Web Based Criminal Recored System
Web Based Criminal Recored System
A PROJECT REPORT
Submitted by:
Melkamu Chemere-------------------------------TER/4676/07
Lakachew Yibeltal--------------------------------TER/4670/07
Yassab Aziz--------------------------------TER/4696/07
Tesfaye Bayih-------------------------------------TER/4691/07
GizachewuM. (MSC)
-------------------------------------------
ADVISOR SEGNATUR
Declaration
We, under signed,declere that thesis our original work, has not been presented for a degree in
this or any other university, and all the source of martial used for the thesis/project have been
acknowledged.
Name Id No Signature
I
2010 E.C
Web based criminal Record System
This project has been submitted for examination with our approval as the
project advisor.
This project has been examined with our approval as the project examiner.
Examiner Name:
1. ____________________ signature______________
2. ____________________Signature______________
3. _____________________Signature_____________
II
2010 E.C
Web based criminal Record System
Acknowledgments
First of all we would like to thanks for our God that keep sour life up to this time
and giving all strength for successful completion of this documentation. Secondly
we would like to thanks for our Advisor Gizachew Melkamu for his great
contribution guidance, support and gives us continuous initiation and
encouragement from the beginning up to the end of the project. We also want to
thank for inspector ayalneh who is Debre Markos city police station manager and
office workers since they provide all the Information about how the current system
works. And we would like to thanks for the department of information technology
that contribute computer laboratory for the success of the project.
III
2010 E.C
Web based criminal Record System
ABSTRACT
Crime is a human experience and it has to be controlled. Debre Markos city police
station plays a great role to control crime and criminal activities But the way of
managing those criminal and crime activities done manually and this is due to lack
of automated system that supports the station workers to communicate with citizen
to share information and store and retrieve criminal activities. In order to control
crime efficiently we need to develop web based systems.
This project entitled as “Web based criminal record system” that is designed to
develop a web application in which any citizen can report crimes; if anybody wants
to complain against crimes he must enjoy with web based communication to police
station. This project provides to store records of crimes and criminals which have
made disciplinary case and used to make simply retrieve information from the
database. The proposed system is a typical automated crime Record system, based
on client-server architecture.
IV
2010 E.C
Web based criminal Record System
Contents
Acknowledgments.......................................................................................................................................... I
ABSTRACT................................................................................................................................................. IV
List of Table ................................................................................................................................................ VII
List of Figures ............................................................................................................................................ VIII
Acronyms ..................................................................................................................................................... IX
CHAPTER ONE ........................................................................................................................................... 1
1.1. Introduction ........................................................................................................................................ 1
1.2. Background of the project .................................................................................................................. 2
1.3. Statement of the Problems ................................................................................................................. 2
1.4. Objectives of the project .................................................................................................................... 3
1.4.1. General objective ........................................................................................................................ 3
1.4.2. Specific objective ........................................................................................................................ 3
1.5. Scope of the Project ........................................................................................................................... 3
1.6. Limitation of the project .................................................................................................................... 4
1.7. Significance of the Project ................................................................................................................. 4
1.8. System requirement ........................................................................................................................... 4
1.8.1. Hardware requirement tool ......................................................................................................... 4
1.8.2. Software requirement tool ........................................................................................................... 5
1.8.3. Programming language ............................................................................................................... 5
1.9. Data collection Methodology ............................................................................................................. 6
1.9.1. Data collection ............................................................................................................................ 6
1.10. Feasibility study ............................................................................................................................... 7
1.10.1. Operational Feasibility .............................................................................................................. 7
1.10.2. Economic Feasibility................................................................................................................. 7
1.10.3. Technical Feasibility ................................................................................................................. 8
1.10.4. Legal Feasibility........................................................................................................................ 8
Chapter Two.................................................................................................................................................. 9
2. System analysis ......................................................................................................................................... 9
2.1. Over View of Existing System........................................................................................................... 9
2.1.1. Users of the existing system........................................................................................................ 9
V
2010 E.C
Web based criminal Record System
2.2. System requirement Specification ................................................................................................... 10
2.2.1. Functional requirement ............................................................................................................. 10
2.2.2. Non-functional requirements: ................................................................................................... 11
2.2.3. Business rule ............................................................................................................................. 12
