0% found this document useful (0 votes)
50 views51 pages

Crime Records System - Final Report

The Objective of the Criminal Justice Crime Records System is to mechanize the existing manual system with computerized equipment and developed computer software, fulfilling the necessities of all Policemen and Police Stations. Their valuable data and information can be stock up for a more extended period with easy access to the same. This Framework likewise keeps up electronic records of all the FIR documented against crime.The project is aimed to develop a crime file for maintain a computerize

Uploaded by

prateek45074
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views51 pages

Crime Records System - Final Report

The Objective of the Criminal Justice Crime Records System is to mechanize the existing manual system with computerized equipment and developed computer software, fulfilling the necessities of all Policemen and Police Stations. Their valuable data and information can be stock up for a more extended period with easy access to the same. This Framework likewise keeps up electronic records of all the FIR documented against crime.The project is aimed to develop a crime file for maintain a computerize

Uploaded by

prateek45074
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

A Project Report

on

Criminal Justice
Crime Records System

Submitted in partial fulfillment of the requirement


for the award of the degree of

Master of Computer Application (MCA)

Guru Gobind Singh Indraprastha University, Delhi

Guide(s): Submitted by:


Mr. Manoj K Purohit (Internal Guide) Prateek Yadav
Mr. Sourabh Yadav (External Guide) Enrollment no: 00311804419

Centre for Development of Advanced Computing,Noida


2021-2022
1
2
Acknowledgement

It is my proud privilege to express my profound gratitude to the entire management of Centre


for Development of Advanced Computing (C-DAC) and Teachers of the Institute for providing
me with the opportunity to avail the excellent facilities and infrastructure. The knowledge and
values inculcated have proved to be of immense help at the very start of my career.

I express my sincere gratitude and thanks to Mr. Manoj K Purohit for his supervision and
guidance. Taking this opportunity further I would like to thank the faculty members of the
institution for being there whenever we need their help.

I would like to thank Ducat for providing me with opportunity to pursue my Industrial Training,
as it is an important part of the MCA Course and It is the one that exposes you to the Industry
standards and makes you adapt yourself to the latest trends and technologies. At the same time, it
gives an experience of working on a project. I feel pride and privilege in expressing my deep
sense of gratitude to all those who have helped me in presenting the assignment.

I am also grateful to my Project Trainer Mr. Sourabh Yadav for his expert guidance and
cooperation in making my project learning and worthwhile experience. The efforts put up by him
during the development of this project would not have been fruitful if he did not assist me
whenever I needed assistance.

3
Synopsis
Introduction

The Objective of the Criminal Justice Crime Records System is to mechanize the existing
manual system with computerized equipment and developed computer software, fulfilling
the necessities of all Policemen and Police Stations. Their valuable data and information
can be stock up for a more extended period with easy access to the same.

This Framework likewise keeps up electronic records of all the FIR documented against
crime.The project is aimed to develop a crime file for maintain a computerized records of all
the FIR against crimes commited. The system is dynamic Web baesd application that can be
access throughout the police department. This system can be used as application for the crime
file of the police department to manage the records of different activity related to first
information report. This medium offers a two-way relationship between the information-givers
and receivers and this is precicely what we intend to capitalize on in keeping up with our police
motto -" With You, For You, Always ".The principle post of this application is to tell every
single police officer about the arrival of any Lawbreaker, including his/her subtleties, for
example, criminals id, name etc. It tends to be used as an application by the Police division to
deal with the records of various exercises identified with the First Information Report.

