Criminal Registration and Tracking System
Criminal Registration and Tracking System
Submitted by
Approved by
Signature Date
Senior project Committee
Program
II
Criminal Registration and Tracking System
Acknowledgement
We would like to express our very great appreciation to Addisu for his valuable and constructive
suggestions during the process of writing this document. His willingness to give his time so
generously is very much appreciated.
We would like to offer our special thanks to computer science and engineering department and to
the school of electrical engineering and computing for their assistance and help.
We would also like to thank the staff of the following organizations for enabling me to visit their
offices to observe their daily operations:
- Adama central police station.
- Adama Prosecutors office.
- Adama higher court office.
Team members
III
Criminal Registration and Tracking System
Contents
List of tables..............................................................................................................................VI
Lists of figures..........................................................................................................................VII
Abbreviations............................................................................................................................IX
Chapter One...................................................................................................................................1
1.1 Introduction..........................................................................................................................1
1.2 Background Information.......................................................................................................2
1.3 Statement of the problem.......................................................................................................3
1.4 Objective of the project.........................................................................................................3
1.4.1 General objective............................................................................................................3
1.4.2 Specific objective.............................................................................................................3
1.5 Feasibility study....................................................................................................................4
1.5.1 Operational feasibility.....................................................................................................4
1.5.2 Technical feasibility........................................................................................................4
1.5.3 Economical feasibility.....................................................................................................5
1.6 Scope and Limitation.............................................................................................................5
1.6.1 Scope..............................................................................................................................5
1.6.2 Limitation.......................................................................................................................6
1.7 Significance of the project......................................................................................................6
1.8 Methodology..........................................................................................................................6
1.8.1 Data source.....................................................................................................................6
1.8.2 Fact Finding Methodologies............................................................................................6
1.8.3 System Development Methodologies................................................................................7
1.8.4 Development Tools..........................................................................................................7
1.9 Testing procedure..................................................................................................................8
1.9.1 Unit testing....................................................................................................................10
1.9.2 Integration testing.........................................................................................................10
1.10 Overview of the project phase............................................................................................10
1.11 Project Plan.......................................................................................................................14
1.11.1 Schedule......................................................................................................................14
1.12 Team Composition.............................................................................................................15
1.12.1 Team Member’s activity and responsibility.................................................................15
Chapter Two................................................................................................................................16
IV
Criminal Registration and Tracking System
V
Criminal Registration and Tracking System
List of tables
Table 1 Development tools..............................................................................................................7
Table 2 Test case............................................................................................................................9
Table 3 Field check..........................................................................................................................9
Table 4 Filed checking.....................................................................................................................9
Table 5 Schedule table...................................................................................................................14
Table 6 Team composition............................................................................................................15
Table 7 Use Case description Register..........................................................................................29
Table 8 Use Case description login..............................................................................................30
Table 9 Use Case description Fill the forms.................................................................................31
Table 10 Use Case description Update.........................................................................................32
Table 11 Use Case description Provide Statistics of crime...........................................................33
Table 12 Use Case description Suspect/lawyer View record........................................................34
Table 13 Use Case description Suspect/lawyer update record.....................................................35
Table 14 Use case description of assign judge.............................................................................36
Table 15 Use case description of approve or disqualify accusation.............................................37
Table 16 Object class....................................................................................................................38
Table 17 Priority table..................................................................................................................60
Table 18 Subsystem decomposition table.....................................................................................70
Table 19 Access matrix table........................................................................................................85
VI
Criminal Registration and Tracking System
Lists of figures
Figure 1 Five phases of project management................................................................................11
Figure 2 Smart...............................................................................................................................12
Figure 3 Use case diagram of CRTS.............................................................................................28
Figure 4 Class diagram..................................................................................................................42
