Monday, December 31, 2018

Criminal Record Management

wr etceteraed testify focal point sorry playscript way TEAM figure of speech THE formorS THE GREAT MIND CHALLENGE 2012 wretched learn anxiety SOFTWARE sine qua non SPECIFICATION Atal Bihari Vajpayee Indian Institute of randomness Techno put downy and focusing, Gwalior, MADHYA PRADESH Team Guide Dr. Anurag Shrivastava Members NITIKA IPG-2011-070 HIMANI SHARMA IPG-2011-042 PRIYANKA AGRAWAL IPG-2011-082 discussion section Information Technology 1 1 THE constructorS THE constructorS State Madhya Pradesh venomous mark charge bend figure heed accede OF CONTENTS 1 Introduction 1. 1 Purpose 1. Scope 1. 3 Definition, Acronyms, and Abbreviations 1. 4 References 1. 5 Tools to be numerical functiond 1. 6 Technologies to be use 1. 7 Over visual sense 2. 0 Over every last(predicate) Description 2. 1 mathematical product Perspective 2. 2 Software drug substance absubstance ab drug user interface 2. 3 computer hardware Interface 2. 4 harvest-time Function 2. 5 substance abuser Characteristics 2. 6 Constraints 2. 7 Architecture intent 2. 8 use Case simulation Description 2. 9. 1 relegate plat 2. 9. 2 Sequence Diagrams 2. 10. 1 ER Diagram 2. 10. 2 Schema 2. 11 Assumptions and Dependencies 3. 0 Specific Requirements 3. 1 intent caTHE constructorS THE constructorS se Reports 2 2 3. 2 Supplementary Requirements condemnable videotape forethought bend playscript precaution reprehensible al-Quran prudence criminal RECORD steering 1 instauration constabulary provides safety to citizens. It always trunk steady for arresting all condemnable who is a threat for the safety of society. afterwardsward establishing the true fir from any citizen, legal philosophy starts its wager and on that basis it arrests the turns if proofs are tack against them. Once the barbarouss are arrested, police starts investigating from them. After getting all the proofs against the criminal, it is the occupation of the police to present all the proofs hones tly to the court so that the right man can get right punishment.The dead on target and right information provided by the peck to police helps a lot in arresting the criminals who try to spoil the nonaggressive environment of society. Along with low earnings scale, facilities of modern technology such as computerized formation of pull throughing constitutions are non provided to police incision which causes low expertness. As it is the age of computers and all the organizations today use computers to maintain their book of accounts, so this facility should in any case be curbn to police department in order to increase their ability and to save their prison term. 1. 1 Purpose-Purpose of this Project is to lend oneself a CRM ( evil character Management). This is a database remains in which police entrust keep the record of evils who throw off been arrested, to be arrested or escaped. This volition help the Police department to manage their records easily. In po lice trunk when an incident occurs, a suitor reports an FIR (First Information Report). Police starts investigation fit to law on this FIR. An investigation officeholder supervises the investigation process. The main concerning people in the whole process are Petitioner (The soul who files an FIR), Victim, Accused/ poisonous, investigation officer. . 2 Scope The Scope of the criminal record prudence includes- The scope of the lamentable RECORD MANGEMENT involves all the prohibitions &type A record- data under CRM project and since it is a vastly implicate record by the crime colligate department therefore the scope though circumscribed to be implicated yet. * Meant for 5 different users 1) cast out Superintendent 2) Police Officers 3) CBI officers 4) executive director 5) Judge * each(prenominal) have their own profiles in crook RECORD MANAGEMENT(CRM) decision makers maintains database, backup and relate data time to time. Police officer can anticipate for criminal s history, can transfer criminal to some other jail. * CBI officer can pay heed for enlarge of any criminal. * Judge can look for criminals record, decide criminals punishment. * Police superintendent records all necessary data about a criminal and update databaseTHE constructorS THE constructorS 1. 3 Definitions, Acronyms Abbreviations 1. 3 3 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRM criminal Record prudence. 2. HTML (Hyper school text Mark-up Language) It is used to create static sack up pages. . JSP (Java emcee Pages) It is used to create high-voltage entanglement content. 4. J2EE (Java 2 Enterprise Edition) It is a programme platform, belonging to the Java platform, which is used for jumpment and run distri onlyed java applications. 5. WSAD ( clear-Sphere Studio cover Developer) It is a constructer toolkit which is intentional to develop more complex projects by providing a complete dynamic web military servi ce. 6. WASCE (Web-Sphere coating server Community Edition) It is an application legion that runs and supports the J2EE and the web service applications. . DB2 (IBM Database 2) It is a database management arrangement that provides a flexible and economical database platform to raise a rigid on demand business applications. 8. HTTP (Hyper Text transfer Protocol) It is a trans proceeding orientated lymph gland/ server protocol surrounded by a web browser and a web server. 9. XML (Extensible Mark-up Language) It is a markup language that was designed to transport and store data. 10. Ajax (Asynchronous Java hired man and XML) It is a technique used in java script to create dynamic web pages. 11. Web 2. It is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centred design and collaboration on the World child handle Web. 12. UML Unified modelling Language is a standard language for writing software product blue prints. The UML may be used to visualize, decide, construct and document. 