online crime reporting
DESCRIPTION
download & enjoy..:)TRANSCRIPT
-
ONLINE CRIME REPORTING
A PROJECT REPORT
Submitted by
NISHIT TRIVEDI 090570107019
In fulfilment for the award of the degree
of
BACHELOR OF ENGINEERING
in
Computer Engineering
Faculty of Engineering
Marwadi Education Foundations Group of Institutions, Rajkot
Gujarat Technological University, Ahmedabad
May, 2013
-
DECLARATION
I hereby declare that the project entitled Online Crime Reporting submitted in partial
fulfilment for the degree of Bachelor of Engineering in Computer Engineering to
Gujarat Technological University, Ahmedabad, is a bonafide record of the project work
carried out at Faculty of Engineering, Marwadi Education Foundations Group of
Institutions under the supervision of Prof. Nishant Goswami and that no part of the IDP
has been presented earlier for any degree, diploma, associate ship, fellowship or other
similar title of any other university or institution.
Nishit Trivedi
090570107019
-
Faculty of Engineering
Marwadi Education Foundations Group of Institutions, Rajkot
Computer Engineering Department
May, 2013
CERTIFICATE
This is to certify that the project entitled Online Crime Reporting has been
carried out by Nishit Trivedi 090570107019 under my guidance in
fulfilment of the degree of Bachelor of Engineering in Computer Engineering
of Gujarat Technological University, Ahmedabad during the academic year
2012-13.
Date: ____________________
Internal Guide Head of the Department
Prof. Nishant Goswami Prof.Vipul Vekariya
Assistant Professor Head of Department
-
TO WHOMSOEVER IT MAY CONCERN
This is to certify that Nishit Trivedi of Faculty of Engineering, Marwadi
Education Foundations Group of Institutions has worked on an Industry
Defined Project of Tech Securing. The work embodied in this project entitled,
Online Crime Reporting has been carried out in fulfilment for the degree of
Bachelor of Engineering. He has undergone the project for the required period.
During this period we found him sincere, honest and diligent. We wish all success
in his future endeavours.
For Tech Securing
Mr. Mitesh Goswami
Date:
-
Acknowledgement
We are extremely grateful to Dr. Y P Costa, Director, MEFGI and Mr. V M Vekariya,
Head of Department, Department of Computer Engineering, MEFGI for providing all
the required resources for the successful completion of our project.
My heartfelt gratitude to my project guide Mr. Nishant Goswami, Assistant Professor and
project co-ordinator Mr. Hiren Kotadiya, Assistant Professor for his valuable suggestions
and guidance in the preparation of the project report.
We will be failing in duty if we do not acknowledge with grateful thanks to the authors of
the references and other literatures referred to in this project.
I express my thanks to all the Professors and all staff members and friends for all the help
and co-ordination extended in bringing out this project report successfully in time.
Last but not the least; we are very much thankful to my parents who guided me in every
step which we took.
-
Abstract
TECH SECURING was formed to meet the growing needs of small and medium business.
TECH SECURING can provide all the required technology services like web design and
deployment, software deployment database development and management, strategic
planning and project management, etc.
Online Crime Reporting System projects main idea is to implement an automated software
application for maintaining the proper common people complaints of different police
departments. By using this application people who are afraid or dont have enough time to
go police station for complaint about their personal legal issues here they can give their
complaint through online to register any type of complaint.
First people have to register their personal details along with login details using
registration form. Once he/she register in the application, they can post their complaints.
This project has 2 modules, 1) Admin 2) User. Here Police department management has
the admin rights and all common people use the user function to register their issues.
In existing system police department use manual methods for storing data and processing
criminal information which is a time taking process. In this system data is maintained in
the form of records which will cause chances of losing information.
In order to overcome this problem we implement an online application where data is
stored in to database and provide more secured and fast processing method. Initially
different police stations should register with the application and get unique user id and
password. then using station module they can enter entire details in to the system. Admin
will look after maintenance of the system and handle technical issues inside application.
-
Table of Contents
Acknowledgement ............................................................................................................... iv
Abstract ................................................................................................................................ v
1 Introduction ................................................................................................................. 1
1.1 Defination ............................................................................................................. 1
1.2 Purpose .................................................................................................................. 1
1.3 Objective ............................................................................................................... 1
1.4 Scope ..................................................................................................................... 1
1.5 Frontend and Backend .......................................................................................... 2
1.6 Technology and Literature Review ........................................................................ 2
1.7 Function and main module of new system ............................................................ 3
1.7.1 User Module ............................................................................................... 4
1.7.2 Admin Module ........................................................................................... 5
1.7.3 Main Admin Module .................................................................................. 6
2 Project Management ................................................................................................... 8
2.1 Project Plan ............................................................................................................ 8
2.2 Milestone and Deliverables ................................................................................... 9
2.3 Roles and Responsibilities ................................................................................... 10
2.4 Project Scheduling ............................................................................................... 11
3 System Requirements Study ..................................................................................... 12
3.1 User Characteristics ............................................................................................. 12
3.2 Hardware and Software Requirements ................................................................ 12
3.3 Constraints ........................................................................................................... 13
4 System Analysis.......................................................................................................... 14
4.1 Study of Current/Existing System ...................................................................... 14
4.2 Problem and Weakness of Current System ......................................................... 14
4.3 Requirements of New System ............................................................................. 14
4.3.1 User Requirements ................................................................................... 14
