Beruflich Dokumente
Kultur Dokumente
Contents
LIST OF FIGURES
Figure 1.1: Gannt Chart for the Schedule. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 17
Figure 4.1: Context Diagram. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -28
Figure 4.2: Program Data flow Diagram. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -29
Figure 4.3: Program Flowchart. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 30
Figure 4.4: Entity relationship model of Motor Vehicle Licensing System - - - - - - - - -31
Figure 4.5: admin login- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 34
Figure 4.6: Home Page - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 35
Figure 4.7: Overview model of registration module. - - - - - - - - - - - - - - - - - - - - - - - - 36
Figure 4.8: Overview model of vehicle module. - - - - - - - - - - - - - - - - - - - - - - - - - - - -37
Figure 4.9: Complaints Module- -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -38
LIST OF TABLES
Table 1.1: Economic Feasibility - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -16
INTRODUCTION ..........................................................................................................9
1.1.
1.2.
MISSION STATEMENT................................................................................................ 10
1.3.
1.4.
1.5.
SYSTEM OBJECTIVES.................................................................................................. 11
1.5.1.
1.5.2.
1.6.
JUSTIFICATION .......................................................................................................... 14
1.7.
1.8.
1.9.
1.9.1.
1.9.2.
1.9.3.
1.9.4.
1.10.
CONCLUSION......................................................................................................... 18
2.0.
2.2.
2.3.
2.3.1.
2.3.2.
2.3.3.
2.3.4.
2.4.
2.5.
Conclusion ................................................................................................................ 24
3.0.
ANALYSIS .................................................................................................................. 25
3.1.
Introduction ............................................................................................................. 25
3.2.
Overview .................................................................................................................. 25
3.3.
3.3.1.
3.3.2.
4.0.
DESIGN ..................................................................................................................... 27
4.1.
4.2.
4.2.1.
4.2.2.
4.3.
4.4.
4.5.
4.5.1.
4.5.2.
4.5.3.
4.5.4.
4.5.5.
5.0.
5.1.
Introduction ............................................................................................................. 38
5.2.
5.3.
Description of Implementation.................................................................................. 38
5.4.
5.5.
5.5.1.
Installation................................................................................................................ 39
5.5.2.
Training .................................................................................................................... 39
5.5.3.
Execution .................................................................................................................. 39
5.5.4.
Review....................................................................................................................... 39
5.6.
5.6.1.
5.6.2.
Hardware Requirements......................................................................................... 40
5.7.
5.8.
Coding ...................................................................................................................... 42
5.9.
Integrating Modules.................................................................................................. 43
6.0.
SYSTEM TESTING....................................................................................................... 44
6.1.
Introduction ............................................................................................................. 44
6.2.
6.2.1.
Black-Box Testing.................................................................................................... 44
6.2.2.
6.2.3.
6.2.4.
6.2.5.
6.2.6.
6.3.
7.0.
Power failure........................................................................................................ 50
7.1.
8.0.
8.1.
INTRODUCTION ........................................................................................................ 52
8.2.
8.3.
9.0.
BIBLIOGRAPHY .......................................................................................................... 59
APPENDIX ............................................................................................................................ 61
DEDICATION
I dedicate this project to my family for their love, understanding and support during the
entire project period.
God bless my entire family.
ACKNOWLEDGEMENT
DECLARATION
This entire documentation is the authors original work and therefore no one shall have the right
to copy, reproduce or present this project documentation without the authors knowledge and
authority.
Author..
Sign...
Date
1.0.
CHAPTER ONE
INTRODUCTION
Preserve peace
Apprehend offenders
Apart from the above-mentioned functions, being in the capital city it is also undertake
all special operations for state and coverage of international functions.
The Kenya police began its operations between 1887 and 1902, by the Imperial British
East Africa (I.B.E.A.) Company. It was until 1907 that Kenya police was organized along
military line and the training was military in nature. In 1906 the Kenya police was legally
constituted by police ordnance. The Nairobi provincial police headquarter had its first
Provincial Police Officer (P.P.O). In 1958, until late 1960s they were known as Chief
Police Officers. To date, it has had a total of eighteen (18) provincial police officers.
Covering a large area Nairobi area is divided into different divisions and units in order to
curb crime effectively. In October 2004 Nairobi was extended to a Greater Nairobi
covering Magadi, Mlolongo, Syokimau, Kiamumbi and Kinoo taking up parts of Rift
valley, Eastern and Central provinces respectively. Currently it has a total of nine (9)
police divisions, which include:
There are also special units which deals specifically with particular criminal activities.