13. RAD Rational employment Developer is a development tool that helps to design web pages and similarly helps to design the diagrams like ER, Database abstract diagrams and to generate DDL. 1. 4 References * IBM TGMC Sample synopsis * IBM- www. ibm. in/develeporworks * THE constructorSTHE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Java- www. sun. com * Wikipedia- www. wikipedia. com * spot Reference-J2EE * 4 4 Object orient Modelling and Design with UML-Michael Blaha, James pack Baugh. * Software Engineering, Seventh Edition, Ian Somerville. * IBM Red Books. * Database Management governances Nava the. 1. 5 Tools to be used * come up/RSA / Web-Sphere Modeler * Eclipse/ RAD / sacred lotus Forms Designer / Portlet Factory * Web-Sphere Portal/ WAS/ WAS CE / WPS * DB2 Express C or DB2 UDB * Tivoli CDP/TSM / Tivoli Directory Server * Linux as the preferred OS. 1. Technologies To Be utilize * J2EE (Servlet, JSP, JAXP, Java Beans) Application architecture. * JAVA Application architecture. * WASCE (Web-Sphere Application Server Community Edition) Web Server * DB2 IBM Database. * RAD 7. 0 reading tool 1. 7 Over work out- * A paid looking user interface with login IDs for criminals, police officers, superintendents, administrator and judge. * Once recruited all the users rise to power their right to respected functions or actions as enlisted later. * Another lot of this is the reports generated in response to- a) Registration confirmations. ) Statement of security and privacy. c) publish outs for criminals history. * Functions/actions of 1) cast away Superintendent * Register the wise Criminal. * Record the Crime causa and exposit of the crime. * Take the information like word-painting from 3 different view, declension group, sense print, retina scan and deoxyribonucleic acid information. * THE constructorS THE constructorS CRIMINAL RECORD MANA GEMENT CRIMINAL RECORD MANAGEMENT hunt Criminal with any of the preceding(prenominal) comment. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Update the modern crime of existing criminal. * 5 5 detect the current location of the criminal (i. . Cell No. , Jail consult etc. ) * Maintain the records of meeting with outsiders. * Record the data of health condition if any. * depute works. 2) Police Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Transfer the criminal to another(prenominal) jail. * entry full information of criminals. 3) CBI Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Access full information of criminals. 4) Administrator * Maintain the database. * Grant/Revoke role to/from other exploiters. * Backup and restore of data. * Monitor the Jail Administration. ) Judge * Access information of criminals. * THE constructorS THE constructorS besides access informatio n about other exercisers. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Reduce/ augment the direct of punishment. * 6 6 Transfer the criminal to other location. * Constraints a) The content and in writing(p) user interface is in English. b) Login and word of honor is for identification. c) The allowed person is allowed to access the database only upto a limited extend. d) This system of rules is limited to HTTP/HTTPS. e) This system is functional for single server only. 2. 0 Overall Description- 2. 1 Product PerspectiveTHE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 2 Software Interface * Client on net income Web Browser, Operating system (LINUX preferred) * Web Server WASCE, Operating System (LINUX preferred) * Data Base Server CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT DB2, Operating System (LINUX preferred) * organic evolution End RAD (J2EE, Java, Java Bean, Servlets, HTML, XML, AJAX), DB2, OS (LINUX prefer red), Web-Sphere(Web Server) 7 7 2. 3 Hardware Interface 2. 3. 1 Client side of meat * Browser- earnings Explorer, Mozilla Firefox,NN, * Processor- All Intel or AMD- 1 gigacycle per second Ram- 256 MB * dish aerial space- ascorbic acid MB 2. 3. 2 Server billet * For RAD * Processor- All Intel or AMD- 1 GHZ * Ram- 2 GB * Disk space- 5 GB * For DB 10. 12 * Processor- All Intel or AMD- 1 GHZ * Ram- 512 MB * Disk space- 500 MB 2. 4 Product Function-The SIC node should be running on the client system so as to grade the account enlarge of the user. The server will only respond to those systems where the client is running THE constructorS THE constructorS 2. 5 dor characteristics 1. General Users They will be in a office staff to permit access to the users in the Internet and acknowledge their account status. 2.Administrators They are the nerve users and are able to add clean users to the system and permit them to access the Internet resources. They can also view in real time what a user is performing right now. They can also get the overall report of the user sessions. 3. Client Users They login at the client level and this is to get access to the Internet at the client level. They can also view their account status in the client system. 2. 6 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Constraints * 8 8 The content and graphical user interface is in English. * Login and password is for identification. The allowed person is allowed to access the database only upto a limited extend. * This system is limited to HTTP/HTTPS. * This system is working for single server only. 2. 7 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Architecture DESIGN- THE constructorS THE constructorS 9 9 2. 8 Use Case Model Description- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT User User can log in after registration whence look for rank , give information like name, localization,& other Information about the criminals. Administrator- Administr ator monitors the details of criminals, aggregates feedback, Backup & restore of data.Manager- Works same as administrator and also monitors , and works on input from feedback Public reviews They interrogate or give reviews on open web found funds listed for utilization, maintaining proper confidentiality 2. 