2.3. System requirement analysis............................................................................................................ 12
2.3.1. Actor and Use case Identification ............................................................................................. 13
2.3.2. UML Sequence Diagrams ......................................................................................................... 24
2.3.3. UML Activity diagram.............................................................................................................. 29
2.3.4. Analysis Class Diagram ............................................................................................................ 32
3. System Design ........................................................................................................................................ 33
3.1. Design Class Diagram.......................................................................................................................... 33
3.1.1. Description of design class diagram ............................................................................................. 34
3.2. Database design /Physical data model ................................................................................................. 36
3.3. User Interface Design .......................................................................................................................... 40
3.4. System Architecture ............................................................................................................................. 44
3.4.1 Deployment Diagram ..................................................................................................................... 44
Reference .................................................................................................................................................... 53
VI
2010 E.C
Web based criminal Record System
List of Table
Table 1: Use Case Identification ................................................................................................................. 15
Table 2: Register User Use Case Description ............................................................................................. 18
Table 3: Create Account Use Case Description ......................................................................................... 19
Table 4: Login Use Case Description ........................................................................................................ 20
Table 5: Register Accused Use Case Description ....................................................................................... 21
Table 6: Assign Police Use Case Description ............................................................................................. 21
Table 7: Post Missing Criminals Use Case Description ............................................................................. 22
Table 8: send complain Use Case Description............................................................................................ 23
Table 9: Complaint class diagram Description ........................................................................................... 35
Table 10: Crime Class diagram Description ............................................................................................... 35
Table 11: Placement class diagram Description ......................................................................................... 36
Table 12: method of detective Officer ........................................................................................................ 36
Table 13: Accuser Database Table.............................................................................................................. 37
Table 14: Employee Database Table .......................................................................................................... 38
Table 15: Missing Criminal Database Table.............................................................................................. 39
VII
2010 E.C
Web based criminal Record System
List of Figures
Figure 1: Web based criminal systems Use Case Diagram......................................................................... 17
Figure 2: User Login Sequence Diagram .................................................................................................... 25
Figure 3: Assign police Sequence Diagram ................................................................................................ 26
Figure 4: Give Nomination Sequence Diagram .......................................................................................... 27
Figure 5: Posts Missing Criminal Sequence Diagram ................................................................................ 28
Figure 6: View post criminal Activity Diagram ......................................................................................... 29
Figure 7: Register Accuser Activity Diagram............................................................................................. 30
Figure 8: View Criminal Activity Diagram ................................................................................................ 31
Figure 9: Web based Criminal Record system Analysis Class Diagram .................................................... 32
Figure 10: Online Police Station Criminal System Design Class Diagram ............................................... 33
Figure 11: Preventive Police page user interface ........................................................................................ 40
Figure 12: Preventive Police page user interface ........................................................................................ 41
Figure 13: Police head post missing person user interface ......................................................................... 42
Figure 14: Police head post notice user interface........................................................................................ 43
Figure 15: Deployment Diagram ................................................................................................................ 44
Figure 16: security testing ........................................................................................................................... 52
VIII
2010 E.C
Web based criminal Record System
Acronyms
CSS-------------------------------------------Cascading style sheet
UML------------------------------------------Unified modeling language
HTML----------------------------------------Hypertext markup language
MYSQL--------------------------------------My structure query Language
PHP-------------------------------------------Hypertext pre processer
ID----------------------------------------------Identification Number
RAM------------------------------------------Random Access Memory
CPU-------------------------------------------Central processing unit
CD---------------------------------------------Compact disk
UC---------------------------------------------Use case
BR---------------------------------------------Business Rule
WAMP----------------------------------------window apache mysqlphp
HR---------------------------------------------Human Resource
DMPS-----------------------------------------debre Marko’spolice station
IX
2010 E.C
Web based criminal Record System
CHAPTER ONE
INTRODUCTION
1.1. Introduction
In this modern world, information technology plays a big role. With the introduction of
computers, the business world was changed forever. Using computers and software, businesses
use information technology to ensure that their departments run successfully. (1)
Now a days Technology is being used in almost every company to accomplish specific
tasks.Many businesses are using various business communication technologies to change the
way their employees interact and communicate while at work. Employees can use various
communication tools to interact or exchange information at work such us developing website for
online communication.