4.3.2 System Requirement ................................................................................ 15
-
4.4 Feasibility Study .................................................................................................. 16
5 System Design ............................................................................................................ 18
5.1 Design Methodology ........................................................................................... 18
5.2 Activity Diagram ................................................................................................. 19
5.3 Sequence Diagram ............................................................................................... 22
5.4 Class Diagram...................................................................................................... 25
5.5 Use Case Diagram ............................................................................................... 26
6 System Architecture .................................................................................................. 27
6.1 Types of Architecture .......................................................................................... 27
6.2 Description of roles of each tier........................................................................... 27
7 Implementation .......................................................................................................... 30
7.1 Security Features ................................................................................................. 30
7.2 Coding Standards ................................................................................................. 30
7.2.1 Naming Convention ................................................................................. 30
7.2.2 Label and Comments ............................................................................... 31
7.3 Fuctionality .......................................................................................................... 31
8 Testing ........................................................................................................................ 48
8.1 Testing Strategy ................................................................................................... 48
8.2 Testing Methods .................................................................................................. 49
8.2.1 Teste Cases ............................................................................................... 50
8.2.2 Test Summary .......................................................................................... 53
9 Limitation and Future Enhancement ...................................................................... 54
10 Conclusion .................................................................................................................. 55
Appendix 1: Data Dictionary ............................................................................................ 56
References ........................................................................................................................... 62
-
List of Tables
Table No Table Description Page No
Table 1 Unit Test at User Side 50
Table 2 Unit Test at Admin Side 51
Table 3 Unit Test at Main Admin Side 52
Table 4 Integration Test of all three modules 52
Table 5 Abusing FIR 56
Table 6 Main-Admin Registration 56
Table 7 Criminal Registration Form 57
Table 8 Police Registration Form 57
Table 9 Missing Person FIR 58
Table 10 Police-station Registration Form 59
Table 11 Robbery FIR 59
Table 12 Registration Form 60
Table 13 Feedback Form 61
-
List of Figures
Figure No. Figure Description Page No
Fig. 2(a) Waterfall Model 8
Fig. 2(b) Timeline chart 11
Fig. 5(a) Activity Diagram of Admin Module 19
Fig. 5(b) Activity Diagram of Main-Admin Module 20
Fig. 5(c) Activity Diagram of User Module 21
Fig. 5(d) Sequence Diagram of User Module 22
Fig. 5(e) Sequence Diagram of Admin Module 23
Fig. 5(f) Sequence Diagram of Main-Admin Module 24
Fig. 5(g) Class Diagram 25
Fig. 5(h) Use Case Diagram 26
Fig. 6(a) Server Communication 27
Fig. 6(b) Web Tier and J2EE Application 28
Fig. 6(c) Business and EIS Tiers 29
Fig. 7(a) User-Login Page 31
Fig. 7(b) Registration Form for User 32
Fig. 7(c) Forgot Password Page for User 33
Fig. 7(d) Home Page for User 33
Fig. 7(e) AboutUs 34
Fig. 7(f) ContactUs 35
Fig. 7(g) Search Page for User 36
Fig. 7(h) Criminal Search Record 37
Fig. 7(i) Individual Criminal Search Record 37
-
Fig. 7(j) Police-station Search Record 38
Fig. 7(k) Individual Police-station Search Record 38
Fig. 7(l) Report FIR 39
Fig. 7(m) Reporting Robbery FIR 40
Fig. 7(n) Success Message 40
Fig. 7(o) Reporting Missing person FIR 41
Fig. 7(p) Reporting abuse person FIR 42
Fig. 7(q) NEWS Page 43
Fig. 7(r) Uttar Pradesh with Crime Status 44
Fig. 7(s) User FeedBack Form 44
Fig. 7(t) Criminal Add Form 45
Fig. 7(u) Search Categories Page On Admin Side 45
Fig. 7(v) Add Police on Main-Admin Side 46
Fig. 7(w) Add Police-Station Page On Main-Admin Side 46
Fig. 7(x) Feedback Record At Main-Admin Side 47
Fig. 7(y) User Profile Page 47
-
List of Symbols, Abbreviations and Nomenclature
Symbol Abbreviations
JSP Java Server Pages
FIR First Information Report
HTML Hyper Text Markup Language
DHTML Dynamic Hyper Text Markup Language
XML Extensible Markup Language
RAM Random Access Memory
SQL Structured Query Language
GUI Graphical User Interface
J2EE Java 2 Enterprise Edition
TCP/IP Transmission Control Protocol/Internet Protocol
-
Online Crime Reporting
1
1. Introduction
1.1 Definition
The ONLINE CRIME REPORTING is a web based system to register online
Complaint/FIR. In this system there are mainly three modules: 1) User Module, 2) Admin
Module, & 3) Main Admin Module.
1.2 Purpose
The main purpose for preparing this document is to give a general insight into the analysis
and requirements of the existing system or situation and for determining the operating
characteristics of the system.
This Document plays a vital role in the software development life cycle (SDLC) and it
describes the complete requirement of the system. It is meant for use by the developers and
will be the basic during testing phase. Any changes made to the requirements in the future
will have to go through formal change approval process.
1.3 Objective
The objective of this project is to develop a web-site in which any citizen can report their
FIR. If anybody wants to complaint against crimes he/she must do it through the police.
The Crime Management and Reporting System make the reporting of crime easier. This
project will be also useful for the Police Department. People could only report their
FIR/Complaint and knows whether the FIR reported by them has been accepted.
People can also see the criminal records. So, that they can see the criminal data also they
can use different functionalities of this system like watching different crime videos, using
Google map which is provided in this system people can also locate the nearest police
station.
1.4 Scope
The main scope of this project is to develop an online crime report and managing system
which is easily accessible to the people. This system provides proper security and reduces
-
Online Crime Reporting
2
the manual work. This proposed system tries to eliminate or reduce difficulties up to some
extent. This system will help the user to reduce the workload and mental conflict. It helps
the user to work user friendly and he can easily do his jobs without time lagging.The
advantages are,
Ensure data accuracys
Proper control of the higher authority
Minimize manual data entry
Greater efficiency
Better service
User friendliness and interactive
Minimum time required
Minimum time needed for the various processing
1.5 Front end and Backend
Front End: ONLINE CRIME REPORTING is developed in NetBeans IDE 6.9.1
with the help of JSP.
Back End: The back end database is developed in MySQL 2005 and coding is
developed in J2EE.
