer dealing with a particular case cannot take decision by himself even when he
is having the first hand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.
Even an efficient officer cannot/may not able to handle more than one case at a time.
As we all know, a covered truth, Bribery plays an important role in the existing system.
Many cases are pilled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
As per our jurisdiction, Let thousand criminals escape-not a single innocent be punished
. As a result of this and other factors that influence investigation, such as bribery, the
innocent becomes accused in several situations in the eyes of Justice.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
They criticized it for being inefficient, time consuming, poorly managed, disparate and
lacking flexibility.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.

Proposed Work

Our mission statement directs us to promote the public interest while balancing the Law.
Obviously well not rush to judgment, but will look at the facts and render a thoughtful
decision based on these facts. Organization is an independent statutory body which was
created to maintain an effective an effective and efficient police service for the public. Its
primary task includes securing continuous needs of the public in an efficient manner. As
part of the responsibility, our committee is responsible for performance monitoring
(performance planning and review formerly professional standards and performance
monitoring) decided to look at the contribution and effectiveness of the organization
within the public. We need the whole hearted support of each and every individual
member of the site and cooperation of the users. The administrator, along with the
investigators, lawyers, counselors, and other authorities statutory partners in our
organization. Given their key role in these partnerships, we felt that an overview of
strength and Weakness of the organization is needed.
The aim of the project is to bring about improvement to the organizations contributions;
this report necessarily concentrates on overcoming weakness and raising standards. To
avoid conducting and unfair evaluation efforts which are made to put this contribution
into this context. It believes that partnership work is highly beneficial to the organization
and that partnership work is the way forward to reduce crime and disorder.

Advantages of the Proposed System:


The scrutiny was carried out through the collection of written and oral evidence.

Better communication, better leadership, better training, more defined roles in


terms of contribution to contribution to the society.
Working with partners.
Reducing crime and disorder.
Confidently and anonymity issues.
The proposed system has control over all its cells and is perfectly coordinated. Also the
cells can act individually. To take our organization to heights we need the wholehearted cooperation of the public.

Objectives of the Proposed System


In the fast moving world, if people lack something, it is time. All are busy in their world. It
will be welcomed if services are provided at their will. So the main objective of our
product is better communication, better leadership, reducing crime and disorder etc.
The product provides a framework within which a user can easily work with. That was out
next objective. We know users are of many categories, like users from who know working
with computers very well to users who didnt know about computers. So all the category
can use the software. So it should be user friendly.

The product provides a framework, which is error free. We know a crime management
system is actually a critical process having many calculations and operations. So each
simple error laid to big problem. So it should be error free and our objective is to build
error free software.

ORGANIZATION PROFILE

DUCAT is one of the nations largest Corporate Education, Training and Consultancy
provider and because DUCAT is a completely Indian company and we understand Indias
training needs, and how they affect our unique place in the global economy. DUCAT has
its corporate office in Noida (UP) with its branches in Delhi/NCR and we provide services
to 20,000 professional annually through a single point of contact to manage our customers
training needs.
With over 6 years experience in the industry, DUCAT is recognized as a leading expert in
the design, development and delivery of technical and soft skills training - from individual
courses and seminars to certification programs and fullscale training solutions. DUCAT
offers a full spectrum of vendor-authorized technical,business skills, project management
and application courses designed to suit every skill level, as well as the ability to consult
directly with organizations to tailor made learning plans for any number of employees.
DUCAT products and services have wide appeal and are applicable to those in a variety of
positions including network administrators, systems analysts, systems architects, software
developers, help desk staff, IT managers, senior executives, administrative assistants and
business professionals.
With DUCAT, you get remarkable flexibility in choosing the learning delivery method that
suits your employees and your organization. DUCAT offers a breadth of instructor-led
training courses across India. To satisfy increasing customer demand, DUCAT will soon
implement a Learning Management System (LMS) that offers all customers access to
fullservice,multi-vendor online training.
DUCAT provides corporate education and custom-content training solutions to some of
India's largest private and public organizations. We serve clients in various sectors such as
information technology, financial services, pharmaceuticals, telecommunications,
education,professional services. DUCAT is proud of itself in its ability to assess learning
needs and develop and deliver training solutions to support and enhance our customers'
return on their training investments.
Nitin Mehta
Director Ducat
A graduate in from Delhi University, Delhi in 1998 in B.Com (H). He also has a Post
Graduate in Business Administration & E-Commerce from Tuples. He started the DUCAT
division under the name of S.O Infotech in 1998, majorly focusing on the training needs of
the IT industry. Presently, Mr. Nitin Mehta is the Director & is responsible for the training
as well as the development division (DUCAT Technologies) operations in the Asia Pacific
region.
With an extensive experience of over a period of 8 years, he is an eminent player in the
industry. "What I enjoy is the challenge in the field that I am in!. Creating solutions for our
clients and continuously getting the best out of my young team is very exciting!" ,is his
mantra for success.
Business Philosophy: "To work hard, to be flexible and adapt to any environment. `No is a
bad word in my business!" On being a Managing Director: Continuously looking for
benchmarks for himself and his company. Strengths: "To be able to get the creative juices
of my young team flowing all the time!"
Corporate Goal: "Positive results are definitely the buzz word, but what is essential to
plan is where my organisation and the industry stands in the next 10 years and to retain my
competitive edge! I want to be my customer's first choice when they need to be serviced.

