crime filecrime file
TRANSCRIPT
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 1/89
CRIME FILEPROJECT REPORT
Submitted in partial fulfilment of the requirementsfor the award of the degree of
Master of Computer Application[Software Engineering
University School ofInformation Technology
GGS Indraprastha University,Delhi –
!
Submitted by"
SOM!E" AR#A
#$$!%#%$#&
'()*S++-. /rd Sem+
Under the Guidance of"
Ms$ Anura%&a c&ug
USIT, GGSI0U
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 2/89
T)12 34 (35T5TS
CO'TE'TS PA(E 'O$
!+ TIT2 34 0637(T88888888888888888888+889
9+ )(:53;2DG'5T88888888888888888888+++/
/+ (6TI4I()T8888888888888888888888888%
%+ S24 (6TI4I()T8888888888888888888888+$
$+ I5T63DU(TI35888888888888888888888+88+++
+ T332S<02)T436', =)6D;)6 )5D S34T;)6
6>UI6'5T S0(I4I()TI358888888+++88888888++?
@+ Technology 3verview of with A1 and 'S )ccess
?+ )5)2BSIS *D4Ds, 6 Diagrams, etc+ )s per the proCect requirements-
8888888888888888888888888!/
&+ US ()S DI)G6)'888888888888888888888++9
!#+ US ()SS8888888888888888888888888++9@
!!+ ) (3'02T ST6U(TU6 34 T= 063G6)'888888++88++%!
5umber of modules and their description+
+ Data structures for all modules+
+ 0rocess 2ogic of each module
6eport generation+
!9+4UTU6 5=)5('5T88888888888888888888+?9
!/+ Glossary88888888888888888888888888++
9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 3/89
CRIME FILE
)*SI'( MS ACCESS +,,-
Framewor. t&roug& "/01
/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 4/89
Ac.nowle%gement
This is a great opportunity to acnowledge and to thans all those persons without whose support
and help this proCect would have been impossible+ ;e would lie to add a few heartfelt words for
the people who were part of this proCect in numerous ways+
I would lie to thans to my proCect guide E's+ )nuradha (hugF, for his indefatigable
guidance, valuable suggestion, moral support, constant encouragement and contribution of time
for the successful completion of proCect wor+ I am very grateful to him, for providing all the
facilities needed during the proCect development+ )t the outset, I sincerely than all faculty
members of my institution for his etra effort to mae our session on line inspire of all ideas+
I than my (ounselors for his indispensable support and encouragement thought the
proCect+ I would lie to than all those who helped me directly or indirectly+
2ast but not the least, I would lie to acnowledge the ongoing support of my parents and
my family members, whose patience and encouragement during these long days and night have
been paramount in maing this proCect a reality+
Than you
Stu%ent 'ame2 Som%e3 Ar4a
%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 5/89
CERTIFICATE
This is to certify that proCect entitled 5Crime FileF done by ESomdev )ryaF , roll no+
#$$!%#%$#& is an authentic wor carried out by her at U5IA6SITB S(=332 34
I5436')TI35 T(=5323GB under my guidance+ The matter embodied in this proCect has
not been submitted earlier for award of any degree or diploma to the best of my nowledge and
belief+
Signature of the Guide
Ms$ Anura%&a C&ug
USIT, GGSI0U
$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 6/89
SELF CERTIFICATE
This is to certify that proCect entitled Crime File is done by me is an authentic wor carried out
for the partial fulfillment of the requirements for the award of the degree of Master of
Computer Application under the guidance of 5Ms$ Anura%&a C&ug F+ The matter embodied
in this proCect wor has not been submitted earlier for award of any degree or diploma to
the best of my nowledge and belief+
Signature of the Student
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 7/89
Intro%uction of Crime file
The proCect is aimed to develop a crime file for maintain a computeriHed records of all the firagainst crime +The system is destop application that can be access throughout the policedepartment+
This system can be used as an application for the crime file of the police department to managethe records of different activity of related to first information report +In such destop (rime filesystem we will manage all such activities *lie registration of the complaint updatinginformation, search of perticularviewing of the respective reports of crimes- that will save time,manpower+
This system will provide better prospective for the enhancement of organiHation regarding toquality and transparency+
@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 8/89
O67ecti3es of Crime File
The obCectives of this system can broadly be listed as follows"
!+ 'ae the 0olice functioning citiHen friendly and more transparent by automating thefunctioning of 0olice Departments+9+ Improve delivery of citiHen.centric services through effective usage of I(T+/+ 0rovide the Investigating 3fficers of the (ivil 0olice with tools, technology and information tofacilitate investigation of crime and detection of criminals+%+ Improve 0olice functioning in various other areas such as 2aw and 3rder, Traffic'anagement etc+$+ 4acilitate Interaction and sharing of Information among 0olice Departments, Districts,State<UT headquarters and other 0olice )gencies+
+ )ssist senior 0olice 3fficers in better management of 0olice 4orce@+ :eep trac of the progress of (ases, including in (ourts?+ 6educe manual and redundant 6ecords eeping
?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 9/89
TOOLS8 PLATFORM 9 LA'(*A(E TO /E *SE! TOOLS2
4635T.5D " 'icrosoft Aisual 1asic
1)(:.5D " 'icrosoft )ccess
PLATFORM2
;I5D3; @
:AR!;ARE A'! SOFT;ARE E'"IRO'ME'T
:AR!;ARE E'"IRO'ME'T"
063(SS36 " (ore 9duo
6)' " /G1
ST36)G ()0)(ITB " /9# G1
D6IA6S " $99%
!? (D<DAD writer
SOFT;ARE E'"IRO'ME'T"
306)TI5G SBST' " ;I5D3; @
6D1'S " 'icrosoft )ccess
&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 10/89
Tec&nolog4 O3er3iew of m4 Pro7ect
Microsoft Access +,,-
Microsoft Access is a relational %ata6ase management s4stem )R!/MS1 that is pacaged
with the 'icrosoft suite of office products to run under the 'icrosoft ;indows operating
system+ 'icrosoft )ccess is a Aisual 1asic *A1- based application that allows Structured >uery
2anguage *S>2- statements to be included in associated macros and A1 scripts+ 'icrosoft
)ccess includes a 7et database engine, combined with a graphical interface, to provide ease of
use in building front.end database applications+ 'icrosoft )ccess is a structured environment,
used by novice programmers, with little or no eperience, to handle relatively small database
functions+ It is also a useful tool, for advanced developers, to provide rapid application
development+
Though 'S )ccess has been successfully front.ended against databases, including itself,
'icrosoft )ccess does not scale well for large databases or multiple.access, networ
environments+ The underlying 7et Database is a file.sharing database that performs all processing
at the client level+ )s such, 'icrosoft )ccess is not designed for high volume multi.user
environments that allow multiple clients to read, write and perform other operations on shared
files at the same time+
!#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 11/89
"isual /asic 0$,
"isual /asic *"/- is the third.generation event.driven programming language and integrated development environment *ID-
from 'icrosoft for its (3' programming model+ 1ecause of its graphical development features and 1)SI( heritage, A1 is
considered to be relatively easy to learn and use+ J!K
Aisual 1asic was derived from 1)SI( and enables the rapid application development *6)D- of graphical user interface
*GUI- applications, access to databases using Data )ccess 3bCects, 6emote Data 3bCects, or )ctive Data 3bCects, and creation
of )ctive controls and obCects+ Scripting languages such as A1) and A1Script are syntactically similar to Aisual 1asic, but
perform differently+
) programmer can put together an application using the components provided with Aisual 1asic itself+ 0rograms written in
Aisual 1asic can also use the ;indows )0I, but doing so requires eternal function declarations+
2ie the 1)SI( programming language, Aisual 1asic was designed to be easily learned and used by beginner
programmers+ The language not only allows programmers to create simple GUI applications, but can also develop
comple applications+ 0rogramming in A1 is a combination of visually arranging components or controls on a form,specifying attributes and actions of those components, and writing additional lines of code for more functionality+