This project is based on, or will cover the registration of new vehicles and investigation
of stolen vehicles within Nairobi and its immediate environs in the Police Divisions;
which is one of their roles as stipulated in the Police Act, section 14.
1.1.
VISION STATEMENT
Nairobi Area Police headquarters vision is to create a secure Nairobi with effective and
efficient police service, which is proactive in reducing crime as well as being disaster
prepared.
1.2.
MISSION STATEMENT
To reduce crime and promote development by providing high quality police service
through:
10
1.3.
All the Nairobi Area Police Divisions are currently using a paper based system where
only the stolen or lost vehicle records are manually filled on paper files or the Occurrence
Book with absolutely no amount of automation.
1.4.
PROBLEM DEFINITION.
The following problems were sighted in the current system and have since then
influenced the need for a new system to be developed to address these problems. It was
found that with the current system;
Lack of Data Integrity- the Nairobi Police Headquarters does not maintain a
parallel Database of all the registered vehicles in the country with Kenya Revenue
Authority and as such it becomes a problem in identifying the real vehicle owner
in case of theft or act of terrorism.
Storage space and retrieval of information- The current system stores
information in file cabinets and this makes it time consuming to retrieve a record
of a previously stored records this makes it even more difficult for an Officer in
Charge of a crime to update record in the archives whenever a vehicle is found.
Data duplication- This arises when information on a stolen vehicle to be
recorded in more than one police station leading to data redundancy.
Loss of Occurrence Book (OB) - as it is the case with traditional filling system
used by the Police Divisions, a very high risk of data loss is eminent in case of
any natural catastrophe as all records are kept in one place and its not easy to
make backups.
Poor services to Citizens Complaint services rendered to their people were
slow and hence leading to constant complaint from them as well as queue in the
service desk. This has now started to translate to frustration and loss of trust with
the police.
1.5.
11
SYSTEM OBJECTIVES
This section outlines what the system should accomplish. This was determined on basis
of understanding how the current system works and what its problems were. This
information has been used to implement improvements on the manual system.
12
The system should provide for safe storage of data by allowing data is stored in
diskettes, magnetic tapes and CDs and these should be conveniently stored away from
the police stations for integrity purposes.
The system should enable police officers to keep track of area susceptible to vehicle
theft.
The system should detect and a report error to the automatically once incorrect data
has been inputted. E.g. when an individual tries to register an already registered
vehicle.
The new system should support proper utilization of computer resources by allowing
multiprocessing.
To develop a user-friendly system that will simplify some of the stressful
tasks such as continuous searching of misplaced vehicle records.
To produce a system that will allow the registration and deregistration of vehicles
whenever they are written off by insurance companies.
Consequently the proposed system should be able to do the following tasks:Register new vehicles, owner details as well as stolen vehicles.
Enable the Officer manning the desk to check on the status of a stolen
vehicle.
Display all registered and stolen vehicles.
Automatically generate a report on the vehicles for monitoring and
planning.
Automatically generate an authentication report upon submission of a
stolen vehicle complaint.
13
1.6. JUSTIFICATION
This project is indeed timely for it comes at a time when the National Police Service is
undergoing major reforms and when the force is under intense pressure to perform as per the
expectations of the country. In line with that is the recent involvement of vehicles in the
recent wave terrorist attacks within and without the county and thereby providing a need for
independency from Kenya Revenue Authority for vehicle identification. The system is
important and comes with various benefits one of them being effective and efficient
management of the vehicles that enter or belong to the residents of Nairobi and its environs.
The benefits of the project overshadow the costs that will be incurred in the course of its
development and operation. This is because it will be able to reduce car theft and citizens
buying stolen second hand vehicles as any interested party can walk into the police station
and counter check on validity of owners information.
This project has to be completed because it will enable the police officers to monitor and
occurrence of vehicle related crimes and hereby make decisions on where to conduct regular
patrols as well as scheduling of operations.
The project offers a prospect for application of the knowledge gained and realization of
more skills with an aim of satisfying the users. It facilitates the appreciation of the theory
behind system development and demonstrates the challenges encountered in the
development of a system.
14
As such the system does not aim to automate the entire Occurrence Book but only the
section that concerns itself with vehicles.
1.8.