To transform and improve on a sustained basis the Police Organization by providing an


environment and leadership that optimizes and sustains the development and utilization of
knowledge, skills and attitudes of the department by effective use of all resources thus bringing
about quantified professional excellence and public confidence. An attempt to build a podium
where from the Police and Public can work together

Problem definition

In the Current scenario, if any Citizen wants to give complaint against any crime they should
go for manually and police department also has to investigate the case and they should
maintain the reports manually.In modern days crime is increasing day by day. To combat such
crimes and to provide safety to citizens, police department plays a vital role. It always is a vital
responsibility arresting criminal who is threat for the safety of society. After registering the
FIR from any citizen, police starts investigation from them, after getting all the proofs against
the criminal, It is the duty of the police to present all the proofs honestly to the court so that
the right man can get right punishment. The true and right information provided by the people
to police helps a lot in arresting the criminals who try to spoil the peaceful environment of
society. Along with low salary scale, facilities of modern technology such as computerized
system of keeping records are not provided to police department which cause low efficiency.
As it is the age of computers, all the organization today use computers to maintain their
records, so this facility should be given to police department. In order to increase their
efficiency and to save their time, in our project we are going to implement a CRMS (criminal
record management system). This is an online web application with database system in which
police will keep the record of criminals who have been arrested. This will help the police
department to manage their records easily. If the Crime case is investigating in two different
4
areas then mutual sharing of Investigation reports are not possible at the same time sending
complaints in Online medium also not possible. Investigating Officer are not able to view the
chargesheet,evidence collected if needed urgently , as they are available in Police Station.

Objective

The proposed system applies to Police Institutions all across the country and specifically looks
into the subject of Crime Records System. It is well understood that Crime Prevention,
Detection and Conviction of criminals depend on a highly responsive backbone of Information
Management. It is proposed to centralize Information Management in Crime for the purposes
offast and efficient sharing of critical information across all Police Stations across the territory.
The System would also be used to generate information for pro-active and preventive
measuresfor fighting crime.

This application gives the following information -

1.System can provide the details of the police station and the employees.
2.Application will provide the details of victims and the registered F.I.R
3.At any point of time system can provide the details of evidence and their sequence
4.This application provides the details of existing charge sheets and their status.

Methodology
This application uses Water-Fall Model for Development of the application. Waterfall Model is
the earliest SDLC approach that was used for software development .
The Waterfall Model was first Process Model to be introduced. It is also referred to as a linear-
sequential life cycle model. It is very simple to understand and use. In a waterfall model, each
phase must be completed before the next phase can begin and there is no overlapping in the
phases.
This Model illustrates the software development process in a linear sequential flow; hence it is
also referred to as a linear-sequential life cycle model. This means that any phase in the
development process begins only if the previous phase is complete. In waterfall model phases
do not overlap.

Water-fall Model Design


Waterfall approach was first SDLC Model to be used widely in Software Engineering to
ensure success of the project. In "The Waterfall" approach, the whole process of software
development is divided into separate phases. In Waterfall model, typically, the outcome of one
phase acts as the input for the next phase sequentially.

5
The sequential phases in Waterfall model are:

 Requirement Gathering and analysis: All possible requirements of the system to be


developed are captured in this phase and documented in a requirement specification doc.
 System Design: The requirement specifications from first phase are studied in this phase and
system design is prepared. System Design helps in specifying hardware and system
requirements and also helps in defining overall system architecture.
 Implementation: With inputs from system design, the system is first developed in small
programs called units, which are integrated in the next phase. Each unit is developed and
tested for its functionality which is referred to as Unit Testing.
 Integration and Testing: All the units developed in the implementation phase are integrated
into a system after testing of each unit. Post integration the entire system is tested for any
faults and failures.
 Deployment of system: Once the functional and non functional testing is done, the product is
deployed in the customer environment or released into the market.
 Maintenance: There are some issues which come up in the client environment. To fix those
issues patches are released. Also to enhance the product some better versions are released.
Maintenance is done to deliver these changes in the customer environment.

All these phases are cascaded to each other in which progress is seen as flowing steadily
downwards (like a waterfall) through the phases. The next phase is started only after the defined
set of goals are achieved for previous phase and it is signed off, so the name "Waterfall Model".
In this model phases do not overlap.done to deliver these changes in the customer environment.