Since default attributes and actions are defined for the components, a simple program can be created without the
programmer having to write many lines of code+ 0erformance problems were eperienced by earlier versions, but
with faster computers and native code compilation this has become less of an issue+
)lthough programs can be compiled into native code eecutables from version $ onwards, they still require the
presence of runtime libraries of approimately ! '1 in siHe+ This runtime is included by default in ;indows
9### and later, but for earlier versions of ;indows lie &$<&?<5T it must be distributed together with the
eecutable+
4orms are created using drag.and.drop techniques+ ) tool is used to place controls *e+g+, tet boes, buttons, etc+- on
the form *window-+ (ontrols have attributes and event handlers associated with them+ Default values are provided
when the control is created, but may be changed by the programmer+ 'any attribute values can be modified during
run time based on user actions or changes in the environment, providing a dynamic application+ 4or eample, code
can be inserted into the form resiHe event handler to reposition a control so that it remains centered on the form,
!!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 12/89
epands to fill up the form, etc+ 1y inserting code into the event handler for a eypress in a tet bo, the program
can automatically translate the case of the tet being entered, or even prevent certain characters from being inserted+
Aisual 1asic can create eecutables * files-, )ctive controls, or D22 files, but is primarily used to develop
;indows applications and to interface database systems+ Dialog boes with less functionality can be used to provide
pop.up capabilities+ (ontrols provide the basic functionality of the application, while programmers can insert
additional logic within the appropriate event handlers+ 4or eample, a drop.down combination bo will
automatically display its list and allow the user to select any element+ )n event handler is called when an item is
selected, which can then eecute additional code created by the programmer to perform some action based on which
element was selected, such as populating a related list+
)lternatively, a Aisual 1asic component can have no user interface, and instead provide )ctive obCects to other
programs via (omponent 3bCect 'odel *(3'-+ This allows for server.side processing or an add.in module+
The language is garbage collected using reference counting, has a large library of utility obCects, and has basic obCect oriented support+ Since the more common components are included in the default proCect template, the programmer
seldom needs to specify additional libraries+ Unlie many other programming languages, Aisual 1asic is generally
not case sensitive, although it will transform eywords into a standard case configuration and force the case of
variable names to conform to the case of the entry within the symbol table+ String comparisons are case sensitive by
default, but can be made case insensitive if so desired+
The Aisual 1asic compiler is shared with other Aisual Studio languages *(, (LL-, but restrictions in the ID do not
allow the creation of some targets *;indows model D22s- and threading models+
Characteristics
Aisual 1asic has the following traits which differ from (.derived languages"
'ultiple assignment available in ( language is not possible+ ) M 1 M ( does not imply that the values of ),
1 and ( are equal+ The 1oolean result of NIs 1 M (ON is stored in )+ The result stored in ) would therefore be
either false or true+
1oolean constant True has numeric value P!+ This is because the 1oolean data type is stored as a !.bit
signed integer+ In this construct P! evaluates to ! binary !s *the 1oolean value True-, and # as ! #s *the
1oolean value 4alse-+ This is apparent when performing a 5ot operation on a ! bit signed integer value #
which will return the integer value P!, in other words True M 5ot 4alse+ This inherent functionality becomes
especially useful when performing logical operations on the individual bits of an integer such
as )nd, 3r, or and 5ot+J%K This definition of True is also consistent with 1)SI( since the early !&@#s
'icrosoft 1)SI( implementation and is also related to the characteristics of (0U instructions at the time+
!9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 13/89
2ogical and bitwise operators are unified+ This is unlie some (.derived languages *such as 0erl-, which
have separate logical and bitwise operators+ This again is a traditional feature of 1)SI(+
Aariable array base+ )rrays are declared by specifying the upper and lower bounds in a way similar
to 0ascal and 4ortran+ It is also possible to use the 3ption 1ase statement to set the default lower bound+ Use of
the 3ption 1ase statement can lead to confusion when reading Aisual 1asic code and is best avoided by always
eplicitly specifying the lower bound of the array+ This lower bound is not limited to # or !, because it can also
be set by declaration+ In this way, both the lower and upper bounds are programmable+ In more subscript.
limited languages, the lower bound of the array is not variable+ This uncommon trait does eist in Aisual
1asic +5T but not in A1Script+
30TI35 1)S was introduced by )5SI, with the standard for )5SI 'inimal 1)SI( in the late
!&@#s+
6elatively strong integration with the ;indows operating system and the (omponent 3bCect
'odel+ The native types for strings and arrays are the dedicated (3' types, 1ST6 and S)4)66)B+
1anerQs rounding as the default behavior when converting real numbers to integers with
the 6ound function+J$K O 6ound*9+$, #- gives 9, O 6ound*/+$, #- gives %+
Integers are automatically promoted to reals in epressions involving the normal division operator
*<- so that division of one integer by another produces the intuitively correct result+ There is a specific
integer divide operator *R- which does truncate+
1y default, if a variable has not been declared or if no type declaration character is specified, the
variable is of type Aariant+ =owever this can be changed with Data type statements such
asDefInt, Def1ool, DefAar, Def3bC, DefStr+ There are !9 Data type statements in total offered by Aisual
1asic +#+ The default type may be overridden for a specific declaration by using a special suffi character
on the variable name * for Double, for Single, for 2ong, V for Integer, W for String, and X for
(urrency- or using the ey phrase )s *type-+ A1 can also be set in a mode that only eplicitly declared
variables can be used with the command 3ption plicit+
!/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 14/89
SOFT;ARE RE<*IREME'TS SPECIFICATIO'
!+ Intro%uction
!+! Purpose 2
(rime 4ile System is a system used to report crimes+ This proCect is mainly useful for police
Departments+ This system will help to manage all the activities in a police Department using
computers+ (urrently all the wors are done manually, by computeriHing all the activities inside a
police Department can be managed easily and effectively+
The police Departments in the country are, today, virtually unconnected islands+ Thans to
telephones and wireless, and especially thans to mobile telephones, there is voice connectivity
between the police Department and senior police officers, but that is about all+ There is no
system of data storage, data sharing and accessing data+ There is no system under which one
police Department can tal to another directly+ There is no record of crimes or criminals that can
be accessed by a Department =ouse 3fficer, ecept the manual records relating to that police
Department+ The goals of the system are to facilitate collection, storage, retrieval, analysis,
!%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 15/89
transfer and sharing of data and information at the police Department and between the police
Department and the State =eadquarters and the (entral 0olice 3rganiHations+
=$+ Scope2
!+ The system Y(6I' 4I2Z will be a 6eporting application that will be used forautomating the manual process of register different case in police Department +Thissystem will manage the details of all the crime who register themselves in policeDepartment+ The system provides an interface to store the crime details of criminals or prisoners and allows the user to search and view records+ The system should have a
