Professional Documents
Culture Documents
REPORTING SYSTEM
CONTENTS
1. Synopsis
2. Organization Profile
3. Project Overview
4. System Analysis
4.1 Existing System
4.2 Proposed System
4.3 Feasibility Study
4.3.1 Economic Feasibility
4.3.2 Technical Feasibility
4.3.3 Behavioral Feasibility
4.4 Tools &Platforms Used
5. Requirement Analysis
5.1 Problem Recognition
5.2 Problem Evaluation and Synthesis
5.3 Modeling
6. System Design
6.1 Data Design
6.2 Architectural Design
6.3 Procedural Design
6.4 Interface Design
7. Coding
8. System Testing
8.1 Testing Process
8.2 Unit Testing
8.3 Integration Testing
8.4 Validation Testing
9. Implementation
9.1 Implementation Procedures
10. Software Maintenance
11. Conclusion
12. Appendices
Appendix A (DFD)
Appendix B (Tables)
Appendix C (Input forms and Output forms)
13. Bibliography
Submitted By:- Preeti Sen
1
SYNOPSIS
2
SYNOPSIS
3
ORGANIZATION PROFILE
4
ORGANIZATION PROFILE
Soft Solutions provides worldwide IT solutions for Global 1000 corporations to stay
abreast of the changes in todays environment. Our areas of expertise include
technology consulting, Application Development, Information Security and SAP. We
are highly motivated, experienced professionals committed to our clients success.
Our technical expertise enables us to innovate, develop, and implement cutting edge
technology solutions, resulting in significant savings for clients.
What distinguishes Soft Solution from its competitors is the work culture of
excellence, which is the result of our commitment to a greater cause. Mr. Harish
Ramachandran, CEO
Working closely with our clients, we customize our solutions to fit each and every
client's unique needs and marketplace. Listed are, but a few of Soft Solutions
comprehensive suite of services:
Application Development
Information Security
SAP Implementation
5
PROJECT OVERVIEW
6
PROJECT OVERVIEW
The Crime Records Management System applies to Police Stations all across the
country and specifically looks into the subject crime prevention, detection, conviction
of criminals depending on a highly responsive backbone of Information Management.
The efficiency of the Police and the effectiveness with which it tackles crime depend
on what quality of information it can derive from its existing records and how fast it
can have access to it.
I had done this project using ASP.NET as front end and SQL Server as back end
easing the effort of user.
1) Station module
Each of the station must first register with the Software. For the registration part each
station enter their details like station name, address, phone no, station in charge etc.
and get a User Id from the Software. Once the prospective station registers with the
software they can avail the existing records.
2) Citizen module
Each of the citizens, who has a complaint to register, must first register with the
Software. For the registration part each person enter their details like name, address,
phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the
registration is complete, the citizen can sign-in to the website & register their
complaint.
3) Crime module
This module is used for entering all details about the crime. It contains the date and
time, police station where it is recorded, place, Nature of Crime, Location of the
Crime etc.
4) Search module
In this module we can search the crime in station wise, nature of crime.
7
5) Administrators Module
The module will be protected by user ID and password. Ordinary users of the
software will not be permitted to enter into this area of the software. The module will
be focusing on the maintenance like Master Data Maintenance, Removal of old and
outdated data from the software etc.
6) Avocation Module
This Module deals with the Law part of every Crime.
The system has developed in ASP.NET as front end and SQL server 2000 as back
end.
ASP: ASP is a server side scripting technology that enables scripts (embedded in web
pages) to be executed by an Internet server
About VB.NET
Microsoft.net was formerly known as next generation windows services (NGWS for
short).It is a completely new platform for developing the next generation of windows
8
/web applications. These applications would transcend device boundaries and fully
harness the power of internet.However, this new platform required a language, which
could take its fully advantage; this is one of factors that led to the development of
VB. VB has evolved from QBASIC language.The VB compiler is considered to be
the most efficient compiler in the .net family and a major part of the .net based
classes libraries, itself are written in VB.
9
SYSTEM SPECIFICATIONS
SOFTWARE SPECIFICATIONS
The Crime Reporting System must use Microsoft SQL server 2000 as its database
component.
