Vous êtes sur la page 1sur 46

Major Project Report

On

E-COPS

Submitted as partial fulfillment for the award of the Degree

Bachelor of Technology
in
Information Technology
BATCH 2011-2015
PUNJAB TECHNICAL UNIVERSITY

Submitted To:Mr. Abhishek Bhardwaj

(Asst prof.)

Submitted By:Harleen (1141525)


Ranjit Kaur (1141544)

CT Institute of Engineering and


Technology,Shahpur,Jalandhar

INDEX
Sr No.

Topic

Page No

1.

Objective

2.

Acknowledgement

3.

Abstract

4.

Introduction

5.

Software/Hardware Req.

6.

Technology Used i.e JAVA

7.

Chracterstics of JAVA

7-9

8.

Literature Review

10

9.

Software Req Analysis

11

10.

Software Design

12-14

11.

UML Diagram

15-20

12.

UseCase Diagram

21-22

13.

Control Flow Diagram

23-27

14.

DB Design

28-29

15.

Coding

30-39

16.

Output Screen

40-54

17.

Conclusion

55

18.

Bibliography

56
2

ACKNOWLEDGEMENT
It is indeed a pleasant task to thank the people who have contributed towards the
successful completion of this project. It is my sincere obligation to thank Dr.Manju
Sharma, Head of Information Technology Department, who has extended positive
support and precious suggestions to make the project work a success.
I am very thankful to our project guide Mr.Chetan Sharma who has been inspiring guide
and committed caretaker for her unflinching devotion. The encouragement and support
by him, especially in carrying out this project motivated me to complete this project.
My heart full thanks to my parents and friends for their moral support. I thank the all the
employees of THE KITES who have made a contribution towards the successful
completion of this project. We pay special thanks to all the staff members of the
Department of Information Technology for their help at every stage. They helped in every
respect during the tenure.
Lastly, We thank our parents and friends for their moral support in every sphere. Their
vital push infused sense of insurgency in us,we are thankful to them for their assistance
and cooperation.

DECLARATION

We, Harleen, Ranjit Kaur students of BTech-IT8 of CTIEMT hereby declare that ECOPS JALANDHAR is an authentic piece of work of mine and have developed it
under guidance of Mrs. Manju ( HEAD OF THE DEPARTMENT) and Mr. Chetan
Sharma, my project guide.

Harleen(1141525)
Ranjit Kaur(1141544)
B.tech(IT)8th

ABSTRACT
This feature is made available to public for interaction with police indirectly. This system
registers the complaints from people through online and is helpful to the police
department in catching criminals. In this system any person can give any complaint
anytime. Generally many crimes seen by the public will not reach to the police due to
many reasons like fear, lack of time, ignorance. Due to this reason many cases are not
even reaching the police station. Though some cases are registered they are not
investigated properly due to lack of evidences and cooperation of the public. This
software helps the public to report about the crimes to the police without any fear in
correct time. This is helpful to police in solving the cases .This is also helpful for higher
authorities of police to have an overview about the progress of the investigation. The aim
of this project is to develop an E-cops reporting and management system which is easily
accessible to the public, police department and the administrative department.

Introduction to Company
The Kites is a group of hard core professionals having expertise in Training,
Development, Soft Skills, Placements & Promotions. 'The KITES' is an ISO 9001:2008
certified company, registered under Government of India.
'The Kites' is a leading IT Company whose Headquarters is in Jalandhar, Punjab and
Branch office is in Mohali. It is operating through well defined systems and procedures.
'The Kites also provides Corporate Training, Sales Training, Induction Programs, Soft
Skills, Behavioral Training, Selling Skills and Functional Training.
The Kites provide jobs to anyone who has finished/yet to finish their graduation/post
graduation or any individual looking for first job in corporate.
We also provide Career guidance to students.

IT DEVELOPMENT IN KITES
'The Kites deals in Software Development, Web-Apps Development and Mobile-Apps
Development. We are providing Software Development Services and Industry Based
Solutions to the IT Industry for more than 5 years.
We have a vast IT Development Network that spans all over India & have been
developing IT Products Software, Websites and Mobile Apps (Android) on a large
scale.