6
Modules Identified:

[1] Admin Module:


This module is all about an Administrator. The Administrator is having all authorities in this
application because he maintains this entire application. The Administrator can register new
police station, register new victims, register new victims F.I.R, register crime charge sheet,
register investigation. And he can delete all the details of victims, he can view all online officers
in the portal.

[2] Writer Module:


This module is related to Writer. In this module the duty of writer in the police station is presented.
The write can add new victim details, new investigation details, new witness details,new evidence
details, new crime nature details, and new Charge Sheet.

[3] Investigating Officer Module:-


This module is related to Investigation. In this module Investigation Officer can view
F.I.Rdetails, new victim’s details, witness details, evidence details, and Charge Sheet
details etc.

Tools used

 JDK
 JVM
 J2EE
 Oracle Database
 Apache Tomcat

7
Software Technologies used

 Java
 JSP (Java Server Pages)
 Java Servlets
 My Sql
 HTML / CSS

Hardware Requirements

 Windows XP & Above


 RAM - minimum 1GB
 Disk Space - 500 MB

8
Limitations

The proposed system applies to Police Institutions all across the country and specifically looks
into the subject of Crime Records System. It is well understood that Crime Prevention, Detection
and Conviction of criminals depend on a highly responsive backbone of Information Management.
As all the information is stored into the database there might be wrong information stored or
manipulated , if there is no Software security system is installed . Data can also be breached if
Systems where software are installed of the Police Stations is breached with intruders.

9
Contents

Sr. no Topic Page no.


1. Certificate (s) 1-2
2. Acknowledgement 3
3. Synopsis 4-9
4. List of Tables/figures 11
5. List of Abbreviations 12
6. Chapter 1: Introduction/Problem definition 13-17
7. Chapter 2: System Requirement Analysis 18-20
8. Chapter 3: System Design 21-45
9. Chapter 4: System Development 46-47
10. Chapter 5: System Implementation 48
11. Summary and Conclusion 49
12. References 50

10
List of Tables / List of Figures

Sr. no Topic Page no.


1. Fig 1.1 A Waterfall Model 16
2. Fig 1.2 - Fig 1.4: DFDs 21-22
3. Fig 2.1 - Fig 2.3: Use Case Diagrams 23-24
4. Fig 3 : ER Diagram 27
5. Fig 4.1 - Fig 4.3: Sequence Diagram 28-29
6. Fig 4.4: Component Diagram 30
7. Fig 5.1 - Fig 5.26 : Screenshots 34-45
8. Table 1: Test cases 47

11
List of abbreviations

Sr. no Abbreviation Meaning


1. DBMS Database Management System
2. IT Information Technology
3. DDL Data Definition Language
4. CLI Command Line Interface
5. GUI Graphical User Interface
6. UDAT Universal Database Administration Tool
7. SQL Structured Query Language
8. CVS Comma Separated Values
9. JSON JavaScript Object Notation
10. DFD Data Flow Diagram
11. JDBC Java Database Connectivity
12. JSP Java Server Pages
13. HTML Hypertext Markup Language
14. CSS Cascading Style Sheets
15. IDE Integrated Development Environment
16. Fig Figure
17. GB Gigabyte
18. JRE Java Runtime Environment
19. J2EE Java 2 Platform,Enterprise Edition
20. ER Entity Relationship Diagram

12
Chapter 1: Introduction/Problem definition

1.1 Brief description of the organization

DUCAT is one of the leading industry-based training institutes in India, and it provides the
students with the knowledge and hands-on training for the computers and IT-based fields. Started
in the year 1999, DUCAT is a private institute that has been creating professionals for big MNC's
and providing them with the job-specific workforce.
They provide industrial training in IT and Software, Animation, Business, Management studies
streams and more.
They provide a practical approach for all the training modules and a student gains an in-depth
knowledge of the subject and also learn complex programming codes and structures more simply.
The Major IT courses offered by the Institute are - Language Programming, CCNA, MCSE,
MCITP and CCNP.
DUCAT provides three major types of services like Software development for large and small
organizations alike, On-campus Training to the students who enrol in their Technical Courses.
They also conduct several workshops and provide many Placement services for students who are
willing to work in the IT field in a well-reputed firm with significant Career opportunities.
This institute has been in collaboration with global leaders such as HCL, Birlasoft, Cognizant,
Ericsson, Capegemini, and NIC which are all billion-dollar MNC's which have a vast reach in its
Customers and IT developmental tools. This has led to making DUCAT a well-known name in
theIT industry for both hands-on training and B2B transactions.