Software Requirements
The software requirements include the software that is required for working. Software
requirements are as follows:
Developments Tools
Database
SQL Server
Application Server
Sun Microsystems
Operating System
Windows XP Professional
10
HARDWARE SPECIFICATION
Hardware interfaces specifies the logical characteristics of each interface between the
software product and the hardware components of the system. Many business type
applications will not have hardware interfaces, since Crime Reporting System is an
application it too will not require any particular hardware interface.
Hardware Requirements
The hardware for the project should be selected in such a way that it should give the
maximum optimal result .Hardware requirements are as follows:
Server Side
Processor :Intel Pentium (II) or higher
128 MB RAM
2 GB Hard Disk or more
SVGA Color Monitor
104 Keyboard
Any Mouse
Any modem
Client Side
Processor :Intel Pentium (II) or higher
128 MB RAM
2 GB Hard Disk or more
SVGA Color Monitor
104 Keyboard
Any Mouse
Any Modem
11
SYSTEM ANALYSIS
12
SYSTEM ANALYSIS
System Analysis works with users to identify goals and build systems to achieve
them. System analysis is an important phase of any system development process. The
system is studied to the minutest details and analyzed. The system analyst plays the
role of an interrogator and dwells deep in to the working of the present system. In
analysis, a detailed study of these operations performed by a system and their
relationships within and outside of the system is done. A key question considered here
is, what must be done to solve the problem? One aspect of analysis is defining the
boundaries of the system and determining whether or not the candidate system should
be considered. The system is viewed as a whole and the inputs to the system are
identified. The outputs from the system are traced through the various processing that
the input phases through in the organization. During analysis, data are collected on
available files, decision points, and transaction handled by present system. Once
analysis is completed the analyst has a firm understanding of what is to be done.
EXISTING SYSTEM
In the existing crime management system, most of the operations are done manually
like send complaints, taking actions against crimes, view status etc. So with the
existing system if anybody wants to complaint against crimes he must do it through
the police.
If we are doing the system manually, so many minor errors will occur. Error detection
in the previous entries made and data cross verification is another important function.
These are done manually, and it would take time.
13
The officer dealing with a particular case cannot take decision by himself even
when he is having the first hand knowledge/information about the case and he can
expect obstructions from higher authorities/officials.
Even an efficient officer cannot/may not able to handle more than one case at a
time.
As we all know, a covered truth, Bribery plays an important role in the existing
system.
Many cases are pilled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
As per our jurisdiction, Let thousand criminals escape-not a single innocent be
punished . As a result of this and other factors that influence investigation, such as
bribery, the innocent becomes accused in several situations in the eyes of Justice.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
They criticized it for being inefficient, time consuming, poorly managed, disparate
and lacking flexibility.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many
crimes become regarded as antisocial activities.
14
PROPOSED SYSTEM
Our mission statement directs us to promote the public interest while balancing the
Law. Obviously well not rush to judgment, but will look at the facts and render a
thoughtful decision based on these facts. Organization is an independent statutory
body which was created to maintain an effective an effective and efficient police
service for the public. Its primary task includes securing continuous needs of the
public in an efficient manner. As part of the responsibility, our committee is
responsible for performance monitoring (performance planning and review formerly
professional standards and performance monitoring) decided to look at the
contribution and effectiveness of the organization within the public. We need the
whole hearted support of each and every individual member of the site and
cooperation of the users. The administrator, along with the investigators, lawyers,
counselors, and other authorities statutory partners in our organization. Given their
key role in these partnerships, we felt that an overview of strength and Weakness of
the organization is needed.
The aim of the project is to bring about improvement to the organizations
contributions; this report necessarily concentrates on overcoming weakness and
raising standards. To avoid conducting and unfair evaluation efforts which are made
to put this contribution into this context. It believes that partnership work is highly
beneficial to the organization and that partnership work is the way forward to reduce
crime and disorder.
15
The proposed system has control over all its cells and is perfectly coordinated. Also
the cells can act individually. To take our organization to heights we need the
wholehearted co-operation of the public.
In the fast moving world, if people lack something, it is time. All are busy in their
world. It will be welcomed if services are provided at their will. So the main objective
of our product is better communication, better leadership, reducing crime and disorder
etc.
The product provides a framework within which a user can easily work with. That
was out next objective. We know users are of many categories, like users from who
know working with computers very well to users who didnt know about computers.
So all the category can use the software. So it should be user friendly.