1.6 Technology and Literature Review
I chose JSP to do this project. And reason behind to choose this technology is given below:
JSP technology is the Java platform technology for building applications containing
dynamic Web content such as HTML, DHTML and XML. The JSP technology enables the
authoring of Web pages that create dynamic content easily but with maximum power and
flexibility.
The Java Server Pages technology offers a number of advantages:
Write Once, Run Anywhere properties:
The JSP technology is platform independent, both in its dynamic Web pages, its
Web server, and its underlying server components. You can author JSP pages on
-
Online Crime Reporting
3
any platform, run them on any Web server or Web enabled application server, and
access them from any Web browser. You can also build the server components on
any platform and run them on any server.
High quality tool support
The Write Once, Run Anywhere properties of JSP allows the user to choose best-
of-breed tools. Additionally, an explicit goal of the Java Server Pages design is to
enable the creation of high quality portable tools.
Reuse of components and tag libraries
The Java Server Pages technology emphasizes the use of reusable components such
as: JavaBeans components, Enterprise JavaBeans components and tag libraries.
These components can be used in interactive tools for component development and
page composition. This saves considerable development time while giving the
cross-platform power and flexibility of the Java programming language and other
scripting languages.
Separation of dynamic and static content
The Java Server Pages technology enables the separation of static content from
dynamic content that is inserted into the static template. This greatly simplifies the
creation of content. This separation is supported by beans specifically designed for
the interaction with server-side objects.
Support for scripting and actions
The Java Server Pages technology supports scripting elements as well as actions.
Actions permit the encapsulation of useful functionality in a convenient form that
can also be manipulated by tools; scripts provide a mechanism to glue together this
functionality in a per-page manner.
1.7 Functions and main modules of System
Functions
o Login for User, Admin and Main-Admin.
-
Online Crime Reporting
4
o Complaint / FIR registration and management.
o Criminal registration and management.
o Feedback registration
o Map-locator and different crime video management.
o Police-station registration and management
o Police-officer registration and management
In Online Crime Reporting, there are mainly three modules:
1) User Module
2) Admin Module
3) Main-Admin Module
1.7.1 User Module
In this module, first of all User will register with proper data (where username and E-mail
id must be unique for everyone).Once User registered than he/she can login in this system
and register their FIR. If user wants to see the nearest police-station than user can see that
using the map-locator which is provide in this system. Also User can see the criminal
records. Here User can search the different criminal with their name and also search the
police-station using the city name. Here Session is applied on this system. So, once user
logout he/she cannot go back, he/she must have to login first. When user logout, cookie
was also deleted. Here complete flow of User Module and all the functionalities explain
below:
Home
Login
o User Name (if user is already Member)
o Password
o Forget Password
Get an Email
User name and original password of the user will be send to his/her
respective Email ID
New User
o First Name
o Middle Name
-
Online Crime Reporting
5
o Last Name
o Gender
o Birthdate
o Address
o State
o City
o Phone
o Email id
o Username
o Set Password
o Identity Proof(License number/ election card number/ PAN card number)
o Unique number
FIR
o Select FIR type
o Write down FIR in this section
Search
o Using this functionality user can search different criminal by their names
and types and also search the nearest police-station according to city.
Mapping
o Here User can see the Google-map and find the nearest police-station.
Crime report generation
o User can see the graph of crime v/s years.
News Feed
o It gives the latest news to user.
Videos
Contact US
About US
Profile
1.7.2 Admin Module
In this module, first of admin will login with proper email-id and password which is
already registered by Main-Admin. Once admin will login, he/she can see all the FIR
which is registered by users. Also admin can search particular FIR using different
-
Online Crime Reporting
6
parameters. Admin can add criminal information. Here admin cannot update his/her
personal information. Admin can also see the feedback/complaint which is given by users.
Here Session is applied on this system. So, once admin logout he/she cannot go back,
he/she must have to login first. When admin logout, cookie was also deleted. Here
complete flow of admin Module and all the functionalities explain below:
Admin Login
o Admin Name ( admin is already registered by main-admin)
o Password
o Forget Password
Get an Email
Admin Email-id and original password of the admin will be sending to his/her
respective Email ID.
FIR
o Select FIR type
o Search FIR using different parameter like name, date, city, etc.
Criminal
o Using this functionality admin can add criminals and also search them by their
names and types.
Feedback
o Here admin can see all the feedback/complaint which is registered by users.
1.7.3 Main Admin Module
In this module, Main admin will assign police-officer to their respective police-station with
proper data. Here main-admin will assign police-officer or we can give them to email-id
and password and also edit/update their database like if one police-officer will get
promotion than his/her post will be updated. So main-admin will update that police-
officers post. Same way main-admin can register different police-station and also if
police-station shifted from one place to another than main admin will update the database.
Also in this module, session and cookie deleted code is applied. Here complete flow of
main-admin Module and all the functionalities explain below:
Main-admin Login
o Main-admin Name (main-admin is already Member)
-
Online Crime Reporting
7
o Password
Add police-officer and police-station
o Using this functionality main-admin can add police-station and police-officer.
Edit/Update police-officer and police-station
o Using this functionality main-admin can edit/update police-station and police-
officer.
Feedback
o Here admin can see all the feedback/complaint which is registered by users.
-
Online Crime Reporting
8
2. Project Management
2.1 Project Plan
WATER FALL MODEL was being chosen because all requirements were known
beforehand and the objective of our software development is the computerization/
automation of an already existing manual working system.
Fig 2(a) Waterfall Model
-
Online Crime Reporting
9
Reasons to choose waterfall model are:
1) Waterfall model is simple to implement and also the amount of resources required for it
are minimal.
2) In this model, output is generated after each stage (as seen before), therefore it has high
visibility. The client and project manager gets a feel that there is considerable progress.
3) Project management, both at internal level and client's level, is easy again because of
visible outputs after each phase. Deadlines can be set for the completion of each phase and
evaluation can be done from time to time, to check if project is going as per milestones.