Besides business, he is actively involved in social philanthropic work. He has been an


active participant of the Agroha Vikas Trust for more than 2 years.
Services
DUCAT has highly experienced team of software developers specializing in emerging
internet and web technologies. We build professional, innovative and creative solutions for
the web, based on open source components,open standards and frameworks. We work
closely with our clients to provide a clear vision and understanding of how emerging
technologies can be used to gain a distinct advantage over their competitors.
No high quality product can be used efficiently today without embedding it in a rich
framework of services. Although our products render a high degree of userfriendliness,
other problems remain to be solved that our located down- or upstream of the software use.
We are diversified our services into :
Training - DUCAT
Development - DUCAT TECHNOLOGIES
Consultancy - CONSULTEYE INDIA

System Requirement And Analysis

SYSTEM ANALYSIS
System Analysis works with users to identify goals and build systems to achieve them.
System analysis is an important phase of any system development process. The system is
studied to the minutest details and analyzed. The system analyst plays the role of an
interrogator and dwells deep in to the working of the present system. In analysis, a detailed
study of these operations performed by a system and their relationships within and outside
of the system is done. A key question considered here is, what must be done to solve the
problem? One aspect of analysis is defining the boundaries of the system and determining
whether or not the candidate system should be considered. The system is viewed as a
whole and the inputs to the system are identified. The outputs from the system are traced
through the various processing that the input phases through in the organization. During
analysis, data are collected on available files, decision points, and transaction handled by
present system. Once analysis is completed the analyst has a firm understanding of what is
to be done.

FEASIBILITY STUDY
A feasibility study is a test of system proposal according to its workability, impact on the
organization, ability to meet user needs and effective use of resources. Apart from these, an
initial investigation is launched to study the present system, evaluate the possible
application of computer based of methods. Selecting a tentative system, evaluate the cost
and effectiveness of the proposed system, evaluate the impact of the proposed system,
existing personal and ascertain the need of new personal.
To define an improved information system, the study group must understand the
information requirements of the organization. This understanding may be obtained by
determining what is currently being done and of investigating through interviews and
analysis what information is needed to be provided that is not being furnished by the
existing system . Data on the cost of operating the current system needs to be collected in
order to make a cost benefit for a new system.
The objective of feasibility study is not to solve the problem, but to acquire a sense of its
scope. During the study, the problem definition is crystallized and aspects of the problem
to be included in the system are determined, consequently costs and benefits are estimated
with greater detail at this stage. The result of the feasibility study is a system formal
proposal. This is a simply a form of documenting or detailing the nature and scope of
proposed solutions. The proposal summarizes what is known and what is going to be done.
Three key considerations involved in the feasibility analysis:
Economic feasibility
Technical feasibility
Behavioral feasibility

ECONOMIC FEASIBILITY:

Economic analysis is the most frequently used method for comparing the cost with the
benefit or income that is expected from developed system.
In the existing system, many people are involved in the process but in the proposed
system, number of persons involved be reduced drastically. So the proposed system is
economic.