The product provides a framework, which is error free. We know a crime
management system is actually a critical process having many calculations and
operations. So each simple error laid to big problem. So it should be error free and our
objective is to build error free software.
16
FEASIBILITY STUDY
To define an improved information system, the study group must understand the
information requirements of the organization. This understanding may be obtained by
determining what is currently being done and of investigating through interviews and
analysis what information is needed to be provided that is not being furnished by the
existing system . Data on the cost of operating the current system needs to be collected
in order to make a cost benefit for a new system.
The objective of feasibility study is not to solve the problem, but to acquire a
sense of its scope. During the study, the problem definition is crystallized and aspects of
the problem to be included in the system are determined, consequently costs and
benefits are estimated with greater detail at this stage. The result of the feasibility study
is a system formal proposal. This is a simply a form of documenting or detailing the
nature and scope of proposed solutions. The proposal summarizes what is known and
what is going to be done. Three key considerations involved in the feasibility analysis:
Economic feasibility
Technical feasibility
Behavioral feasibility
17
ECONOMIC FEASIBILITY:
Economic analysis is the most frequently used method for comparing the cost
with the benefit or income that is expected from developed system.
In the existing system, many people are involved in the process but in the
proposed system, number of persons involved be reduced drastically. So the proposed
system is economic.
In the existing system, storage of all these records should be arranged and
security should be provided for the records. In the proposed system, separate security
arrangement is not needed since the software provides security and maintenance is
simply and hardly needs one or two person to operate the system.
TECHNICAL FEASIBILITY:
The feasibility center on the existing computer system (software, hardware) and
to what extend it can support the proposed addition.
In the proposed system, data can be easily stored and managed in database
management system software.
The results for various queries can be generated easily.
Therefore, the system is technically feasible
BEHAVIORAL FEASIBILITY:
People are inherently resistant to change and computer has known to facilitate
change. An estimate should be made of how strong a reaction the user staff likely to
have towards the developments of computerized system.
In the existing system more manpower is required and time factor is more but in the
proposed system, manpower and time factors are reduced .So, the remaining
numbers are engaged with some other important works.
18
An SRS is basically an organization's understanding (in writing) of a customer
or potential client's system requirements and dependencies at a particular point in time
(usually) prior to any actual design or development work. It's a two-way insurance
policy that assures that both the client and the organization understand the others
requirements from that perspective at a given point in time.
19
TOOLS & PLATFORMS USED
Computing Model
Visual Studio .Net is the rapid application development tool for BASIC. Visual
Studio .Net offers complete integration with ASP.NET and enables to drag and drop
server controls and design Web Forms as they should appear when user views them.
20
The .NET Framework is a multi-language environment for building, deploying,
and running XML Web services and applications. It consists of four main parts:
Common Language Runtime: Despite its name, the runtime actually has a
role in both a component's runtime and development time experiences. While
the component is running, the runtime is responsible for managing memory
allocation, starting up and stopping threads and processes, and enforcing
security policy, as well as satisfying any dependencies that the component might
have on other components. At development time, the runtime's role changes
slightly; because it automates so much (for example, memory management), the
runtime makes the developer's experience very simple, especially when
compared to COM as it is today. In particular, features such as reflection
dramatically reduce the amount of code a developer must write in order to turn
business logic into a reusable component.
Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding each
control to the Web Form programmatically, it helps to add these controls by
using toolbox, saving programming efforts.
Visual Studio .Net supports custom and composite controls. Can create custom
controls that encapsulate a common functionality that might need to use in a
number of applications.
21
Visual Studio .Net does a wonderful job of simplifying the creation and
consumption of Web Services. Mush of the programmer-friendly stuff (creating all the
XML-based documents) happens automatically, without much effort on the
programmers side. Attribute-based programming is a powerful concept that enables
Visual Studio .Net to automate a lot of programmer-unfriendly tasks.
ASP.NET
ASP.NET is more than the next version of Active Server Pages (ASP); it is a
unified Web development platform that provides the services necessary for developers to
build enterprise-class Web applications. While ASP.NET is largely syntax compatible
with ASP, it also provides a new programming model and infrastructure for more secure,
scalable, and stable applications.