Though the system will greatly help solve the Nairobi Area police problems, there are
disadvantages it will bring along. This includes:
a) An act of parliament may be necessary to mandate the Kenya Police to have a
parallel database as that of KRA and as well as make it mandatory for everyone
owning a vehicle to register it with the Force.
b) The system will lead to overdependence i.e. it is foreseen that the officers will
entirely depend on the system to protect public property.
c) The system will call for additional costs required for training the police officers.
d) The file transfer process will be cumbersome as all previous records of stolen
vehicles are all in paper files.
e) A cost has to be incurred in purchasing new hardware and software. Also the cost
of hiring experts to maintain and administrate the system
f) A public awareness campaign has to be carried out to help the public familiarize
themselves with the new system and hence a new added cost.
g) The public as it is the norm may be reluctant to register the vehicles with Kenya
police.
It is necessary to note that the above limitations will have a short time implication and as
such should not worry the management.
15
No. Of items
Total cost
Pc Computers
18,000.00
10
180,000.00
Hp LaserJet printer
4,500.00
10
45,000.00
Networking
20,000
20,000.00
16,000.00
16,000.00
Documentation
2,000.00
2,000.00
Ms windows 7
8,000.00
8,000.00
Open source
Training costs
6,000.00
6,000.00
TOTAL COSTS
Table 1.1
16
277,000.00
Start date
End date
Feasibility study
15/05/2014
25/05/2014
Analysis
26/05/2014
02/06/2014
Database design
03/06/2014
10/06/2014
System design
11/06/2014
06/07/2014
Test strategy
05/07/2014
12/07/2014
Coding
13/07/2014
20/07/2014
21/07/2014
28/07/2014
Installation
29/07/2014
05/08/2014
Implementation_ testing
06/08/2014
13/08/2014
Maintenance
After installation.
No. of weeks
17
10
11 12
18
2.0.
Abstract
CHAPTER TWO
LITERATURE REVIEW
This review provides an overview of the role computer software plays within police
forces with particular attention paid to crime and vehicle registration and investigation
computer systems. Illustrative systems that are in practical use for tackling both major
and volume crimes are described. Particular attention is paid to the attempts that have
been made to automate the police force in dealing with crime. It concludes by looking at
the desired features of the proposed system in relation to already existing crime
investigation systems. A topic of current research is the use of data mining techniques for
automatically detecting patterns in reported vehicle crimes.
2.1.
Introduction
Recent years have seen an increasing use of computers within police forces, not just in
general administration -payroll, personnel, e-mail, and general office suites- but also as a
tool to assist the core business activity of policing preventing and solving crime.
Increasing crime rates and the greater awareness of modern criminals puts a strain on
existing methods and techniques. There is, therefore, a clear need for the application of
advanced software technologies in order to make the best use of limited resources.
2.2.
Cronkhite (2013) stated that information is the life blood of any law enforcement agency.
The accurate and rapid flow of information is essential for effective law enforcement.
Without information, police work would come to a standstill.
Without a fast and reliable means of obtaining and communicating police information,
manpower is wasted and police operations are degraded. As the rate at which vehicle
crime increased from 2004 through 2011 (53.7% increase in major vehicle crimes
nationally) so has the amount of information the police have to handle -World Atlas,
19
Kenya Crime Statistics (2012). It has reached such volume in most police agencies that
information no longer can be manually manipulated with any degree of accuracy and
efficiency. Automation can assist law enforcement to be more effective, particularly in
relationship to four major problems areas:
Reducing crime.
Optimizing police manpower.
Tracking Vehicle Information.
Gathering information to locate owners of recovered vehicles.
Ensuring efficient transition in the change of ownership of vehicle and facilitate
the sale of second hand vehicles.
But, one problem which seems to wave all of the automation systems was the length of
time it took to get data into the computer. Northrop (2000) in a study conducted
discussing the effectiveness of police computer use and the problems that exist with this
use. It was found in that study that the respondents in forty four cities across the United
States view computers as a major force in the fight against crime. This too could be
applied in Nairobi County if properly established and managed.
Cronkhite (2013) concluded that automation is not a remedy but rather just a tool for:
Rapidly correlating crime and criminal information from massive amounts of data
Quickly locating and dispatching field forces
Storing, correlating, manipulating and retrieving massive amounts of data
accurately and promptly.
Speedily transmitting and interchanging information from field personnel to data
files and from one agency to another.
20
2.3.
According to Ratledge et al. (2012), a variety of technologies have been tested and used
by many law enforcement agencies in the world. This includes:
2.3.1. Home Office Large Major Enquiry System (HOLMES)
All 43 UK police forces use the current HOLMES system that is approximately 12 years
old. There are five variant main systems produced by Bull, ICL, CGS UK Ltd, Unisys
and MDIS each using its own proprietary database, programming and query language.
