Sie sind auf Seite 1von 25

FINAL YEAR PROJECT REPORT

CRIME FILE MANAGEMENT SYSTEM


I.T.S ENGINEERING COLLEGE, GREATER NOIDA

ON

Submitted by: 1.) MUDIT(0822213023) 2.) SANTOSH KUMAR PATEL(0822210078) 3.) PRATEEK KUMAR GUPTA(0822210067) 4.) NITIN KUMAR(0822210060)

Submitted to: Mr. TARUN CHUGH (Mentor)

November 21, 2011

CRIME MANAGEMENT SYSTEM

ACKNOWLEDGEMENT
Keep away from people who try to belittle your ambitions. Small people always do that, but the really great make you feel that you too, can become great. I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully. First of all, I would like to thank Mr. Sarban Mukharjee, Director (ITS Engineering College, Greater Noida) for creating opportunities to undertake me in the esteemed organization. Special thanks to Mr. Tarun Cough, Mentor for all the help and guidance extended to me by him in every stage during project. His inspiring suggestions and timely guidance enabled me to perceive the various aspects of the project in a new light. I would also thank to my Mr. Vijay Shukla , HOD (CSE Dept.) & my internal project guide Mr. Sandeep Kumar(Assistant Professor, CSE Dept.) who guided me a lot in completing this project. I would also like to thank my parents & project mate for guiding and encouraging me throughout the duration of the project.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 2

November 21, 2011

CRIME MANAGEMENT SYSTEM

ABSTRACT
This Synopsys documents the process of designing, building and testing a software system to be used for marketing Crime Management System. The piece of software, and therefore the project, is known as a Crime File Management System. The project titled as Crime file Management System is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, show most wanted person details mailing as well as chatting. Any Number of clients can connect to the server. Each user first makes their login to sever to show their availability. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities; The software produced by this project exceeded expectations and would be suitable to be used in industry.

INTRODUCTION ABOUT THE PROJECT


The project titled as Online Crime file Management is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, show most wanted person details mailing as well as chatting. Any Number of clients can connect to the server. Each user first makes their login to sever to show their availability. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities. The main modules in this project .

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 3

November 21, 2011

CRIME MANAGEMENT SYSTEM

SOFTWARE REQUIREMENT SPECIFICATION

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 4

November 21, 2011

CRIME MANAGEMENT SYSTEM

Purpose
The purpose of this project is to design, build and test a Crime File Management System. This will be a vastly complex software development project which will take approximately 5 months to complete. The project will be split up into stages and documented thoroughly throughout. Project management is a key factor of this task to ensure the strict deadlines are adhered to. It is also of paramount importance that tried and tested practices and techniques from the field are adhered to to ensure that no common development project mistakes are reproduced.

Scope
The scope of the project is the system on which the software is installed, i.e. the project is developed as a desktop application, and it will work for a particular organization using Internet. But later on the project can be modified to operate it online.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 5

November 21, 2011

CRIME MANAGEMENT SYSTEM

Definition, Acronyms, and Abbreviations


SWING FRAMEWORK: The Swing Application Framework is a Java specification for providing a simple application framework for Swing applications. It defines infrastructure common to most desktop applications, making Swing applications easier to create. J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java Applications. JAVA COLLECTION FRAMEWORK : The Java collections framework (JCF) is a set of classes and interfaces that implement commonly reusable collection data structures. Although it is a framework, it works in a manner of a library. The JCF provides both interfaces that define various collections and classes that implement them.