22
does this make Web development easier, but it also provides all the benefits that these
tools have to offer, including a GUI that developers can use to drop server controls onto
a Web page and fully integrated debugging support. Developers can choose from the
following two features when creating an ASP.NET application, Web Forms and Web
services, or combine these in any way they see fit.
Web Forms allows you to build powerful forms-based Web pages. When
building these pages, you can use ASP.NET server controls to create common
UI elements, and program them for common tasks. These controls allow you to
Rapidly build a Web Form out of reusable built-in or custom components,
simplifying the code of a page.
An XML Web service provides the means to access server functionality
remotely.
ASP.NET ARCHITECTURE
.NET ARCHITECTURE
23
In addition to the built-in ASP.NET security features, an ASP.NET application
can use the low-level security features of the .NET Framework.
Features
Reliable Interoperability
Employ code to call native Windows APIs, use pre-built COM components, and
leverage existing ActiveX controls to seamlessly integrate existing applications and
components.
Create Web-based solutions in VB using the shared Web Forms Designer and
XML Designer. Developers can also use IntelliSense features and tag completion or
choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web
applications.
24
Integrating with IIS
IIS is the web server is used here. IIS 5.0 or above is essential for
the ASP.NET for the environment. This release of ASP.NET uses IIS 5.0 as the pre
Kim host environment. When considering ASP.NET authentication, you should
understand the interaction with IIS authentication services.
IIS always assumes that a set of credentials maps to a Windows NT account and
uses them to authenticate a user. There are three different kinds of authentication
available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication
(NTLM or Kerberos). You can select the type of authentication to use in the IIS
administrative services. If you request a URL containing an ASP.NET application, the
request and authentication information are handed off to the application..
Web Service
Web service is arguably the most exciting and innovate features of Microsofts.
NET initiative and they are likely to profoundly affect the way business interact using
computer application. List of possible Web services is as varies as the list of possible
business opportunities. Web service would typically perform a core business service
such as user authentication, credit card validation, pricing a derivates security, placing a
purchase order for a stock or pricing a same-day shipment.
A web service may also return information to the caller. This service resides
somewhere on the Web and can be accessed from other locations on the Web. For this
service to be called, there are a number of elements that must be in place. First, the
caller must know how to call the service. Second, the call must be made across the
Web. Finally, the web service must know how to respond.
25
Introduction to VB. NET
Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to
create a user interface than writing several lines of code. The predecessor of Visual
BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC
was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid
Application Development tool. This is the main reason why Visual BASIC. Net is
widely used as a prototyping language.
VB. Net is object oriented, whereas each object possesses some properties like size,
position, color, appearance etc. This means that we can compartmentalize different
aspects of our application as object and develop test those object independently of
the rest of the application. By modifying certain properties and invoking the methods
of these objects, we exert a great deal of control over the users interaction with the
VB.net program we have written. Each object has its own event handling procedures.
Visual BASIC.net is a member of Visual Studio.
One of the merits of VB.Net is that it insulates the user from having to deal with low-
level message handling. This allows as to quickly creating powerful applications
without having dealing with unnecessary data. Microsoft has developed VB. NET as
a complete Windows applications development system.
26
Back end
27
(ETL) tool, business intelligence and analysis services, and new capabilities such as
Notification Services. The result is the best overall business value available.
28
for as separate add-on products for their highest-end editions are included in Standard
Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and
merge) Full-Text Search English Query Stored procedure development and debugging tools
SQL Profiling and performance analysis tools.
1. Snapshot.
It copies an entire view of data to another computer. The destination database view is
overwritten with the new version. Snapshot replication distributes data exactly as it appears
at a specific moment in time and does not monitor for updates to the data. Snapshot
replication is best used as a method for replicating data that changes infrequently or where
the most up-to-date values, low latency, is not a requirement. When synchronization occurs,
the entire snapshot is generated and sent to Subscribers.
2. Transactional.
Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are
replicated to another computer. With transactional replication, an initial snapshot of data is
applied at subscribers, and then when data modifications are made at the Publisher, the
individual transactions are captured and propagated to Subscribers. Transactional
replication is helpful when: Incremental changes need to be propagated to subscribers as
they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and
Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the
Publisher.