login+ System should support for Data ntry module for 5ominal 6oll, (ase register for
each prisoner entering in the prison
The system will greatly simplify the overall procedure of crime files+
=$> O67ecti3es2
The proposed system includes the following features"
• 2ogin for user and admin
• (omplaint registration
• Aiew complaint status
• (riminal register management
• 4I6 'anagement
!$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 16/89
• (ase =istory Details management
• 'anaging 0ostmortem details
• 0risoners register management
• 'anage list about most wanted criminals
!+% A66re3iations2
=$? References2
• I S6S 4ormat+
=$0 Tec&nologies
• Development Tool" Aisual studio #
• Database" 'icrosoft )((SS
9+ O3erall !escription
)t its core, the system should offer the following basic functionalities"
+
!+ The system requests that the administrator to enter his<her name, password+
9+ The administrator enters his<her name, password+
/+ The system validates the entered name, password, logs the actor into the system+
%+ The administrator maintains the record of information of varios fir,crimes and related
obCects+
!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 17/89
If in the basic flow, the actor enters an invalid name, password , the system displays an
error message+ The actor can return to the beginning of the basic flow
+$= Pro%uct perspecti3e2
(6I' 4I2 is a system which aims at maing the store records of crimes easier+ This system
provides an easy way to admin to eep trac of record of all the crimes and saves him loads of
manual wor+ This system maes updation of records easier by both user and admin and provides
updated information about the current crimes status in happening+
+$=$= S#STEM I'TERFACES 5one
+$=$= S4stem interface2
+$=$+ *SER I'TERFACES
• There will be a screen to display varios information related to 4I6+
• ) login screen for entering username, password will be provided+
4ront nd (lient)pplication *with dataentry< update< cancel< viewand reporting facility-
1acendDatabase
!@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 18/89
• There will be a screen for taing and modifying the information of the related to 4I6+
• ;indows based
• 4riendly 5avigation
+$=$> :AR!;ARE I'TERFACE2
• :eyboard
• 'ouse
• Screen resolution of at least !#9%@?. required for proper and complete viewing of
screens+
+$=$@ SOFT;ARE I'TERFACES
• )ny ;indows based operating system *'icrosoft ;indows 0 or higher-+
• 'S )ccess as the D1'S.for database+
+$=$? COMM*'ICATIO' I'TERFACES
• 5one
+$=$0 MEMOR# CO'STRAI'TS
• )t least % '1 6)' and 9 G1 space on hard dis will be required for running the
application
!?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 19/89
+$=$- OPERATIO'S
• Aiewing
• )ddition* by administrator only-
• Updation* by administrator only-
• Deletion * by administrator only
+$=$ SITE A!APTATIO' RE<*IREME'TS
• The terminals at client site will have to support the hardware and software interfaces
specified in above sections+
+$+ Pro%uct Function2
• )ccepting crimes information correctly+
• Storing the correct records in the database+
• Displaying correct information on selecting view option+
• Displaying current status of fir of the all crimes+
• )ccepting the updated information from user and administrator+
• Storing the updated record in database to mae it consistent+
• Deletion privilege to administrator only +
+$> *ser C&aracteristics2
3perator should be computer literate+
9+% (eneral Constraints2
• )ny ;indows 3perating system+
• Interface is in nglish+
!&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 20/89
Site A%aption ReBuirements
Terminals at the client side site will have to support the hardware and software interfaces
specified in above sections+
+$? Assumptions 2
• User is a related of certain branch of police Department
• fir information is correct+
• user can fill the registration form+
>$ Specific ReBuirements
Functional ReBuirement no =2
• Introduction " 6egister for the (riminal or prisoner
• Input " criminals personal details viH – (riminal 5o+, (riminal 5ame, )ge, 3ccupation,
(rimeType,address, 'ost;anted+
• 0risoner details " 0risoner5o+, (harge Sheet 5o+, 5ic5ame, (rimeType, 4amily'em
Identity 'ar, =eight, ;eight, (olor
• 0rocessing " validation checs are performed on the input data by the user<administrator lie "
mandatory fields should not be ept blan
prisoner family member should be chec
)ll the entries in database should be correct
9#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 21/89
Functional ReBuirement no +2
• Introduction " 4I6
• Input " 4ir no, (3'02)I5T 53+, 4ir Date, 4ir Time , Information Type, 0lace of crime, )ct for
crime, District of 4I6, )ddress of victim, 0assport 5o, 5ame of 0olice, 6eceived Time,
Information 6eceived
• 0rocessing " )fter inputting data validation checs on various fields is performed + on submission
of the information the record is searched in the stored database o basis of the information
submitted+
• 3utput " If the information submitted by the user is valid and found in the database then the
corresponding record is displayed +
Functional ReBuirement 'o >2
• Introduction " add or Updation of user or administrator
• Input " Username,password
• 0rocessing " )fter entering the required information the various validation checs are
performed on submission of the information the updations are made to the database+
administrator must enter the correct user name and password
• 3utput " The updated information is reflected in the stored database
Functional ReBuirement @
• Introduction " Aiewing
• Input " none+
9!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 22/89
• 0rocessing " on clicing the view button the system search for the specified database stored+
• 3utput " if the specified database is stored then the whole database is display in the tabular form+
The data displayed is the updated and current information of the user personal and academic
details + It also displays the status of the prisoner and criminals+
@$ Performance reBuirements
?$ !esign Constraints
• Standard compliance such as I for the development of S6S report+
• Software ngineering by :+:+ )ggarwal and Bogesh Singh+
0$ Attri6utes
0$= Relia6ilit4 an% Reco3er42
It is imperative that database should be always up when put into the product+ During period of intense
activities lie submission and verification and updation of data, bac up should be taen+ It will help to
minimiHe downtime in case of failure+ )ny abnormal operations shall result in the shutting down of the
system+
0$+ Securit42
The database should be protected physically by having server located in an enclosed and guarded facility+
Airus scanning software should be installed to protect from viruses+ The server should be installed under
firewall so that server only internal users can access it+ The system shall be compatible with )I'S
security standards+ There should be terms and conditions and a chec on the content added by the users+
Duplicate record must be discarded by the administrator+
0$> Maintenance2
5ew additional features can be added if required and also the system components i+e+ memory, dis,
drives shall be easily serviceable without much alteration in the code+
99
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 23/89
;or. Flow of Crime File
9/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 24/89
!ATA FLO; !IA(RAM
The data flow diagram enables the software engineer to develop models of the information
domain and functional domain at the same time+ )s the D4D is defined into greater level of
details, the analyst performs as implicit functional decomposition of the system, thereby
accomplishing the fourth operational analysis principle for functions+ )t the same time, the D4D
refinement results in a corresponding refinement of data as it moves through the processes that
embody the application
LE"EL , !F!
9%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 25/89
Contet Le3el !F! for Crime File
LE"EL = !F!
9$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 26/89
LE"EL + !F!
9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 27/89
LE"EL > !F!
9@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 28/89
LE"EL @ !F!