4) This methodology is significantly better than the haphazard approach to develop
software. It provides a template into which methods of analysis, design, coding, testing and
maintenance can be placed.
5) This methodology is preferred in projects where quality is more important as compared
to schedule or cost.
2.2 Milestones and Deliverables
Milestones
o Analysis & requirement gathering.
o Learning all the stuff which required to completing this project.
o Designing UI.
o Designing Database.
o Coding.
o Testing.
Deliverables
o Software Requirement Specification.
The SRS document states in precise in explicit language those functions and
capabilities a software system must provide. Also states any required
constraints by which the system must abide. It contains all the necessary
-
Online Crime Reporting
10
functional and non-functional requirements of the application. SRS
accomplishes four major goals:
1. It provides feedback to the customers
2. It decomposes the problems into different component parts
3. It serves as an input to the design specification.
4. It serves as a product validation check.
5. The SRS document contains all diagrams (use cases, sequence, activity
and class), functional and non-functional requirements for the website.
o Software Project Management Plan.
Software project management is the art and science of planning and leading
software projects. It is a sub-discipline of project management in which
software projects are planned, monitored and controlled. Listing the details
of the major functions, project resources, staff representations and
scheduling.
o Analysis and design of the Website.
Containing the design issues and the UI diagrams. The design issues for any
web application are:
1. Page load efficiency.
2. Simplicity.
3. Use the space wisely.
o Project Report.
A full project report, enlightening about the details of the project.
o Working Website.
A fully functional website at the end of the year.
2.3 Roles and Responsibilities
Here in this project, I am only one person to do all the roles. So like requirement gathering,
design, coding, implementation, testing, etc. roles done by me.
-
Online Crime Reporting
11
2.4 Project Scheduling
Fig 2(b) Timeline chart
-
Online Crime Reporting
12
3. System Requirements Study
3.1 User Characteristics
User should be familiar with following:
Working on a website
Using a browser like navigating through the links
Searching the required information
User should know that how to search any police-station and criminal.
User should know that how to register any FIR.
Admin should be familiar with following:
Working on a website
Using a browser like navigating through the links
Searching the required information
Admin should know that how to search particular stuff.
Admin should know that how to register any criminal.
3.2 Hardware & Software Requirements
At User Side:
o Minimum RAM: 512 MB. Recommended RAM: 1 GB DDR2
o Internet: 2G Plan or above, bandwidth with at least 256 kbps.
o Minimum Processor: 1.80 GHz P IV. Recommended Processor: 2.10 GHz Dual
Core.
At Admin / Main-Admin Side:
o Minimum RAM: 2 GB. Recommended RAM: 4 GB DDR3
o Internet: 2G Plan or above, bandwidth with at least 1 mbps or above.
o Minimum Processor: 2.20 GHz P IV. Recommended Processor: 3.10 GHz
Core2Duo.
-
Online Crime Reporting
13
3.3 Constraints
My SQL Server
For efficient function of the system; minimum 4 GB(DDR3) of RAM is required at
Server Side
The application is not multi-lingual.
Only one administrative control is given; not distributed
For full working Online Crime reporting requires Internet and Intranet Connection.
-
Online Crime Reporting
14
4. System Analysis
4.1 Study of Current/Existing System
In the existing crime management system, most of the operations are done manually like
sending complaints, taking actions against crimes, viewing status etc. So with the existing
system if anybody wants to complaint against crimes he must do it through the police.
Also in general people in India are afraid to give a complaint in police station because they
are filled with a false fear about the police department.
If we are doing the system manually, so many minor errors will occur. Error detection in
the previous entries made and data cross verification is another important function. These
are done manually, and it would take time. The existing system has more workload for the
authorized person.
4.2 Problem and Weaknesses of Current System
Lack of security for data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
Not very user friendly.
Sometimes the complaints may be ignored by the police.
Damage of machines due to lack of attention.
No direct role for the higher officials.
4.3 Requirements of New System
4.3.1 User Requirements
The following should be taken care of while designing the user interfaces
The design or layout of every form will be very clear and very interactive to the
user.
-
Online Crime Reporting
15
When the user open the software the welcome window will appear.
In the login window the user can easily entered the desired password and login
name.
Then it will give the successfully login message.
From each and every window the user can easily go to any desired window that is
there is will be a absolute and relative linking.
There will be a proper collection of GUI interface, which will provide better look
and feel.
In the screen layout the background color is very light and the graphics and font
style will be in proper manner and well organized.
In each and every window there will be alert, confirm etc message box for
displaying message.
The user will be able to search any data from the record by using proper guideline
shown in the window & Linux.
User can easily save its data in to the database and update as their need.
This software will be easily understandable and operable by the user.
4.3.2 System Requirements
4.3.2.1 Hardware Requirements
Processor : Pentium 4 (P4) / AMD Athlon
RAM : 512 MB
Hard Disk : 20 GB
FDD : 1.44 MB
Keyboard : 108 Keys
Mouse : 3 Button scroll
Monitor : VGA/SVGA 14 inch
CD Drive : 52 X
4.3.2.2 Software Requirements
OS : Any
Language : java 2(EJB2.0, JDBC, JSP, Servlet, Java Mail)
Front End : HTML, JavaScript
-
Online Crime Reporting
16
Back End : MySQL
Platform : J2EE
Web Server : Tomcat 5.0
Browser : Any
4.3.2.3 Communications Interfaces
Following communication interfaces are used in system and data is actually transmitted
through physical layer of OSI Layers. IPv4 will be used for connection.
Web Browser : Any HTTP supported web browser like IE, Firefox, etc.
Protocol : HTTP and TCP/IP
4.4 Feasibility Study
Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study
lets the developer foresee the future of the project and the usefulness. A feasibility study of
a system proposal is according to its workability, which is the impact on the organization,
ability to meet their user needs and effective use of resources.