13
1.2 General Description of the System under Study:

If any citizen wants to give complaint against any crime they should go for manually and police
department also has to investigate the case and they should maintain the reports manually. In modern
days crime is increasing day by day. To combat such crimes and to provide safety to citizens, police
department plays a vital role. It always is a vital responsibility arresting criminal who is threat for the
safety of society. After registering the FIR from any citizen, police starts investigation from them,
after getting all the proofs against the criminal, It is the duty of the police to present all the proofs
honestly to the court so that the right man can get right punishment. The true and right information
provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful
environment of society. Along with low salary scale, facilities of modern technology such as
computerized system of keeping records are not provided to police department which cause low
efficiency. As it is the age of computers, all the organization today use computers to maintain their
records, so this facility should be given to police department. In order to increase their efficiency and
to save their time, in our project we are going to implement a (Criminal Justice Crime Records
system). This is an online web application with database system in which police will keep the record
of criminals who have been arrested. This will help the police department to manage their records
easily.

There is a need for the Digitization of the Data/Information are Stored or maintained in the Police
Organization .There are some system are used in some Police Stations across the country.

1.3 User Requirements:

In modern days crime is increasing day by day. To combat such crimes and to provide safety to citizens,
police department plays a vital role. It always is a vital responsibility arresting criminal who is threat for the
safety of society. After registering the FIR from any citizen, police starts investigation from them, after
getting all the proofs against the criminal, It is the duty of the police to present all the proofs honestly to the
court so that the right man can get right punishment. The true and right information provided by the people to
police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with
low salary scale, facilities of modern technology such as computerized system of keeping records are not
provided to police department which cause low efficiency.

14
1.4 Need of New System

If any citizen wants to give complaint against any crime they should go for manually and police department
also has to investigate the case and they should maintain the reports manually. As it is the age of computers,
all the organization today use computers to maintain their records, so this facility should be given to police
department. In order to increase their efficiency and to save their time, in our project we are going to
implement a (Criminal Justice Crime Record System). This is an online web application with database
system in which police will keep the record of criminals who have been arrested. This will help the police
department to manage their records easily and

1.5 Objectives of the Project


The objective of this system can broadly be listed as follows:

 To keep record of criminals details for future investigation.


 System can provide the details of the police station and the employees.
 Application will provide the details of victims and the registered F.I.R
 At any point of time system can provide the details of evidence and their sequence
 This application provides the details of existing charge sheets and their status

1.6 Methodology

Methodology
This application uses Water-Fall Model for Development of the application. Waterfall Model is
the earliest SDLC approach that was used for software development .
The Waterfall Model was first Process Model to be introduced. It is also referred to as a linear-
sequential life cycle model. It is very simple to understand and use. In a waterfall model, each
phase must be completed before the next phase can begin and there is no overlapping in the
phases.
This Model illustrates the software development process in a linear sequential flow; hence it is
also referred to as a linear-sequential life cycle model. This means that any phase in the
development process begins only if the previous phase is complete. In waterfall model phases
do not overlap.

Water-Fall Model Design


Waterfall approach was first SDLC Model to be used widely in Software Engineering to
ensure success of the project. In "The Waterfall" approach, the whole process of software
development is divided into separate phases. In Waterfall model, typically, the outcome of one
phase acts as the input for the next phase sequentially.