9?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 29/89
Entit4DRelations&ip !iagram
9&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 30/89
/#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 31/89
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 32/89
*se cases
=$ Login
=$= /rief %escription
This use case allows the actor to login in system +
=$+ Actors
There is only one actor *user ,administrator- which interacts and participates with this use
case+
=$> Flow of e3ents
=$>$= /asic flow
This use case starts when the actor wishes to 2ogin himself for the use os system+
• The system requests that the user must enter his all valid username and password+
• 3nce the user provides the requested information, one of the sub.flows is eecuted+
• If the user selected Esubmit F, the 2ogin information sub flow is eecuted+
=$>$=$= Su6mit crimefile information
• The system requests the user to enter the information which includes"
Personal Information
a- User 5ame
/9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 33/89
b- password
• 3nce the user provides the requested information, system first validates the
information provided+
• If the information is valid then the particular information about the user is
recorded in the database
=$>$+ Alternati3e flow
=$>$+$= In3ali% information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly+
=$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
=$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
=$@ Special ReBuirements
5one
=$? PreDCon%ition
The user must be computer operator in police Department +
=$0 PostDCon%ition
If the use case was successful, the user information is login in the system+ 3therwise , the
system state is unchanged+
=$- Etension points
//
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 34/89
5one
Registration process for criminals
+$= /rief %escription
This use case allows the actor to register criminal in database+
+$+ Actors
There is only two actor *user, administrator- which interacts and participates with this use
case+
+$> Flow of e3ents
+$>$= /asic flow
This use case starts when the actor wishes to 6egister criminals for the record in database++
• The system requests that the user must enter all valid personal and academic information
of criminals+
• 3nce the user provides the requested information, the following sub.flow is eecuted+
• If the user selected Esubmit F, the submit information sub flow is eecuted+
+$>$=$= Su6mit crimefile information
!+ The system requests the use to enter the 6egistration information
which includes"
• (riminal5o
• (rim5ame
• 5ic5ame
/%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 35/89
• )ge
• 3ccupation
• (rimeType
• )ddress
• 'ost;anted
9+ 3nce the user provides the requested information, system first validates the
information provided+
/+ If the information is valid then the particular information about the criminal is
recorded in the database+
+$>$+ Alternati3e flow
+$>$+$= In3ali% information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly+
+$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
+$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
+$@ Special ReBuirements
5one
+$? PreDCon%ition
The user must be computer operator in police Department +
/$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 36/89
+$0 PostDCon%ition
If the use case was successful, the criminal information is added in the crimefile database+
3therwise , the system state is unchanged+
+$- Etension points
5one
>$ Registration process for prisoner
>$= /rief %escription
This use case allows the actor to register prisoner in database +
>$+ Actors
There are two actor *user, administrator- which interacts and participates with this use
case+
>$> Flow of e3ents
>$>$= /asic flow
This use case starts when the actor 6egister prisoners of the prison+
• 3nce the user provides the requested information, one of the sub.flows is eecuted+
• If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+
>$>$=$= Su6mit crimefile information
• The system requests the user to enter the 6egistration information which
includes"
• 0risoner5o
• (hargeSheet5o
• 5ic5ame
/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 37/89
• (rimeType
• 4amily'em
• Ident'ar
• =eight
• ;eight
• (olor
• 3nce the user provides the requested information, system first validates the
information provided+
• If the information is valid then the particular information about the prisoner is
recorded in the database
>$>$+ Alternati3e flow
>$>$+$= In3ali% information
none+
>$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
>$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
>$@ Special ReBuirements
5one
>$? PreDCon%ition
The user must be computer operator in police Department +
/@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 38/89
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 39/89
• 0'ortem5o
• 4ir5o
• 6esult
• Se
• DthDate
• (aseDesc
• =ouse5ame
• Doct5ame
• 0oliceDepartment
• 3nce the user provides the requested information, system first validates the
information provided+
• If the information is valid then the particular information about the prisoner is
recorded in the database
@$>$+ Alternati3e flow
@$>$+$= In3ali% information
none+
@$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
@$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
@$@ Special ReBuirements
5one
/&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 40/89
@$? PreDCon%ition
The user must be computer operator in police Department +
@$0 PostDCon%ition
If the use case was successful, the user information is added in the crimefile database+
3therwise , the system state is unchanged+
@$- Etension points
5one
?$ Registration process for most wante% criminal
?$= /rief %escription
This use case allows the actor to register most wanted criminal in database +
?$+ Actors
There are two actor *user, administrator- which interacts and participates with this use
case+
?$> Flow of e3ents
?$>$= /asic flow
This use case starts when the actor 6egister postmortem+
+
3nce the user provides the requested information, one of the sub.flows is eecuted+
If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+
?$>$=$= Su6mit crimefile information
%#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 41/89
• The system requests the user to enter the 6egistration information which
includes"
• 'stID
• 'st5ame
• 'st5ic5ame
• )ge
• Se
• Desc
• 3nce the user provides the requested information, system first validates the
information provided+
• If the information is valid then the particular information about the most
wanted criminal is recorded in the database
?$>$+ Alternati3e flow
=$>$+$= In3ali% information
none+
?$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
?$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
?$@ Special ReBuirements
5one
?$? PreDCon%ition
%!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 42/89
The user must be computer operator in police Department +
?$0 PostDCon%ition
If the use case was successful, the user information is added in the crimefile database+
3therwise , the system state is unchanged+
?$- Etension points
0$ Registration process for F$I$R$