Objective:
The aim of this project is to develop a system of improved facilities. Thesystem provides
proper security and reduces the manual work. The existing system has several
disadvantages and many more difficulties to work well. The proposed system tries to
eliminate or reduce these difficulties up to some extent. It will help the user to reduce the
workload and mental conflict. For the police, initiatives such as ECOPS are designed to
improve their long-term relations with the citizens due to effective feedback and faster
exchange of critical information between various departments and police stations. The
proposed system helps the user to work user friendly and he can easily do his jobs
without time lagging.
SCOPE OF THE PROJECT:
An online solution is very useful as the solution is inherently distributive. This
distributive characteristic of the online solution helps in getting the different police
stations to share information and get in contact with one another. With respect to ECOPS,
going forward, the aim is to develop new technologies that include designing new
techniques to fight crime and improve criminal justice. Plans are afoot to embed multipurpose technologies such as traffic management, mobile data techniques, warrants,
personnel scheduling, gang activity analysis, field reporting, human resource
development of police personnel, etc.
For the police, initiatives such as ECOPS are designed to improve their long-term
relations with the citizens due to effective feedback and faster exchange of critical
information between various departments and police stations.

Introduction
Overview
An online comprehensive crime reporting system to engage public, NGOs, police and
government agencies to be more quick, proactive and responsive to fight with crime and
criminals.

ABOUT THE PROJECT


Crime Reporting System will address not only the cited reasons for not reporting, but also
the need of police departments for more accurate, complete, and reusable information that
may free up their time and resources to allocate them to policing the streets . An online
solution is very useful as the solution is inherently distributive. This distributive
characteristic of the online solution helps in getting the different police stations to share
information and get in contact with one another. It also improves work efficiency of
department. Using this application information handling will be easy and fast and solving
cases will be fast. The modules involved are station module, citizen module, crime
module, search module, avocation module. The main advantage of online application is
that, a person can report the crime anytime from anywhere. Users can view the progress
of their complaint online.
Need: Although reporting crime has many societal and individual benefits, it is common
for criminal acts to remain unreported. Victims and witnesses have many reasons for not
reporting a crime. Among these reasons, fear of repercussion, embarrassment or shame,
believing the crime is too insignificant or a personal issue, believing that reporting will
not make a difference, and being unable to reach an authority are often cited. Generally
many crimes seen by the public will not reach to the police due to many reasons like fear,
Lack of time, Ignorance. Due to this reason many cases are not even reaching the police
station. Though some cases are registered they are not investigated properly due to lack
of evidences and Cooperation of the public. This software helps the public to report about
the crimes to the police without any fear in correct time. This is helpful to police in
solving the cases .This is also helpful for higher authorities of police to have an overview
about the progress of the investigation.
ECOPS is an online reporting service to which the internet user can report crimes
committed on or through the Internet. The impact of IT and communications is traversing
9

at a fast pace. As information for the department is crucial, an enterprise IT tool for
enhancing the performance of the police officials became necessary called ECOPS or EComputerized Operations for Police Services, the main purpose is to maintain
information, monitor and enhance the performance of the department.
The focus of ECOPS is to computerize the activities of controlling crime, administration
and support services across the state in an integrated fashion so as to enable the division
heads and senior officers to obtain the relevant information. Besides, it is also envisaged
to reduce dependence on paper and help in automatic maintenance of registers and
generation of reports, data analysis, better planning and coordination, speedy detection of
crimes and monitoring the prosecutions.

10

MODULE DESIGN
There are three modules:
1. Public
2. Police
3. Administrator
1. Public:
User can send the complaints to police and they can view the complaint report.
User can perform these tasks only when he logins to his account otherwise he has to
register his new account. Police send the status report to the users based on their
investigation. The user can check the status of their complaints with the help of
complaint id given. The user can register his complaints to the police and view the
thieves information.
The public module includes:
Add Complaint: This module help the user to report online complaints.
Add Crime report: This module help the user to report online crimes.
Add Missing person: This module help the user to report online missing persons
details also we have to add photos of missing person using heterogeneous database.
View Missing persons: This module help the user to view all the missing person
details.
View Most wanted persons: This module help the user to view all most wanted
persons which can be given by the administrator.
Edit Complaint: This module help the user to edit his complaint details.
Edit Account: This module help the user to update his or her profile.
View complaint status: This module allows us to view the status of all complaint
that you have posted earlier.
View crime status: This module allows us to view the status of the all crimes.
Add and View feedback: This module helps the user to add and view feedbacks.

