Project Report Batch 3
Project Report Batch 3
PROJECT-I REPORT
REG NO NAME
1811103 AJITHKANNAN A
1811119 JEEVANANDHAM A
1811155 VEERAMANIKANDAN M
BONAFIDE CERTIFICATE
Mrs. ANNE CHRIS EVERT M.E., Dr. J. NAFEESA BEGUM, M.E., Ph.D.,
SUPERVISOR HEAD OF THE DEPARTMENT
Assistant Professor Professor [CAS]
Department of CSE Department of CSE
Govt. College of Engineering Govt. College of Engineering
Bargur-635 104 Bargur-635 104
CHAPTER
TITLE PAGE NO.
NO.
Acknowledgement i
Abstract ii
1. Introduction 1
2. Problem Description 3
3. System Analysis 4
4. System Requirements 5
5. System Design 6
6. System Implementation 14
References 35
i. ACKNOWLEDGEMENT
First and Foremost, praises and thanks to the God, the Almighty for showers of
blessings throughout our beautiful life journey. We are extremely grateful to our parents
for their love, prayers, caring and sacrifices for educating and preparing us for our future.
We are again greatly thankful to our project guide Mr. J. MANIMARAN, M.E.,
MBA., Department of Computer Science and Engineering for his valuable guidance and
motivation which helped us to complete this project on time.
We thank all our teaching and non-teaching staff members of the Computer
Science and Engineering for their passionate support for helping us to identify our
mistakes and also for the appreciation they gave us in achieving our goal.
Also, we would like to record our deepest gratitude to our parents for their
constant encouragement and support which motivated us to complete our project on
time.
AJITHKANNAN A (1811103)
JEEVANANDHAM A (1811119)
VEERAMANIKANDAN M (1811155)
ii. ABSTRACT
person along with photograph. To identify any Criminal we need some identification
regarding person, which are given by eyewitness. In most cases the quality and resolution
of the recorded image segments is poor and hard to identify a face. To overcome this sort
of problem we are developing software. Identification can be done in many ways like
finger print, eyes, DNA etc. One of the applications is face identification. The face is our
primary focus of attention in social inters course playing a major role in conveying
identify and emotion. Although the ability to infer intelligence or character from facial
DATABASE TABLES
FACE
Field Name Data Type Size
D.O.B Date
Age Number 5
Gender Varchar2 15
Address Varchar2 15
City Varchar2 15
State Varchar2 15
Photo Varchar2 15
CRIMINAL_SUSPECT TABLE
Cid Number 5
FACE_HEIGHTS TABLE
Criminal Id Number 5
Hair Number 5
Forehead Number 5
Eyes Number 5
Nose Number 5
Lips Number 5
Chin Number 5
FACE_SUSPECTPHOTO
Cid Number 5
This project is aimed to identify the criminals in any investigation department. Here
the technique is we already store some images of the criminals in our database along with
his details and that images are segmented into many slices say eyes, hairs, lips, nose, etc.
These images are again stored in another database record so to identify any criminals;
eyewitnesses will see the images or slices that appear on the screen by using it we
develop the face, which may or may not be matched with our images. If any image is
matched up to 99% then we predict that he is only the criminal. Thus using this project it
provides a very friendly environment for both operator and eyewitness to easily design
any face can identify criminals very easy.
PROJECT OBJECTIVE:
This project is intended to identify a person using the images previously taken. The
identification will be done according the previous images of different persons.
PROJECT SCOPE:
The scope of the project is confined to store the image and store in the database.
When a person has to be identified the images stored in the database are compared with
the existing details.
OVERVIEW OF THE PROJECT:
a. EXISTING SYSTEM:
This system is manual system only. Here, have a facility to store the
criminal images. If you want to compare the criminal images with the existing
images it is manual process. This process is very slow to give the result. It is very
critical to find the criminal images.
b. PROPOSED SYSTEM:
To overcome the drawbacks that were in the existing system we develop a
system that will be very useful for any investigation department. Here the program
keeps track of the record number of each slice during the construction of
identifiable human face and calculate maximum number of slices of the similar
record number. Based on this record number the program retrieves the personal
record of the suspect (whose slice constituted the major parts of the constructed
human face) on exercising the “locate” option.