Web application is one parts of information technology in which applications and information’s
are stored on servers and users can access that information or application remotely using web
browsers. “Web based criminal record system” is a web application that provides users interact
with the system without any physical contact. This system helps the police department to
generate fast reports, and to retrieve criminal cases. It also establishing an active and equal
partnership between the Police and the public through which crime and community safety issues
can jointly be discussed and solutions determined and implemented.
1
2010 E.C
Web based criminal Record System
1.2. Background of the project
In 1913, during the reign of Emperor Minilik II, the Ethiopian police was founded for the first
time in our history. A modern police establishment was newly founded in 1934. Debre Markos
police station was also established newly as a police force at the same time in 1934. It is the
basic unit that looks after the law and order of that area. Debre Markos police station is headed
by a Station House Officer (S.H.O.) who is generally an inspector from the police department.
Under him works a team consisting of a Sub-Inspector, Head Constable and Constables. The
station was organized in to five big departments that were detection department, prevention
department, traffic department, human resource management department and council
community.Still now, the system is working manual (10)
All criminal information’s are paper based which is cumbersome to maintain. Even an efficient
officer may not be able to handle more than one case at a time.
Access to the criminal information is not well controlled and there is no clear security on
avoiding possible manipulation of information which results in possible alteration by
unauthorized users. Retrieving information from this type of system can be cumbersome and
time consuming especially when searching for information from former years.
Data redundancy and inconsistency, there is a Work load over police departments since
investigation reports and investigation files are manually operated.
2
2010 E.C
Web based criminal Record System
3
2010 E.C
Web based criminal Record System
Flash: -16 and more GB flash is required for data storage and data movement.
4
2010 E.C
Web based criminal Record System
Disks (CD):-720 MB necessary for the movement of relevant data and for backup and recovery
mechanism.
Internet Connection: -the main information source to develop our system. To extract relevant
information about our project from internet.
Writing material (pen, paper):- for writing all necessary information associated with the
project during interview or time of data collection
Notebook:-to take notes during data collection and for other documentations
Edraws Max8:-For designing UML diagrams associated with the project. E.g. Activity
Diagram, Class Diagram, Sequence Diagram and Use case Diagram.
5
2010 E.C
Web based criminal Record System
Css: a language that accompanies HTML, and defines the style of a website’s
content, such as layout, colors, fonts, etc.
Backend programming language: also known as “server-side” is the portion of the website you
don’t see. It’s responsible for storing and organizing data, and ensuring everything on the client-
side actually works. Such as php, Perl, Python, MYSQL, ruby Etc. But we are interesting to do
with Php because
It is OS independent or compatible on all operating systems.
Simple and easy to learn for developer: - When compared with other scripting
languages.
allows data base integration with wide variety of application
Database tool: - MYSQL
Open –source
Secure
Easy connection to programming to indicated
6
2010 E.C
Web based criminal Record System
Document analysis: - we reviewed other relevant documents that help to know about the existing
system.
Due to most users of the system are educated those users need less training.
The interface of the system directs the user how to use it.
the technology it can be easily maintained and repaired; accomplished with the available
technology, technically, the system will be powerful to be applied by low skilled users as
much as possible and easily accessible by the people who can easily understand natural
languages The team proposed system is technically feasible.
Tangible benefits
7
2010 E.C
Web based criminal Record System
Tangible benefits are something that has a physical existence. Cost reduction and avoidance,
increase the income of the organization, improving response time, producing error free out put
such as report generating, and no redundancy, increased management planning and control
Intangible benefits
Increase information processing efficiency, faster decision making, increase accuracy, right
information at the right time, Customer satisfaction. Intangible costs are not always foreseen.
The cost needed to search one criminal is comparatively equal to the cost needed to develop the
System, so it was economically feasible.
Technically, the system is powerful to be applied by low skilled users as much as possible.
