Beruflich Dokumente
Kultur Dokumente
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract Cybernetic Protectors is to provide a secure way 2. SYSTEM FUNCTIONALITY
of communication and transferring evidences in Secret
Intelligence Agency of defence system which always uses Figure 1 explains overall functionality of the system along
undercover agents to solve complex cases and dismantle with different set of users involved. In the information
criminal organizations. We are conceptualizing this software systems development field, requirements form the
as a solution so that Secret Intelligence Agencies and their foundation for the rest of the software development
agent can communicate through this Software for the process. since building a high-quality requirements
exchange of evidences in a secure way, and maintain the specification is essential to ensure that the product
details of main officer. The Cybernetics Protector software is satisfies the users.
concerned with the security of the country and thus proper
care has to be taken that confidential data from within the
database is not leaked out. Every country requires a Secret
Agency who undertakes cases which are a threat to the
national security. These agencies operate with the help of
undercover agents who help solve these cases. Since these
cases deal with the nations security, the communication and
data transfer between the agents and higher authorities
need to be protected.
1. INTRODUCTION
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1577
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
2.2 The Security Chief in the application with various controls provided by
The Chief of the Secret Agency has the highest powers. system rich user interface. This system makes the
He can administer the agents, assign cases and overall project management much easier and flexible.
resources. Also he has right to view the database.
Cybernetics and Management written by Beer
2.3 The Agent S.(1960) [5] specifies the various classes have been
The undercover agent can send the evidence and data used for maintain the details of all the users and
collected in an encrypted fashion so that the data cannot be
catalog. Authentication is provided for this application
intercepted.
only registered users can access. Report generation
2.4 Citizen features is provided using to generate different kind of
A citizen has the lowest access rights. A citizen can only view reports.
the success stories of the agency and chat with the officials.
5. RELATED WORK
This feature is provided to the Chief of Security, Agent and
the Defense Ministry. This feature basically enhances the A Cybernetic Approach to Resolving International
security of the software.
Conflicts written by Chestnut, H. (1986)[6] specifies the
system provides facilities to track the all activities of
Agency-Chief and Agents. System also tracks the tips
3. PROBLEM DEFINITION
and suggestion online.
The main objective of Crime Investigation With Cybernetic Anticipating Critical Reconfiguration in World
Protectors is to provide a secure way of communication Societal Fields System written by De Greene, K. B.
and transferring evidences in Secret Intelligence Agency of (1982)[7] provides facility to recruit Agents in online.
defence system which has always uses undercover agents System also provides facility to upload evidences in
to solve complex cases and dismantle criminal encrypted format and view cases, related resources.
organizations. We are conceptualizing this software as a This system is providing more memory for the users to
solution so that Secret Intelligence Agencies and their maintain data.
agents can communicate through this Software for the
exchange of evidences in a secure way And maintain the Eck-Introduction to Programming using java, Sixth
details of Defence Minister. Edition written by David J.[8] states that the system
doesnt provide any functionality to upload evidences
4. LITERATURE SURVEY in encrypted format. This system doesnt provide
recruitment of agents through online. The system
Knowledge-Based Intelligent System Advancements
doesnt provide any functionality to Defense
written by Jerzy J.[1], states that this existing system is
Minister/Secrete Agency-Chief/Agents for online
not providing secure registration and profile
chatting.
management of all the users properly. This manual
system gives us very less security for saving data and 6. PROPOSED SCHEME
some data may be lost due to mismanagement.
The development of this new system contains the
A Cybernetic Approach to Resolving International following activities, which try to automate the entire
Conflicts written by Chestnut, H. (1986)[2] specifies the process keeping in the view of database integration
system is giving only less memory usage for the users. approach. This system maintains users personal,
The system doesnt provide facility to track all the address, and contact details. User friendliness is
activities of Agency-Chief and under working Agents. provided in the application with various controls
provided by system rich user interface. This system
Cybernetic Safety And Security written by A. G. makes the overall project management much easier
Hessami[3] specifies the development of this new and flexible.
system contains the following activities, which try to
automate the entire process keeping in the view of Our project crime investigation with cybernetic
database integration approach. This system maintains protector basically consist of five modules are as
users personal, address, and contact details. follows
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1578
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
UI displaying set
Ministery Login
Of Operations Mails
System
Security
Agencys chief
Logout
Evidences
Agent
Transferring in Figure 3. Secret intelligence agency chief
Secret Intelligence
Agencies Secret intelligent agency chief receives cases from
defence ministry and distribute that cases to
respective undercover agent for collecting evidences
Ministry of Defence of that case. Undercover agent works under secret
intelligence agency chief and seret intelligence
agency chief assign different undercover agent for
different cases. Secret intelligent agency chief should
be able to create, edit and views undercover agent
Citizen profile.
upload Evidence
view resources
Agents
chating
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1579
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
NO
7. EXPERIMENTAL RESULT
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1580
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
8. CONCLUSION
REFERENCES
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1581
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1582