In the existing system, storage of all these records should be arranged and security
should be provided for the records. In the proposed system, separate security arrangement
is not needed since the software provides security and maintenance is simply and hardly
needs one or two person to operate the system.

TECHNICAL FEASIBILITY:
The feasibility center on the existing computer system (software, hardware) and to
what extend it can support the proposed addition.

In the proposed system, data can be easily stored and managed in database
management system software.

The results for various queries can be generated easily.


Therefore, the system is technically feasible

BEHAVIORAL FEASIBILITY:

People are inherently resistant to change and computer has known to facilitate
change. An estimate should be made of how strong a reaction the user staff likely to have
towards the developments of computerized system.
In the existing system more manpower is required and time factor is more but in the
proposed system, manpower and time factors are reduced .So, the remaining numbers are
engaged with some other important works.
An SRS is basically an organization's understanding (in writing) of a customer or potential
client's system requirements and dependencies at a particular point in time (usually) prior
to any actual design or development work. It's a two-way insurance policy that assures that
both the client and the organization understand the others requirements from that
perspective at a given point in time.

REQUIREMENT ANALYSIS

Requirement analysis task is a process of discovery, refinement, modeling and


specification. Both the developers and customers take an active role in requirement
analysis. Requirement analysis is a communication intensive activity. Requirement
analysis can be divided into:

Problem Recognition
Problem Evaluation & Synthesis
Problem Recognition
The goal of this step is recognition of basic problem elements as indicated by the
customer. The basic purpose of this activity is to obtain a thorough understanding of the
needs of the client and the user, what exactly is desired from the software and what are
the constraints on the solution.
Problems of the existing system:

Security cant assured


Delay in storing and retrieving information
Possibility of human errors
Problem Evaluation & Synthesis
In this step analyst must define all externally observable objects, evaluate flow and
control of the information, define and elaborate all software functions, understand.
Software behavior and design constraints etc. Evaluation and synthesis continues until
both analyst and customer field confident about the product.
Once the problems are identified, evaluation process begins. After evaluation of the
current problem and desired in formations, the analyst synthesis one or more solutions.

Security can be assured

Cost effective

No chance of errors
TOOLS & PLATFORMS USED
Operating System
Front End
Back End

: Windows 7
: ASP.Net with VB
: SQL SERVER 2008

SYSTEM DESIGN

The most creative and challenging phase of the system life cycle is system design. The
term design describes a final system and the process by which it is developed. It refers to
the technical specifications that will be applied in implementing the proposed system. It
also includes the construction of program and designing of output, input, menu, code,
database and process of the system.
System output may be report, document or a message. In on-line applications,
information is displayed on the screen. The layout sheet for displayed output is similar to
the layout chart used for designing output.
On-line data entry makes use of processor that accepts commands and data from the
operator through a keyboard or a device such as touch screen or voice input.
Designing the code depends on the programming language chosen and mostly they are
not specified while outlining the design of the system. The goal of coding is to translate
the design of the system in to code in a programming language. The aim of the code
design is to implement the system in best possible manner.
Database design is used to define and specify the structure of objects used in the system.
A wide array of design information must be developed during the database design. A
database is the collection of interrelated data stored with minimum redundancy to serve
many users quickly and efficiently. The general objective of data base design is to make
information access easy, quick, inexpensive, and flexible for the user.
Databases of Crime Reporting System is as shown below.

Database tables:

Table Name

tbl_cirmeSeqEstimationMaster

Table Name

tbl_crimeCategoryMaster

Table Name

tbl_crimeCategoryNatureMaster.