There is no need for the developer involvement in almost all implementation of the entire
system. It is easily accessible by the people who can easily understand natural languages
8
2010 E.C
Web based criminal Record System
Chapter Two
2. System analysis
System analysis is a process of gathering and interpreting facts, diagnosing problems and the
information to recommend improvements on the system. It is a problem solving activity that
requires intensive communication between the system users and system developers. System
analysis or study is an important phase of any system development process. (2)
Generally the system works manually in the above process of these takes long period of time to
respond user’s service request and also it consumes high human power.
Police Head
Criminal preventive police
Complaint
Administrator
Detective Officer
HR manager
Customer
9
2010 E.C
Web based criminal Record System
Input data: - this is the functionality that the system will allow the user to enter input data using
forms for processing.
10
2010 E.C
Web based criminal Record System
The system should allow detective police update status of accused criminals
The system should allow detective police manage complaint
The system should allow Human resource manager update employee status
The system should allow system police head assign police to their job placement
Data output: This is the functionality that the system provides several data’s as an output. Those
functionalities are
Nonfunctional Requirements (also known as system qualities) define system attributes such as
security, reliability, performance, maintainability, scalability, and usability. They serve as
constraints or restrictions on the design of the system across the different backlogs. In general
this system ensures the usability, efficiency and effectiveness of the entire system. (3)
Availability: The system is available in 24 hours a day and seven days a week
Efficiency: This system must ensure allocation and use of services being requested for
the users by using minimum memory storage, cost, and time.
Security: The user accesses the system using valid user name and password. The system
use md5 encryption security mechanism to secure password.
Error handling: When a user interacts with the system errors may occur. To control this
kind of inaccuracies our system will generate different user friendly messages.
Scalability: the system adding new features and new user without any problem
11
2010 E.C
Web based criminal Record System
User Interface: The interface will be user friendly and can properly guide the user how to
use the system and perform operations easily since every link name in the system similar
to the task performed.
BR 1: the police station department head should manage other members in the station.
BR 2: Members of the station shall obey all laws and ordinances.
BR 3: Members of the Department shall not express any prejudice concerning race, sex, religion,
national origin, life-style, or similar personal characteristics
BR 4: All employees of the Department shall report their places of residence and their telephone
number to the Commanding Officer or supervisor of the Bureau.
Business rules of the new team proposed system:
BR1: To access the system the users must be registered in the system and must have account.
BR2: User of the system must be login to the system to access the service provided by the system
BR3: User access the system based on their privilege given by system administrator
12
2010 E.C
Web based criminal Record System
Actor Identification
1. Police Head
2. System administrator
3. Criminal preventive police
4. Detective Officer
5. Human resource manager
6. Compliant
Create Account
View User Account
Update User Account
View Employee
View user activities
Take backup
Restore backup
13
2010 E.C
Web based criminal Record System
Criminal preventive police: - have the following activities
View Criminal
Order Preventive police
Register witness
Register Accused
Register Accuser
View witness
View Accused
View Accuser
Generate first information Record
Register Employee
View Employee
Update Employee
14
2010 E.C
Web based criminal Record System
Give Comment
Complaint: - have the following activities
Send Request
View response
Use case identification:
Use case is an activities that accomplished by actors. Use case describes a sequence of actions
that provide a measurable value to an actor. In the following table we try to list use case id, use
case name and its description
Table 1: Use Case Identification
Use case ID Use case Name Include/
Uc1 Create Account Login
Uc2 View User Account Login
Uc3 Update Account Login
Uc4 View User Activities Login
Uc5 Take Backup Login
Uc6 Restore backup Login
Uc7 Assign placement for Police Login
Uc8 View Employee Login
Uc9 View Comment Login
Uc10 View Nomination Login
Uc11 Post Missing Criminals Login
Uc12 Post Notice Login
Uc13 View Criminal Report Login
Uc14 View Placement Login
15
2010 E.C
Web based criminal Record System
Uc20 View Criminal Login
Uc21 Register Complaint Login
Uc22 Order Preventive police Login
Uc23 Register witness Login
Uc24 Register Accused Login
Uc25 Register Accuser Login
Uc26 Register First Information Record Login
Uc27 Order Preventive Police Login
Uc28 Register Employee Login
Uc29 Update Employee Login
Uc30 View Employee Login
Uc31 Send Complain Login
16
2010 E.C
Web based criminal Record System
<<include>> Customer
View Missing
Criminal <<include>>
Police head Give nomination
Login
View compliant <<include>> <<include>>
<<include>>
Update Employee
<<include>>
View Placment <<include>>
<<include>>
<<include>>
Registor Employee
<<include>> <<include>>
Registor Criminal
View Employee
View Report <<include>> HR manager
<<include>>
<<include>>
<<include>>
Registor Crime Update Criminal
<<include>> <<include>> Status
<<include>>
<<include>>
<<include>>
Preventive Police View Order
Logout Registor FIR
View Notice
View Criminal
Registor Compliant
Manage Accused
17
2010 E.C
Web based criminal Record System
Use Case description
A use case description is a business analysis presentation of the steps defining the
interactions between a user (called an actor) and a system (usually a computer system). It
details the interactions and sets the expectations of how the user will work within the
system.(6).