Figure 5 Sequence diagram for login.............................................................................................43
Figure 6 Sequence diagram for Register A crime.........................................................................44
Figure 7 Sequence diagram for update a record............................................................................45
Figure 8 Sequence diagram for view record.................................................................................46
Figure 9 Sequence diagram for provide Statics............................................................................47
Figure 10 Activity Diagram for Login...........................................................................................48
Figure 11 Activity Diagram for Register......................................................................................49
Figure 12 Activity Diagram for Update record.............................................................................50
Figure 13 Activity Diagram for View record...............................................................................51
Figure 14 Activity Diagram for Provide Statistics........................................................................52
Figure 15 State diagram for login..................................................................................................53
Figure 16 State Diagram for update...............................................................................................54
Figure 17 State diagram for View Record....................................................................................55
Figure 18 State Diagram for Register Record..............................................................................56
Figure 19 States Diagram for Provide Statics...............................................................................57
Figure 20 System overviews.........................................................................................................60
Figure 21 Client-server architecture for CRTS............................................................................61
Figure 22 System activity diagram...............................................................................................61
Figure 23 System overview of police station...............................................................................62
Figure 24 System process of police station..................................................................................62
Figure 25 Prosecutor system overview.........................................................................................63
Figure 26 System process of prosecutor.......................................................................................63
Figure 27 System overview of Court registrar.............................................................................64
Figure 28 System process of court registrar.................................................................................64
Figure 29 System overview of investigator..................................................................................65
Figure 30 System process of investigator.....................................................................................65
Figure 31 System overview of judge............................................................................................66
Figure 32 System process of judge...............................................................................................66
Figure 33 System overview of lawyer..........................................................................................67
Figure 34 System process of lawyer.............................................................................................67
Figure 35 How users are accessing our system............................................................................68
Figure 36 Subsystem decomposition level 1................................................................................68
Figure 37 Subsystem decomposition level 2................................................................................69
Figure 38 Hardware and Software mapping.................................................................................71
Figure 39 Mapping class to table..................................................................................................71
VII
Criminal Registration and Tracking System
VIII
Criminal Registration and Tracking System
Abbreviations
CRTS = Criminal Registration and tracking system
MVC = Model View Controller
JDK = Java Development Kit
JRE = Java Run time Environment
API = Application Program Interface
IDE = Integrated Development Environment
JSP = Java Server Pages
PMBOK = Project Management Body of Knowledge
PM = Project Managers
SMART = Specific, Measurable, Attainable, Realistic, Timely
CLEAR = Collaborative, Limited, Emotional, Appreciable, Refinable
KPI = Key Performance Indicators
CR = Criminal Registration
UML = Unified Modeling Language
SRS = Software Requirements Specifications
HTTP = Hypertext Transfer Protocol
XML = extensible Markup Language
SQL = Structured Query Language
JDBC = Java Database Connectivity
IX
Criminal Registration and Tracking System
Chapter One
1.1 Introduction
Criminal records may be used for many purposes, including background checks for purposes of
employment, security clearance, adoption and licensing. Criminal records may be useful for
identifying suspects within the course of a criminal investigation. They may be used for
enhanced sentencing in criminal prosecutions. Criminal registration and tracking system are
being used by many countries around the world after the innovation of computer and web
technology. The police department of the countries is using this system for crime solving,
investigation, keeping track of crime rate in the country, and to better understand the scope of
crime to take corrective measures.
The need for good record-keeping and information sharing practice has taken on added
significance in today’s global environment. In modern-day crime is increasing day by day. To
combat such crime and to provide safety to citizens, the Criminal Justice System work plays a
vital role. And must be modernized.
It always is a vital responsibility arresting any criminal who is a threat to the safety of society. In
a traditional way, the police have to register information about the crime and the criminal. The
police department uses paper and a pain approach to register files. This way of gathering
information has led the governments to do the unorganized job in its police departments, lack of
information sharing among different government office, police departments and risk of losing
information.
In Ethiopia, the police department is administratively divided into regional states and chartered
cities, zones, wereda (districts) and kebele (wards) police. Information about any crime in one
region is not accessible in another region because of no means of sharing crime information. This
leads to a repeated pattern of crime in the country. This affects the crime-fighting capacity of the
criminal Justice System. Not sharing crime information has a significant effect on the budget and
resource of the police force like investigating the same crime which occurred in another region
just only by luck of information about the crime.
The system that we are going to develop is Criminal registration and tracking system (CRTS)
and it mainly focuses on registering every suspect of a crime in the country with a mug shot.
This system will solve the problem of sharing crime information between police departments,
government offices, and anyone in need of criminal records. And also helps in creating an
information sharing environment between police departments, prosecutors and courts. This
increases communication and workflow of offices in the Criminal Justice System.
1
Criminal Registration and Tracking System
After the downfall of the monarchic government in 1974, the military junta – the Dergu – that
came to power enacted proclamation no. 10/1974 to provide for the nation’s security and
protection; however, no provision was incorporated therein regarding organizational matters of
the police. No separate proclamation of the police establishment was enacted until the downfall
of Dergue in 1991.