Advantages:
SOFTWARE REQUIREMENTS:
Operating System : Windows 2000
Database Server : Oracle 9i
HARDWARE REQUIREMENTS:
Processor : Pentium IV
RAM : 256MB
5. SYSTEM DESIGN
b. E-R DIAGRAMS
User Pwd
id User id Pwd
Authentication
Administrator Employee
Criminal
User id Pwd
images Pwd
User
id
Viewing &
Employee Eyewitness
selecting,
images
Criminal Criminal
details images
E-R DIAGRAM BETWEEN EYEWITNESS AND CRIMINAL:
Criminal
Criminal Criminal id
details
images
Criminal
Eyewitness Identification
Criminal Id Criminal
Pwd
User details
id
Getting
Employee Criminal
details
of
criminal
E-R DIAGRAM BETWEEN EYEWITNESS AND ADMINISTTRATOR
User Pwd
User Pw
id
id d
Authentication
Administrator Eyewitness
c. DATAFLOW DIAGRAMS
LEVEL 1
LEVEL 2
LEVEL 1:
LEVEL 2:
d. UML DIAGRAMS
Administrator:
Login
criminal
Splitting/Updating Images
Administrator
New Criminal
Deleting Images
Client (Operator):
operator Login
operator Criminal
identifying the images
6. SYSTEM IMPLEMENTATION
The testing phase involves the testing of development system using various data.
Preparation of the test data plays a vital role in system testing. After preparing the test
data, the system under study was tested using those data. While testing the system, by
using the test data, errors were found and corrected by using the following testing steps
and corrections were also noted for future use. Thus, a series of testing is performed on
the proposed system before the system is ready for implementation.
▪ Integration testing
▪ Validation testing
▪ Unit testing
▪ Output testing
▪ User Acceptance testing
Unit testing:
Unit testing focuses on verification effort on the smallest unit of software design
module. Using the unit test plans prepared in the design phase of the system development
as a guide, important control paths are tested to uncover errors with in the boundary of
the modules. The interfaces of the modules are tested to ensure proper flow of
information into and out of the modules under consideration boundary conditions were
checked. All independent paths were exercised to ensure that all statements in the module
have been executed at least once and all error-handling paths were tested.
Data can be lost across an interface, one module can on another; sub-
functions when combined may not produce the desired major function: global data
structures can present problems. Integration testing is a systematic technique for the
program structure while at the same time concluding tests to uncover errors associated
with interface. All modules are combined in this testing step. Then the entire program is
tested as a whole. Each of the module is integrated and tested separately and later all
modules are tested together for sometime to ensure the system as a whole works well
without any errors.
Validation Testing:
Output Testing:
After performing validation testing, the next phase is output testing of the proposed
system, since no system can be useful if it does not produce the desired output in the
specified format. The output generated or displayed by the system under consideration is
tested by asking the user about the format required by them, here, the output format is
considered in two ways: One is on the screen and the other is on the printed form. Beta
testing is carried output by the client, and minor errors that have been discovered by the
client are rectified to improve the user friendliness of the system.
Object-Oriented Testing
The overall objectives of the object-oriented testing – to find the maximum number
of errors with a minimum amount effort – is identical to the to the objective of
conventional software testing. But the strategy and tactics for OO testing differ
significantly. The view of testing broadens to include the review of both the analysis and
design model. In addition, the focus of testing moves away from the procedural
component and toward the class.
Because the OO analysis and design models and the resulting source code are
semantically coupled, testing begins during these engineering activities. For this reason, a
review of CRC, object relationships, and object behavior models can be viewed as first
stage testing. As a result of this first stage testing, we encountered few problems in OOA
done at analysis time. We have gone back and remodeled with new errorless classes and
their relationships. The documented model is the revised model of earlier analysis model.
Once OOP has been accomplished, unit testing is applied for each class. Class
testing uses a variety of methods: fault-based, random, and partition test methods. Each
of those methods exercises the operations encapsulated by the class. Test sequences are
designed to ensure that relevant operations are exercised. The state of the class,
represented by the values of its attributes, is examined to determine if errors exist.
Test case #1
Use Case: download a file
Event Sequence:
Test case #2
Use Case : upload a file
Event Sequence:
OUTPUT SCREENS
LOGIN SCREEN
MAIN SCREEN
NEW CRIMINAL FORM
SHOW DETAILS
CLIP IMAGE SCREEN
UPDATE DETAILS SCREEN
CONSTRUCT SCREEN
FIND FACE
HELP SCREEN
8. CONCLUSION AND FUTURE WORK
years this process is carried out by humans. This process gives the exact image of the
criminal but it is very difficult to identify the criminal details and also it requires much
based system by using the machine based face identification process. In this process
we store the details of criminal into the database along with his photo or
image. Then we make the image into different clips containing hair, forehead, eyes,
nose, lips and chin and store these clips into the database. When any crime occurs
we compare the details given by the eyewitness with the clips already stored in the
database and we will identify the criminal. This project can be extended to adjust the
gaps between the clips after construction of the image to be a perfect photograph using
BOOKS REFERRED
The following books were used extensively for the project development and
implementation.
Herbert Schildt.
WEBSITES REFERRED
The following links were searched and exploited extensively for the project development
and implementation.
1. http://www.java.sun.com/products\java
2. http://www.jakarta.apache.org
3. http://www.javaworld.com/
4. http://www.java2s.com/