15
Following is a Diagrammatic representation of different phases of waterfall model.

Fig.1.1 A WaterFall Model

The sequential phases in Waterfall model are:

 Requirement Gathering and analysis: All possible requirements of the system to be


developed are captured in this phase and documented in a requirement specification doc.
 System Design: The requirement specifications from first phase are studied in this phase and
system design is prepared. System Design helps in specifying hardware and system
requirements and also helps in defining overall system architecture.
 Implementation: With inputs from system design, the system is first developed in small
programs called units, which are integrated in the next phase. Each unit is developed and
tested for its functionality which is referred to as Unit Testing.
 Integration and Testing: All the units developed in the implementation phase are integrated
into a system after testing of each unit. Post integration the entire system is tested for any
faults and failures.
 Deployment of system: Once the functional and non functional testing is done, the product is
deployed in the customer environment or released into the market.
 Maintenance: There are some issues which come up in the client environment. To fix those
issues patches are released. Also to enhance the product some better versions are released.
16
Maintenance is done to deliver these changes in the customer environment.

All these phases are cascaded to each other in which progress is seen as flowing steadily
downwards (like a waterfall) through the phases. The next phase is started only after the
defined set of goals are achieved for previous phase and it is signed off, so the name
"Waterfall Model". In this model phases do not overlap.done to deliver these changes in the
customer environment

17
Chapter 2: System Requirements Analysis

System analysis is the process of collecting a factual data, understand the process involved,
identifying problem and recommending feasible suggestion for improving the system functioning,
this involving studying the business process, gathering operational data, understand the information
flow, finding out bottlenecks and evolving solution for overcoming the weakness of the system so as
to achieve the organization goals. System analysis also includes subdividing of complex process
involving the entire system, identification of data store and manual process.It is very difficult to
change the system once it has been designed and on the other hand designing a system, which does
not cater to the requirements of the user, is of no use.

The requirement specification for any system can be broadly stated as given below:
The system should be able to interface with the existing system
The system should be accurate
The system should be better than the existing system
The existing system is completely dependent on the user to perform all the duties.

To provide flexibility to the users, the interfaces have been developed that are accessible through a
browser. The GUI’S at the top level have been categorized as
Administrative user interface
The operational or generic user interface

The ‘Administrative user interface’ concentrates on the consistent information that is practically, part
of the organizational activities and which needs proper authentication for the data collection. These
interfaces help the administrators with all the states like Data insertion, Data deletion and Date
Updation along with the extensive data search capabilities.

The ‘operational or generic user interface’ helps the end users of the system in transactions through
the existing data and required services. The operational user interface also helps the ordinary users in
managing their own information in a customized manner as per the included flexibilities

Functional Requirements
This application is categorized into three modules-
[1]Admin Module:

This module is all about an Administrator. The Administrator is having all authorities in this
application because he maintains this entire application. The Administrator can register new
police station, register new victims, register new victims F.I.R, register crime charge sheet,
register investigation. And he can delete all the details of victims, he can view all online officers
in the portal.

18
[2]Writer Module:

This module is related to Writer. In this module the duty of writer in the police station is presented.
The write can add new victim details, new investigation details, new witness details,new evidence
details, new crime nature details, and new Charge Sheet.

[3] Investigating Officer Module:-


This module is related to Investigation. In this module Investigation Officer can view
F.I.Rdetails, new victim’s details, witness details, evidence details, and Charge Sheet
details etc.

19
Software Requirements

Operating System : Windows 7 or Above


Technology : Java/j2ee (JDBC, Servlets, JSP)
Web Technologies : HTML , CSS
Web Server : Apache Tomcat
Database : Oracle
Software’s : JDK, Apache Tomcat 5.5, Oracle 10g

Hardware Requirements

Processor : Pentium based system with Intel Pentium 4

RAM : 256 MB (Minimum)

20
Chapter 3: System Design

Systems design is the process or art of defining the architecture, components, modules, interfaces,
and data for a system to satisfy specified requirements. One could see it as the application of systems
theory to product development. There is some overlap and synergy with the disciplines of systems
analysis, systems architecture and systems engineering.