0$= /rief %escription
This use case allows the actor to register fir in database +
0$+ Actors
There are two actor *user,administrator- which interacts and participates with this use
case+
0$> Flow of e3ents
0$>$= /asic flow
This use case starts when the actor 6egister 4+I+6++
+
• 3nce the user provides the requested information, one of the sub.flows is eecuted+
• If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+
0$>$=$= Su6mit crimefile information
• The system requests the user to enter the 6egistration information which
includes"
%9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 43/89
• 4irno
• (omplnt5o
• 4irDate
• 4irTime
• InfoType
• 0lace
• 4or2oc
• )ct
• District
• )ddress
• 0assport5o
• 0olice5ame
• 6ecvdTime
• 6ecvdInfo
• 3nce the user provides the requested information, system first validates the
information provided+
• If the information is valid then the particular information about the 4I6 is
recorded in the database
0$>$+ Alternati3e flow
0$>$+$= In3ali% information
none+
0$>$+$+ /lan. information
%/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 44/89
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 45/89
-$>$= /asic flow
This use case starts when the actor wishes to search for the criminals+ The system
requests the user to enter the required information in order to search for criminal+
!+ 3n submitting the required information the following sub flow is eecuted+
-$>$=$= Searc& placement information
!+ The system requests the user to enter the following information for searching
which includes"
(riminal name
9+ 3nce the user provides the requested information, system first validates the
information provided+
/+ If the information is valid then the placement status of the particular user is
displayed+
-$>$+ Alternati3e flow
-$>$+$= In3ali% information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly+
-$>$+$+ /lan. information
If the user left blan the tet boes that are mandatory to be filled by him then the
system will generate error message+
-$>$+$> 'o information foun%
If the information entered by the user is not found in database then the system will not
display the name of the organiHation+
%$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 46/89
-$>$+$> On cancel
If the user chooses the cancel then the use case ends and the basic flow begins+
-$@ Special reBuirements
5one
-$? PreDcon%ition
The user must be computer operator in police Department +
-$0 PostDcon%ition
If the use case was successful, the criminal status of the particular user is displayed+
3therwise, the system state is unchanged+
-$- Etension points
5one
%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 47/89
!ATA/ASE MO!*LE
4or creation of database 'icrosoft )ccess a popular relational database management system isused+ The database is connected visual basic which have inbuilt functions to connect to database,enter information to database and etract data+
The proCect database has following tables+
2ogin –admin login
2ogin –user login
(riminal registration
0risoner registration
%@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 48/89
0ostmortem
'ost wanted
%?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 49/89
4I6
(harge sheet
(omplaint status
%&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 50/89
(omplaint registration
$#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 51/89
CO!I'( A'! SCREE' S:OTS
Start
$!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 52/89
Login form
Co%ing2Login form
0rivate Sub cmd)dmin2og[(lic*-Set rs M con+ecute*NSelect \ from )dmin2ogin where UsernameMQN L ttUname+Tet L NQ and0asswordMQN L tt0ass+Tet L NQN-If *5ot rs+34- Then
'sg1o N2ogin SuccessN, vbInformation, N(rime 4ile SystemN frm'DI+mnu2ogoff+nabled M True frm'DI+mnu)dmin)ddU+nabled M True frm'DI+mnu)dminDelU+nabled M True frm'DI+mnu)ctiv+nabled M True frm'DI+mnu2ogin+nabled M 4alse frm'DI+mnu)dmin)dd(omSt+nabled M True frm'DI+mnu)ctiv6eg+nabled M True frm'DI+mnu)ctiv(omp+nabled M True frm'DI+mnu)ctiv6pt+nabled M True frm'DI+mnusearch+nabled M True Unload 'else 'sg1o N4ailureN, vb(ritical, N(rime 4ile SystemNnd If Qrs+(loseUnload 'end Sub
0rivate Sub cmd(ancel[(lic*-Unload 'e
$9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 53/89
nd Sub
0rivate Sub cmdUser2og[(lic*-Set rs M con+ecute*NSelect \ from User2ogin where UsernameMQN L ttUname+Tet L NQ and0asswordMQN L tt0ass+Tet L NQN-
If *5ot rs+34- Then 'sg1o N2ogin SuccessN, vbInformation, N(rime 4ile SystemN
frm'DI+mnu2ogoff+nabled M True frm'DI+mnu2ogin+nabled M 4alse frm'DI+mnu)ctiv+nabled M True frm'DI+mnu)ctiv6eg+nabled M True frm'DI+mnu)ctiv(omp+nabled M True frm'DI+mnu)ctiv6pt+nabled M True frm'DI+mnusearch+nabled M True Unload 'e
lse 'sg1o N4ailureN, vb(ritical, N(rime 4ile SystemNnd If Qrs+(lose
nd Sub
0rivate Sub 4orm[2oad*-connectdbnd Sub
0rivate Sub 4orm[Unload*(ancel )s Integer-con+(losend Sub
$/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 54/89
Main form
Co%ing2 Main form
0rivate Sub 'DI4orm[2oad*-mnu2ogoff+nabled M 4alsemnu)dmin)ddU+nabled M 4alse
mnu)dminDelU+nabled M 4alsemnu)ctiv+nabled M 4alsemnu)dmin)dd(omSt+nabled M 4alsemnu)ctiv6eg+nabled M 4alsemnu)ctiv(omp+nabled M 4alsemnu)ctiv6pt+nabled M 4alsemnusearch+nabled M 4alse
$%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 55/89
Datanvironment!+(onnection!+(onnectionString M N0roviderM'icrosoft+7et+32D1+%+#]DataSourceMN )pp+0ath NRcrimefile+mdb]0ersist Security InfoM4alseNnd Sub0rivate Sub mnu)ctiv(hrgSht[(lic*-2oad frm(hargeSheet
frm(hargeSheet+Shownd Sub0rivate Sub mnu)ctiv(omp6eg[(lic*-2oad frm(omplt6egfrm(omplt6eg+Shownd Sub0rivate Sub mnu)ctiv(ompStat[(lic*-2oad frm(ompStatusfrm(ompStatus+Shownd Sub0rivate Sub mnu)ctiv(s=ist[(lic*-
2oad frm=istSheetfrm=istSheet+Shownd Sub0rivate Sub mnu)ctiv4ir[(lic*-2oad frm4I6 frm4I6+Shownd Sub0rivate Sub mnu)ctiv6eg(rim[(lic*-2oad frm(riminal6egister frm(riminal6egister+Shownd Sub0rivate Sub mnu)ctiv6eg0ost[(lic*-2oad frm0ostmortemfrm0ostmortem+Shownd Sub0rivate Sub mnu)ctiv6eg0ris[(lic*-2oad frm0risoner6egfrm0risoner6eg+Shownd Sub0rivate Sub mnu)ctiv6pt(rim[(lic*-2oad Data6eport(rime6ptData6eport(rime6pt+Shownd Sub0rivate Sub mnu)ctiv6pt'st[(lic*-2oad Data6eport'ost;antedData6eport'ost;anted+Shownd Sub0rivate Sub mnu)ct6eg'st[(lic*-2oad frm'ost;antedfrm'ost;anted+Show
$$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 56/89
nd Sub0rivate Sub mnu)dmin)dd(omSt[(lic*-2oad frm)dd(ompltStatusfrm)dd(ompltStatus+Shownd Sub
0rivate Sub mnu)dmin)ddU[(lic*-2oad frm)ddUser frm)ddUser+Shownd Sub0rivate Sub mnu)dminDelU[(lic*-2oad frmDeleteUser frmDeleteUser+Shownd Sub0rivate Sub mnucriminal[(lic*-2oad search(riminalsearch(riminal+Show
nd Sub0rivate Sub mnueit[(lic*-Unload 'end Sub0rivate Sub mnu2ogin[(lic*-2oad frm2oginfrm2ogin+Shownd Sub0rivate Sub mnu2ogoff[(lic*-mnu2ogoff+nabled M 4alsemnu)dmin)ddU+nabled M 4alsemnu)dminDelU+nabled M 4alsemnu)ctiv+nabled M 4alsemnu2ogin+nabled M Truemnu)dmin)dd(omSt+nabled M 4alsemnu)ctiv6eg+nabled M 4alsemnu)ctiv(omp+nabled M 4alsemnu)ctiv6pt+nabled M 4alsemnusearch+nabled M 4alsend Sub0rivate Sub mnuprisioner[(lic*-2oad Search0risoner Search0risoner+Shownd Sub0rivate Sub mnu6pt4I6[(lic*-2oad frm4I6rptfrm4I6rpt+Shownd Sub0rivate Sub mnu6pt'ortem[(lic*-2oad frm0'ortem6pt