The document provide the feasibility of the project that is being designed and lists various
areas that were considered very carefully during
The feasibility study of this project such as technical, economic and operational
feasibilities. The following are its features:
A. TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment of this
feasibility must be based on an outline design of the system requirement in the terms of
input, output, programs and procedures. Having identified an outline system, the
investigation must go on to suggest the type of equipment, required method developing the
system, of running the system once it has been designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the suggested one?
Can the system expand if developed?
-
Online Crime Reporting
17
The project should be developed such that the necessary functions and performance are
achieved within the constraints. The project is developed within latest technology. Through
the technology may become obsolete after some period of time, due to the fact that never
version of same software supports older versions, the system may still be used. So there are
minimal constraints involved with this project. The system has been developed using Java
the project is technically feasible for development.
B. ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to ensure that effort is
concentrated on project, which will give best, return at the earliest. One of the factors,
which affect the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary
investigation:
The costs conduct a full system investigation.
The cost of the hardware and software.
The benefits in the form of reduced costs or fewer costly errors.
Since the system is developed as part of project work, there is no manual cost to spend for
the proposed system. Also all the resources are already available, it give an indication of the
system is economically possible for development.
C. BEHAVIORAL FEASIBILITY
This includes the following questions:
Is there sufficient support for the users?
Will the proposed system cause harm?
The project would be beneficial because it satisfies the objectives when developed and
installed. All behavioural aspects are considered carefully and conclude that the project is
behaviourally feasible.
-
Online Crime Reporting
18
5. System Design
5.1 Design Methodology
Here in this project, I used WATER FALL MODEL to complete this project. The waterfall
model is a sequential design process, often used in software development processes, in
which progress is seen as flowing steadily downwards (like a waterfall) through the phases
of Conception, Initiation, Analysis, Design, Construction, Testing, Production/
Implementation, and Maintenance.
It states that the phases are organized in a linear manner. There are variations of the
waterfall model depending on the nature of activities and the flow of control between them.
In a typical model, a project begins with feasibility analysis. On successfully demonstrating
the feasibility of a project, the requirement analysis and project planning begins. The
design starts after the requirements analysis is complete, and coding begins after the design
is complete. Once the programming is completed, the code is installed.
After this, the regular operation and maintenance of the system takes place. With the
waterfall model, the sequence of activities performed in a software development project is:
requirement analysis, project planning, system design, detailed design, coding and unit
testing, system integration and testing. There are two basic assumptions for justifying the
linear ordering of phases in the manner proposed by the waterfall mode.
The various phases in this model are:
Conception
Initiation
Analysis
Design
Construction
Testing
Deployment
-
Online Crime Reporting
19
5.2 Activity Diagram
5.2.1 Activity diagram of Admin
Admin
Login
Select FIR type
View details
Do process
Search Police-Officer's
details
Search Criminal's
details
Search Police-Station's
details
Logout
View details
Add Criminal
Save
Fig 5(a) Activity diagram of Admin module
-
Online Crime Reporting
20
5.2.2 Activity diagram of Main-Admin
Main-Admin
Login
Add / Edit Police-
Officer's details
Save
Add / Edit Police-
station's details
Logout
Fig 5(b) Activity diagram of Main-Admin module
-
Online Crime Reporting
21
5.2.3 Activity diagram of User
User
Login
Select FIR type
Give details
Save
Watch Videos
Search Criminal's detailsSearch Police-Station's
details
Logout
View details
Show Map Show / Edit Profile
Show Graph
Fig 5(c) Activity diagram of User module
-
Online Crime Reporting
22
5.3 Sequence Diagram
5.3.1 Sequence diagram of User
User System Database
LoginVerify
ResponseLogin successful
Register
complaint complaint stored
Police Officer
gives approx.
time duration
Response
gives unique ID
Feedback Feedback
stored
ResponseResponse
Search Criminal Request
ResponseResponse
Search Police-
stationRequest
ResponseResponse
Watch videos /
MapsRequest
Response
Response
Logout
Logout
successful
Fig 5(d) Sequence diagram of User module
-
Online Crime Reporting
23
5.3.2 Sequence diagram of Admin
Police Officer System Database
LoginVerify
ResponseLogin successful
Select FIR type Request
ResponseShow all FIR
Logout
Logout
successful
Search
Individual FIRRequest
ResponseDisplay FIR
details
Add Criminal
Request
ResponseCriminal's detail
stored
successfully
Search Police/
Police-stationRequest
ResponseShow detail
Fig 5(e) Sequence diagram of Admin module
-
Online Crime Reporting
24
5.3.2 Sequence diagram of Main-Admin
Main-Admin System Database
LoginVerify
ResponseLogin successful
Add/Edit
Police-officer's
detailsdetail's stored
ResponseDetails stored
successfully
Add/Edit
Police-station's
details
Detail stored
Response
Show Request
Responseall feedback
Logout
Logout
successful
Details stored
successfully
Fig 5(f) Sequence diagram of Main-Admin module
-
Online Crime Reporting
25
5.4 Class Diagram
User
First Name
Middle Name
Last Name
Gender
Birth Date
Address
State
City
Phone
E-mail Id
User Name
Password
Identity Proof
Unique Number
Register FIR
Register Feedback
Update Profile
Show Video
See map
Main-admin
Admin name
Password
Add Police Details
Edit Police Details
Add Police-station Details
Edit Police-Station Details
See Feedback
Police-officer(admin)
Admin name
Password
Add Criminal
Search FIR
Search Police-station
Abusing FIR
AbuseId
Report's First name
Report's Phone No.
Abuse First Name
Abuse Last Name
Address
State
City
Religion
Abused by
Reason
Missing FIR
MissingId
Missing Person's Details
Reporter's First Name
Reporter's Phone No
Robbery FIR
RobberyId
Date
Place
Suspact
Robbed things
Police Station
Police-station Id
Center code
Name
State
city
Phone No.