3. Merge.
Updates on any computer will be replicated to another computer at a later time. Merge
replication is the process of distributing data from Publisher to Subscribers, allowing both
the Publisher and Subscribers to make updates while connected or disconnected, and then
merging the updates between sites when connected. Merge replication allows various sites
to work autonomously. At a later time, merge updates produce single, uniform result. The
29
initial snapshot is applied to Subscribers, and then you have tracked changes to published
data at the Publisher and at the Subscribers.
The data is synchronized between servers continuously, at a scheduled time,
or on demand. Because updates are made at more than one server, the same data may have
been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur
when updates are merged. Merge replication includes default and custom choices for
conflict resolution that the user can define while configuring a merge publication. When a
conflict occurs, a resolver is invoked by the Merge Agent and determines which data will
be accepted and propagated to other sites. Merge replication is helpful when:
Multiple Subscribers need to update data at various times and propagate
those changes to the Publisher and to other Subscribers. Subscribers need to receive data,
make changes offline, and later synchronize changes with the Publisher and other
Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is
because the data is filtered into partitions and then published to different Subscribers, or due
to the uses of the application. However, if conflicts do occur, violations of ACID properties
are acceptable.
30
REQUIREMENT ANALYSIS
31
REQUIREMENT ANALYSIS
Problem Recognition
Problem Evaluation & Synthesis
Problem Recognition
The goal of this step is recognition of basic problem elements as indicated by the
customer. The basic purpose of this activity is to obtain a thorough understanding of
the needs of the client and the user, what exactly is desired from the software and
what are the constraints on the solution.
In this step analyst must define all externally observable objects, evaluate flow and
control of the information, define and elaborate all software functions, understand.
Software behavior and design constraints etc. Evaluation and synthesis continues until
both analyst and customer field confident about the product.
Once the problems are identified, evaluation process begins. After evaluation of the
current problem and desired in formations, the analyst synthesis one or more
solutions.
32
Cost effective
No chance of errors
MODELING
During the evaluation and solution synthesis activity, the analyst creates models of the
system in an effort to better understand data and control flow. The model serves as
foundation for software design and as the basis for the creation of specification for the
software. For the better understanding of data and control flow we use Data Flow
Diagram.
Data Flow Diagram is used to define the flow of the system and its resources such as
informations. DFDs are a way of expressing systems requirements in graphical
manner. DFD represents one of the most ingenious tools used for structured analysis.
It has the purpose of clarifying system requirements and identifying major
transformations that will become programs in the system design. It is the major
starting point in the design phase that functionalities decompose the requirement
specification to the lowest level of detail.
33
SYSTEM DESIGN
34
SYSTEM DESIGN
The most creative and challenging phase of the system life cycle is system design.
The term design describes a final system and the process by which it is developed. It
refers to the technical specifications that will be applied in implementing the proposed
system. It also includes the construction of program and designing of output, input,
menu, code, database and process of the system.
On-line data entry makes use of processor that accepts commands and data from the
operator through a keyboard or a device such as touch screen or voice input.
Designing the code depends on the programming language chosen and mostly they
are not specified while outlining the design of the system. The goal of coding is to
translate the design of the system in to code in a programming language. The aim of
the code design is to implement the system in best possible manner.
Database design is used to define and specify the structure of objects used in the
system. A wide array of design information must be developed during the database
design. A database is the collection of interrelated data stored with minimum
redundancy to serve many users quickly and efficiently. The general objective of data
base design is to make information access easy, quick, inexpensive, and flexible for
the user.
35
ARCHITECTURAL DESIGN
a) Program Structure
The product entitled Crime Reporting System follows bottom up program structure.
In a bottom-up approach the individual base elements of the system are first specified
in great detail. These elements are then linked together to form larger subsystems,
which then in turn are linked, sometimes in many levels, until a complete top-level
system is formed. This strategy often resembles a "seed" model, whereby the
beginnings are small, but eventually grow in complexity and completeness. However,
"organic strategies", may result in a tangle of elements and subsystems, developed in
isolation, and subject to local optimization as opposed to meeting a global purpose.
PROCEDURAL DESIGN
Procedural design occurs after data, architectural, and interface designs must be
translated in to operational software. The procedural design for eachcomponent,
represented in graphical, tabular or text based notation, is the primary work product
produced during component level design.