JDBC (Java Data Base Connectivity): is an API for the Java programming language that defines how a client may access a database. It provides methods for querying and updating data in a database. JDBC is oriented towards relational databases. A JDBC-to-ODBC bridge enables connections to any ODBC-accessible data source in the JVM host environment.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 6

November 21, 2011

CRIME MANAGEMENT SYSTEM

Technologies to be used:
PROGRAMMING LANGUAGE: JAVA(SE) 7 DATABASE: My SQL

System Requirements:
SERVER SIDE:
RAM: 256 MB or above Processor: 1.2 GHz and above OPERATING SYSTEM: any OS which supports Java 7 or above Hard Disk: 50 MB free space

CLIENT SIDE:
RAM: 4GB or above Processor: 2.4 GHz or above OPERATING SYSTEM: Red Hat Enterprise Linux AS/ES 4.0 Update 2 SUSE Linux Enterprise Server 10 Windows Server 2003 SP2 Standard, Enterprise & Datacenter Windows Server 2008 SP1 Standard, Enterprise & Datacenter Hard Disk: 100GB free space

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 7

November 21, 2011

CRIME MANAGEMENT SYSTEM

Overview:
Crime File Management System has following main modules for proper functioning:

ADMIN MODULE: View and reply user complaint: This module helps the admin to view
and reply users complaint details

View and reply user crimes: This module helps the admin to view and reply users crimes details New admin: This module used for add new admin

VISITOR MODUL View Hot news: This module helps the visitor to see the latest hot news
which can update by the admin. These modules help the user to report online complaints.

REGISTERED USER MODULE: The registered user module includes,

Add complaint, Add Crime report, Add Missing person, viewing most wanted etc.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 8

November 21, 2011

CRIME MANAGEMENT SYSTEM

FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work, effort and the time that spend on it. Feasibility study lets the developer foresee the future of the project and the usefulness. A feasibility study of a system proposal is according to its workability, which is the impact on the organization, ability to meet their user needs and effective use of resources. Thus when a new application is proposed it normally goes through a feasibility study before it is approved for development. The document provide the feasibility of the project that is being designed and lists various areas that were considered very carefully during the feasibility study of this project such as Technical, Economic and Operational feasibilities. The following are its features:

Technical Feasibility
The system must be evaluated from the technical point of view first. The assessment of this feasibility must be based on an outline design of the system requirement in the terms of input, output, programs and procedures. Having identified an outline system, the investigation must go on to suggest the type of equipment, required method developing the system, of running the system once it has been designed. Technical issues raised during the investigation are: Does the existing technology sufficient for the suggested one? Can the system expand if developed? The project should be developed such that the necessary functions and performance are achieved within the constraints. The project is developed within latest technology. Through the technology may become obsolete after some period of time, due to the fact that never version of same software supports older versions, the system may still be used. So there are minimal constraints involved with this project. The system has been developed using Java the project is technically feasible for development. I.T.S ENGINEERING COLLEGE, GRETER NOIDA Page 9

November 21, 2011

CRIME MANAGEMENT SYSTEM

Economic Feasibility
The developing system must be justified by cost and benefit. Criteria to ensure that effort is concentrated on project, which will give best, return at the earliest. One of the factors, which affect the development of a new system, is the cost it would require. The following are some of the important financial questions asked during preliminary investigation: The costs conduct a full system investigation. The cost of the hardware and software. The benefits in the form of reduced costs or fewer costly errors.

Since the system is developed as part of project work, there is no manual cost to spend for the proposed system. Also all the resources are already available, it give an indication of the system is economically possible for development.

Behavioral Feasibility
This includes the following questions: Is there sufficient support for the users? Will the proposed system cause harm?

The project would be beneficial because it satisfies the objectives when developed and installed. All behavioral aspects are considered carefully and conclude that the project is behaviorally feasible.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 10

November 21, 2011

CRIME MANAGEMENT SYSTEM

User Characteristics:
Administrator: Administrators are responsible for updating the database and the contents of the website. Hence they should have the knowledge of the whole Student Attendance management system that is available. End Users: 1.) He/ She must have the knowledge about computers and how to operate the application which is provided in the form of simple GUI. 2.) He/ She must have an account or college ID. 3.) He/ She must be registered for the further processing.