Alternative course of If the HR manager enters wrong username or password, the system display
action “Incorrect input” and the process turn again from step 5.
18
2010 E.C
Web based criminal Record System
Alternative course of If the user enters wrong username or password, the system display invalid
action input message and process turn again from step 4.
Post condition Users can login to the system with their account
19
2010 E.C
Web based criminal Record System
Alternative course of User may input wrong user name and password the system display wrong
action message.
The process turn back to step 5
Post condition Users perform its own task on the system
20
2010 E.C
Web based criminal Record System
21
2010 E.C
Web based criminal Record System
Basic course of Actor action System response
action 1. the police head login to 2. System directs to police head page
system 4. The system opens the form.
3. the user click Assign Link 6. system display successfully message
5. then Fill the Form and click 7. Use case end.
Assign button
Alternative course of A1.Police head may input wrong user name and password the system show
action incorrect message.
The process turn back to step 1
A2. Police head may fill wrong input the system show incorrect message.
The process turn back to step 5
Post condition User’s logout from the system.
22
2010 E.C
Web based criminal Record System
Basic course of Actor action System response
action 1. The police head login to system. 2. System directs to police head page.
3. The police head click on Post 4. The system displays Missing
missing criminal link person from
5. The police head fill the form and 6. The system displays “the missing
click post button. criminal successfully posted”
7. Use case end. message.
Alternative A1. If the user enters the wrong username or password, the system notifies
course of “the wrong input” and the process continues from step 1.
action
23
2010 E.C
Web based criminal Record System
Basic course of Actor action System response
action 1. The Complaint login to system. 2. System directs to complaint page.
3. The Complaint click on Send 4. The system displays the form
complain form 6. The system displays “successfully”
5. The Complaint fill the form and message.
send request
7. Use case end.
Alternative course A1. If the user enters the wrong username or password, the system notifies “the
of action wrong input” and the process continues from step 1.
