Crime Records Management System ASP - Net GOOD
Crime Records Management System ASP - Net GOOD
ABSTRACT
The proposed system applies to all Police stations across the country and
specifically looks into the subject of Crime Records Management. It is well
understood that Crime Prevention, Detection and Conviction of criminals
depend on a highly responsive backbone of Information Management. The
efficiency of the police function and the effectiveness with which it tackles
crime depend on what quality of information it can derive from its existing
records and how fast it can have access to it.
1. Introduction
1.1Introduction to Project
1.2Organization Profile
2. System Analysis
4. System Design
4.1. Introduction
4.2. Data flow Diagrams
5. Testing
6. Technical Notes
8. Conclusion
9. Future Improvement
Introduction
Overview
The entire project has been developed keeping in view of the distributed
client server computing technology, in mind. The specifications have been
normalized up to 3NF to eliminate all the anomalies that may arise due to
the database transaction that are executed by the general users and the
organizational administration. The user interfaces are browser specific to
give distributed accessibility for the overall system. At all proper levels high
care was taken to check that the system manages the data consistency with
proper business rules or validations. The authentication and authorization
was crosschecked at all the relevant stages. The user level accessibility has
been restricted into two zones namely. The administrative zone and the
normal user zone.
The system after careful analysis has been identified to be presented with the
following modules:
Police stations registration module: This module maintains the
information about all the police stations that are registered as per the
jurisdiction of the system. It also gets integrated with the employees
who are working in these stations along with their designation.
Victims FIR registration module: This module maintains the
information related to the first investigation report of the crime
sequences that have taken place. The Fir registers all that a data that is
necessary for the investigation to take place in proper length. It
identifies the crime category and the crime nature.
Investigating evidence registration module: This module makes a
collection of information related to all the evidences that become
categorically important under the normal sequence of the
investigation, this module dynamically concentrates upon the changes
that take place while the system of investigation is under process.
3. Software Requirement Specification
3.1. Overview
Purpose: The main purpose for preparing this document is to give a general
insight into the analysis and requirements of the existing system or situation
and for determining the operating characteristics of the system.
4. System design
4.1 Introduction
Software design sits at the technical kernel of the software engineering
process and is applied regardless of the development paradigm and area of
application. Design is the first step in the development phase for any
engineered product or system. The designer’s goal is to produce a model or
representation of an entity that will later be built. Beginning, once system
requirement have been specified and analyzed, system design is the first of
the three technical activities -design, code and test that is required to build
and verify software.
The importance can be stated with a single word “Quality”. Design is
the place where quality is fostered in software development. Design provides
us with representations of software that can assess for quality. Design is the
only way that we can accurately translate a customer’s view into a finished
software product or system. Software design serves as a foundation for all
the software engineering steps that follow. Without a strong design we risk
building an unstable system – one that will be difficult to test, one whose
quality cannot be assessed until the last stage.
During design, progressive refinement of data structure, program
structure, and procedural details are developed reviewed and documented.
System design can be viewed from either technical or project management
perspective. From the technical point of view, design is comprised of four
activities – architectural design, data structure design, interface design and
procedural design.
4.2 Data Flow Diagrams
A data flow diagram is graphical tool used to describe and
analyze movement of data through a system. These are the central tool and
the basis from which the other components are developed. The
transformation of data from input to output, through processed, may be
described logically and independently of physical components associated
with the system. These are known as the logical data flow diagrams. The
physical data flow diagrams show the actual implements and movement of
data between people, departments and workstations. A full description of a
system actually consists of a set of data flow diagrams. Using two familiar
notations Yourdon, Gane and Sarson notation develops the data flow
diagrams. Each component in a DFD is labeled with a descriptive name.
Process is further identified with a number that will be used for
identification purpose. The development of DFD’S is done in several levels.
Each process in lower level diagrams can be broken down into a more
detailed DFD in the next level. The lop-level diagram is often called context
diagram. It consists a single process bit, which plays vital role in studying
the current system. The process in the context level diagram is exploded into
other process at the first level DFD.
The idea behind the explosion of a process into more process is that
understanding at one level of detail is exploded into greater detail at the next
level. This is done until further explosion is necessary and an adequate
amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing
system requirements in a graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of
clarifying system requirements and identifying major transformations that
will become programs in system design. So it is the starting point of the
design to the lowest level of detail. A DFD consists of a series of bubbles
joined by data flows in the system.
Data Store
1) A Data Flow has only one direction of flow between symbols. It may
flow in both directions between a process and a data store to show a read
before an update. The later is usually indicated however by two separate
arrows since these happen at different type.
2) A join in DFD means that exactly the same data comes from any of two
or more different processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There
must be at least one other process that handles the data flow produce
some other data flow returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use. A data flow has a
noun phrase label more than one data flow noun phrase can appear on a
single arrow as long as all of the flows on the same arrow move together
as one package.
In this the structural and behavioral aspects of the environment in which the
system is to be implemented are represented.
1. Investigating officer
2. Administrator
3. Writer
Investigating officer: He is the actor who can practically work upon the
existing data in the police station only for view purpose.