After the downfall of Dergue, it was found necessary to re-establish the police institution for
better organizational capabilities. In so doing, the police force has become in better shape to
discharge its duties of enforcing the constitution of the Federal Democratic Republic of Ethiopia
and laws issued based upon that constitution; the police establishment is also better suited to
contribute its share to the nationwide activities of development of a democratic system, to
maintain peace and to expedite development.
The police institution in Ethiopia is classified in regions, zones, and weredas, each of them
having their own investigation team. And also regions, zones, and weredas have a court system
that works with the police force. This institution has served the people in many cases and
situations of society. If any crime is conducted in the society the police arrest the suspect and
take their word about the crime while recording every word of the suspect on paper. This
information about the suspect will be used by the prosecutor to form a legal case on the suspect
then the case will be sent to court. All this process is based on paper, and this has a significant
effect on information privacy and tampering of crime information.
All police departments in the country use paper-based registration and tracking system. It is a
hard job for police and courts to find a connection of crime. Also, this will result in losing
important information.
2
Criminal Registration and Tracking System
3
Criminal Registration and Tracking System
Create an easy and secure way to share information between the police, the court system,
and the correction organization. As well as any authorized external organization looking
for information.
Check for any modified data and keep the consistency of information.
To define an improved information system, the study group must understand the information
requirements of the organization. This understanding may be obtained by determining what is
currently being done and of investigating through interviews and analysis of what information is
needed to be provided that is not being furnished by the existing system. Data on the cost of
operating the current system needs to be collected in order to make a cost-benefit for a new
system.
The objective of the feasibility study is not to solve the problem, but to acquire a sense of its
scope. During the study, the problem definition is crystallized and aspects of the problem to be
included in the system are determined, consequently, costs and benefits are estimated with
greater detail at this stage. The result of the feasibility study is a system formal proposal. This is
simply a form of documenting or detailing the nature and scope of proposed solutions. The
proposal summarizes what is known and what is going to be done.
4
Criminal Registration and Tracking System
1.6.1 Scope
Our system is used for automating the manual process of registering different cases in the police
department. The scope of our project includes saving or recording suspects detailed confession
and saving on a safe and secure database system. The system provides an interface to store and
search criminal details of criminals for a specific user. The system should.
Have a login.
support data entry.
Give easy access to users.
Include editing the recorded data by higher authority users.
Replace or detect duplicate records.
Let information be accessed by users.
Record and display the full profile of criminals.
The system provides the following features:
The system asks the user to login with the correct username and password.
The user enters into the system with its authority level.
If the user enters the wrong information the system asks to enter the correct information.
The user makes an information record of criminal or suspect.
5
Criminal Registration and Tracking System
1.6.2 Limitation
The system only records a criminal profile.
The system is limited only up to the final judgment of the central judicial facility.
1.8 Methodology
A methodology is a model, which we employ for the design, planning, implementation and
achievement of our project objectives. Under this chapter, we will discuss the methods we used
with respect to the Data source, Fact-finding, System development methodologies, and
Development tools.
6
Criminal Registration and Tracking System
Tools Purpose
7
Criminal Registration and Tracking System
Google Docs, GitHub and Slack We use this for the purpose of managing
cooperative works.
Unit testing focuses first on the modules in the proposed system to locate errors. This enables to
detect errors in the coding and logic that are contained within that module alone. Those resulting
from the interaction between modules are initially avoided. In unit testing step each module has
to be checked separately.
System testing does not test the software as a whole, but rather that integration of each module in
the system. The primary concern is the compatibility of individual modules. One has to find
areas where modules have been designed with different specifications of data lengths, type, and
data element name.
Testing and validation are the most important steps after the implementation of the developed
system. System testing is performed to ensure that there are no errors in the implemented system.
The software must be executed several times in order to find out the errors in the different
modules of the system.
Test results
The primary goal of software implementation is the production of source code that is easy to read
and understand. Clarification of source code helps in easier debugging, testing and modification.
Source code clarification is enhanced by structured coding techniques, by good coding style, by
8
Criminal Registration and Tracking System
appropriate supporting documents, by good internal comments and by the features provided in
the modern programming language.