Table Name

tbl_crimeChargesheetMaster

Table Name

tbl_crimeWitnessMaster

Table Name

tbl_departmentEmployeemaster

Table Name

tbl_departmentMaster

Table Name

designationMaster

Table Name

tbl_evidenceMaster

Table Name

tbl_evidenceTypeMaster

Table Name

tbl_investigationMaster

Table Name

tbl_loginMaster

Table Name

tbl_policeStationMaster

Table Name

tbl_territoryMaster

Table Name

tbl_victimesMaster

Table Name

tbl_victimsFirMaster

MODELING

During the evaluation and solution synthesis activity, the analyst creates models of the
system in an effort to better understand data and control flow. The model serves as
foundation for software design and as the basis for the creation of specification for the
software. For the better understanding of data and control flow we use Data Flow
Diagrams.
Data Flow Diagrams
Data Flow Diagram is used to define the flow of the system and its resources such as
informations. DFDs are a way of expressing systems requirements in graphical manner.
DFD represents one of the most ingenious tools used for structured analysis. It has the
purpose of clarifying system requirements and identifying major transformations that
will become programs in the system design. It is the major starting point in the design
phase that functionalities decompose the requirement specification to the lowest level of
detail.
DFD of Crime Reporting System is as shown below:

DATA FLOW DIAGRAMS:


Level 0 DFD
Crime Reporting System
login

users

request
crimereport

details

response

Level 1.0 DFD (admin)


request
admin

registration

details
login

username
password

station
processes

login

details
station

request
complaints

details

crimedescription

details
assignstation

Level 1.1 DFD (citizen)

request
citizen

details

registration

login

username
password

login

complaints

details Crime description

Level 1.2 DFD (station)

request
station

registration

details
login

username
password
crimedescription
fir
login

crime processes

details
criminaldetails
newteamregister
teammember
victim

request
witness

close
crime

details

crimedescription
advocate
crimeclose

Level 2.0 DFD (admin)

admin

response

request

station approval

details

station

view complaints
crimedescription

complaints

details
assign
station

assignstation

crimed

Level 2.1 DFD (citizen)

citizen
request

send complaints

crimedescription
details
details

response
view
accepted
crimeid

complaints

crime
status

Level 2.2.0 DFD (station)

crimeclose

Level 2.2.1 DFD (station)

view complaints

crimedescription

station
request

details

response
avocation
processes

criid

details

close
crime

crimeid

criminaldetails

advocate

crimedescription
assignstation

System Snapshots

Page Name

frmLoginPage.aspx

Page Name

frmDesignationMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

designationMaster

When we want see all disgnation then click on showalldesignation button then we get the
data from table and also we will modify that data.

Page Name

frmDesignationMaster.aspx

Page Name

frmDepEmpMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_departmentEmployeemaster

When we want see all department employees then click on showalldepartment button then
we get the data from table and also we will modify that data.

Page Name

frmDepEmpMaster.aspx

Page Name

crimeCategorymaster.aspx

Processing

stored in Table

Table or Procedure

Table

Table Name

tbl_crimeCategoryMaster

When we want see all crime categories then click on showallcrime categories button then
we get the data from table and also we will modify that data.

Page Name

crimeCategorymaster.aspx

Page Name

CrimeCategorynatureMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_crimeCategoryNatureMaster.

When we want see all records then click on showall button then we get the data from table
and also we will modify that data.

Page Name

CrimeCategorynatureMaster.aspx

Page Name

VictimMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_victimesMaster

When we want see all records then click on showall button then we get the data from table
and also we will modify that data.

Page Name

VictimMaster.aspx

Page Name

frmVictimFirMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_victimsFirMaster

Page Name

frmVictimFirMaster.aspx

Page Name

frmInvestigationMaster.aspx

Processing

Stored in table

Table or Procedure

Table

Table Name

tbl_investigationMaster

Page Name

frmInvestigationMaster.aspx

Page Name

frmCrimeSequenceEstimationMaster

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_cirmeSeqEstimationMaster

Page Name

frmCrimeSequenceEstimationMaster

Page Name

frmCrimeWitnessMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_crimeWitnessMaster

Page Name

frmCrimeWitnessMaster.aspx

Page Name

frmEvidenceMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_evidenceMaster

Page Name

frmEvidenceMaster.aspx

Page Name

frmEvidenceTypeMaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_evidenceTypeMaster

Page Name

frmEvidenceTypeMaster.aspx

Page Name

frmCrimeChargeSheetmaster.aspx

Processing

Stored in Table

Table or Procedure

Table

Table Name

tbl_crimeChargesheetMaster

Page Name

frmCrimeChargeSheetmaster.aspx

Page Name

frmUserAdd.aspx

Processing

Stored In Table

Table or Procedure

Table

Table Name

tbl_User.