$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 57/89
frm0'ortem6pt+Shownd Sub
A%% 'ew user
Co%ing2 A%% 'ew user
0rivate Sub 4orm[2oad*-connectdbnd Sub0rivate Sub cmd)dd[(lic*-
Set rs M con+ecute*Nselect \ from User2ogin where UsernameMQN L ttUsername+Tet L NQ and0asswordMQN L tt0assword+Tet L NQN-If *5ot rs+34- Then 'sg1o NSorry User already eists+ Try another usernameN, vb(ritical, N(rime 4ile SystemN tt0assword+Tet M NN ttUsername+Tet M NN ttUsername+Set4ocuslse
$@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 58/89
con+ecute *Ninsert into User2ogin values*QN L ttUsername+Tet L NQ,QN L tt0assword+Tet LNQ-N- 'sg1o NUser added sucessfullyN, vbInformation, N(rime 4ile SystemN tt0assword+Tet M NN ttUsername+Tet M NN
ttUsername+Set4ocusnd If nd Sub
0rivate Sub cmd(ancel[(lic*-Unload 'end Sub
!elete user
Co%ing2 !elete user
0rivate Sub cmd(ancel[(lic*-Unload 'end Sub
0rivate Sub cmdDelete[(lic*-
con+ecute *Ndelete from User2ogin where UsernameMQN L cmbUsername+Tet L NQN-'sg1o NUser deleted sucessfullyN, vbInformation, N(4SNcmbUsername+Tet M NNnd Sub
0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect \ from User2oginN-
$?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 59/89
;hile *5ot rs+34- cmbUsername+)ddItem rs*#- rs+'ove5et;endnd Sub
A%% complaint status
Co%ing2 A%% complaint status
0rivate Sub cmd(ancel[(lic*-Unload 'end Sub
0rivate Sub cmdAiewStat[(lic*-Set rs M con+ecute*Nselect \ from (omplntStatus where (omplnt5oMN L cmb(omplnt5o+TetL NN-If *5ot rs+34- Then
$&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 60/89
ttDetails+Tet M rs*!-nd If
nd Sub
0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect distinct*(omplnt5o- from (omplntStatusN-;hile *5ot rs+34- cmb(omplnt5o+)ddItem rs*#- rs+'ove5et;endrs+(losend Sub
Criminal registration
Co%ing2 Criminal registration
0rivate Sub cmd(ancel[(lic*-Unload 'e
#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 61/89
nd Sub
0rivate Sub cmdSave[(lic*-If *optyes+Aalue M True- Then M NBesN
lse M N5oNnd If If *tt)ddress+Tet M NN 3r tt)ge+Tet M NN 3r tt(rimeType+Tet M NN 3r tt5ame+Tet M NN3r tt5ic5ame+Tet M NN 3r tt3ccupation+Tet M NN- Then 'sg1o N'issing 4ields,0lease fill up allN, vbInformation, N(rime 4ile SystemNlseIf *5ot Is5umeric*tt)ge+Tet-- Then 'sg1o N)ge should be numericNlse con+ecute *Ninsert into (riminal6eg values*N L tt(riminal5o+Tet L [ N,QN L tt5ame+Tet L NQ,QN L tt5ic5ame+Tet L NQ,N L tt)ge+Tet L [
N,QN L tt3ccupation+Tet L NQ,QN L tt(rimeType+Tet L NQ,QN L tt)ddress+Tet L [ NQ,QN L L NQ-N- 'sg1o N6ecord )dded successfullyN, vbInformation, N(rime 4ile SystemN tt(riminal5o+Tet M tt(riminal5o+Tet L ! tt)ddress+Tet M NN tt)ge+Tet M NN tt(rimeType+Tet M NN tt5ame+Tet M NN tt5ic5ame+Tet M NN tt3ccupation+Tet M NN tt5ame+Set4ocusnd If nd Sub
0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect ma*(riminal5o- from (riminal6egN-If *5ot rs+34- Then cnt M rs*#- If *cnt M #- Then cnt M ! lse cnt M cnt L ! nd If tt(riminal5o+Tet M cntnd If nd Sub
!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 62/89
Prisoner registration
Co%ing2 Prisoner registration
0rivate Sub (ommand![(lic*-If *tt(hgr5o+Tet M NN 3r tt(olor+Tet M NN 3r tt(rmType+Tet M NN 3r tt4am'em+Tet MNN 3r tt=t+Tet M NN 3r ttIden'ar+Tet M NN 3r tt5i5ame+Tet M NN 3r tt0ris5o+Tet M NN3r tt;t+Tet M NN- Then 'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile SystemNlse
9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 63/89
If **5ot Is5umeric*tt(hgr5o+Tet-- 3r *5ot Is5umeric*tt=t+Tet-- 3r *5otIs5umeric*tt;t+Tet--- Then 'sg1o NSome of the values entered are not matching, 0lease chec numbers are enteredcorrectlyN, vb(ritical, N(rime 4ile SystemN lse
Set rs M con+ecute*Nselect \ from 0risoners6eg where (hargeSheet5oMN Ltt(hgr5o+Tet L NN- If *5ot rs+34- Then 'sg1o N(harge Sheet 5umber )lready ist, 0lease try another numberN, vb(ritical,N(rime 4ile SystemN tt(hgr5o+Tet M NN tt(hgr5o+Set4ocus lse con+ecute *Ninsert into 0risoners6eg values*N L tt0ris5o+Tet L N,N L tt(hgr5o+Tet L N,QNL tt5i5ame+Tet L [ NQ,QN L tt(rmType+Tet L NQ,QN L tt4am'em+Tet L NQ,QN L ttIden'ar+Tet L NQ,N L
tt=t+Tet L [ N,N L tt;t+Tet L N,QN L tt(olor+Tet L NQ-N- con+ecute *Ninsert into prisonersTemp values*N L tt0ris5o+Tet L N,Q5oQ-N- 'sg1o N6ecord )dded SucessfullyN, vbInformation, N(4SN tt0ris5o+Tet M tt0ris5o+Tet L ! tt(hgr5o+Tet M NN tt(olor+Tet M NN tt(rmType+Tet M NN tt4am'em+Tet M NN tt=t+Tet M NN ttIden'ar+Tet M NN tt5i5ame+Tet M NN tt;t+Tet M NN tt(hgr5o+Set4ocus nd If nd If nd If nd Sub
0rivate Sub (ommand9[(lic*-Unload 'end Sub
/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 64/89
Post mortem
Co%ing2 Post mortem
0rivate Sub cmdSave[(lic*-If *ttDate+Tet M NN 3r ttDesc+Tet M NN 3r ttDoct5ame+Tet M NN 3r cmb4irr5o+Tet M NN 3rtt=ouse5ame+Tet M NN 3r tt0oliceSt+Tet M NN 3r tt0ost5o+Tet M NN 3r tt6slt+Tet M NN-Then 'sg1o N'issing 4ields 0lease 4ill Up allN, vbInformation, N(rime 4ile SystemN
%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 65/89
lse Set rs M con+ecute*Nselect \ from 0ostmortem where 4ir5oMN L cmb4irr5o+Tet L NN- If *5ot rs+34- Then 'sg1o NDuplication is not allowded, 0lease try another 4I6 numberN, vb(ritical, N(rime4ile SystemN
cmb4irr5o+Set4ocus lse
con+ecute *Ninsert into postmortem values*N L tt0ost5o+Tet L N,N L cmb4irr5o+Tet LN,QN L tt6slt+Tet L [ NQ,QN L cmbSe+Tet L NQ,QN L ttDate+Tet L NQ,QN L ttDesc+Tet L [ NQ,QN L tt=ouse5ame+Tet L NQ,QN L ttDoct5ame+Tet L NQ,QN L tt0oliceSt+Tet L NQ-N- 'sg1o N6ecord )dded SucessfullyN, vbInformation, N(rime 4ile SystemN tt0ost5o+Tet M tt0ost5o L ! ttDate+Tet M NN ttDesc+Tet M NN
ttDoct5ame+Tet M NN tt=ouse5ame+Tet M NN tt0oliceSt+Tet M NN tt6slt+Tet M NN nd If nd If nd Sub
0rivate Sub 4orm[2oad*-connectdbcmbSe+Tet M N'aleNSet rs M con+ecute*Nselect ma*0'ortem5o- from 0ostmortemN-If *5ot rs+34- Then cnt M rs*#- If *cnt M #- Then cnt M ! lse cnt M cnt L ! nd If tt0ost5o+Tet M cntnd If rs+(loseSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34- cmb4irr5o+)ddItem rs*#- rs+'ove5et;endrs+(losend Sub
$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 66/89
POST MORTEM REPORT2
CO!I'(2
Dim )s Integer 0rivate Sub cmdSh6pt[(lic*- M cmb'no+Tet If *Datanvironment!+rs(ommand/+State M !- Then
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 67/89
Datanvironment!+rs(ommand/+(lose lse Datanvironment!+(ommand/ *- 2oad Data6eportmortem Data6eportmortem+Show
nd If nd Sub0rivate Sub (ommand![(lic*-Unload 'end Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect 0'ortem5o from 0ostmortemN-;hile *5ot rs+34- cmb'no+)ddItem rs*#-
rs+'ove5et;endnd Sub
@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 68/89
Most wante%
Co%ing2 Mostwante%
Dim )s Integer
0rivate Sub cmd(ancel[(lic*-Unload 'end Sub0rivate Sub cmdSave[(lic*-If *tt)ge+Tet M NN 3r ttDesc+Tet M NN 3r tt5ame+Tet M NN 3r tt5ic5ame+Tet M NN-Then 'sg1o N'issing fields, 0lease fill up allN, vbInformation, N(rime 4ile SystemNlse
?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 69/89
Set rs M con+ecute*Nselect count*\- from 'ost;antedN- If *5ot rs+34- Then M rs*#- If * M #- Then M !