In our implementation phase, source code contains both global and formal variables. It contains
predefined functions as well as the user-defined functions. If there is an error, the error must be
debugged.
Test cases:
User Authentication
The user should enter both When the user enters only one or none, the login As expected
username and password screen will be displayed with an error message
Logout when the user wants Displaying the user logout successfully As expected
to discontinue login section
Field checking:
Name The name of the user is entered here. It can Test Successful
9
Criminal Registration and Tracking System
10
Criminal Registration and Tracking System
PHASE 1: PROJECT INITIATION: This is the start of the project, and the goal of this phase
is to define the project at a broad level. This phase usually begins with a business case. This is
when you will research whether the project is feasible and if it should be undertaken. If
feasibility testing needs to be done, this is the stage of the project in which that will be
completed.
11
Criminal Registration and Tracking System
PHASE 2: PROJECT PLANNING: This phase is key to successful project management and
focuses on developing a roadmap that everyone will follow. This phase typically begins with
setting goals. Two of the more popular methods for setting goals are S.M.A.R.T. and CLEAR:
Figure 2 Smart.
S.M.A.R.T. Goals: This method helps ensure that the goals have been thoroughly vetted. It
also provides a way to clearly understand the implications of the goal-setting process.
specific: To set specific goals, answer the following questions: who, what, where, when,
which, and why.
Measurable: Create criteria that you can use to measure the success of a goal.
Attainable: Identify the most important goals and what it will take to achieve them.
Realistic: You should be willing and able to work toward a particular goal.
Timely: Create a timeframe to achieve the goal.
C.L.E.A.R. Goals: A newer method for setting goals that take into consideration the
environment of today’s fast-paced businesses.
Collaborative: The goal should encourage employees to work together.
Limited: They should be limited in scope and time to keep it manageable.
Emotional: Goals should tap into the passion of employees and be something they can
form an emotional connection to. This can optimize the quality of work.
Appreciable: Break larger goals into smaller tasks that can be quickly achieved.
Refinable: As new situations arise, be flexible and refine goals as needed.
12
Criminal Registration and Tracking System
This is the phase where deliverables are developed and completed. This often feels like the meat
of the project since a lot is happening during this time, like status reports and meetings,
development updates, and performance reports. A “kick-off” meeting usually marks the start of
the Project Execution phase where the teams involved are informed of their responsibilities.
Tasks completed during the Execution Phase include:
Develop team
Assign resources
Execute project management plans
Procurement management if needed
PM directs and manages project execution
Set up tracking systems
Task assignments are executed
Status meetings
Update project schedule
Modify project plans as needed
13
Criminal Registration and Tracking System
1.11.1 Schedule
Months
Requirement gathering
and Analysis
Design
Implementation
Testing
14
Criminal Registration and Tracking System
15
Criminal Registration and Tracking System
Chapter Two
16
Criminal Registration and Tracking System
and investigating criminal activities. These functions are known as policing. Police are often also
entrusted with various licensing and regulatory activities. The following are the responsibilities
of a Police force: -
Investigation
An investigation may include interviewing the victim, witnesses, suspects; collecting physical
evidence; visiting, viewing, photographing, measuring crime scene; identifying suspects.
Prosecutor
Prosecutors are attorneys who work for the government on a local, state or federal level. They
represent the interests of public safety and work with law enforcement agencies to bring accused
criminals to justice.
The Prosecutors have the following responsibilities: -
Gets new cases from the police.
17
Criminal Registration and Tracking System
Coordinate and keeps track of the status of the case in court representing the police.
Investigate the crime with or without coordinating with the police.
Forwarding the cases to the court
And also, the have the following tasks: -
Charging suspects
Once a suspect is arrested, a prosecutor must look at the evidence and decide whether or not to
file charges of a crime against the person. Once he makes that determination, he files formal
paperwork to charge the suspect with a specific crime or crimes.
It’s the job of the prosecutor to determine which specific charges to file. For instance, if someone
has died, the prosecutor looks at the evidence and decides whether to file charges for
manslaughter, second degree murder or first-degree murder. There are specific evidence
requirements for each charge and the penalties differ greatly, so it’s important to choose the
correct charge for the crime.
Research and Preparation
After he/she files charges, the prosecutor continues to research the case. He/She is responsible
for convincing the judge that a suspect is guilty, and must do so using evidence and testimony.