When we click on mac it take MAC address of that Computer.

When We want come out this project we click on Logout

Page Name

frmHomePage.aspx

SYSTEM TESTING
System testing is a critical aspect of Software Quality Assurance and represents the
ultimate review of specification, design and coding. Testing is a process of executing a
program with the intent of finding an error. A good test is one that has a probability of
finding an as yet undiscovered error. The purpose of testing is to identify and correct bugs
in the developed system. Nothing is complete without testing. Testing is the vital to the
success of the system.
In the code testing the logic of the developed system is tested. For this every module of the
program is executed to find an error. To perform specification test, the examination of the
specifications stating what the program should do and how it should perform under various
conditions.
Unit testing focuses first on the modules in the proposed system to locate errors. This
enables to detect errors in the coding and logic that are contained within that module alone.
Those resulting from the interaction between modules are initially avoided. In unit testing
step each module has to be checked separately.
System testing does not test the software as a whole, but rather than integration of each
module in the system. The primary concern is the compatibility of individual modules. One
has to find areas where modules have been designed with different specifications of data
lengths, type and data element name.
Testing and validation are the most important steps after the implementation of the
developed system. The system testing is performed to ensure that there are no errors in the
implemented system. The software must be executed several times in order to find out the
errors in the different modules of the system.
Validation refers to the process of using the new software for the developed system in a
live environment i.e., new software inside the organization, in order to find out the errors.
The validation phase reveals the failures and the bugs in the developed system. It will be
come to know about the practical difficulties the system faces when operated in the true
environment. By testing the code of the implemented software, the logic of the program
can be examined. A specification test is conducted to check whether the specifications
stating the program are performing under various conditions. Apart from these tests, there
are some special tests conducted which are given below:
1. Peak Load Tests: This determines whether the new system will handle the volume
of activities when the system is at the peak of its processing demand. The test has
revealed that the new software for the agency is capable of handling the demands at
the peak time.
2. Storage Testing: This determines the capacity of the new system to store
transaction data on a disk or on other files. The proposed software has the required
storage space available, because of the use of a number of hard disks.

3. Performance Time Testing: This test determines the length of the time used by the
system to process transaction data.
The testing steps performed in Crime Reporting System are given below:
Unit testing
Integration testing
Validation testing

Unit testing

In unit testing different modules are tested against the specifications produced during the
design of the modules. Unit testing is essential for the verification of the code produced
during the coding phase, and hence the goal is to test the internal logic of the modules.
The testing is carried out during the programming itself. After designing and coding each
form they are run to see whether there are any anomalies. Some of the various test cases
used to test the system are as follows:

Test cases are given for testing against requirements of the unit being tested.
Test case for path or branch covering.
Test case for data flow coverage.
Testing with classes of bad data
In unit testing the program unit that make up the system are tested individually. Unit
testing focuses first on the modules, independent of one another to locate errors. Here in
Crime Reporting System unit testing contains testing like user registration test, login
test, user updating test, agent registration test, policy registration test, customer request
test, premium calculation test etc. This enables to detect in coding and the logic with in
the module alone. This testing is also used to ensure the integrity of data stored
temporarily.

Integration testing
Integration testing is systematic technique for constructing the program structure, while
at the same time conducting test to uncover errors associated with interfacing. That is the
program is constructed and tested in small segments, which makes it easier to isolate and
correct.
Invalid modules are invariably related to one another and interact in a total system. Each
portion of the system is tested against the entire module with both testing and live data
before the entire system is ready to be implemented. When the individual modules were
found works satisfactory, the system integration test was carried out. Data was collected
in such a way that all program paths could be covered. Using these data a complete test
was made. All outputs were generated. Different users were allowed to work on the
system to check its performance.
So here in Crime Reporting System integration testing contains administrative module,
customer module and login with administrative and customer module.