24
2010 E.C
Web based criminal Record System
25
2010 E.C
Web based criminal Record System
26
2010 E.C
Web based criminal Record System
27
2010 E.C
Web based criminal Record System
28
2010 E.C
Web based criminal Record System
The control flow is drawn from one operation to another. This flow can be sequential, branched,
or concurrent. Activity diagrams deal with all type of flow control by using different elements
such as fork, join. (8)
29
2010 E.C
Web based criminal Record System
30
2010 E.C
Web based criminal Record System
31
2010 E.C
Web based criminal Record System
w
1
Inherite
1
vie *
manage
1
manage
1 1
gn
* 1
Assi
has
Post
Employee
View
ie
ew
* 1 *
w
* -ID
Vi
-FName
View
Placement -Mname Account
* Notice
-Lname
-Placement ID -title * * 1 -User_ID
-sex has 1
-Police_ID -User_Name
V
-Date -Office_No
ie
-sender -User_Type
-Email -firstname -file -Email -User_Type
-Date -fathername -Phone_N
ite
-Status
-Description -gfathername -Age
er
Vie -Photo
Inh
-sex
* w 1
-phoneno *
-Kebele
View
-case -Crime_Level
er
* -Date
View
* Preventive Police
ite
Register -Kebele
* -village
Customer +View Nomination() 1 -month
-CID 1 +view Criminal() -photo
V
-description
w
View
-Sex *
-City * Order
*
manage
-Kebele -orderid *
rd
Detective Officer
-Phone_ No
er
ew
-Crime_Type
-Age *
Vi
-Crimelevel
ew
-Village 1
+order police()
1
gis
r *
r
Register
+send Nomination() te
gis
+Give Complaint() Re 1 Witness
ster
Inhe *
rite -WID:varchar(30)
Inhe
* 1 -Fname
Inhe
Accused
-Lname
rite
send
-Photo -Phone_No
rite
Accuser -Crime_Type
* -sex
-Description -Description -age
*
In
1
h
* -kebele
er
Nomination
it
Complain -Description
e
-Type FIR
-Case
-Description Complaint -accuserid
-Date Send
-Date -accusedid
request +Send Request() -witnessid
* +View Response() -crimetype
1 -crimelevel
-crime_commited_date
32
2010 E.C
Web based criminal Record System
CHAPTER THREE
3. System Design
Introduction
The term design describes a final system and the process by which it is developed it refers to the
technical specification that will be applied in implementing the proposed system. It also include
the construction of program and design of output, input, code, database and process of the system
System design is the transformation of the analysis model into a system design model. Up to now
we were in the problem domain. System design is the first part to get into the solution domain in
a software development.
The main purpose of system design is to determine how the system is going to build and to
obtain the information needed to direct the actual implementation of the system. It focuses on
understanding the model how the software will be built.
33
2010 E.C
Web based criminal Record System
Missing Ciminal *
-MID varchar(50) 1 HR Manager Adminstrator
-lostdate date Police Head
Post
-postdated date
-woreda varchar(50)
+Regster Employe() +create Account()
+View User()
+Update Employee() +view account()
Inh
-Description text +View Comment()
1 +view employee() +Update account()
-photo blob
eri
+Assign placement()
+View User()
te
man
Inherite
1 * 1
vie
1 1
1
manage
1 1
age
*
gn
V
ie
has
*
Assi
w
Post
View
* * 1 *
Inherite
** Employee
Vie
-ID varchar(50)
View
* Placement Notice -FName varchar(50) Account
V
ie
-Police_ID varchar(50) -title varchar(50) -Mname varchar(50)
1 -User_ID varchar(50)
w
-Lname varchar(50) has 1
Comment -Kebele varchar(50) -Date date -User_Name varchar(50)
-sex varchar(50)
-Date date -sender varchar(50) -Office_No varchar(50) -Password varchar(100)
-Email varchar(50) -firstname varchar(50) -file text -User_Type varchar(50) -User_Type varchar(50)
-Date date -fathername varchar(50) -Email varchar(50)
-Description text -Status varchar(50)
-gfathername varchar(50) -Phone_No int
-sex varchar(50) * Vie 1
-phoneno int w*
te
1 1
eri
Account Request
View
Crime
Give
Inh
*
-Date date
* Preventive Police
Register -Kebele varchar(50)
* -village varchar(50)
Customer +View Nomination() 1 -month varchar(50)
V
Inh
+view Criminal() ie
-photo blob
-CID varchar(50) 1 w
eri
V
te
w
View
w
Order *
Vie
-City varchar(50) *
manage
or
r
Vie
-Crimelevel varchar(50)
-Age int 1* +manage accused() 1
-Education_ Level varchar(50) -crimecommiteddate varchar(50)
-crimecommiteddate date +Manage accuser ()
-Job varchar(50)
-Birth_date date -appointmentdate date +manage witness()
1
-descrpition text +order police()
Re
-Village varchar(50)
1 Inhe 1
gis
+Give Comment() rite 1
e r ter 1
te
+View post Criminal()
ist gis
Regi
r
+send Nomination() eg R e
R *
+Give Complaint()
ster
Witness
Inh 1
eri * Accused -WID:varchar(50)
te
Inhe
-Fname varchar(50)
-Photo blob
send
FIR
ite
34
2010 E.C
Web based criminal Record System
35
2010 E.C
Web based criminal Record System
Method/operation Function
View Criminal () Used to view criminals send from preventive police
Register accuser() Used to record the accuser
register accused() Used to register the accused
Order preventive police() Used to order preventive police.
