Sunday, September 15, 2019
Criminal Record Management
CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT TEAM NAME: THE constructorS THE GREAT MIND CHALLENGE 2012 CRIMINAL RECORD MANAGEMENT SOFTWARE REQUIREMENT SPECIFICATION Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior, MADHYA PRADESH Team Guide: Dr. Anurag Shrivastava Members: NITIKA IPG-2011-070 HIMANI SHARMA IPG-2011-042 PRIYANKA AGRAWAL IPG-2011-082 Department: Information Technology 1 1 THE constructorS THE constructorS State: Madhya Pradesh CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT TABLE OF CONTENTS 1 Introduction: 1. 1 Purpose 1. Scope 1. 3 Definition, Acronyms, and Abbreviations 1. 4 References 1. 5 Tools to be used 1. 6 Technologies to be used 1. 7 Overview 2. 0 Overall Description 2. 1 Product Perspective 2. 2 Software Interface 2. 3 Hardware Interface 2. 4 Product Function 2. 5 User Characteristics 2. 6 Constraints 2. 7 Architecture Design 2. 8 use Case Model Description 2. 9. 1 Class Diagram 2. 9. 2 Sequence Diagrams 2. 10. 1 ER Diagram 2. 10. 2 Schema 2. 11 Assumptions and Dependencies 3. 0 Specific Requirements 3. 1 Use caTHE constructorS THE constructorS se Reports 2 2 3. 2 Supplementary RequirementsCRIMINAL RECORD MANAGEMENTCRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 1 INTRODUCTION Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment.The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along w ith low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time. 1. 1 Purpose-Purpose of this Project is to implement a CRM (Criminal Record Management). This is a database system in which police will keep the record of Criminals who have been arrested, to be arrested or escaped. This will help the Police department to manage their records easily. In police system when an incident occurs, a Petitioner reports an FIR (First Information Report). Police starts investigation according to law on this FIR. An investigation Officer supervises the investigation process. The main concerning people in the whole process are Petitioner (The person who files an FIR), Victim, Accused/Criminal, investigation officer. . 2 Scope: The Scope of the criminal record management includes:- The scope of the CRIMINAL RECORD MANGEMENT involves all the prohibitions & record- data under CRM project and since it is a vastly implicated record by the crime related department therefore the scope though limited to be implicated yet. * Meant for 5 different users 1) Jail Superintendent 2) Police Officers 3) CBI officers 4) Administrator 5) Judge * All have their own profiles in CRIMINAL RECORD MANAGEMENT(CRM) Administrators maintains database, backup and restore data time to time. Police officer can look for criminal's history, can transfer criminal to another jail. * CBI officer can look for details of any criminal. * Judge can look for criminal's record, decide criminal's punishment. * Police superintendent records all necessary data about a criminal and update databaseTHE constructorS THE constructorS 1. 3 Definitions, Acronyms ; Abbreviations: 1. 3 3 THE constructorS T HE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRM: criminal Record management. 2. HTML (Hyper Text Mark-up Language): It is used to create static web pages. . JSP (Java Server Pages): It is used to create dynamic web content. 4. J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java applications. 5. WSAD (Web-Sphere Studio Application Developer): It is a designer toolkit which is designed to develop more complex projects by providing a complete dynamic web service. 6. WASCE (Web-Sphere Application Server Community Edition): It is an application server that runs and supports the J2EE and the web service applications. . DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient database platform to raise a strong ââ¬Å"on demandâ⬠business applications. 8. HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server protocol between a web browser and a web server. 9. XML (Extensible Mark-up Language): It is a markup language that was designed to transport and store data. 10. Ajax (Asynchronous Java Script and XML): It is a technique used in java script to create dynamic web pages. 11. Web 2. : It is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centred design and collaboration on the World Wide Web. 12. UML: Unified Modelling Language is a standard language for writing software blueprints. The UML may be used to visualize, specify, construct and document. 13. RAD: Rational Application Developer is a development tool that helps to design web pages and also helps to design the diagrams like ER, Database schema diagrams and to generate DDL. 1. 4 References: * IBM TGMC Sample Synopsis * IBM- www. ibm. in/develeporworks * THE constructorSTHE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Java- www . sun. com * Wikipedia- www. wikipedia. com * Complete Reference-J2EE * 4 4 Object Oriented Modelling and Design with UML-Michael Blaha, James Ram Baugh. * Software Engineering, Seventh Edition, Ian Somerville. * IBM Red Books. * Database Management Systems ââ¬â Nava the. 1. 