Constraints:
Proxies cannot be detected.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 11

November 21, 2011

CRIME MANAGEMENT SYSTEM

SYSTEM ANALYSIS

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 12

November 21, 2011

CRIME MANAGEMENT SYSTEM

USE CASE DIAGRAMS

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 13

November 21, 2011

CRIME MANAGEMENT SYSTEM

E R DIAGRAM

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 14

November 21, 2011

CRIME MANAGEMENT SYSTEM

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 15

November 21, 2011

CRIME MANAGEMENT SYSTEM

DATA FLOW DIAGRAMS


Context flow diagram

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 16

November 21, 2011

CRIME MANAGEMENT SYSTEM

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 17

November 21, 2011

CRIME MANAGEMENT SYSTEM

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 18

November 21, 2011

CRIME MANAGEMENT SYSTEM

SOFTWARE DESIGN METHODOLOGY

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 19

November 21, 2011

CRIME MANAGEMENT SYSTEM

SDLC-THE WATERFALL MODEL

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 20

November 21, 2011

CRIME MANAGEMENT SYSTEM

All about the Waterfall Model


The waterfall model is a model which was developed for software development; that is to create software. It is called as such because the model develops systematically from one phase to other in a downward fashion, like a waterfall. The most probable phases through which it progresses downwards are

Definition Study/Analysis Basic Design Technical Design/Detailed Design Construction Testing Integration Management and Maintenance.

Before the advent of this method, the software development in the computer companies suffered from a haphazard integrated software network like cluttered knitting. However with this method they hoped to bring clarity in their projects. About the Phases As said earlier the waterfall model has been structured on multiple phases especially to help out the software construction companies to develop an organized system of construction. By following this method, the project will be divided into many stages thus easing out the whole process. For example you start with Phase I and according to this model, one only progresses to the next Phase once the previous one has been completed. This way one moves progressively to the final stage and once that point is reached, you cannot turn back; similar to the water in a waterfall.

Brief Description of the Phases of Waterfall Model

Definition Study / Analysis: During this phase research is being conducted which includes brainstorming about the software, what it is going to be and what purpose is it going to fulfill.

Basic Design: If the first phase gets successfully completed and a well thought out plan for the software development has been laid then the next step involves formulating the basic design of the software on paper.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 21

November 21, 2011

CRIME MANAGEMENT SYSTEM

Technical Design / Detail Design: After the basic design gets approved, then a more elaborated technical design can be planned. Here the functions of each of the part are decided and the engineering units are placed for example modules, programs etc.

Construction / Implementation: In this phase the source code of the programs is written.

Testing: At this phase, the whole design and its construction is put under a test to check its functionality. If there are any errors then they will surface at this point of the process.

Integration: in the phase of Integration, the company puts it in use after the system has been successfully tested.

Management and Maintenance: Maintenance and management is needed to ensure that the system will continue to perform as desired.

Through the above mentioned steps it is clearly shown that the Waterfall model was meant to function in a systematic way that takes the production of the software from the basic step going downwards towards detailing just like a Waterfall which begins at the top of the cliff and goes downwards but not backwards.

History of the Waterfall Model

The history of the Waterfall model is somewhat disrupted. It is often said or believed that the model was first put forth by Winston Royce in 1970 in one of his articles; whereas he did not even used the word waterfall. In fact Royce later presented this model to depict a failure or a flaw in a non-working model. So later on, this term was mostly used in writing about something that is often wrongly done in the process of software development like a common malpractice. Royce was more of the opinion that a successful model should have the allowance of repetition or to go back and forth between phases which the waterfall model does not do. He examined the first draft of this model and documented that a recurrent method should be developed in this

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 22

November 21, 2011

CRIME MANAGEMENT SYSTEM

model. He felt the need of progressing only after a feedback from the previous stage has been received. This is known as the Iterative model. As opposed to the Waterfall model, the Iterative model is more practical and has room for maneuver. Followers of the Iterative method perceive the Waterfall model as inappropriate. Advantages of the Waterfall Model Lets look at some of the advantages of this model,

The project requires the fulfillment of one phase, before proceeding to the next. Therefore if there is a fault in this software it will be detected during one of the initial phases and will be sealed off for correction.