lse M L ! nd If tthd+Tet M nd If If *5ot Is5umeric*tt)ge+Tet-- Then 'sg1o N)ge should be numberN, vbInformation, N(rime 4ile SyatemN tt)ge+Tet M NN tt)ge+Set4ocus lse
con+ecute *Ninsert into 'ost;anted values*N L tthd+Tet L N,QN L tt5ame+Tet L [ NQ,QN L tt5ic5ame+Tet L NQ,N L tt)ge+Tet L N,QN L cmbSe+Tet L NQ,QN LttDesc+Tet L NQ-N- 'sg1o N6ecord )dded SuccessfullyN, vbInformation, N(rime 4ile systemN tt5ame+Tet M NN tt)ge+Tet M NN ttDesc+Tet M NN tt5ic5ame+Tet M NN tt5ame+Set4ocus nd If nd If nd Sub0rivate Sub 4orm[2oad*-connectdbnd Sub
&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 70/89
MOST ;A'TE! REPORT
@#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 71/89
FIR
Co%ing2 FIR
0rivate Sub cmd(ancel[(lic*-Unload 'end Sub
0rivate Sub cmdSave[(lic*-If *ttDate+Tet M NN 3r ttDistrict+Tet M NN 3r tt4ir5o+Tet M NN 3r ttInfo)dd+Tet M NN 3rttInfo6cd+Tet M NN 3r [
@!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 72/89
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 73/89
nd Sub0rivate Sub 4orm[2oad*-cmbT!+Tet M N)'NcmbT/+Tet M N)'N
cmb)ct+Tet M N'urderNcmb4or2oc+Tet M N4oreignNconnectdbSet rs M con+ecute*NSelect (omplnt5o from (omplntTemp where StatusMQ5oQN-;hile *5ot rs+34- cmb(omplantno+)ddItem rs*#- rs+'ove5et;endnd Sub
@/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 74/89
FIR REPORT
CO!I'(2
Dim )s Integer 0rivate Sub cmdSh6pt[(lic*- M cmb'no+Tet If *Datanvironment!+rs(ommand%+State M !- Then Datanvironment!+rs(ommand%+(lose
@%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 75/89
lse Datanvironment!+(ommand% *- 2oad Data6eport4I6 Data6eport4I6+Show nd If
nd Sub0rivate Sub (ommand![(lic*-Unload 'end Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34- cmb'no+)ddItem rs*#- rs+'ove5et;end
nd Sub
C&arge s&eet
@$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 76/89
Co%ing2c&argeS&eet
Dim cnt )s Integer Dim )s (ontrol
0rivate Sub cmd1ac[(lic*-4rame%+Aisible M 4alse4rame/+Aisible M Truend Sub
0rivate Sub cmd1ac9[(lic*-4rame9+Aisible M 4alse4rame!+Aisible M Truend Sub
0rivate Sub cmd1ac/[(lic*-4rame/+Aisible M 4alse4rame9+Aisible M True
@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 77/89
nd Sub
0rivate Sub cmd4inish[(lic*-If *tt;itn)dd+Tet M NN 3r tt;itn5ame+Tet M NN 3r tt;itn3cc+Tet M NN- Then 'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemN
lse Set rs M con+ecute*Nselect \ from (hargeSheet where 4ir5oMN L cmb4ir5o+Tet L NN- If *5ot rs+34- Then 'sg1o NDupplication is not allowed, 0lease try another fir numberN, vb(ritical, N(rime4ile systemN 4rame%+Aisible M 4alse 4rame!+Aisible M True cmb4ir5o+Set4ocus lse con+ecute *Ninsert into (hargeSheet values*N L tt(hrg5o+Tet L N,QN Ltt0stat5ame+Tet L NQ,QN L ttDate+Tet L [
NQ,N L cmb4ir5o+Tet L N,QN L ttDist+Tet L NQ,QN L ttInfo5ame+Tet L [ NQ,QN L ttInfo)dd+Tet L NQ,QN L ttInfo3cc+Tet L NQ,QN L ttInfo0art+Tet L [ NQ,QN L tt)ccu5ame+Tet L NQ,QN L tt)ccu)dd+Tet L NQ,QN L cmb)ccuSe+Tet L [ NQ,N L tt)ccu)ge+Tet L N,QN L tt)ccu3cc+Tet L NQ,QN L cmb)ccuStat+Tet L [ NQ,QN L tt)ccu)ct+Tet L NQ,QN L tt;itn5ame+Tet L NQ,QN L tt;itn)dd+Tet L [ NQ,QN L tt;itn3cc+Tet L NQ-N- 'sg1o N6ecord )dded SuccessfullyN, vbInformation, N(rime 4ile systemN 4rame%+Aisible M 4alse 4rame!+Aisible M True tt(hrg5o+Tet M tt(hrg5o+Tet L ! Q 4or ach In 'e+(ontrols Q If * M Tet1o- Then Q +Tet M NN Q nd If Q5et nd If nd If nd Sub
0rivate Sub cmd5et![(lic*-If *tt(hrg5o+Tet M NN 3r tt0stat5ame+Tet M NN 3r ttDate+Tet M NN 3r cmb4ir5o+Tet M NN3r ttDist+Tet M NN- Then 'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse 4rame!+Aisible M 4alse 4rame9+Aisible M Truend If nd Sub
0rivate Sub cmd5et9[(lic*-
@@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 78/89
If *ttInfo)dd+Tet M NN 3r ttInfo5ame+Tet M NN 3r ttInfo3cc+Tet M NN 3r ttInfo0art+Tet MNN- Then 'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse 4rame9+Aisible M 4alse
4rame/+Aisible M Truend If nd Sub
0rivate Sub cmd5et/[(lic*-If *tt)ccu)ct+Tet M NN 3r tt)ccu)dd+Tet M NN 3r tt)ccu)ge+Tet M NN 3rtt)ccu5ame+Tet M NN 3r tt)ccu3cc+Tet M NN- Then 'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse 4rame/+Aisible M 4alse 4rame%+Aisible M True
nd If nd Sub0rivate Sub 4orm[2oad*-4rame!+Aisible M True4rame9+Aisible M 4alse4rame/+Aisible M 4alse4rame%+Aisible M 4alseconnectdbSet rs M con+ecute*Nselect ma*(hrgSht5o- from (hargeSheetN-If *5ot rs+34- Then cnt M rs*#- If *cnt M #- Then cnt M ! lse cnt M cnt L ! nd If tt(hrg5o+Tet M cntnd If rs+(loseSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34- cmb4ir5o+)ddItem rs*#- rs+'ove5et;endrs+(losend Sub
Complaint status
@?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 79/89
Co%ing2 Complaint status
0rivate Sub cmd(ancel[(lic*-
Unload 'end Sub
0rivate Sub cmdAiewStat[(lic*-Set rs M con+ecute*Nselect \ from (omplntStatus where (omplnt5oMN L cmb(omplnt5o+TetL NN-If *5ot rs+34- Then ttDetails+Tet M rs*!-nd If nd Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect distinct*(omplnt5o- from (omplntStatusN-;hile *5ot rs+34- cmb(omplnt5o+)ddItem rs*#- rs+'ove5et;endrs+(losend Sub
@&
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 80/89
Searc& criminal
?#
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 81/89
Co%ing2 Complaint status
Dim con )s )D3D1+(onnection
Dim rec )s )D3D1+6ecordset
0rivate Sub (ommand![(lic*- Dim strcon )s String Dim strcom )s String strcon M N0roviderM'icrosoft+)(+32D1+!9+#]DataSourceMD"R(rime4ileR(rime4ileR(rime4ileR(rime 4ile SystemRcrimefile+mdb]0ersist SecurityInfoM4alseN Set con M 5ew )D3D1+(onnection con+3pen strcon Set rec M 5ew )D3D1+6ecordset
strcom M Nselect \ from (riminal6eg where (rim5ameMQN Tet!+Tet NQN rec+3pen strcom, con, ad(mdTet If rec+34 Then 'sg1o Nrecord not presentN lse" 'sg1o Nrecord is presentN Tet9+Tet M rec+4ields*#- Tet/+Tet M rec+4ields*!- Tet%+Tet M rec+4ields*9- Tet$+Tet M rec+4ields*/- Tet+Tet M rec+4ields*%- Tet@+Tet M rec+4ields*$- Tet?+Tet M rec+4ields*- Tet&+Tet M rec+4ields*@- nd If nd Sub
0rivate Sub eit[(lic*-Unload 'e
nd Sub
?!