FeedBack
User Id
Subject
Description
1
*
1
*
*
*
*
*
*
*
*
*
1
*
1
*
1
*
Fig 5(g) Class Diagram
-
Online Crime Reporting
26
5.5 Use Case Diagram
Login
Registration
Register FIR / Feedback
View FIR
View Map / Video
Search Police
Station
Add criminal
Logout
User
Main
Admin
Police-
officer
(admin)
View Criminal
Detail
Add / Edit Police-
Officer
Add / Edit Police-
Station
FeedBack
Search Police-
Officer
Fig 5(h) Use Case Diagram
-
Online Crime Reporting
27
6. System Architecture
6.1 Types of Architecture
There are mainly three types of architecture which are mostly used at present.
1) Two Tier architecture
2) Three Tier architecture
3) Four Tier architecture
6.2 Description of roles of each tier
Here in this system, I used three tier architecture. The client communicates with the
business tier running on the J2EE server either directly or, as in the case of a client running
in a browser, by going through JSP pages or servlets running in the Web tier. J2EE
application uses a thin browser-based client or thick application client. In deciding which
one to use, you should be aware of the trade-offs between keeping functionality on the
client and close to the user (thick client) and off-loading as much functionality as possible
to the server (thin client). The more functionality you off-load to the server, the easier it is
to distribute, deploy, and manage the application; however, keeping more functionality on
the client can make for a better perceived user experience.
Fig 6(a) Server Communications
-
Online Crime Reporting
28
Web Components
J2EE Web components can be either servlets or JSP pages. Servlets are Java
programming language classes that dynamically process requests and construct
responses. JSP pages are text-based documents that execute as servlets but allow a
more natural approach to creating static content. Static HTML pages and applets are
bundled with Web components during application assembly, but are not considered
Web components by the J2EE specification. Server-side utility classes can also be
bundled with Web components and, like HTML pages, are not considered Web
components. Like the client tier and as shown in Fig 6(b), the Web tier might
include a JavaBeans component to manage the user input and send that input to
enterprise beans running in the business tier for processing.
Fig 6(b) Web Tier and J2EE Application
Business Components
Business code, which is logic that solves or meets the needs of a particular business
domain such as banking, retail, or finance, is handled by enterprise beans running in
the business tier. An enterprise bean also retrieves data from storage, processes it (if
necessary), and sends it back to the client program.
-
Online Crime Reporting
29
There are three kinds of enterprise beans: session beans, entity beans, and message-
driven beans. A session bean represents a transient conversation with a client. When
the client finishes executing, the session bean and its data are gone. In contrast, an
entity bean represents persistent data stored in one row of a database table. If the
client terminates or if the server shuts down, the underlying services ensure that the
entity bean data is saved. A message-driven bean combines features of a session
bean and a Java Message Service (JMS) message listener, allowing a business
component to receive JMS messages asynchronously. This tutorial describes entity
beans and session beans.
Fig 6(c) Business and EIS Tiers
Enterprise Information System Tier
The enterprise information system tier handles enterprise information system
software and includes enterprise infrastructure systems such as enterprise resource
planning (ERP), mainframe transaction processing, database systems, and other
legacy information systems. J2EE application components might need access to
enterprise information systems for database connectivity.
-
Online Crime Reporting
30
7. Implementation
7.1 Security Features
As the system will run on browser, the following security requirement will be fulfilling.
The system will use session Identifier to identify the user.
The system will maintain the cookie on client side.
Session will be maintain in such a way that user cannot log-in for same account in
different browser at same time.
The secure connection will be used to provide the security.
Cookie will not contain any information like user password.
Cookie will also not contain any confidential data on client side.
Web browser will never display the user password.
The system front end will access by the general user while the back end will be
access by the administration only.
For user security, if user forgot password than original password will be sent to the
users email-id with username.
7.2 Coding Standards
The purpose of code is to facilitate the identification, retrieval of the items and information.
A code is an oriented collection of symbols design to provide unique identification of an
entry or attribute. Code is built with manually exclusive features. Codes in all cases specify
object which are physical or on performance characteristics. They are used to give optimal
distraction and other information. Codes are used for identifying, accessing, storing and
matching records. The codes insure that only one value of the code with a single meaning
is correctly applied to give entity or attribute as described in various ways. Code can also
be design in a manner easily understood and applied by the user.
This coding standard includes naming conversions of variables, constants and objects,
standardized formats or labelling and commenting code, spacing, formatting and indenting.
7.2.1 Naming Convention
Classes names and interface names are meaning full so anyone can easily understand this.
The function names will start with small letters.
-
Online Crime Reporting
31
7.2.2 Labels and Comments
Sufficient labels and comments are included in the description of it for the benefits if the
developer and other programmers who might examine or modified it later.
7.3 Functionalities
Fig 7(a) User-Login Page
-
Online Crime Reporting
32
Fig 7(b) Registration Form for User
-
Online Crime Reporting
33
Fig 7(c) Forgot Password Page for User
Fig 7(d) Home Page of User
-
Online Crime Reporting
34
Fig 7(e) AboutUs
-
Online Crime Reporting
35
Fig 7(f) ContactUs
-
Online Crime Reporting
36
Fig 7(g) Search Page for User
-
Online Crime Reporting
37
Fig 7(h) Criminal Search Record
Fig 7(i) Individual Criminal Search Record
-
Online Crime Reporting
38
Fig 7(j) Police-station Search Record
Fig 7(k) Individual Police-station Search Record
-
Online Crime Reporting
39
Fig 7(l) Report FIR
-
Online Crime Reporting
40
Fig 7(m) Reporting Robbery FIR
Fig 7(n) Success Message
-
Online Crime Reporting
41
Fig 7(o) Reporting Missing person FIR
-
Online Crime Reporting
42
Fig 7(p) Reporting abuse person FIR
-
Online Crime Reporting
43
Fig 7(q) News Page
-
Online Crime Reporting
44
Fig 7(r) Uttar Pradesh Map with Crime Status
Fig 7(s) User FeedBack Form
-
Online Crime Reporting
45
Fig 7(t) Criminal Add Form
Fig 7(u) Search Categories Page On Admin Side
-
Online Crime Reporting
46
Fig 7(v) Add Police Page On Main-Admin Side
Fig 7(w) Add Police-Station Page On Main-Admin Side
-
Online Crime Reporting
47
Fig 7(y) FeedBack Record At Main-Admin Side
Fig 7(y) User Profile Page
-
Online Crime Reporting
48
8. Testing
Testing is the process of executing the program to find if there are any errors. It is the final
verification and validation activity .In testing phase we have tried to affirm the quality of
the product. We have also tried to eliminate errors in the previous stages.
