cybernetic protector

22
CYBERNETIC PROTECTOR Mamani Bagh G.Bharath B.V.Sai Krishna Presented By, Guided By, Mamatha laxmi

Upload: aryan-ragu

Post on 22-Apr-2015

594 views

Category:

Documents


30 download

TRANSCRIPT

Page 1: Cybernetic Protector

CYBERNETIC PROTECTOR

Mamani BaghG.BharathB.V.Sai Krishna

Presented By, Guided By,

Mamatha laxmi

Page 2: Cybernetic Protector

CONTENTS

Abstract Existing & proposed system Modules System Design System Requirements Conclusion

Page 3: Cybernetic Protector

ABSTRACT

The main objective of this project is to build software which will help Secret Intelligence Agency to solve cases.

The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way.

Page 4: Cybernetic Protector

The following are the disadvantages of current system

Difficulty in maintaining clients schedules. Risk in maintaining witness , evidence

details Doesn’t provide effective communication

between client and chief Doesn’t have proper cryptography for

agents data. Doesn’t show the status of the agents

request.

Page 5: Cybernetic Protector

EXISTING SYSTEM

The existing system is nothing but a manual system, The registration details are maintained in a registry. Current system is a manual, one can maintain their own data and maintaining records of evidences and case details to store the information like users details, availability of cases and evidences secretly. It is very difficult to maintain historical data.

Page 6: Cybernetic Protector

PROPOSED SYSTEM

The proposed system Cybernetics aim is to provide Secret Intelligence Agency a secure way of maintaining their data and their communications. Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way.

Page 7: Cybernetic Protector

It provides facility to check the existing evidences and case and availability of agents.

It gives help about the system on how to use the different features of the system.

It shows the status of case request of a requestor.

Secret intelligence agencies can update/withdraw his case request.

Secret intelligence agencies can view/cancel his case schedule.

Page 8: Cybernetic Protector

MODULES

Admin Citizen Under Cover Agent Secret Intelligence Agency‘s chief Ministry of Defense 

Page 9: Cybernetic Protector

ADMIN

He is the person who maintains the database, data,witness documents and have all rights to add/delete agents ,chief ,ministry

CITIZEN Ability to see Success Stories. Chat assistance from Intelligence Agency. Ability to apply for a job in Secret

Intelligence Agency. Ability to give tips & suggestion

Page 10: Cybernetic Protector

AGENT

Able to view case details. Should be able to encrypt & upload

evidence or data to Data Base. Able to view resources from ministry or

chief. Generate Report. Should be able to view the dynamic

map of anywhere in the world.

Page 11: Cybernetic Protector

SECRET AGENCY’S CHIEF

Chief should be able to create/edit/view Agent’s profile

Appointing of Agent to a particular case. Secure retrieval of evidences received

from Agent. Access to Data Base logs. Should be able to trace Agent’s location

(using IP addresses) Generate Reports

Page 12: Cybernetic Protector

MINISTRY OF DEFENSE

Should be able to send resources to Secret

Page 13: Cybernetic Protector

SYSTEM DESIGN

Class Diagram:

Page 14: Cybernetic Protector

USE CASE DIAGRAM FOR CLIENT AND AGENT

Page 15: Cybernetic Protector

SEQUENCE DIAGRAM FOR CITIZEN

Page 16: Cybernetic Protector

SEQUENCE DIAGRAM FOR AGENT

Page 17: Cybernetic Protector

SEQUENCE DIAGRAM FOR CHIEF

Page 18: Cybernetic Protector

ACTIVITY DIAGRAM FOR AGENT

Page 19: Cybernetic Protector

  SYSTEM REQUIREMENT:

Hardware specifications: Processor : Intel Processor IV RAM : 128 MB Hard disk : 20 GB CD drive : 40 x Samsung Floppy drive : 1.44 MB Monitor : 15’ Samtron color Keyboard : 108 mercury keyboard Mouse : Logitech mouse

Page 20: Cybernetic Protector

SOFTWARE SPECIFICATION:

Operating System : Windows XP/2003 or Linux

User Interface : HTML, CSS Client-side Scripting : JavaScript Programming Language : Java Web Applications : JDBC, Servlets,

JSP Database : My-Sql Server Deployment : Tomcat 6.x

Page 21: Cybernetic Protector

CONCLUSION

The Cybernetic protector is for secret intelligence and it is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the workflow of the requests that come from various departments for clients and evidence and their approvals.

This system gives users to utilize more features like registration ,job search,tips and suggestions. Update/withdraw case details, checking schedule status, cancel agent details schedule, viewing agents, cases etc.

The administrator can make schedule depending upon the request, update/cancel a data that was updated, view agent details evidences, cases and checks the status of agent’s schedule.

Page 22: Cybernetic Protector

Thank Q