Information cannot easily be transferred between systems; in fact, there is only a limited
linking facility between systems from the same manufacturer.
HOLMES uses a Bull utility, transaction processing system (TPS), to extract text from
the files and compile the status database. To search for a vehicle record, the system will
instigate a procedure, which is transparent to the user, by firstly searching the vehicle file
and then the status database.
Within the present HOLMES systems all data is limited to a single incident, no searching
can occur across incidents thereby imposing obvious limitations.
2.3.2. Violent Criminal Apprehension System (VICAP)
The Federal Bureau of Investigation developed the VICAP system that uses pattern
analysis to monitor case activity enabling the investigators to trace the travelling criminal
who is actively involved in major violent crime.
When a new case is entered, the system simultaneously compares and contrasts 188
variables relating to MO categories against those held in the database. The output is a
listing of the ten cases that most resemble the one being entered. The VICAP system has
21
22
However, it still has its limitation as they have not met up with the demands to the masses
that spend endless time anxiously waiting for their demands to be met at Kenya Revenue
Authority and the are still working under the mercies of the registrar of motor vehicles
whenever in need of any information regarding any vehicle or vehicle owner.
Hence, the full computerization have not been effected as expected while technology and
software programming has advanced in other countries.
Shall we continue to wait for the criminals to get away with our stolen vehicles? Shall the
law enforcement agency continue with their dependency on other institution in order to
obtain vital information on the citizen? Shall the police force spend endless time
searching for owners of whose vehicles have been recovered when software can be
developed to tackle such problem like these? Shall inconsistency in on information
continue to be the norm of the Law Enforcement agency?
2.4.
It has been shown how investigation systems are being developed to harness the power of
the computer as a tool to aid the solution of both major and volume crimes. Identifying
characteristics in volume crime where there are no clear suspects is quite difficult due to
specific series of crimes being lost in the morass of all reported crimes.
From the stance of investigating crime, there is a set of features that would be most
desirable in any computer system for the police:
The ability to interface with incongruent, existing systems. It is quite common, at
present, to check four or five different systems to establish the history of and
information about a single address or person.
The ability to use natural language for queries and the competence for any
submitted query to have the capability of searching through all tables in the
database without the requirement to establish relationship links would bring
complex searching into the domain of the untrained user. It would also require a
complex indexing system to ensure acceptable retrieval times.
23
When data is entered into the system a useful facility would be the automatic
matching of any new information to existing information based on user defined
criteria. Examples being the entry of a vehicle registration number.
2.5.
Conclusion
The computer, as a tool, plays an essential part in the investigation of both major and
volume crime. The majority of current systems are designed to be used in the
investigation or registration of either these categories of crime. The proposed system
however, is intended to do both registration and investigation of motor vehicle crimes in
Nairobi and its environs.
This requires increasing sophistication and specialization to obtain the best results from
the software and gain confidence in the procedures.
Future systems should now exploit AI techniques that will enable the automatic
examination and presentation of information. However, in the past AI systems have been
viewed with a great deal of skepticism within the police force.
This is partly due to a general lack of computer literacy and also due to systems requiring
a substantial amount of hand crafted knowledge with which users may disagree or the
knowledge becoming dated and difficult to update.
24
CHAPTER THREE
ANALYSIS
3.1. Introduction
This chapter will briefly discuss what has been learnt from the literature review and the
review of existing products. The information will then be used to set the requirements
specification.
3.0.
3.2. Overview
The literature review highlighted many key areas. The review exposed the need to use a
specific system tailor-made for the registration and investigation of vehicles. It brought
to the forefront the need to for the police force to have a self-sufficient system for vehicle
management in the Nairobi area police department. Vehicle details should be accessible
to as many police officers as possible.
The review of existing systems revealed important features that are similar across the
majority of their functionality. These features included the use of robust, universal and
integrated components. Where possible these features should be included or adapted for
the implementation. The review also gave an insight into the weaknesses. Many of the
systems only dealt with human criminal investigations and identification. If they the
offender was to use a vehicle, it would take the intervention of other third parties to
recognize the said person and the vehicle. The existing systems depended on other
systems from other government agencies to conduct their investigation. None of the
systems had a self -sufficient database for their Operation.