Prosecutors interview witnesses, law enforcement officers, and experts, review police files and
video or photos and look at evidence collected from the crime scene. They also study past cases
and review applicable statutes to ensure that they proceed in accordance with the law.
Plea Bargains
In many cases, a prosecutor will present a plea bargain to a suspect and his attorney. There are
many reasons for a plea bargain. The prosecutor may not feel confident that a jury will vote to
convict, so he/she may opt for a plea bargain, which ensures that the criminal faces some
punishment rather than none. Or, if there are extenuating circumstances, such as a first-time
offender with a minor, non-violent charge or a large number of current cases, a prosecutor may
offer the suspect a plea bargain in order to focus on cases with more serious charges.
Working in court
When a prosecutor takes a case to court, he/she must convince a jury that the suspect is guilty.
He/She does this by questioning witnesses for the prosecution and cross-examining the
defendant’s witnesses. He/She presents evidence to the jury, including photos, videos, audio
recordings, and physical evidence. He/She may also have experts testify so that the jury can
understand some of the evidence. For instance, in the case of a shooting, a prosecutor may ask an
expert to testify about how he determined that a bullet came from a particular gun.
After Conviction
18
Criminal Registration and Tracking System
Once a jury has convicted a criminal, the prosecutor presents a sentencing recommendation to
the judge. He/She may also present the victim(s) or friends and family members of the victim(s)
to speak to the judge regarding the impact of the crime.
Court
The court is a tribunal which can be presided over by a judge, several judges or a magistrate, and
is tasked with hearing and giving out judgement in civil and criminal cases. It is part of the
judiciary arm of the government whose role is to ensure that laws are adhered to or followed
strictly. The society is never shy of conflicts or disputes. If you are living in a society governed
by the rule of law, then it is essential to follow the legal process when it comes to dispute
resolution. The court plays a key role when it comes to resolving disputes that need to be
addressed legally. It is designed to listen to all forms of cases, from those that are highly
sensitive to those people refer to as petty offenses.
In most judicial systems, the courts are categorized into several structures or hierarchy levels;
each meant to listen to a specific type of case. A good example is when one is not satisfied by the
ruling of a particular court level. You can move to the next level to appeal the decision of a
specific judge. The Supreme Court is always the highest level in most hierarchies. The judges of
the Supreme Court have the final say in your case. Courts have been a significant player in the
society, especially in matters to do with dispute resolution. Here is the essential role of courts in
our society.
Hearing disputes
Disputes are the norm in every society. Those guided by the law are always advised to follow the
legal process instead of using uncouth methods to sort out their differences. Court Hearings are
part of the legal process where the conflicting parties sit down and argue their case before the
judges who give out their final judgment after considering several things.
20
Criminal Registration and Tracking System
Chapter Three
3.1 Overview
Since the emergence of the concept of networking, sharing information has become significantly
easy. Since then the value of information has grown. An organization needs and collects
information to compile its job, hence information should be stored in a well-organized manner in
order to support the workflow of the organization. This day's organizations are exchanging
information more than products. So having various, fast, secure means of information exchange
channels can, and will help any governmental or private organizations.
The system we are going to develop will provide a well-organized data storage and sharing
system that will help to improve the communication between the police, the prosecutor office,
and the court through a very reliable and easy interface with features like searching and general
statistical reports. The system is going to be web-based so the users can access it through the
internet regardless of their location.
21
Criminal Registration and Tracking System
to judge the operation of a system, rather than specific behaviors. So, they specify the following
major emergent properties of CRTS: -
Accessibility
Our system should be accessible at any time. It is a web-based system, therefore internet
connection and platform is required to be accessible.
Availability
Our system will be available using a web browser. To increase the availability of our system
reliability of the network and power infrastructure must increase.
Compatibility
The system should have to be compatible: - since this system is web based it is compatible with
any operating system environment if a web browser installed in the computer and internet
connection is available.
Documentation
At the completion of the project, every activity of the entire development, design and another
process will be documented for future reference. There will also be a documentation of
implementation for maintenance during application failure. Furthermore, this will help for
further maintenance and reusability of our system.
Maintainability
The system will be maintainable. Changes made on our system must not affect the current
system state. The system will be easy to maintain at any time of failure.
Performance
The system should respond within a short period of time. It depends on the performance of the
hardware environment and internet connection speed. As a governmental system, it should
perform better to maximize its productivity.