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 82/89
Searc& prisoner
Co%ing2 Searc& prisoner
Dim con )s )D3D1+(onnectionDim rec )s )D3D1+6ecordset0rivate Sub (ommand![(lic*- Dim strcon )s String Dim strcom )s String strcon M N0roviderM'icrosoft+)(+32D1+!9+#]DataSourceMD"R(rime4ileR(rime4ileR(rime4ileR(rime 4ile SystemRcrimefile+mdb]0ersist SecurityInfoM4alseN
?9
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 83/89
Set con M 5ew )D3D1+(onnection con+3pen strcon Set rec M 5ew )D3D1+6ecordset strcom M Nselect \ from 0risoners6eg where 0risoner5oMN (ombo!+Tet If (ombo!+Tet M NN Then
'sg1o Nrecord not presentN lse rec+3pen strcom, con, ad(mdTet If rec+34 Then 'sg1o Nrecord not presentN lse 'sg1o Nrecord is presentN Tet!+Tet M rec+4ields*#- Tet9+Tet M rec+4ields*!- Tet/+Tet M rec+4ields*9- Tet%+Tet M rec+4ields*/-
Tet$+Tet M rec+4ields*%- Tet+Tet M rec+4ields*$- Tet@+Tet M rec+4ields*- Tet?+Tet M rec+4ields*@- Tet&+Tet M rec+4ields*?- nd If nd If nd Sub
0rivate Sub eit[(lic*-Unload 'end Sub
?/
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 84/89
The modules involved in this proCect are"
• 2ogin for user and admin
• (omplaint registration
• Aiew complaint status
• (riminal register management
• 4I6 'anagement
• (ase =istory Details management
• 'anaging 0ostmortem details
• 0risoners register management
• 'anage list about most wanted criminals
LO(I'
This includes )dministrator and User login+ There will be a username and
password to login into the system to use all the facilities+
=$ COMPLAI'T RE(ISTRATIO'
This module helps to register the details about the crime+ This is done by
entering some details, such as incident details, Aictim details, crime details etc
>$ "IE; COMPLAI'T STAT*S
This module allows us to view the status of the complaint that you have
registered earlier+
?%
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 85/89
@$ CRIMI'AL RE(ISTER MA'A(EME'T
=ere we can have the facility to view the details of the criminals+ The
administrator can add new criminalZs details and save it in a database+ This can be done
by entering details such as criminal number, age, occupation, type of crime etc+
?$ FIR MA'(EME'T
This module allows viewing the 4irst Information 6eport of all the crimes that
too place at recent years+ The administrator can enter 4I6 information and save it in a
database+
0$CASE :ISTOR# !ETAILS MA'A(EME'T
=ere we can view the details of the case, date of occurrence, the type of crime
and place of occurrence etc8
-$ MA'A(I'( POSTMORTEM !ETAILS
This module helps to view the postmortem details of a person+ The details such
as date of death cause of death, name of the doctor etc+
$ PRISO'ER RE(ISTER MA'(EME'T
This module helps the administrator as well as the user to store, view and manage the
details of the past and present prisoners+
$ MA'A(E T:E LIST OF MOST ;A'TE! CRIMI'ALS
?$
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 86/89
This is an additional feature added to this Software, which helps us to mae a quic
search about the most wanted criminals+ This helps to always eep trac of and identify a person
quicly, who is a most wanted criminal+
TEST CASES
Test cases used in this proCect are"
Test case =2
Purpose2 The main purpose of this test case to inform the administrator if he did not write the
correct username or password+
Pre con%ition an% inputs2 The precondition for this test case is if the administrator write the
correct username and password, then only user will be able to access the application+
Results2 if username and password is not correct, then an error mess will be displayed for
incorrect password< username+
Test case +2
Purpose2 The main purpose of this test case to inform the administrator if any eception occurs
while updating information on the application+ The format should be correct while entering the
details for the criminal or prisoner name or fir information+
Precon%ition an% inputs2 The precondition of this test case is there are validations given in the
form which indicates the correct format of the data +The user has to fill the all required field ++
?
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 87/89
Results2 lf data format entered is not correct or any field is blan, then no account will be
generated+
F*T*RE E':A'CEME'T
• ;e can update this system as online application
• The main advantage of online application is that, a person can report the
crime any time from anywhere+
• Users can view the progress of their complaint online+
• 1y the future technology user can view the case details and progress of
the complaints on their mobile phones
•
4ace recognition technology can apply+ User or witness of the crime cangive the physical information of the thief+
?@
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 88/89
CO'CL*SIO'
CRIME FILE MA'A(EME'T S#STEM initiates the obCective of providing
the user with customiHed and powerful complaint registration and process management
system side software+ The software is built with all options such as complaint
registration, prisonerZs registration, and postmortem report generation etc8)ll the
requirements specified during the analysis and design phase are fully met, thus resulting
in the formation of good software+ The interface provided is very user friendly and
fleible for all times+
??
8/13/2019 Crime Filecrime file
http://slidepdf.com/reader/full/crime-filecrime-file 89/89
References
!+ http"<<office+microsoft+com<en.us<access.help<what.s.new.in.microsoft.office.access.9##@.=)#!##9%!?$+asp
9+ http"<<ncrb+nic+in<cctns+htm/+ http"<<en+wiipedia+org<wii<A1
%+ ) (omplete Aisual 1asic Training (ourse" =ow to 0rogramme" 0acage