8.1 Testing Strategy
Unit Testing
Unit test comprises of a set tests performed by an individual program prior to the
integration of the unit into large system. A program unit is usually the smallest free
functioning part of the whole system. Module unit testing should be as exhaustive
as possible to ensure that each representation handled by each module has been
tested. All the units that makeup the system must be tested independently to ensure
that they work as required. During unit testing some errors were raised and all of
them were rectified and handled well. The result was quiet satisfactory and it
worked well.
Integration Testing
Integration testing is a system technique for constructing the program structure
while at the same time conducting tests to uncover errors associated with
interfacing. The objective is to take unit tested modules and build a program
structure that has been dictated by design. Bottom-up integration is the traditional
strategy used to integrate the components of a software system into functioning
whole. Bottom-up integration consists of unit test followed by testing of the entire
system. A sub-system consists of several modules that communicated with other
defined interface.
The system was done the integration testing. All the modules were tested for their
compatibility with other modules .They test was almost successful. All the modules
coexisted very well, with almost no bugs. All the modules were encapsulated very
well so as to not hamper the execution of other modules.
-
Online Crime Reporting
49
Validation Testing
After validation testing, software is completely assembled as a package, interfacing
errors that have been uncovered and corrected and the final series of software test;
the validation test begins. Steps taken during software design and testing can
greatly improve the probability of successful integration in the larger system.
System testing is actually a series of different tests whose primary purpose is to
fully exercise the compute based system.
Recovery Testing
It is a system that forces the software to fail in a variety of ways and verifies that the
recovery is properly performed.
Security Testing
It attempts to verify that protection mechanisms built into a system will in fact
protect it from improper penetration. The systems security must of course be tested
from in vulnerability form frontal attack.
Black Box Testing
Black box testing is done to find out the following information as shown in below:
o Incorrect or missing functions.
o Interface errors.
o Errors or database access.
o Performance error.
o Termination error.
The mentioned testing is carried out successfully for this application according to
the users requirement specification.
Test Data Output
After preparing test data, the system under study is tested using the test data. While
testing the system using test data, errors are again uncovered and corrected by using
above testing and corrections are also noted for future use.
-
Online Crime Reporting
50
8.2 Testing Methods
I used two types of testing methods:
1) Unit testing &
2) Integration Testing.
8.2.1.1 Unit Testing
User Module
Table 1: Unit test at User side
No Unit Input Expected
Output
Obtained
Output
Status Remedies
1 Registration Give all the
details
Check with
database for
duplication
Details
inserted
Success Username,
Email-id,
UniqueNo
must be
UNIQUE.
2 Login User Name
and
Password
Check with
database for
their relevance
and redirect to
the home page.
Database is verified and application
redirected to admin home
page
Success
3 Robbery
FIR
Date, Place,
robed thing,
suspect
Insert into
database
Data inserted
into database
Success
4 Missing
FIR
Missing
persons
details,
reporters
details
Inserted into
database
Data inserted
into database
Success Reporters
Phone
number
must be on
working
mode
5 Abusing
FIR
Abused
person
details,
reason
Inserted into
database
Data inserted
into database
Success
6 Feedback Feedback
persons
details,
subject,
description
Inserted into
database
Data inserted
into database
Success Person
name is
compulsory
-
Online Crime Reporting
51
Admin Module
Table 2: Unit test at Admin side
No Unit Input Expected
Output
Obtained
Output
Status Remedies
1 Add
Criminal
Name,
Type, City,
State,
Nationality
Inserted into
database
Data inserted
into database
Success Criminal
name and
type is
compulsory
2 Show
different
FIR reports
Select FIR
type
FIR record will
show
FIR record
showed.
Success
3 Search FIR Enter value
according to
different
search
Show
particular FIR
according to
search
parameter
Particular
FIR showed.
Success Entered
value must
be there in
database.
-
Online Crime Reporting
52
Main-Admin Module
Table 3: Unit test at Main-Admin side
No Unit Input Expected
Output
Obtained
Output
Status Remedies
1 Add Police-
officer
Full name,
post, state,
city, phone
no, email-id
Insert into
database
Data inserted
into database
Success
2 Edit Police-
officer
Select
police-id
and change
details
Update
database
Data updated
into database
Success Police-id
must be
there into
database
3 Add Police-
station
Name,
center code,
state, city,
phone,
address
Insert into
database
Data inserted
into database
Success
4 Edit Police-
station
Select
police-
station id
and change
details
Update
database
Data updated
into database
Success Police-
station id
must be
there into
database
5 Show
feedback
Select
feedback
field
Feedback table
show
Feedback
table showed
Success
8.2.1.2 Integration Testing
Table 4: Integration test of all three modules
No Unit Input Expected
Output
Obtained
Output
Status Remedies
1 User
Module
Register
FIR
Insert FIR FIR inserted Success
2 Admin
Module
Select FIR
type or add
criminal
FIR record
show or
criminal insert
FIR record
showed or
criminal
details
inserted
Success
3 Main-
Admin
Module
Add/ edit
police or
police-
station
Insert/update
database
Database
inserted/
updated
Success
-
Online Crime Reporting
53
8.2.2 Test Summary
Developer will test all the above tests after every 7-10 days at starting of this system. Here
after 1 year developer will test the entire above test once in a month because after 1 year
system will stable and easily handle and more error free.