Reliability
The system should be highly reliable. Since the users of the system are police, prosecutors and
the courts. The system will be good at handling errors and display error messages appropriately
in order to minimize system failures.
Security
22
Criminal Registration and Tracking System
The files which are going to be registered in the system must be secured because of the
sensitivity of the documents. To fulfill this need of security, the system will be developed using
Java and Java security modules. Also, classify authorization level according to their managing
level and restrict unauthorized access to files.
Usability
The system should be easy to learn and understandable for the user to achieve the quantified
objective with effectiveness, efficiency, and satisfaction.
Performance requirements
Performance requirements define acceptable response times for system functionality.
The load time for user interface screens shall take no longer than thirty seconds.
The log in information shall be verified within five seconds.
Queries shall return results within five seconds.
3.4.1. Scenario
Since a scenario is a tool that is used during requirement analysis to describe a specific use of a
proposed system. Using this tool, we will illustrate some interaction of our proposed system.
Scenario: Register
Crime registration is done by a Police officer.in order the user to register user must have an
internet connection, must navigate to our website and must input a valid username and password.
After the entry conditions are met User input username and password to login to the system.
After authentication user Select new case button to get the registration form. The user fills the
form and Click the save button to save the record. During this interaction there could be some
alternate conditions like, if the user forgets to fill required fields then the system displays fill the
form correctly message and the user may insert inappropriate data types while filling the form
When the user is done registering up on exit the system saves the information into a database and
Displays success message.
Scenario: Log in
Police officer, prosecutor, judge, attorney or suspect and the CRTS admin must always first login
for security purposes. In order for all users to login to the system users must have an internet
23
Criminal Registration and Tracking System
connection and navigate to the systems domain name also the user must have a valid username
and password, and must log in with their own username and password which gets recognized by
the system.
For all users to log in to the system the system displays the login form including username and
password form. Then the user fills the form and click the login button after that the user logs into
the system. If the user fills the form incorrectly then the system will generate an error message.
Once the entry conditions are met the user logs in to the system by entering username and
password and clicks the login button. The system identifies who logged in and also display the
service depend on their privilege. User clicks on fill the form button after that the system will
display different forms based on their privileges. So The user can fill the forms. If user fills the
form incorrectly then the system will generate an error message. Up on exit the system saves and
exit.
After the users fulfill the entry conditions the police officer, prosecutor, lawyer and judge logs in
by inserting username and password and click the login button. After a successful authentication
the users search a criminal by their full name. The system provides a list of valid names. The
user clicks on the detail button then the system shows all information about the individual. User
selects update and edits the chosen entries. After that user clicks on the save button then the
system provides a successful message. Some alternate cases like, the user inserting an incorrect
username or password or the criminal record the user searched may not exist, could happen.
Upon exiting the system saves all changes and redirects to the search page
24
Criminal Registration and Tracking System
After getting to the systems homepage the users click on the statistics button then the system
redirects to the appropriate page. On that page the users search the location they want the
information about using the search form. The system provide available information about the
chosen location. After that the user saves provided data if needed. But there might not be any
data about the location the user searched.
If the entry conditions are met user logs in using the provided username and password then
system redirects to a page that only shows detailed information about the user with that username
user clicks Done button after reviewing the record. There could be other cases like the suspect/
lawyer may not have an authentic username or password or the username and password may
have expired.
If the users fulfil the entry conditions and the record is authorized to be updated to update the
record user logs in using the provided username and password then system redirects to a page
that only shows detailed information about the user with that username. User selects the update
button and edits chosen fields. User clicks Done button. In some cases the suspect/lawyer may
not have an authentic username or password, The username and password may have expired or
the file could be locked not to be updated. Upon exiting the system update data then redirects to
the home page.
25
Criminal Registration and Tracking System
will have an effect larger than the sum of the separate elements combined. The use case should
contain all system activities that have significance to the users. A use case can be thought of as a
collection of possible scenarios related to a particular goal, indeed, the use case and goal are
sometimes considered to be synonymous.
Name: Prosecutor
Description: a person who represents the government in front of the court.
Role: Follows the status of the investigation, investigates with the investigator in charge of the
case, validate the case file and pass it to the office of court file management.
Name: Judge
Description: A person in charge of analyzing the case with respect to the criminal code and pass
the final verdict.
Role: get new validated case files from the file management office, record the final result and
return to the file management office.