9. 1 Class Diagram- User Managers Admin User-name User-id() User-id() word of honor Password() Password() Sign-up() Login() Login() Search-criminal() Feedback() Criminal() come home-details() Criminal() View-status() Feedback() Add-new Criminal() THE constructorS THE constructorS Login() 10 10 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 9. Sequence Diagram- THE constructorS THE constructorS THE constructorS THE constructorS 11 11 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 1 ER DIAGRAM- THE constructorS THE constructorS 12 12 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 2 SC HEMA- CRIMINALS Name Criminal id Occupation participation of Arrest escort of parentage Crime penalization details Address Sex Finger grade Blood Group Photograph Punishment starts on Punishment ends on security (if given) Health report Unwanted drill during punishment Jail Details target AdminName Email id Date of birth Sex Occupation qualification intercommunicate Number Password agricultural keen User Name Email id Date of birth Sex Occupation Qualification Achievement Contact_num Password City Country Registered Profile Name Email- Id Sex Password Address Date of birth Contact Number Police station locate Id Station Name Station Location Station In-charge lock away up mode Lock up Number Lock up Location Room surface Maximum Capacity(allowed) Present status Criminal In Jail Jail Id Criminal id MEDIA Media Id Media Name Media Type 13 13 2. 11 Assumptions and Dependencies Initially only both locations are connected to the SIC * apiece location is always connect ed, whether an operator is logged on at the remote location or not * Each User must(prenominal) have a User-ID and password * in that respect is only one Administrator. * Server must always run under Linux system * Internet connection is a must. * kosher browsers should be installed * Text readers should be installed to view the help files. THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT THE constructorS THE constructorS 3. graphical USER INTERFACE- 3. 0 Specific Requirements 1) The details within it should be defined as individual unique(predicate) requirements, pastime the guidelines for vigorous requirements (verifiable, unambiguous, etc. ) (2) Specific requirements should be nonionized in a logical and well-defined fashion. (3) Each requirement should be declared such that its achievement can be objectively verified by a prescribed method. (4) obtains of a requirement should be identified where that is useful in instinct the r equirement. (5) One way to classify the specific requirements is as follows 14 14 3. 1 Use Case Reports- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENTUse case Description Login The user has to register for prime(prenominal) time then log in Update Profile Information like current address, ration card etc. Give feedback Giving feedback to the manager 15 15 THE constructorS 7 THE constructorS 7 Use case Description Login The Administrator has to register for first time then log in History of criminal Keeps record and check of criminal Aggregate feedback hive away feedback from User Give feedback Give individual(prenominal) and collected feedback to manager Ask query Ask query to the manager Use case DescriptionLogin The Manager has to register for first time then log in History of criminal The Administrator has to register for first time then log in Aggregate feedback invite feedback from user Efficiency check Checking the efficiency of database and administrator Input from feedback Reviewing feedback and involving concerned action 16 16 THE constructorS 7 THE constructorS 7 3. 2 External Interface (Supplementary) Requirements-This should specify (1) The characteristics that the software must support for severally human interface to the software product.For example, if the user of the system operates through a discover terminal, the following should be specified * inevitable screen formats * Page layout and content of any reports or menus * Relative timing of inputs and outputs * availableness of some form of programmable function keys. CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT the use of other need software products (for example, a data management system, an operating system, or a mathematical package), and interfaces with other application systems is specified to a lower place- For each required software product, the following should be provided * Name Mnemonic * specification Number * Version number * Source For each interface * The purpose of the interfacing software should be related to the software product. * It is not necessary to detail any well-documented interface, but a reference to the document delimit the interface is required. (1) Safety Requirements-Highly recommend Kaspersky 2013 net income security to been Installed in users Pc to disallow the harm that may occurs by throwaway(prenominal) malicious softwares, phishing URLs and all the types of virus attacks during using this application. 2) Security Requirements-All users should be aright authenticated before allowed entry into the system authentication will be establish on an E-mail address, and a password. All activities on the system must be logged. (3) Non-Functional Requirements- Secure access of confidential data (users details). SSL can be used. 24 X 7 availability. Better component design to get better achievement at peak time. Flexible service based architecture will be highly desirable for future extension. 17 17 THE constr uctorS 7 THE constructorS 7

No comments:

Post a Comment