Administrator: He is the actor who has the full-length potentiality and
Writer: He is the actor who can enter all the details of the crime or
evidence. Once entered cannot be edited. Only the administrator can edit or
delete the record from the database.
Use case Description:
Use case
name Register Investigation Evidence
Participating Administrator, Writer
actors
Flow of User will register the investigation evidence
events
Entry User should know the details of evidence.
Condition
Exit condition Evidence details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements
Register Police Station
Use case
name
Participating Administrator
actors
Flow of User will register the police station.
events
Entry User should know the details of police station.
Condition
Exit condition Police station details are successfully inserted into the
system.
Quality Display proper error messages while insertion.
Requirements
View all crime details
Use case
name
Participating Investigator
actors
Flow of User can view all the crime details.
events
Entry Display the details of crime and evidences.
Condition
Exit condition Evidence and crime details are successfully displayed.
Quality N/A
Requirements Sequence Diagram:
Administrator:
Investigator:
Writer:
TECHNICAL NOTES
5.1 Dot Net Framework:
The following sections describe the main components and features of the
.NET Framework in greater detail.
Console applications.
WindowsGUIapplications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.
This model provides you with all the features of the common
language runtime and class library while gaining the performance and
scalability of the host server.
The new model for developing applications means more and more
solutions require the use of emerging Web standards like Hypertext Markup
Language (HTML), Extensible Markup Language (XML), and Simple
Object Access Protocol (SOAP). Existing development tools were developed
before the Internet or when the Web as we know it today was in its infancy.
As a result, they don't always provide the best fit for working with new Web
technologies. C# programmers can leverage an extensive framework for
building applications on the Microsoft .NET platform. C# includes built-in
support to turn any component into an XML Web service that can be
invoked over the Internet-from any application running on any platform.
Even better, the XML Web services framework can make existing XML
Web services look just like native C# objects to the programmer, thus
allowing developers to leverage existing XML Web services with the object-
oriented programming skills they already have. There are more subtle
features that make C# a great Internet programming tool. For instance, XML
is emerging as the standard way to pass structured data across the Internet.
Such data sets are often very small. For improved performance, C# allows
the XML data to be mapped directly into a strut data type instead of a class.
This is a more efficient way to handle small amounts of data.
The end result is a language that makes it far easier for developers to write
and maintain programs that solve complex business problems.
● Including native support for the Component Object Model (COM) and
Windows.- based APIs.
✔ Sql server
✔ Ms access
2. ExecuteScaler();
3. ExecuteReader();
4. ExecuteXmlReader();
Validation controls:
Validation is the process of making sure that the user enters
correct information into a form. Validation controls is provide by the. Net
framework in the client browser if the browser supports java script and
DHTML and checks the data that user entered before sending it to the server.
The entire validation take place in the browser and nothing is sent back to
the server. If the browser does not support DHTML and scripting then is
done on the server. All validation controls in the. Net frameworks are
derived from the Base Validator class.
The validation controls that are provided by the. Net frameworks are as
following:
1. Required Field Validator
2. Compare Validator
3. Range Validator
4. Regular Expression Validator
5.Custom Validator
Required Field Validator:
Simple of all, Required Field Validator makes sure that the user
enters data into a form. For example, on a registration form you might want
your users to enter their data of in a textbox. If they leave field empty, this
validation control will display an error.
Notable property of the Required Field Validator is the initial value
property, which set as an initial value in the control
Compare Validator:
Comparison Validations are used to compare the entered by the
user into a control (Textbox, for example) with the value entered into
another control for with a constant value. We indicate the control to validate
by setting the Control to validate property and if we want to compare a
specific control with an other control we need set the Control to compare
property to specify the Control to compare with.
Range Validator:
Range Validators are used to test if the value of a control is inside a
specified range of values.
The three property of this control are the Control To Validate
property, which contains the control of validate and maximum and minimum
values which hold the maximum and minimum values of the valid range.
Regular Expression Validator:
Regular Expression Validators are used to check if the value in a
control matches a pattern defined by the regular expression. Notable
property for this control is the Validation Expression property, which allow
us to select a predefined expression which we want to match with the data
enter in a control.
Custom Validator:
Custom Validator is used to our own Validation for the data in a
control. For example, you can check the value entered by a user is even or
odd, with this control which is not possible with any of the above mentions
validation controls. You write the script for the validation for JavaScript or
vbscript and associate that script function to the Client Validation Function
property of this control
Output Screens
Methodologies:
• Black box Testing: is the testing process in which tester can perform
testingon an application without having any internal structural knowledge of
application.
Usually Test Engineers are involved in the black box testing.
• White box Testing: is the testing process in which tester can
performtesting on an application with having internal structural knowledge.
Usually The Developers are involved in white box testing.
● A console for the data centre may be made available to allow the
personnel to monitor on the sites which were cleared for hosting during a
particular period.
BIBLIOGRAPHY
● FOR .NET INSTALLATION
www.support.mircosoft.com
● FOR DEPLOYMENT AND PACKING ON SERVER
www.developer.com
www.15seconds.com
● FOR SQL
www.w3schools.com
● FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/
default.com www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com