5 Tools to be used * ROSE/RSA / Web-Sphere Modeler * Eclipse/ RAD / Lotus Forms Designer / Portlet Factory * Web-Sphere Portal/ WAS/ WAS CE / WPS * DB2 Express ââ¬â ââ¬ËCââ¬â¢ or DB2 UDB * Tivoli CDP/TSM / Tivoli Directory Server * Linux as the preferred OS. 1. Technologies To Be Used: * J2EE: (Servlet, JSP, JAXP, Java Beans) Application architecture. * JAVA: Application architecture. * WASCE: (Web-Sphere Application Server Community Edition) Web Server * DB2: IBM Database. * RAD 7. 0: Development tool 1. 7 Overview:- * A professional looking user interface with login IDs for criminals, police officers, superintendents, administrator and judge. * Once recruited all the users access their right to r espected functions or actions as enlisted later. * Another component of this is the reports generated in response to:- a) Registration confirmations. ) Statement of security and privacy. c) Print outs for criminal's history. * Functions/actions of ââ¬â 1) Jail Superintendent * Register the new Criminal. * Record the Crime type and details of the crime. * Take the information like photo from 3 different view, blood group, finger print, retina scan and DNA information. * THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Search Criminal with any of the above input. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Update the new crime of existing criminal. * 5 5 Maintain the current location of the criminal (i. . Cell No. , Jail Name etc. ) * Maintain the records of meeting with outsiders. * Record the data of health condition if any. * Assign works. 2) Police Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/ Image/Sketch. * Transfer the criminal to another jail. * Access full information of criminals. 3) CBI Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Access full information of criminals. 4) Administrator * Maintain the database. * Grant/Revoke role to/from other Users. * Backup and restore of data. * Monitor the Jail Administration. ) Judge * Access information of criminals. * THE constructorS THE constructorS Also access information about other Users. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Reduce/Increase the level of punishment. * 6 6 Transfer the criminal to other location. * Constraints ââ¬â a) The content and graphical user interface is in English. b) Login and password is for identification. c) The allowed person is allowed to access the database only upto a limited extend. d) This system is limited to HTTP/HTTPS. e) This system is working for single server only. 2. 0 Overall Description:- 2. 1 Product Perspe ctive:THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 2 Software Interface: * Client on Internet Web Browser, Operating System (LINUX preferred) * Web Server WASCE, Operating System (LINUX preferred) * Data Base Server CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT DB2, Operating System (LINUX preferred) * Development End RAD (J2EE, Java, Java Bean, Servlets, HTML, XML, AJAX), DB2, OS (LINUX preferred), Web-Sphere(Web Server) 7 7 2. 3 Hardware Interface: 2. 3. 1 Client Side: * Browser- Internet Explorer, Mozilla Firefox,NN, * Processor- All Intel or AMD- 1 GHZ Ram- 256 MB * Disk space- 100 MB 2. 3. 2 Server Side: * For RAD * Processor- All Intel or AMD- 1 GHZ * Ram- 2 GB * Disk space- 5 GB * For DB 10. 12 * Processor- All Intel or AMD- 1 GHZ * Ram- 512 MB * Disk space- 500 MB 2. 4 Product Function-The SIC client should be running on the client system so as to track the account details of the user. The server will only respond to thos e systems where the client is running THE constructorS THE constructorS 2. 5 User characteristics 1. General Users: They will be in a position to permit access to the users in the Internet and acknowledge their account status. 2.Administrators: They are the core users and are able to add new users to the system and permit them to access the Internet resources. They can also view in real time what a user is performing right now. They can also get the overall report of the user sessions. 3. Client Users: They login at the client level and this is to get access to the Internet at the client level. They can also view their account status in the client system. 2. 6 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Constraints ââ¬â * 8 8 The content and graphical user interface is in English. * Login and password is for identification. The allowed person is allowed to access the database only upto a limited extend. * This system is limited to HTTP/HTTPS. * This system is working f or single server only. 2. 7 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Architecture DESIGN- THE constructorS THE constructorS 9 9 2. 8 Use Case Model Description- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT User ââ¬â User can log in after registration then look for site , give information like name, Location,& other Information about the criminals. Administrator- Administrator monitors the details of criminals, aggregates feedback, Backup & restore of data.Manager- Works same as administrator and also monitors , and works on input from feedback Public reviews ââ¬â They query or give reviews on open web based funds listed for utilization, maintaining proper confidentiality 2. 9. 