Validation testing
At the culmination of the integration testing, the software was completely assembled as
package, interfacing errors have been uncovered and a final series of software validation
testing began. Here we test the system functions in manner that can be reasonably
expected by customer, the system was tested against system requirement specification.
Different unusual inputs that the users may use were assumed and the outputs were
verified for such unprecedented inputs. Deviation or errors discovered at this step are
corrected prior to the completion of this project with the help of user by negotiating to
establish a method for resolving deficiencies. Thus the proposed system under
consideration has been tested by using validation testing and found to be working
satisfactorily.

TEST RESULTS
The primary goal of software implementation is the production of source code that is easy
to read and understand. Clarification of source code helps in easier debugging, testing and
modification. Source code clarification is enhanced by structural coding techniques, by
good coding style, by appropriate supporting documents, by good internal comments and
by the features provided in the modern programming language.
In our implementation phase, source code contains both global and formal variables. It
contains predefined functions as well as the user defined functions. The result of the new
system is compared with the old system and supposes the result is wrong the error must be
debugged.
After the acceptance of the system by the user, the existing system must be replaced by this
new system. Any user can work in this package very easily. It does not require any
intensive training for the user. Procedures and functions in the system are very simple that
any one can understand and correspondingly act to the system with no difficulty.
Test Cases :
User Authentication:
Functions Tested

Expected Result

Test
Result

User should enter both User


Name and password

When the user enters only one or none login


screen will displayed with error message

As
expected

Logout when user wants to


discontinue login section

Displaying the user logout successfully

As
expected

Integer Field Check:


Checking whether a particular text field, which is supposed to receive only integers, is
receiving any other characters.
Input Value

Expected Result

Result

123

Display

Pass

Dqwe

Doesnt Display

Pass

$#*>.)

Doesnt Display

Pass

Field Checking:

Function Tested
Name

Mobile-Phone, Zip
code, Date of Birth

Expected Result
The name of the user is entered here. It can
contain only characters and blank space

This should only contain numbers.

Test Result
Test
Successful

Test
successful

IMPLEMENTATION
The next stage after testing is implementation. Generally implementation is referred to
conversion of a new system design to an operational one. It also deals with the training of
operators. An implementation plan is to be made before starting the actual
implementation of the system. Implementation is the stage where the theoretical design is
converted into a working system. The newly proposed system is implemented after the
successful testing of the system.
Implementation Methods
The term implementation has different meanings, ranging from the conversion of a basic
application to a complete replacement of a computer system. The procedure, however, is
virtually the same. Implementation is used here to mean the process for converting a new
or revised system into an operational one. Conversion is one aspect of implementation.
The other aspects are the post implementation review and software maintenance.
There are three types of implementation:

Implementation of a computer system to replace a manual system.


Implementation of a new computer system to replace an existing one.
Implementation of a modified application to replace an existing one.
Conversion means changing from one system to another. That is data in the old format is
run through a program, or a series of programs, to convert it into the new format.
Conversion can also be from one hardware medium to another. The objective is to put the
tested system into operation while holding costs, risk and personnel irritation to a
minimum. It involves :-

Creating computer compatible files.


Training the operating staff.
Installing terminals and hardware.
A problem for management is discovering, at integration time, that pieces of modules
simply do not fit together. Such problem will arise when charge is made to only one copy
of the design document. When integration is completed, the product as whole is tested,
this is termed product testing. When the developers are confident about the correction of
every aspect of product, it is handled over to the client for acceptance testing.

Implementation Plan
The implementation plan includes a description of all the activities that must occur to
implement the new system and to put it into operation. It identifies the personnel
responsible for the activities and prepares a time chart for implementing the system. The
implementation plan consists of the following steps.

List all files required for implementation.


Identify all data required to build new files during the implementation.
List all new documents and procedures that go into the new system.
The implementation plan should anticipate possible problems and must be able to deal
with them. The usual problems may be missing documents; mixed data formats between
current and files, errors in data translation, missing data etc.

BIBLIOGRAGHY
Reference Books:

1.
2.
3.
4.
5.

Active Server Pages for Dummies. IDG Books worldwide, 2001


Scott Stabbert, Authentication and Security for Internet developers
All India Reporter
Kerala Law Times Journal
Indian Law Reporter

Reference Sites:
1. Howard, Michael. Microsoft Internet Information Server Security
URLs:
http://www.highcourtofkerala.com/
http://www.casecitation.com/

You might also like