Register witness() User to record the witness information
Physical data model represents how the model built in the database. A physical database model
shows all table structures, including column name, column data type, column constraints,
primary key, foreign key, and relationships between tables. In our system sample database
structure is the following.
36
2010 E.C
Web based criminal Record System
37
2010 E.C
Web based criminal Record System
38
2010 E.C
Web based criminal Record System
39
2010 E.C
Web based criminal Record System
In this system users will communicate with the system through the following user interface links,
button, forms and pictures that described under the system.The following some interface design
describe the logical characteristics of some interfaces between the system and the users.
40
2010 E.C
Web based criminal Record System
41
2010 E.C
Web based criminal Record System
42
2010 E.C
Web based criminal Record System
43
2010 E.C
Web based criminal Record System
Deployment diagrams are used to model the hardware that will be used to implement the system
the link between different item of hardware and the deployment of software on to that hardware.
44
2010 E.C
Web based criminal Record System
CHAPTER FOUR
IMPLEMENTATION
Introduction
Systems implementation is the final stage of system development process that used to converting
logical design in to application using selected programming languages. To develop this project
the team project uses the following programming languages PHP, HTML, JavaScript and CSS.
It is integrated with a number of popular databases, including MySQL, Postgre SQL, Oracle,
Sybase, Informix, and Microsoft SQL Server.
PHP works well for a database-driven Web site. PHP scripts in the Web site can store data in and
retrieve data from any supported database. PHP also can interact with supported databases
outside a Web environment.
45
2010 E.C
Web based criminal Record System
2. Update account
Logged page
Click on manage account link
List of account is displayed
Click on Edit link
Form displayed
Fill new information for the user
Click on update button
If (valid)
Display successful message.
Else display invalid input message
<?php
include("connection.php");
?>
<html>
<head>
<title>
Login Page
</title>
</head>
<body>
<table>
<form action="" method="post">
<tr><th><h1>Login <h1></th></tr>
46
2010 E.C
Web based criminal Record System
<tr><td><label>User Name:</label></td></tr>
<tr><td><input type="text" name ="un" placeholder="Enter User Name"
required style="height:30px; width:180px;"></td></tr>
<tr><td><label>Password:</label> <input type="password" name ="pass"
required placeholder="*********" required
style="height:30px; width:180px;"></td></tr>
<tr><td><input type="submit"name="login"value="login" style="height:30px;
width:80px;background-color:#c0cbcd">
<input type="reset"value ="Reset" style="height:30px; width:80px;background-
color:#c0cbcd"></td></tr>
<tr><td><p>Forget<a href="#">Password?</p></td></tr>
</form>
</table>
<?php
function encryptpassword($password )
{
$cryptKey='qJB0rGtIn5UB1xG03efyCp';
$passwordEncoded= base64_encode( mcrypt_encrypt(
MCRYPT_RIJNDAEL_256, md5( $cryptKey ), $password,
MCRYPT_MODE_CBC, md5( md5( $cryptKey ) ) ) );
return( $passwordEncoded );
}
if(isset($_POST['login']))
{
$un=$_POST["un"];
$pass=$_POST["pass"];
$plaintext_password=$pass;
47
2010 E.C
Web based criminal Record System
$password=encryptpassword($plaintext_password);
if($con)
{
$sql="select * from account where username='$un' and
password='$password'";
$matchfound=mysql_query($sql,$con);
$userexist=mysql_num_rows($matchfound);
if($userexist>0)
{
while($row=mysql_fetch_assoc($matchfound))
{
//$username=$row['UName'];
$userid=$row["userid"];
$un=$row["username"];
$pw=$row["password"];
$role=$row["role"];
$status=$row["status"];
$pw_status=$row["password_status"];
}
if($pw_status=="unchanged")
{
$_SESSION['userid']=$userid;
$_SESSION['oldpassword']=$pass;
header("location:change_password.php");
}
48
2010 E.C
Web based criminal Record System
else
{
$sqll="select * from employee where emp_id='$userid'";
$matchfound1=mysql_query($sqll,$con);
$row1=mysql_fetch_assoc($matchfound1);
//session
$eid=$row["emp_id"];
$firstname=$row["firstname"];
$fathername=$row["fathername"];
$gfathername=$row["gfathername"];
$photo=$row["photo"];
$email=$row["email"];