25
Non-functional requirements are requirements that are not directly concerned with the
specific services delivered by the system to its users. They may relate to emergent system
properties such as reliability, response time, and store occupancy. Alternatively, they may
define constraints on the system implementation such as the capabilities of I/O devices or
the data representations used in interfaces with other systems. Non-functional
requirements, such as performance, security, or availability, usually specify or constrain
characteristics of the system as a whole. They include:
Usability- The system provides a help and support menu in all interfaces for the
user to interact with the system.
Security- The system provides username and password to prevent the system from
unauthorized access.
Performance- The system response time for every instruction conducted by the
user must not exceed more than a minimum of 10 seconds.
Availability- The system should always be available for access at 24 hours, 7 days
a week. Also in the occurrence of any major system malfunctioning, the system
should be available in 1 to 2 working days, so that business process is not severely
affected.
3.3.2.
Specific Requirements
These are statements of services the system should provide, how the system should react
to particular inputs, and how the system should behave in particular situations. It
specifies the software functionality that the developers must build into the product to
enable users to accomplish their tasks. This includes;
Vehicle investigation.
Allow for user to register a complaint on lost vehicle.
Transfer plates between vehicles and vehicles between different persons
Collect vehicle and vehicle owner information
Process certain complaints and registration certificate.
Change details in the database, if necessary
Vehicle registration
26
CHAPTER FOUR
DESIGN
4.1. DESIGN METHODOLOGY
The analysis and design of a system involve various methodologies. The methodology
4.0.
used in the analysis and design of this system is the Structured System Analysis and
Design Methodology (SSADM). This methodology uses a systematic and structured
manner to analyze and design a system. The methodology which uses a linear life circle,
divided the whole project task into various stages or phases.
This stage is meant to come up with a system structure in terms of database design,
interface design and a process flow that is reflective of a systematically organized
sequence. This activity is succeeded by a program design that should facilitate data entry,
processing and subsequence storage in the format that will ensure uniformity and
maximum accuracy of entries. Database interface and program design
This is done to show the systems flow of information. The requirements were used to
create the basis for the new system. Its main objective is to design a system which
delivers the functions required by the users to support the business objectives of their
organization this activity is affected using process description tools e.g. (DFD) and
context diagrams.
The design area covered includes the following:
Interface modeling
Program modeling
Data modeling
Process modeling
4.2. System Architecture Description
4.2.1. Context Diagram
This system is based on two main components:
Database: Contain all the data and information about vehicles in Nairobi
Area.
User Interface: enables the Officer on Duty or any other relevant Officer to
access the various parts of the system, which perform various functions and
operations.
The Officer inputs data using the GUI, which interacts with the system and/or database to
give output. There is one database, which is a data store.
27
VEHICLE REGISTRATION
Context Diagram
AND INVESTIGATION
OFFICER ON
Registered vehicles
DUTY
Request
Reports
Reports
SENIOR OFFICERS
28
Level 1 DFD
1
Owner details
D1
owners
2
Delete vehicle details
reg. No
D2
Police Officer
file on duty
Vehicle details
Vehicles
vehicle details
view vehicles
4
Vehicle status
complaints
Stolen
vehicle
Vehicle status.
5
Check status of stolen vehicle
29
Reg. No.
Start
No
Valid?
Error
message
Yes
Register
owner
Yes
Register owner?
No
Register
vehicle
Yes
Register vehicle?
No
Yes
Record
complaint
Record a vehicle
complaint?
No
Check
status
Yes
Check status?
No
Yes
Update
records
Update records?
No
30
END
Data type
size
null
description
adminID
Varchar
no
Officer login id
Password
Varchar
no
Data Type
size
null
description
idNo
Varchar
25
no
fName
Varchar
50
no
First Name
oNames
Varchar
50
no
Other Names
Nationality
Varchar
50
no
pNumber
Varchar
25
no
Phone Number
Varchar
50
no
Email address
address
Varchar
50
no
town
Varchar
50
no
Town of residence
31
Data type
size
null description
rNo
Varchar
25
no
Make
Varchar
50
no
model
Varchar
50
no
Vehicle model
yOM
date
no
Year of manufacture
engineCC
Varchar
50
no
Engine capacity
chesisNo
Varchar
50
no
color
Varchar
50
no
Vehicle color
wheels
Varchar
50
no
Number of wheels
insuranceC
Varchar
50
no
Insurance company
idNo
Varchar
25
no
size null
description
rNo
Varchar
25
no
area
Varchar
50
no
date
date
no
Date of theft
idNo
Varchar
no
25
32
4.4.