Begin
If ((User name is valid)) and corresponding password is correct) then
Theuser is an authorized person & can access the system
Else
Display invalid user
End If
End
36
INTERFACE DESIGN
Human interface:- In project work entitled Crime Reporting System the user will
interacts with product through Graphical User Interface (GUI) which will be
developed in front pages. Since GUIs are the interface, workings with GUIs are very
simple and not at all complicated. So any user who had no knowledge about softwares
and computers can use this Crime Reporting System very simply.
The input and output forms of Crime Reporting System are provided in Appendix
C.
37
CODING
38
CODING
End Sub
End If
cmd.Dispose()
con.Close()
Catch ex As Exception
MessageBox.Show(ex.Message, "ERROR",
MessageBoxButtons.OK, MessageBoxIcon.Error)
End Try
Else
MessageBox.Show("Record not found......")
39
End If
End Sub
Try
Dim cmd As New OleDbCommand("insert into St_Info
values('" & TextBox1.Text & "', '" & TextBox2.Text & "','" &
TextBox3.Text & "','" & TextBox4.Text & "','" & TextBox5.Text & "','"
& TextBox6.Text & "','" & TextBox7.Text & "','" & TextBox8.Text &
"','" & TextBox9.Text & "','" & TextBox10.Text & "')", con)
con.Open()
cmd.ExecuteNonQuery()
Catch ex As Exception
MsgBox(ex.Message.ToString)
Finally
con.Close()
End Try
Else
MsgBox("Data Saved.........")
End If
Dim a As DialogResult = MsgBox("Are you sure You want Input
Record Now ", MsgBoxStyle.YesNo, "Varify...")
If a Then
new1()
End If
End Sub
40
End Sub
End Sub
End Sub
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e
As System.EventArgs) Handles Button2.Click
41
Dim ans As DialogResult = MsgBox("Are you sure to add these
data into database", MsgBoxStyle.YesNo, "Varify...")
If ans Then
Try
Dim cmd As New OleDbCommand("insert into Fees_Info
values('" & TextBox1.Text & "', '" & TextBox2.Text & "','" &
TextBox3.Text & "','" & TextBox4.Text & "','" & TextBox5.Text & "','"
& TextBox6.Text & "')", con)
con.Open()
cmd.ExecuteNonQuery()
Catch ex As Exception
MsgBox(ex.Message.ToString)
Finally
con.Close()
End Try
Else
MsgBox("Data Saved.........")
End If
Dim a As DialogResult = MsgBox("Are you sure You want Input
Record Now ", MsgBoxStyle.YesNo, "Varify...")
If a Then
new1()
End If
End Sub
42
If DR.Read = True Then
TextBox1.Text = DR(0)
TextBox2.Text = DR(1)
TextBox3.Text = DR(2)
TextBox4.Text = DR(3)
TextBox5.Text = DR(4)
TextBox6.Text = DR(5)
End If
cmd.Dispose()
con.Close()
Catch ex As Exception
MessageBox.Show(ex.Message, "ERROR",
MessageBoxButtons.OK, MessageBoxIcon.Error)
End Try
Else
MessageBox.Show("Record not found......")
End If
End Sub
43
TextBox3.Text = ""
TextBox4.Text = ""
TextBox5.Text = ""
TextBox6.Text = ""
TextBox7.Text = ""
TextBox8.Text = ""
TextBox9.Text = ""
TextBox10.Text = ""
End Sub
End If
cmd.Dispose()
con.Close()
Catch ex As Exception
MessageBox.Show(ex.Message, "ERROR",
MessageBoxButtons.OK, MessageBoxIcon.Error)
End Try
Else
MessageBox.Show("Record not found......")
End If
End Sub
Try
Dim cmd As New OleDbCommand("insert into Book_Info
values('" & TextBox1.Text & "', '" & TextBox2.Text & "','" &
TextBox3.Text & "','" & TextBox4.Text & "','" & TextBox5.Text & "','"
& TextBox6.Text & "','" & TextBox7.Text & "','" & TextBox8.Text &
"','" & TextBox9.Text & "','" & TextBox10.Text & "')", con)
44
con.Open()
cmd.ExecuteNonQuery()
Catch ex As Exception
MsgBox(ex.Message.ToString)
Finally
con.Close()
End Try
Else
MsgBox("Data Saved.........")
End If
Dim a As DialogResult = MsgBox("Are you sure You want Input
Record Now ", MsgBoxStyle.YesNo, "Varify...")