$fullname=$firstname." ".$fathername;
$_SESSION['fullname']=$fullname;
$_SESSION['sun']=$un;
$_SESSION['spw']=$pw;
$_SESSION['srole']=$role;
$_SESSION['seid']=$eid;
$_SESSION['sphoto']=$photo;
$login_time = date("h:i:s");
$_SESSION['login_time']=$login_time;
if($role=="Adminstrator" && $status=="Active")
header("location:Adminstrator.php");
else if($role=="PoliceHead" && $status=="Active")
49
2010 E.C
Web based criminal Record System
header("location:PoliceHead.php");
else if($role=="DetectiveOfficer" && $status=="Active")
header("location:DetectiveOfficer.php");
else if($role=="PreventivePolice" && $status=="Active")
header("location:PreventivePolice.php");
else if($role=="HRManager" && $status=="Active")
header("location:HRManager.php");
else if($role=="Complaint" && $status=="Active")
header("location:Complaint.php");
}
}
else
{
$x='<script type="text/javascript">alert("Please Enter Correct Username and
Password!");
window.location=\'index.php\';</script>';
echo $x;
}
}
else
echo "<div id=error>Connection Failed!!";
}
?>
</body>
</html>
50
2010 E.C
Web based criminal Record System
CHAPTER FIVE
5.1. Testing
Testing is a process to show the correctness of the program and designed to analyze the logic
used in the implementation of the System.
Testing by Requirements: - The requirements that are tested by the group member during the
implementation are correctness, performance, accuracy, security and others.
Testing the correctness: - correctness determines how users can interact with the software and
how the software should behave when it is used correctly. Users can easily interact with the
application since it has easily understandable interface and the application responds correctly.
Performance testing: The team members measures the system parameters in terms of System
responsiveness with related to time avail ability, and scalability.
Security Testing: The team members insure the security of the system that authenticates when
user login to the correct user name and password. The system allows only authorized users to
login users that have previously created account through user name and password. The system
also uses session management, time management, and change password if he/she is login for the
first time.
51
2010 E.C
Web based criminal Record System
52
2010 E.C
Web based criminal Record System
As a central part of this study, a detailed analysis and design was held to develop automated
criminal records system for Debre Markos police station. The project is aimed at developing a
simple and user friendly automated criminal records system for Debre Markos police station. The
project made is almost simple, interactive and time saving system and this project initiates us to
think wide and hopefully. Before this time it is thought that developing projects in different
programming languages is a very match difficult work. But at this time it becomes easy to
understand and develop such systems.
6.2 Recommendations
The system that we develop is a web based criminal record system for Debre Markos city police
station. While doing this system the team members has faced different challenges. But by the
cooperation of all the group members the team is now able to reach to the final result. I.e. all the
group members strongly fight these challenge and take the turn to the front. We strongly
recommend for everyone involved in criminal record system; our new system has provided a
better service than the existing system by forming better interaction among them. Our
recommendation to other system developers is that to develop an android part for the system.
53
2010 E.C
Web based criminal Record System
Appendix
54
2010 E.C
Web based criminal Record System
Reference
[1]. “introduction about impact of information technology," 23: December 2010. [Online].
http://techpedia.sristi.org/parojects/online-crime-management-system/185558
http://www.scaledagileframework.com/nonfunctional-requirements/
https://books.google.com.et/books/about/System_Requirements_Analysis.html?id=FkpqAnHUN
LYC&redir_esc=y
http://agilemodeling.com/style/useCaseDiagram.htm
http://www.dummies.com/business/business-strategy/how-to-create-use-case-description-for-
your-business-analysis-report/
https://www.tutorialspoint.com/uml/uml_activity_diagram.htm
http://www.federalpolice.gov.et/web/guest/background-information
55