26
Criminal Registration and Tracking System
Name: Lawyer
Description: A person who represents the suspect and stand inside the courtroom.
Role: Access the case file, read and update the file.
27
Criminal Registration and Tracking System
28
Criminal Registration and Tracking System
29
Criminal Registration and Tracking System
Description 1
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
The crime might be a false claim.
Description 2
30
Criminal Registration and Tracking System
Alternative flow of events If the user enters wrong password or user name the system
will display error message.
If the user makes an error the system will display an
appropriate error message.
Description 3
31
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 4
32
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 5
Use case description Provide statistics about crime type and aria.
33
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 6
34
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 7
Use case description Suspect/lawyer add supporting file to the case the suspect is
accused of.
35
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 8
36
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
Description 9
Use case description Court registrar and prosecutor approve or disqualify based
on criminal law of the country.
37
Criminal Registration and Tracking System
Alternative flow of events If the user makes an error the system will display an
appropriate error message.
38
Criminal Registration and Tracking System
ValidateEmail() password
39
Criminal Registration and Tracking System
40
Criminal Registration and Tracking System
Class diagrams offer a number of benefits for any organization. We use UML class diagrams to:
➢ Illustrate data models for information systems, no matter how simple or complex.
➢ Better understand the general overview of the schematics of an application.
➢ Visually express any specific needs of a system and disseminate that information
throughout the business.
41
Criminal Registration and Tracking System
➢ Create detailed charts that highlight any specific code needed to be programmed and
implemented to the described structure.
➢ Provide an implementation-independent description of types used in a system that are
later passed between its components.
42
Criminal Registration and Tracking System
43
Criminal Registration and Tracking System
44
Criminal Registration and Tracking System
45
Criminal Registration and Tracking System
46
Criminal Registration and Tracking System
47
Criminal Registration and Tracking System
48
Criminal Registration and Tracking System
49
Criminal Registration and Tracking System
50
Criminal Registration and Tracking System
51
Criminal Registration and Tracking System
52
Criminal Registration and Tracking System
53
Criminal Registration and Tracking System
54
Criminal Registration and Tracking System
56
Criminal Registration and Tracking System
57
Criminal Registration and Tracking System
58
Criminal Registration and Tracking System
Chapter 4
4.1. Overview
This is the System Design document for the Criminal Registration and Tracking System. The
document includes the design goals, the proposed system Design, and the object design.
59
Criminal Registration and Tracking System
60
Criminal Registration and Tracking System
1 End User
2 Performance
3 Dependability
4 Maintenance
61
Criminal Registration and Tracking System
62
Criminal Registration and Tracking System
Police station
63
Criminal Registration and Tracking System
Prosecutor
64
Criminal Registration and Tracking System
Court Registrar
65
Criminal Registration and Tracking System
Investigator
66
Criminal Registration and Tracking System
Judge
67
Criminal Registration and Tracking System
Lawyer
68
Criminal Registration and Tracking System
69
Criminal Registration and Tracking System
70
Criminal Registration and Tracking System
71
Criminal Registration and Tracking System
Key
72
Criminal Registration and Tracking System
73
Criminal Registration and Tracking System
74
Criminal Registration and Tracking System
75
Criminal Registration and Tracking System
76
Criminal Registration and Tracking System
77
Criminal Registration and Tracking System
78
Criminal Registration and Tracking System
79
Criminal Registration and Tracking System
80
Criminal Registration and Tracking System
81
Criminal Registration and Tracking System
Component Description
Authentication Controller
Description: This component is responsible to authenticate users.
Role: Read from user table and check validity of user trying to login.
Page Controller
Description: This component is responsible to manage pages.
Role: Accept page request and provide appropriate pages.
Form Controller
82
Criminal Registration and Tracking System
83
Criminal Registration and Tracking System
84
Criminal Registration and Tracking System
85
Criminal Registration and Tracking System
86
Criminal Registration and Tracking System
office ge()
employe
e)
Lawyer
Civilians View
()
87
Criminal Registration and Tracking System
88
Criminal Registration and Tracking System
4.2.10 Reference
1. http://www.federalpolice.gov.et/web/guest/background-information
2. https://en.wikipedia.org/wiki/Unified_Modeling_Language
3. https://www.tutorialspoint.com
4. https://www.google.com
5. https://www.wikipedia.org/
89