Admin
Vehicles
Register
Is registered
Is owned
Registers
is registered
Owns
Owners
33
Admin Login
Username
Password
LOGIN
34
REGISTER VEHICLE
VIEW VEHICLES
RIGISETR
COMLAINT
VIEW STOLEN
VEHICLES
CHECK VEHICLE
STSTUS
EXIT
Owners Details
First Name
Other Names
ID/Passport No.
Nationality
Phone Number
Email Address
Address
Town
NEXT
35
RESET
Vehicle Details;
Registration No.
Make
Model
Year of Manufacture
Chassis No
Engine capacity
Color
No. of Wheels
Insurance Company
Owner IdNo
SUBMIT
36
CANCEL
Vehicle Reg. No
Area Stolen
Date Stolen
Id No. Of Owner
Submit
37
CHAPTER FIVE
5.0.
SYSTEM IMPLEMENTATION
5.1. Introduction
System implementation is a collection of inter-dependent physical devices together with
their programming which provides the functionality and performance for which the
system was designed. It covers all the activities necessary to set the system that has been
analyzed and designed to be fully functional to the users.
Implementation develops the system to be functional to attain the objectives. It is done by
acquiring hardware and installing software required to develop the system. It is then
followed by developing database and coding the modules and integrating the modules.
5.2. Implementation Overview
Nairobi Area Police Department has relied on a Manual method of Record Keeping since
its inception. A major consideration in the automated systems implementation was the
fact that the organizations registry and record department has been using the manual
system all this years over which no other system has been introduced. The subsequent
sections provide a description of the implementation approach and Tasks that will be
involved.
5.3. Description of Implementation
With all the above stated factors put into consideration, the Parallel Changeover method
will be the most convenient implementation method for the system. The Parallel
Changeover runs both the existing system and the new system side by side. Since two
systems are available, one acts as backup to the other and as a benchmark for comparison
of how well they function. If the new system fails, the existing system remains in place to
take over processing.
Parallel changeover is typically the choice for applications considered critical to the
projects success. However, Parallel Changeover has its disadvantages. It is the most
expensive changeover method. It may require additional personnel and Executing
systems side by side is time consuming and costly.
38
5.5.1. Installation
This will involve both Hardware and Software Installation and will be carried out by the
system developer.
5.5.2. Training
The training phase of Implementation will involve introducing the police staff to the
system and its functionality. Training will be carried out by the system developer.
5.5.3. Execution
This will involve the actual operation of the system in parallel with the manual system.
The execution phase will be performed by the Officer in charge.
5.5.4. Review
During the Review phase, the System developer and the Officer in charge will analyze
and compare the Manual system to the automated system and draw conclusions on the
changeover.
5.6.
System Requirements
39
Specification
Purpose
1. Personal Laptop
- Mobility in development
GHz
- RAM minimum 512MB
- Hard disk minimum
40GB
- Monitor minimum 15
LCD
2. Printer
- Laser or DeskJet
- Should be able to print
A4 size paper.
3. PHP scripting language
40
4. MySQL Server
41
<?php
session_start();
// dBase file
include("connect.php");
// Grab User submitted information
$adminID = $_POST["adminID"];
$password = $_POST["password"];
$result = mysql_query("SELECT * FROM login");
$row = mysql_fetch_array($result);
if (false === $result) {
echo mysql_error();
}
if($row["adminID"]==$adminID && $row["password"]==$password)
Header("Location: home.php");
Else{
echo"Sorry, your credentials are not valid, Please try
again.";}
?>
42
43
CHAPTER SIX
SYSTEM TESTING
6.1. Introduction
Developing a good and logically sound test plan is very vital to developing a bug free
software system. The testing of the system includes unit testing, integration testing,
system testing and acceptance testing. The following sections describe the testing for the
system.
6.0.
Searching
Sub-module
Testing
Expected Output
Search by
Search each
Load documents
categories
category with
applicable data
Testin
g
Result
Passed
string
Search each
category with
non-applicable
books found.
data
44
Passed
Add/Edit
Add New
vehicle
Vehicle
vehicle data to
database.
Update /
Passed
save.
vehicle
View vehicles
Update vehicle
Data.
will be updated.
Search by owner
ID number
similar ID
Owner
Vehicle
owner data to
database.
Owner
save
Edit/Update
Update owner
owner
data
will be updated.
Search by owner
ID number
supplied ID
Record a
Record
Enter vehicle
Data updated in
stolen
complaint
Registration No.
database
Enter owner ID
Data updated in
Vehicle
Complaint
Passed
Passed
Passed
Passed
Passed
Passed
database
Report
Monthly
Check vehicles
Generating
reports
registered and
stolen complaints
45
Passed
Print if option
Passed
selected.