If a Then
new1()
End If
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e
As System.EventArgs) Handles Button1.Click
DataSet11.Clear()
OleDbDataAdapter1.Fill(DataSet11)
End Sub
45
SYSTEM TESTING
46
SYSTEM TESTING
System testing is a critical aspect of Software Quality Assurance and represents the
ultimate review of specification, design and coding. Testing is a process of executing
a program with the intent of finding an error. A good test is one that has a probability
of finding an as yet undiscovered error. The purpose of testing is to identify and
correct bugs in the developed system. Nothing is complete without testing. Testing is
the vital to the success of the system.
In the code testing the logic of the developed system is tested. For this every module
of the program is executed to find an error. To perform specification test, the
examination of the specifications stating what the program should do and how it
should perform under various conditions.
Unit testing focuses first on the modules in the proposed system to locate errors. This
enables to detect errors in the coding and logic that are contained within that module
alone. Those resulting from the interaction between modules are initially avoided. In
unit testing step each module has to be checked separately.
System testing does not test the software as a whole, but rather than integration of
each module in the system. The primary concern is the compatibility of individual
modules. One has to find areas where modules have been designed with different
specifications of data lengths, type and data element name.
Testing and validation are the most important steps after the implementation of the
developed system. The system testing is performed to ensure that there are no errors
in the implemented system. The software must be executed several times in order to
find out the errors in the different modules of the system.
Validation refers to the process of using the new software for the developed system in
a live environment i.e., new software inside the organization, in order to find out the
47
errors. The validation phase reveals the failures and the bugs in the developed system.
It will be come to know about the practical difficulties the system faces when
operated in the true environment. By testing the code of the implemented software,
the logic of the program can be examined. A specification test is conducted to check
whether the specifications stating the program are performing under various
conditions. Apart from these tests, there are some special tests conducted which are
given below:
1. Peak Load Tests: This determines whether the new system will handle the
volume of activities when the system is at the peak of its processing demand.
The test has revealed that the new software for the agency is capable of handling
the demands at the peak time.
2. Storage Testing: This determines the capacity of the new system to store
transaction data on a disk or on other files. The proposed software has the
required storage space available, because of the use of a number of hard disks.
3. Performance Time Testing: This test determines the length of the time used by
the system to process transaction data.
The testing steps performed in Crime Reporting System are given below:
Unit testing
Integration testing
Validation testing
Unit testing
In unit testing different modules are tested against the specifications produced during
the design of the modules. Unit testing is essential for the verification of the code
produced during the coding phase, and hence the goal is to test the internal logic of
the modules.
48
The testing is carried out during the programming itself. After designing and coding
each form they are run to see whether there are any anomalies. Some of the various
test cases used to test the system are as follows:
Test cases are given for testing against requirements of the unit being tested.
Test case for path or branch covering.
Test case for data flow coverage.
Testing with classes of bad data
In unit testing the program unit that make up the system are tested individually. Unit
testing focuses first on the modules, independent of one another to locate errors. Here
in CrimeReportingSystem unit testing contains testing like user registration test,
login test, user updating test, agent registration test, policy registration test, customer
request test, premium calculation test etc. This enables to detect in coding and the
logic with in the module alone. This testing is also used to ensure the integrity of data
stored temporarily.
Integration testing
49
Validation testing
At the culmination of the integration testing, the software was completely assembled
as package, interfacing errors have been uncovered and a final series of software
validation testing began. Here we test the system functions in manner that can be
reasonably expected by customer, the system was tested against system requirement
specification. Different unusual inputs that the users may use were assumed and the
outputs were verified for such unprecedented inputs. Deviation or errors discovered at
this step are corrected prior to the completion of this project with the help of user by
negotiating to establish a method for resolving deficiencies. Thus the proposed system
under consideration has been tested by using validation testing and found to be
working satisfactorily.
TEST RESULTS
In our implementation phase, source code contains both global and formal
variables. It contains predefined functions as well as the user defined functions. The
result of the new system is compared with the old system and supposes the result is
wrong the error must be debugged.
After the acceptance of the system by the user, the existing system must
be replaced by this new system. Any user can work in this package very easily. It does
not require any intensive training for the user. Procedures and functions in the system
are very simple that any one can understand and correspondingly act to the system with
no difficulty.