-
Online Crime Reporting
54
9. Limitation and Future Enhancement
Limitation
o The size of the database increases day-by-day, increasing the load on the
database. At present there is no back up and data maintenance activity.
o Training for simple computer operations is necessary for the users working on
the system.
Future Enhancement
Nothing can be ended in a single step. It is the fact that nothing is permanent in this
world. So this project also has some future enhancements in the evergreen and
booming IT industry. Change is inevitable. The project entitled Online Crime
Reporting was successfully designed developed and tested. The system and the
architecture is a compatible one, so addition of new modules can be done without
much difficulty. Since this module has its unique properties it can extend further to
make this system a complete one.
o We look forward to working with the Government in implementing the
recommendations and seeing an improvement in the effectiveness of the Police
Department.
o Assign each case to particular officer and other details are user will show.
o The method of video conferencing can be added to make the project livelier.
o Users can view the progress of their complaint online.
o By the future technology user can view the case details and progress of the
complaints on their mobile phones.
o Back up will automatically generated every 24 hours.
-
Online Crime Reporting
55
10. Conclusion
The project titled as Online Crime Reporting is a web based application. This software
provides facility for reporting online crimes, complaints, missing persons, show criminal
details. This software is developed with scalability in mind. Additional modules can be
easily added when necessary. The software is developed with modular approach. All
modules in the system have been tested with valid data and invalid data and everything
work successfully. Thus the system has fulfilled all the objectives identified and is able to
replace the existing system.
The project has been completed successfully with the maximum satisfaction of the
organization. The constraints are met and overcome successfully. The system is designed
as like it was decided in the design phase. The project gives good idea on developing a full-
fledged application satisfying the user requirements.
The system is very flexible and versatile. This software has a user-friendly screen that
enables the user to use without any inconvenience. Validation checks induced have greatly
reduced errors. Provisions have been made to upgrade the software. The application has
been tested with live data and has provided a successful result. Hence the software has
proved to work efficiently.
-
Online Crime Reporting
56
Appendix 1: Data Dictionary
abusingform
Table 5: Abusing FIR
Column Name Data Type Length Extra
abuseid int 6 Auto_Increament, Primary Key
reportfname varchar 20 -
reportphone int 10 -
abusefname varchar 20 -
abuselname varchar 20 -
abuseaddress varchar 50 -
abusestate varchar 20 -
abusecity varchar 20 -
abusereligion varchar 20 -
abusedby varchar 20 -
abusereason varchar 50 -
adminreg
Table 6: Main-Admin Registration
Column Name Data Type Length Extra
adminName varchar 8 Primary Key
adminPass varchar 10 -
-
Online Crime Reporting
57
criminalform
Table 7: Criminal Registration Form
Column Name Data Type Length Extra
criminalid int 6 Auto_Increament, Primary Key
cfname varchar 20 -
cmname varchar 20 -
clname varchar 20 -
cgender varchar 20 -
cbdate varchar 20 -
cnationality varchar 20 -
crimetype varchar 20 -
policeform
Table 8: Police Registration Form
Column Name Data Type Length Extra
policeid int 6 Auto_Increament, Primary Key
pfname varchar 20 -
plname varchar 20 -
pstate varchar 20 -
pcity varchar 20 -
pphone varchar 20 -
pemail varchar 20 Unique Key
ppassword varchar 20 -
ppost varchar 20 -
-
Online Crime Reporting
58
kidnappedform
Table 9: Missing Person FIR
Column Name Data Type Length Extra
missingid int 6 Auto_Increament, primary key
missingfname varchar 20 -
missingmname varchar 20 -
missinglname varchar 20 -
missinggender varchar 20 -
reportfname varchar 20 -
reportphone varchar 20 -
relationmissing varchar 20 -
missingage varchar 20 -
missingdate varchar 20 -
missingfromaddress varchar 20 -
missingaddress varchar 20 -
missingstate varchar 20 -
missingcity varchar 20 -
missingphone varchar 20 -
missingoccupation varchar 20 -
missingheight varchar 20 -
-
Online Crime Reporting
59
policestattionform
Table 10: Police-station Registration Form
Column Name Data Type Length Extra
policestationid int 6 Auto_Increament, Primary Key
pstationcentercode varchar 11 -
pstationname varchar 20 -
pstationaddress varchar 20 -
pstationstate varchar 20 -
pstationcity varchar 20 -
pstationcity varchar 20 -
robberyform
Table 11: Robbery FIR
Column Name Data Type Length Extra
robid int 6 Auto_Increament, Primary Key
robdate varchar 20 -
robplace varchar 20 -
robsuspect varchar 20 -
robthings varchar 200 -
-
Online Crime Reporting
60
registrationform
Table 12: Registration Form
Column Name Data Type Length Extra
userid int 6 Auto_Increament, Primary Key
ufname varchar 20 -
umname varchar 20 -
ulname varchar 20 -
ugender varchar 6 -
ubdate varchar 20 -
uaddress varchar 100 -
ustate varchar 20 -
ucity varchar 20 -
uphone int 10 -
uemail varchar 30 Unique Key
username varchar 20 Unique Key
password varchar 20 -
uidproof varchar 20 -
Uniquenum varchar 13 Unique Key
-
Online Crime Reporting
61
visitedfeedbackform
Table 13: Feedback Form
Column Name Data Type Length Extra
vfname varchar 20 -
vmname varchar 20 -
vlname varchar 20 -
vgender varchar 20 -
vphone varchar 20 -
vemail varchar 30 -
vsubject varchar 20 -
vfeedback varchar 500 -
-
Online Crime Reporting
62
References
Books:
o Charles Hampfed (2000)-Instant Java Server Pages-University of Toronto
o Elmasri Navathe-Fundamentals of database systems
o Herbert Schildt (2000)-Java Complete Reference- Tata McGraw Hill
o Jamie Jaworsky-J2EE Bible-Techmedia
o Rajeev mall-Software engineering
o Advance Java Technology-Dreamtech
Online Reference:
o www.theserverside.com
o www.java.sun.com
o www.developer.com