1 Class Diagram- User| Managers| Admin | User-name | User-id() | User-id() | Password| Password() | Password() | Sign-up() | Login() | Login() | Search-criminal() | Feedback() | Criminal()| Contact-details() | Criminal()| View-status()| Feedback() | | Add-new Criminal() | THE cons tructorS THE constructorS Login() | | 10 10 | CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 9. Sequence Diagram- THE constructorS THE constructorS THE constructorS THE constructorS 11 11 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 1 ER DIAGRAM- THE constructorS THE constructorS 12 12 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 2 SCHEMA- CRIMINALS| Name| Criminal id| Occupation| Date of Arrest| Date of birth| Crime| Punishment Details| Address| Sex| Finger Print| Blood Group| Photograph| Punishment starts on| Punishment ends on| Bail (if given)| Health report| Unwanted activity during punishment| Jail Details| Site Admin|Name| Email id| Date of birth| Sex| Occupation| Qualification| Contact Number| Password | Country| Expert User| Name| Email id| Date of birth| Sex| Occupation| Qualification| Achievement| Contact_num| Password| City| Country| Registered Profile| Name| Email- Id| Sex| Password| Address| Dat e of birth| Contact Number| Police station| Station Id| Station Name| Station Location| Station In-charge| Lock up room| Lock up Number| Lock up Location| Room size| Maximum Capacity(allowed)| Present status| Criminal In Jail| Jail Id| Criminal id| MEDIA| Media Id| Media Name| Media Type| 13 13 2. 11 Assumptions and Dependencies Initially only two locations are connected to the SIC * Each location is always connected, whether an operator is logged on at the remote location or not * Each User must have a User-ID and password * There is only one Administrator. * Server must always run under Linux system * Internet connection is a must. * Proper browsers should be installed * Text readers should be installed to view the help files. THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT THE constructorS THE constructorS 3. GRAPHICAL USER INTERFACE- 3. 0 Specific Requirements ââ¬â 1) The details within it should be defined as individual specific requi rements, following the guidelines for sound requirements (verifiable, unambiguous, etc. ) (2) Specific requirements should be organized in a logical and readable fashion. (3) Each requirement should be stated such that its achievement can be objectively verified by a prescribed method. (4) Sources of a requirement should be identified where that is useful in understanding the requirement. (5) One way to classify the specific requirements is as follows 14 14 3. 1 Use Case Reports- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENTUse case| Description| Login| The user has to register for first time then log in| Update Profile| Information like current address, ration card etc. | Give feedback| Giving feedback to the manager| 15 15 THE constructorS 7 THE constructorS 7 Use case| Description| Login| The Administrator has to register for first time then log in| History of criminal| Keeps record and check of criminal| Aggregate feedback| Collect feedback from User| Give feedback| Give personal and collected feedback to manager| Ask query| Ask query to the manager| Use case | Description|Login | The Manager has to register for first time then log in| History of criminal| The Administrator has to register for first time then log in| Aggregate feedback| Collect feedback from user| Efficiency check| Checking the efficiency of database and administrator| Input from feedback| Reviewing feedback and involving concerned action| 16 16 THE constructorS 7 THE constructorS 7 3. 2 External Interface (Supplementary) Requirements-This should specify: (1) The characteristics that the software must support for each human interface to the software product.For example, if the user of the system operates through a display terminal, the following should be specified: * Required screen formats * Page layout and content of any reports or menus * Relative timing of inputs and outputs * Availability of some form of programmable function keys. CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD M ANAGEMENT the use of other required software products (for example, a data management system, an operating system, or a mathematical package), and interfaces with other application systems is specified below:- For each required software product, the following should be provided: * Name Mnemonic * Specification Number * Version number * Source For each interface: * The purpose of the interfacing software should be related to the software product. * It is not necessary to detail any well-documented interface, but a reference to the document defining the interface is required. (1) Safety Requirements-Highly recommend Kaspersky 2013 internet security to been Installed in users Pc to prevent the harm that may occurs by unwanted malicious softwareââ¬â¢s, phishing URLs and all the types of virus attacks during using this application. 2) Security Requirements-All users should be properly authenticated before allowed entry into the system authentication will be based on an E-mail address, and a password. All activities on the system must be logged. (3) Non-Functional Requirements- Secure access of confidential data (userââ¬â¢s details). SSL can be used. 24 X 7 availability. Better component design to get better performance at peak time. Flexible service based architecture will be highly desirable for future extension. 17 17 THE constructorS 7 THE constructorS 7
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.