50
Test Cases
User Authentication:
Field Checking:
51
IMPLEMETATION
52
IMPLEMENTATION
Implementation Methods
The term implementation has different meanings, ranging from the conversion of a
basic application to a complete replacement of a computer system. The procedure,
however, is virtually the same. Implementation is used here to mean the process for
converting a new or revised system into an operational one. Conversion is one aspect
of implementation. The other aspects are the post implementation review and software
maintenance.
Conversion means changing from one system to another. That is data in the old
format is run through a program, or a series of programs, to convert it into the new
format. Conversion can also be from one hardware medium to another. The objective
is to put the tested system into operation while holding costs, risk and personnel
irritation to a minimum. It involves :-
Creating computer compatible files.
Training the operating staff.
Installing terminals and hardware.
53
A problem for management is discovering, at integration time, that pieces of modules
simply do not fit together. Such problem will arise when charge is made to only one
copy of the design document. When integration is completed, the product as whole is
tested, this is termed product testing. When the developers are confident about the
correction of every aspect of product, it is handled over to the client for acceptance
testing.
Implementation Plan
The implementation plan includes a description of all the activities that must occur to
implement the new system and to put it into operation. It identifies the personnel
responsible for the activities and prepares a time chart for implementing the system.
The implementation plan consists of the following steps.
The implementation plan should anticipate possible problems and must be able to deal
with them. The usual problems may be missing documents; mixed data formats
between current and files, errors in data translation, missing data etc.
54
SOFTWARE MAINTENANCE
55
SOFTWARE MAINTENANCE
Security
Identification
Access Control
56
Audit Control
System Integrity
57
We may define Software Maintenance by describing for activities that are undertaken
after a program is released for use.
1. Corrective Maintenance
The first maintenance activity occurs since it is unreasonable to assume that software
testing will uncover all errors in a large software system.
2. Adaptive Maintenance
This activity that contributes to the definition of maintenance occurs since rapid
change is encountered in every aspect if computing.
3. Perceptive Maintenance
4. Preventive Maintenance
This activity occurs when software is changed to improve further maintainability and
reliability.
58
FUTURE ENHANCEMENT
Anything cannot be ended in a single step. It is the fact that nothing permanent
in this world. So this utility also has some future enhancements in the evergreen and
booming IT industry. Change is inevitable. The project entitled Crime Reporting
System was successfully designed developed and tested. The system and the
architecture is a compatible one, so addition of new modules can be done without
much difficulty. Since this module has its unique properties it can extend further to
make this system a complete one.
The various Future Enhancement which shall include in this software are:
We look forward to working with the Government in implementing the
recommendations and seeing an improvement in the effectiveness of the organization
The method of video conferencing can be added to make the project more lively
An intercom facility will add a little more flexible communication between the
Master and Branch In Charge, Master and Members, etc.
Not withstanding this drive and progress, the Panel believes that more fundamental
changes are needed. It hopes that the recommendation made in this report will assist
in changing the culture around partnership.
59
CONCLUSION
60
CONCLUSION
The Software is made user friendly to the maximum so that any lay man can run the
software provided he could access to the system via the login password.
It believes that partnership work is highly beneficial to the organization and that
partnership work is the way forward to reduce crime and disorder
Hence, we wish to remind that its culture should fully endorse partnership work; we
urge to ensure the attention they require.
61
Appendix A (DATA FLOW DIAGRAMS)
Level 0 DFD
Crime Automation
login request
users crimereport &Reporting
username
password
details
login station
stationpro
cesses
request
complaints
details
crimedescription
details
assignstation
62
Level 1.1 DFD (citizen)
username
password
63
Level 1.2 DFD (station)
username
password
details
crimedescription
login crime fir
processes
criminaldetails
newteamregister
teammember
victim
request
witness
crimeclose
64
Level 2.0 DFD (admin)
request details
station
admin station
approval
complaints view
complaints crimedescription
response
details
assign crimeid
station assignstation
65
Level 2.1 DFD (citizen)
request details
send
citizen crimedescription
complaints
details
view
response
accepted
complaints
crimeid
crime
status crimeclose
66
Level 2.2.0 DFD (station)
67
Level 2.2.1 DFD (station)
request details
view
station crimedescription
complaints
criid criminaldetails
response avocation
details processes
advocate
crimeid
close crimedescription
crime
assignstation
68