A lot of emphasis is laid on paperwork in this method as compared to the newer methods. When new workers enter the project, it is easier for them to carry on the work from where it had been left. The newer methods dont document their developmental process which makes it difficult for a newer member of the team to understand what step is going to follow next. The Waterfall Model is a straight forward method and lets one know easily what stage is in progress.

The Waterfall method is also well known amongst the software developers therefore it is easy to use. It is easier to develop various softwares through this method in short span of time.

Disadvantages of the Waterfall Model There are many disadvantages to the model as well. Lets have a look at those,

Many software projects are dependent upon external factors; out of which the client for which the software is being designed is the biggest factor. It happens a lot of times, that the client changes the requirement of the project, thereby influencing an alteration in the normal plan of construction and hence the functionality as well. The Waterfall Model doesnt work well in a situation like this as it assumes no alteration to occur once the process has started according to plan.

If, for instance, this happens in a Waterfall Model, then a number of steps would go to waste, and there would arise a need to start everything all over again. Of course this also brings about the aspect of time and money which will all go to waste. Therefore this method will not at all prove to be cost effective. It is not even easy to take out the cost estimate of each step, as each of the phases is quite big. There are many other software developmental models which include many of the same aspects of the Waterfall model. But unlike the Waterfall model, these methods are not largely affected by
I.T.S ENGINEERING COLLEGE, GRETER NOIDA Page 23

November 21, 2011

CRIME MANAGEMENT SYSTEM

the outside sources. In the waterfall model, there are many different people working in the different phases of the project like the designers and builders and each carries his own opinion regarding his area of expertise. The design, therefore, is bound to be influenced; however in the Waterfall model, there is no room for that.

The other negative aspect of this model is that a huge amount of time is also wasted. For example if we study any software development process, we know that Phase II cannot be executed until Phase I has been successfully completed; so while the designers are still designing the software, time of the builders is completely wasted. Another disadvantage of this method is that the testing period comes quite late in the developmental process; whereas in various other developmental programs the designs would be tested a lot sooner to find the flaw at a time when a lot of time and money has not been wasted. Elaborate documentation during the Waterfall method has its advantages, but it is not without the disadvantages as well. It takes a lot of effort and time, which is why it is not suitable for smaller projects.

Modified Waterfall Models Due to the various disadvantages a lot of other modified versions of this model have also been put forth and some of these are mentioned below:

Royce Model

The Royce model stresses on the fact that the Waterfall model suffers from a serious flaw that one cannot return to a previous phase to correct something that has gone wrong.

Sashimi Model

Sashimi is a true modified version of the Waterfall model. The phases are somewhat the same as in the Waterfall Model; only this time the phases are overlapping each other which present many advantages. For example the time wont be wasted because before Phase I would be completed, Phase II would already be underway. Moreover, since they overlap, so one can return to the previous step if desired.

Aorta Lifecycle Model

The difference in this model is that they rely a lot on the feedback which comes from other phases before progressing onto the next.

V Waterfall Model

The V Waterfall Model relies on a linear software developmental program which stresses on balanced development more than anything else.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 24

November 21, 2011

CRIME MANAGEMENT SYSTEM

References
[1] Head First (Core Java) by Kathy Sierra and Bert Bates. [2] http://www.javacoffeebreak.com/java109/java109.html [3] http://www.oracle.com/technetwork/java/javase/downloads/index.html [4] http://www.emeriocorp.com/Solutions/Pages/TuitionManagementSystem.aspx [5] Complete Reference of JAVA by Patrick Naught on and Herbert Scheldt, Tata McGraw Hill [6] http://www.waterfall-model.com [7] http://en.wikipedia.org/wiki/Software_development_methodology [8] IEEE SRS format

[9] Designing tools- Rational Rose, Smart draw

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 25

Das könnte Ihnen auch gefallen