3.1 DFD

 3.1.1 Zero Level DFD

Criminal
Justice
Crime
Records

Fig 1.2 Zero Level DFD

21
 3.1.2 Level 1 DFD

Fig 1.3 Level 1 DFD

 3.1.3 Level 2 DFD

Fig 1.4 Level 1 DFD

22
 3.2 Use Case Diagrams

The actors who have been identified in the system are as follows:

1. Investigating officer

2. Administrator

3. Writer

Investigating officer: He is the actor who can practically work upon the existing data in the police
station only for view purpose.

Fig 2.1 Investigating Officer Actor

23
Administrator: He is the actor who has the full-length potentiality and privilege to carry out
transactions upon the system. He is authorized to maintain consistency within the information.

Fig 2.2 Administrator Actor

Writer: He is the actor who can enter all the details of the crime or evidence. Once entered cannot be
edited. Only the administrator can edit or delete the record from the database.

Fig 2.3 Writer Actor

24
 3.2.1 Use Case Description
Use case name Login Information
Participating Administrator, Investigator, Writer
actors
Flow of events Provides username and password
Entry Users must know the username and password
Condition
Exit condition User successfully logged into the system
Quality Should provide proper error messages while login into the system.
Requirements

Use case name Register Victims


Participating Administrator, Writer
actors
Flow of events User will enter the Victims information
Entry User should know the details of the victim
Condition
Exit condition Victim details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements

Use case name Register Victims FIR


Participating Administrator, Writer
actors
Flow of events User will register the FIR
Entry User should know the details of the FIR
Condition
Exit condition FIR details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements

Use case name Register Crime charge sheet


Participating Administrator, Writer
actors
Flow of events User will register the crime charge sheet
Entry User should know the details of charge sheet.
Condition
Exit condition Charge sheet details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements

Use case name Register Investigation Evidence


Participating Administrator, Writer
actors
Flow of events User will register the investigation evidence
25
Entry User should know the details of evidence.
Condition
Exit condition Evidence details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements

Use case name Register Police Station


Participating Administrator
actors
Flow of events User will register the police station.
Entry User should know the details of police station.
Condition
Exit condition Police station details are successfully inserted into the system.
Quality Display proper error messages while insertion.
Requirements

Use case name View all crime details


Participating Investigator
actors
Flow of events User can view all the crime details.
Entry Display the details of crime and evidences.
Condition
Exit condition Evidence and crime details are successfully displayed.
Quality N/A
Requirements

26
 3.3 ER Diagram

Fig 3 ER Diagram

27
 3.4 Sequence Diagrams
Administrator:

Register E vidence Details

Register Crime Chargesheet

Register Police Station

Register Victim

Register Victim
FIR

Fig 4.1 Sequence Diagram of Administrator

Investigating Officer:

Provide UserName,Passwords

View Crime Chargesheet

View Crime sequence info

View Evidenence

View FIR details

Fig 4.2 Sequence Diagram of Investigating Officer

28
Writer

Provide
Provideusername,passwords
Sf7kk
UserName,Passwords

Fig 4.3 Sequence Diagram of Writer

29
 3.5 Component Diagram

Fig 4.4 Component Diagram

30
 3.6 Database Dictionary

31
32
33
3.7 Screenshots

Fig 5.1 Home Page

Fig 5.2 Login Form


34
Fig 5.3 Login Master

Fig 5.4 Admin Home Page

Fig 5.5 Designation Master Page


35
Fig 5.6 Designation Report Search Result

Fig 5.7 Police Station Master Page

36
Fig 5.8 Police Station Master View Page

Fig 5.9 Police Station Report

37
Fig 5.10 Crime Category Master Page

38
Fig 5.11 Crime Category Report Display Page

Fig 5.12 Victims View Page

39
Fig 5.13 Victim View Display Page

Fig 5.14 Victim FIR Page

40
Fig 5.15 Investigation Master Page

Fig 5.16 Crime witness master page

Fig 5.17 Evidence Master Page

41
Fig 5.18 Crime Charge Sheet Master Page

Fig 5.19 Crime Charge Sheet Master View Details Result

42
Fig 5.20 Writer Home Page

Fig 5.21 Victim FIR Data Record Page

Fig 5.22 Crime Charge Sheet Master Data Record Page

43
Fig 5.23Investigating Officer Home Page

Fig 5.24 Victim Data Display Page

44
Fig 5.25 Victim FIR View Page

Fig 5.26 Victim FIR Details Display Page

45
Chapter 4: Systems Development

4.1 Purpose

Testing is a process, which reveals errors in the program. It is the major quality measure
employed during software development. During software development. During testing, the
program is executed with a set of test cases and the output of the program for the test cases is
evaluated to determine if the program is performing as it is expected to perform. some of the
traits of a good test caseare

 A good test case has a high probability of finding out errors.


 It should be non-redundant.
 It has to be best of breed.
 A good test case should neither be too simple nor too complex

4.1.1 Project Development

The Project is built using the combination of following technologies:

 Java,J2EE
 Java Servlets
 JSP
 HTML/CSS
 MySQL
 Oracle Database
 Apacahe Tomcat

4.2 Testing

Testing means verifying behavior to ensure that the system works the way it is supposed to.
Due to the nature of the system, it is quite easy to test it by simply comparing the results with the
database in either the provided shell or through their own interfaces.

Each module is tested separately to ensure that each component of the system works the way it is
supposed to perform.

46
4.2.1 Test Cases

Case No. Description Expected Result Actual Result Status


1. Correct login details Log in Log in PASS
successfully successfully
2. Incorrect login details Invalid details Invalid details PASS

3. Insert Details Inserted Inserted PASS


(FIR,Police successfully successfully
Stations,Chargesheet
etc.)
4. Search Details View results View results PASS
(FIR,Chargesheet,Police
Station etc.)
5. Delete Details Deleted Deleted PASS
(Employee,Victims data successfully successfully
etc.)

Table 1. Test Cases

47
Chapter 5: System Implementation

Hardware and Software Requirements

The project requires the minimum of following resources available on a system to execute:

 Operating System: Windows XP or Above.


 Processor: Pentium IV 1.8 GHz and Above.
 RAM : Minimum 2GB
 Memory: 500 MB.
 Storage: 1 GB.
 Internet connection.
 JRE 8,J2EE
 Any modern web browser supporting ES6 JavaScript such as Google chrome, Mozilla
Firefox etc.
 MySQL DBMS, Oracle DBMS
 Apache Tomcat
 Eclipse IDE

48
Summary and Conclusions

This system appeals to Police Institutions all across the country and specifically looks into the
subject of Crime Records System. It is well understood that Crime Prevention, Detection and
Conviction of criminals depend on a highly responsive backbone of Information Management. It is
proposed to centralize Information Management in Crime for the purposes of fast and efficient
sharing of critical information across all Police Stations across the territory.

The need for a computerized platform for Criminal Justice Crime Record System cannot be
overemphasized. The Project enhances proper and efficient management of criminal records by
helping in making informed decisions and improving reliability thus improving law enforcement
operations. The Objectives for the development of this project is achieved as we want to digitize the
system working in the Police Stations etc. while there are still many areas are still we can say that
Undiscovered or uncovered. There are areas which might be covered in the future.

49
References

[1] Kawai, D., & Samson, D. (2011). Development Of A Criminals Record Management System.
Information Technology for People Centred Development, 1-8.

[2] Korth, H. (2010). Database system concepts. Macgraw-Hill. Retrieved 2015

[3] Sourav Bhowmick, “Criminal Report Management System”, Department of Computer Science
and Engineering , ADMAS Institute of Technology ,2013

[4] http://www.tutorialspoint.com/sdlc/sdlc_waterfall_model.htm [Last Accessed on 25/03/2022]

[5] https://en.wikipedia.org/wiki/Criminal_record [Last Accessed on 20/03/2022]

50

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy