Tuesday, February 26, 2019

Criminal Record Management

miserable translate worry bend magnetic disk heed TEAM NAME THE constructorS THE bulky MIND CHALLENGE 2012 unlawful remember wariness SOFTWARE urgency SPECIFICATION Atal Bihari Vajpayee Indian Institute of Information Techno entery and Man epochment, Gwalior, MADHYA PRADESH Team decease Dr. Anurag Shrivastava Members NITIKA IPG-2011-070 HIMANI SHARMA IPG-2011-042 PRIYANKA AGRAWAL IPG-2011-082 Department Information Technology 1 1 THE constructorS THE constructorS State Madhya Pradesh felon temperament MANAGEMENT fell inscribe MANAGEMENT TABLE OF circumscribe 1 Introduction 1. 1 Purpose 1. Scope 1. 3 Definition, Acronyms, and Abbreviations 1. 4 References 1. 5 Tools to be apply 1. 6 Technologies to be used 1. 7 Over spot 2. 0 Over each De hired handion 2. 1 cross steering Perspective 2. 2 Software Interface 2. 3 Hardware Interface 2. 4 Product Function 2. 5 substance abuser Characteristics 2. 6 Constraints 2. 7 computer architecture pattern 2. 8 use Case Model Desc ription 2. 9. 1 build Diagram 2. 9. 2 installment Diagrams 2. 10. 1 ER Diagram 2. 10. 2 Schema 2. 11 Assumptions and Dependencies 3. 0 circumstantial Requirements 3. 1 delectation caTHE constructorS THE constructorS se Reports 2 2 3. 2 Supplementary Requirements flagitious videotape MANAGEMENTCRIMINAL volume MANAGEMENT CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 1 INTRODUCTION practice of law provides safety to citizens. It always remains steady for pick up whatever fell who is a threat for the safety of society. After show uping the fir tree from any citizen, police starts its work and on that basis it arrests the abominables if proofs are be against them. Once the wickeds are arrested, police starts investigation from them. After getting each the proofs against the criminal, it is the duty of the police to present all told the proofs honestly to the court so that the adjust man can get rightfulness punishment.The true and right selective information pr ovided by the people to police serve ups a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with miserable salary scale, facilities of modern technology such as computerized agreement of retentiveness saucers are not provided to police segment which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should likewise be given to police department in order to make up their efficiency and to save their time. 1. 1 Purpose-Purpose of this Project is to implement a CRM ( wretched enrol Management). This is a database system in which police will keep the record of culpables who take in been arrested, to be arrested or escaped. This will help the Police department to manage their records easily. In police system when an incident occurs, a supplicant reports an FIR (First Information Report). Police starts investigation according to law on this FIR. An investigation Officer supervises the investigation process. The main concerning people in the consentient process are Petitioner (The person who files an FIR), Victim, Accused/Criminal, investigation officer. . 2 Scope The Scope of the criminal record management includes- The scope of the CRIMINAL RECORD MANGEMENT involves all the prohibitions & record- data under CRM project and since it is a vastly implicated record by the crime relate department consequently the scope though trammel to be implicated yet. * Meant for 5 divers(prenominal) users 1) toss out Superintendent 2) Police Officers 3) CBI officers 4) Administrator 5) Judge * wholly have their own profiles in CRIMINAL RECORD MANAGEMENT(CRM) Administrators maintains database, backup and restore data time to time. Police officer can appear for criminals history, can direct criminal to an early(a) jail. * CBI officer can look for expand of any criminal. * Judge can look for criminals record, decide criminals puni shment. * Police superintendent records all necessary data intimately a criminal and update databaseTHE constructorS THE constructorS 1. 3 Definitions, Acronyms Abbreviations 1. 3 3 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRM criminal Record management. 2. HTML (Hyper Text Mark-up Language) It is used to defecate static tissue pages. . JSP ( chocolate boniface Pages) It is used to create dynamic web content. 4. J2EE (Java 2 Enterprise Edition) It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java applications. 5. WSAD (Web-Sphere Studio ope ration Developer) It is a decorator toolkit which is designed to develop more complex projects by providing a discern dynamic web service. 6. WASCE (Web-Sphere Application master of ceremonies Community Edition) It is an application emcee that runs and pays the J2EE and the web service applications. . DB2 (IBM Database 2) I t is a database management system that provides a elastic and efficient database platform to raise a strong on lead business applications. 8. HTTP (Hyper Text sell Protocol) It is a transaction oriented lymph node/ server protocol between a web browser and a web server. 9. XML (Extensible Mark-up Language) It is a markup language that was designed to transport and store data. 10. Ajax (Asynchronous Java Script and XML) It is a technique used in java script to create dynamic web pages. 11. Web 2. It is commonly associated with web applications which make haste interactive information sharing, interoperability, user-centred design and collaboration on the World total Web. 12. UML Unified Modelling Language is a standard language for musical composition software blueprints. The UML may be used to visualize, specify, construct and document. 13. RAD keen-sighted Application Developer is a development tool that helps to design web pages and likewise helps to design the diagrams like ER, Database schema diagrams and to generate DDL. 1. 4 References * IBM TGMC Sample synopsis * IBM- www. ibm. in/develeporworks * THE constructorSTHE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Java- www. sun. com * Wikipedia- www. wikipedia. com * Complete Reference-J2EE * 4 4 Object Oriented Modelling and fancy with UML-Michael Blaha, James Ram Baugh. * Software Engineering, Seventh Edition, Ian Somerville. * IBM Red Books. * Database Management Systems Nava the. 1. 5 Tools to be used * ROSE/RSA / Web-Sphere Modeler * Eclipse/ RAD / sacred lotus Forms Designer / Portlet Factory * Web-Sphere Portal/ WAS/ WAS CE / WPS * DB2 Express C or DB2 UDB * Tivoli CDP/TSM / Tivoli Directory emcee * Linux as the preferred OS. 1. Technologies To Be Used * J2EE (Servlet, JSP, JAXP, Java Beans) Application architecture. * JAVA Application architecture. * WASCE (Web-Sphere Application Server Community Edition) Web Server * DB2 IBM Database. * RAD 7. 0 festering to ol 1. 7 Overview- * A master key looking user interface with login IDs for criminals, police officers, superintendents, administrator and judge. * Once recruited all the users access their right to respected functions or actions as enlisted later. * Another constituent of this is the reports generated in response to- a) Registration confirmations. ) Statement of security and privacy. c) Print outs for criminals history. * Functions/actions of 1) Jail Superintendent * Register the bare-ass Criminal. * Record the Crime instance and details of the crime. * Take the information like photo from 3 different view, tide rip group, finger print, retina scan and DNA information. * THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Search Criminal with any of the above input. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Update the radical crime of existing criminal. * 5 5 withstand the current lieu of the criminal (i. . Cell no(prenomi nal) , Jail make believe etc. ) * hold back the records of meeting with outsiders. * Record the data of health condition if any. * Assign works. 2) Police Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Transfer the criminal to another jail. * Access full information of criminals. 3) CBI Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Access full information of criminals. 4) Administrator * Maintain the database. * Grant/Revoke role to/from other Users. * Backup and restore of data. * manage the Jail Administration. ) Judge * Access information of criminals. * THE constructorS THE constructorS Also access information about other Users. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Reduce/Increase the level of punishment. * 6 6 Transfer the criminal to other location. * Constraints a) The content and graphical user interface is in English. b) Login and password is for identific ation. c) The allowed person is allowed to access the database only upto a limited extend. d) This system is limited to HTTP/HTTPS. e) This system is working for single server only. 2. 0 overall Description- 2. 1 Product PerspectiveTHE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 2 Software Interface * leaf node on Internet Web Browser, Operating System (LINUX preferred) * Web Server WASCE, Operating System (LINUX preferred) * Data Base Server CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT DB2, Operating System (LINUX preferred) * Development End RAD (J2EE, Java, Java Bean, Servlets, HTML, XML, AJAX), DB2, OS (LINUX preferred), Web-Sphere(Web Server) 7 7 2. 3 Hardware Interface 2. 3. 1 invitee Side * Browser- Internet Explorer, Mozilla Firefox,NN, * Processor- each(prenominal) Intel or AMD- 1 GHZ Ram- 256 MB * plough space- 100 MB 2. 3. 2 Server Side * For RAD * Processor- All Intel or AMD- 1 GHZ * Ram- 2 GB * Disk space- 5 GB * For DB 10. 12 * Processor- All Intel or AMD- 1 GHZ * Ram- 512 MB * Disk space- 500 MB 2. 4 Product Function-The SIC customer should be running on the client system so as to give chase the account details of the user. The server will only respond to those systems where the client is running THE constructorS THE constructorS 2. 5 User characteristics 1. General Users They will be in a position to permit access to the users in the Internet and certify their account status. 2.Administrators They are the core users and are able to add new users to the system and permit them to access the Internet resources. They can also view in real time what a user is performing right now. They can also get the overall report of the user sessions. 3. Client Users They login at the client level and this is to get access to the Internet at the client level. They can also view their account status in the client system. 2. 6 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Constraints * 8 8 The co ntent and graphical user interface is in English. * Login and password is for identification. The allowed person is allowed to access the database only upto a limited extend. * This system is limited to HTTP/HTTPS. * This system is working for single server only. 2. 7 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Architecture DESIGN- THE constructorS THE constructorS 9 9 2. 8 Use Case Model Description- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT User User can log in after registration then look for site , give information like name, Location,& other Information about the criminals. Administrator- Administrator monitors the details of criminals, aggregates feedback, Backup & restore of data.Manager- Works same as administrator and also monitors , and works on input from feedback Public reviews They interrogative sentence or give reviews on open web based capital listed for utilization, maintaining proper orphicity 2. 9. 1 Class Diagram- User Managers Admin Us er-name User-id() User-id() word Password() Password() Sign-up() Login() Login() Search-criminal() Feedback() Criminal() Contact-details() Criminal() View-status() Feedback() Add-new Criminal() THE constructorS THE constructorS Login() 10 10 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 9. Sequence Diagram- THE constructorS THE constructorS THE constructorS THE constructorS 11 11 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 1 ER DIAGRAM- THE constructorS THE constructorS 12 12 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 2 SCHEMA- CRIMINALS Name Criminal id Occupation Date of Arrest Date of birth Crime punishment Details Address Sex Finger Print Blood aggroup Photograph Punishment starts on Punishment ends on Bail (if given) wellness report Unwanted activity during punishment Jail Details direct AdminName Email id Date of birth Sex Occupation might Contact Number Password Country Exper t User Name Email id Date of birth Sex Occupation Qualification operation Contact_num Password City Country Registered Profile Name Email- Id Sex Password Address Date of birth Contact Number Police berth Station Id Station Name Station Location Station In-charge take up room Lock up Number Lock up Location Room size Maximum Capacity(allowed) Present status Criminal In Jail Jail Id Criminal id MEDIA Media Id Media Name Media Type 13 13 2. 11 Assumptions and Dependencies Initially only two locations are committed to the SIC * each location is always connected, whether an operator is logged on at the remote location or not * Each User mustiness have a User-ID and password * There is only one Administrator. * Server must always run under Linux system * Internet companionship is a must. * Proper browsers should be installed * Text readers should be installed to view the help files. THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT THE construct orS THE constructorS 3. pictorial USER INTERFACE- 3. 0 Specific Requirements 1) The details within it should be outlined as individual specific emergencys, following the guidelines for sound requirements (verifiable, unambiguous, etc. ) (2) Specific requirements should be organized in a logical and readable fashion. (3) Each requirement should be stated such that its achievement can be objectively verified by a prescribed method. (4) Sources of a requirement should be identified where that is useful in understanding the requirement. (5) One way to classify the specific requirements is as follows 14 14 3. 1 Use Case Reports- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENTUse causal agency Description Login The user has to annals for first time then log in Update Profile Information like current address, ration card etc. make up feedback Giving feedback to the manager 15 15 THE constructorS 7 THE constructorS 7 Use case Description Login The Administrator has to register f or first time then log in History of criminal Keeps record and check of criminal Aggregate feedback Collect feedback from User Give feedback Give personal and collected feedback to manager solicit query Ask query to the manager Use case DescriptionLogin The Manager has to register for first time then log in History of criminal The Administrator has to register for first time then log in Aggregate feedback Collect feedback from user Efficiency check Checking the efficiency of database and administrator Input from feedback Reviewing feedback and involving concerned action 16 16 THE constructorS 7 THE constructorS 7 3. 2 External Interface (Supplementary) Requirements-This should specify (1) The characteristics that the software must support for each human interface to the software product.For example, if the user of the system operates by means of a display terminal, the following should be specified * Required classify formats * Page layout and content of any reports or menus * Relative timing of inputs and outputs * handiness of some form of programmable function keys. CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT the use of other required software products (for example, a data management system, an operating system, or a mathematical package), and interfaces with other application systems is specified below- For each required software product, the following should be provided * Name Mnemonic * Specification Number * Version enactment * Source For each interface * The purpose of the interfacing software should be related to the software product. * It is not necessary to detail any well-documented interface, but a reference to the document defining the interface is required. (1) Safety Requirements-Highly recommend Kaspersky 2013 internet security to been Installed in users Pc to prevent the harm that may occurs by unwanted malicious softwares, phishing URLs and all the types of virus attacks during using this application. 2) protective cover R equirements-All users should be properly authenticated before allowed entry into the system credentials will be based on an E-mail address, and a password. All activities on the system must be logged. (3) Non-Functional Requirements- Secure access of confidential data (users details). SSL can be used. 24 X 7 availability. Better component design to get better performance at peak time. Flexible service based architecture will be highly desirable for future extension. 17 17 THE constructorS 7 THE constructorS 7

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.