Log on
Login as
Enter username
administrator
and password
password.
Passed
username and
password.
password
Log off
Exit
Passed
Passed
Backup
Back up
Show location to
back up.
System saves
database to specified
location.
Shows success
message.
If fails, fail message
46
Passed
i.
Check logical paths of the coding after coding and when any change is made.
Errors are fixed and result showed well working.
ii.
Check the loops whether it works intended. Result showed well working.
iii.
Check logical decisions working correct or not. Result showed all the
conditions are working well.
iv.
Check overall internal program structure for the whole system. Result showed
all the connectivity and structure working well.
47
During the testing I was concerned about the inputs and expected outputs. Emphasis is on
the testing where I input the data and compared the output with the expected results. I
tested for the acceptance of unexpected data and the reaction from the program.
I kept checking the database manually during testing whether it works according to the
rules that I established in the relationships.
48
new errors. The test also performed improper actions to ensure the system is
immune to invalid actions like adding blank records.
Usability testing was done to test how convenient the system is to use. It was done
in users point of view. It was tested for easy interface, short cuts, and handy
commands. It was also tested if one task can be done in an alternative way for
users choice.
Security testing is to test disaster recovery and unauthorized access. The system
offers back up.
49
CHAPTER SEVEN
7.0.
PROBLEMS ENCOUNTERED IN DEVELOPMENT PROCESS
While carrying out the project development several problems and experiences were
encountered. Below are some of the problems encountered and how they were overcome.
Inadequate time
During the project there was shortage of time to develop and finish the project. Extra
time was spared during the weekends and at night to proceed with the project.
Power failure
This was a very major problem in the project development. There was frequent
power failure which always interrupted with the project timetable and the short
time allocation, sometimes some data would get lost in the process forcing one to
redo the job again.
Lack of enough resources
The machines needed to work out the project were not enough. Besides that
development work required a lot of money, which was not adequately available.
7.1.
The system can only be used by trained end users therefore there have to be retraining
of the workers in the organization. The users must be computer literate so that they
can maneuver through the system with ease.
It was not currently possible to implement the system to work in a networked
environment.
The system has managed to carry out all the procedures as expected in all the types of
files e.g. searching the customer records, displaying the found records, deleting the
unwanted records
Security is enhanced in the system by use of passwords.
Alert messages for the user to confirm if certain data should be deleted prevent data
loss.
Due to existence of the above limitations, it was concluded that the development team
should continue looking up with methodologies of ensuring that the system will
efficiently be used in a networked environment, they should be seeing into it that the
50
system can be in a position to assign user rights to different users to restrict their access
to the information in the system.
The developers should also look into developing of on demand report to address real time
management needs.
New technology that is coming up in the fast growing computer world can be included in
the system to make it more efficient and fast e.g. use of automatic teller machines which
can be used by the customers to inquire their bills and payments cash using them.
51
CHAPTER EIGHT
8.0.
USER GUIDE
The application is user-friendly enabling user to easily navigate through the program.
This ease the workload of the user having to initiate the commands himself/herself, as
programming language used is object oriented therefore command driven.
8.1. INTRODUCTION
This is a guide to users on how to load the software platform on which the system is to
run on, how to load the system and how to use the system.
This section explains the system installation and maintenance procedures for the
administrator.
8.2. System Installation
The system will come with an installation CD. Steps to install the system are as follows.
i.
ii.
iii.
iv.
After installation, the short cut for the programme will be stored in Start menu > All
Programs > NAPDVRS. When program is run at the first time, it will ask for login.
Figure 7.1 shows the log in form
User has to fill all the necessary fields. The Website URL given during the login will
appear in about window and will allow opening it in default browser when clicked. The
registration key will be checked for correct key while being typed and will show valid if
correct otherwise cross.
52
When loading the system first ensure that the computer machine is in good working
condition and that there is power.
Procedure
This form will allow a admin load the other modules of the system.
Login form.
This where the admin name and the password are typed to allow the user to navigate
through the project the password and the user name are defined in the database in that not
any name can be entered and access granted. This enhances security.
53
54
Interaction pages.
55
Complaint form.
This form allows the admin to interact with the system when handling people complaints.
Vehicle owner registration
form
56
57
Searching
This enables an individual to search records.
58
9.0.
BIBLIOGRAPHY
Atkinson, B (2009) Cyber cops make house calls", The Globe and Mail, Science and
Criminology.
Bell, D. (2005). Database Software for Microcomputer Systems. McGraw-Hill Book
Company, USA.
Cronkhite, C.J (2013). Automation and Law Enforcement, Pennsauken, New Jersey.
CRIS Sales Promotion Literature (2012), Department of Technology, Metropolitan Police,
London.
Daily Telegraph, (1996), "Computer feeling collars", Daily Telegraph,
Here Maps for Life. (2014) Country and City retrieved from
http://here.com/directions/
Keller, J. J. (2001). Federal Motor Carrier Safety Regulations Pocketbook. Academic
Press, Ibadan.
Lerk Mark and Deeks David (3rd Edition)-Introduction to System Analysis and DesignPearson Education (2010).
Northrop et al., 2000, Journal of Criminal Justice, Vol. 23, Iss. pgs. 209- 309.
Oladipo, O. I. (2011). Road Transportation in South Western Nigeria, 1900 1960: its
Role, Nature and Impact on the Economy. Nicholas Brealey Publishing, London.
Pratelli, A. & Brebbia, C. A. (2011). Urban Transport and the Environment. Academic
Press New York, USA.
Pressman, R.S., Software Engineering: A Practitioners Approach, 7th Edition, McGraw
Hill, New Delhi, 2011
59
Ratledge, E.C, Jacoby, J.E (2012), Handbook on Artificial Intelligence and Expert Systems
in Law Enforcement, Greenwood Press, Westport, CO.
Rudman, J. (2004). Motor Vehicle Licensing Supervisor. Gower Publishing Limited, Lagos.
World Data Atlas, Kenya Crime Statistics (2012) retrieved from
http://www.knoema.com/atlas/kenya/statistics at18th June, 2014; 17:05hrs
Ramkrishna.R& Johannes G. Database Management Systems. - McGraw-Hill (2012).
Summerville, I., Software Engineering 9th Edition, Pearson Education, Delhi, 2010.
The Kenya Police. (2014) Nairobi retrieved from
http://www.kenyapolice.go.ke/Nairobi.asp/
Thomas Mathiba. (2012)Developing and Implementing an IT Based Project
Management System retrieved from
http://www.wrseta.org.za/
60
APPENDIX
Sample Code
<?php
session_start()
?>
<html>
<head>
<link href="Newfile.css" rel="stylesheet" type="text/css">
<title>Admin Login</title>
</head>
<form action="loginpro.php" method="post" class="login-Container">
<legend>Admin Login</legend>
<label><span>User Name</span><br><input type="text" name="adminID"
REQUIRED></label><br>
<label><span>Password</span><br><input type="password" name="password"
REQUIRED></label>
<label><span></span><br><input type="submit" name="login" value="LOGIN"
id="login"></label>
</form>
</html>
<?php
session_start();
// dBase file
include("connect.php");
// Grab User submitted information
$adminID = $_POST["adminID"];
$password = $_POST["password"];
$result = mysql_query("SELECT * FROM login");
$row = mysql_fetch_array($result);
if (false === $result) {
echo mysql_error();
}
if($row["adminID"]==$adminID && $row["password"]==$password)
Header("Location: home.php");
else echo "<center><img src= 8.png WIDTH='200'
BLINK><br></center>";
print "<center><b>Sorry, your Login Credentials Are NOT VALID,
Please CHECK AND try AGAIN<b></center>";
?>
<?php
session_start();
?>
<html>
<head>
61
<html>
<head>
<title>New Owner registration</title>
</head>
<link rel="stylesheet" type="text/css" href="newfile.css">
<body>
<div class="wrapper-home">
<div id= "main-Container">
<h3>NAIROBI AREA POLICE<BR> VEHICLE REGISTRATION
AND INVESTIGATION SYSTEM</h3>
<div id="nav">
<a href= "home.php"><button>Home</button></a><br>
<a href="stolenv.php"><button>Stolen Vehicle Complaint</button></a><br>
62
63
$email=($_POST["email"]);
$address=($_POST["address"]);
$town=($_POST["town"]);
$username='root';
$password='';
$host="localhost";
$databaseName='system_project';
$connect=mysql_connect($host,$username,$password);
if ($connect){
$db=mysql_select_db($databaseName);
}
else{
echo "could not connect to server";
}
$query="INSERT INTO owners
VALUES('$fName','$oNames','$nationality','$idNo','$pNumber','$email','$
address','$town')";
$result= mysql_query($query);
if ($result){
header("Location:vehiclereg.php");
}
else { die(mysql_error());
}
exit();
?>
64