11

2. Police:
Basing on the complaints given by the public, police can view them and take appropriate
action timely. The police has to login with their account to view the complaints and to
send the status of the complaints to the users. They can update the status of the complaint
basing on the progress of investigation. They will also receive alerts from the higher
authorities regarding warnings and can take action in advance.
The police module include:
View Hotnews: This module help the visitor to see the latest hotnews which can
updated by the admin that you have posted earlier.
View crime status: This module allows us to view the status of the all crimes that
you have posted earlier.
Add and View feedback: This module helps the user to add and view feedbacks.
3. Administrator:
Higher authorities like VIPS, CP, and DCP can view the complaints which are sent by
the public. The administrator has to login with their account in order to perform his
actions. They can send alert messages to the police department regarding any future
complications. The administrator can also send cautions to the users. Unlike police who
can view complaints specific to his area the administrator can view the complaints
universally.
The administrator module includes:
View and reply user complaint: This module helps the admin to view and reply
users complaint details
View and reply user crimes: This module helps the admin to view and reply users
crimes details
Add and delete latest hotnews: This module helps the admin to add and delete latest
hotnews.
View and delete users feedback: This module helps the admin to add and delete
users feedback.
Add, delete and view mostwanted persons: This module helps the admin to add,
delete and view mostwanted person details.

12

Add, delete and view missing persons: This module helps the admin to add, delete
and view missing person details
Add and view Criminal registeration: This module helps the admin to add and view
criminal registrations.
Add and view FIR: This module helps the admin to add and view Fir reports
Add and view history sheet: This module helps the admin to add and view history
reports

13

System Analysis
Existing system
In the existing crime management system, most of the operations are done manually like
send complaints, taking actions against crimes, view status etc. So with the existing
system if anybody wants to complaint against crimes he must do it through the police. If
we are doing the system manually, so many minor errors will occur. In the existing
system only we can see the details of particular information about the police stations in
our state, the existing system has more workload for the authorized person, but in the
case of Proposed System, the user can registered in our site and send the crime report and
complaint about a particular city or person. The normal public in India are afraid
to give an complaint in police station because they are filled with a false fear
about the police department. An online complaint registering system will solve the fears
of public and will also help the police department in catching criminals.
Purposed system
The aim of the proposed system is to develop a system of improved facilities. The
proposed system can overcome all limitation of existing system. The system provides
proper security and reduces the manually done work. The Crime Records Management
System applies to Police Stations all across the country and specifically looks into the
subject crime prevention, detection, conviction of criminals depending on a highly
responsive backbone of Information Management. The efficiency of the Police and the
effectiveness with which it tackles crime depend on what quality of information it can
derive from its existing records and how fast it can have access to it.

14

Drawbacks of Existing System

More man power.


Time consuming.
Consumes large volume of pare work.
Needs manual calculations
Damage of machines due to lack of attention
No direct role for the higher officials
To avoid all these limitations and make the working more accurately the system
needs to be computerized.

Expected Advantages of Proposed System


The system is very simple in design and to implement. The system requires very
low system resources and the system will work in almost all configurations. It has got
following features:
Ensure data accuracys.
Proper control of the higher officials.
Reduce the damages of the machines.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.

15

Requirements And Specification: The system specification is the final work produced by the system and requirements
engineer. It serves as the foundation for hardware engineering, software engineering,
database engineering and human engineering.
Once requirements have been gathered explore each requirements in relationship to
others, examine requirements for consistency, omissions and ambiguity.

Software requirements:
Windows 7, 8 operating system
Oracle 10g
J2EE (JAVA Enterprise Edition)

Hardware requirements:
Pentium machine with atleast 1 GHz processor speed or above
RAM of 512 MB or above
10.2 GB Hard Disk or above

16

Technologies and Requriments


Front End:
J2EE

Back End:
Oracle 10g

IDE:
NetBeans 8.0

Programming Language:
JAVA, JSP, HTML, JAVASCRIPT, JQUERY.

17

Technology Used(JAVA): Key Features of the Java Language


The Java language has key features that make it ideal for developing server applications. These
features include:
Simplicity. Java is a simpler language to master than most others you use in server applications
because of its consistent enforcement of the object model. The large standard set of class
libraries brings powerful tools to Java developers on all platforms.
Portability. Java is ubiquitous due to its portability across platforms. It is possible to write
platform-dependent code in Java, but it is also simple to write programs that move seamlessly
across machines. Server applications, which by their nature do not support graphical user
interfaces directly on the platform that hosts them, also tend to avoid the few real platform
portability issues that Java has.
Automatic Storage Management. The Java virtual machine automatically performs all memory
allocation and deallocation during program execution. Java programmers can neither alloc nor
free memory explicitly. Instead, they depend on the virtual machine to perform these
bookkeeping operations, allocating memory as they create new objects and deallocating memory
when the objects are no longer referenced. The latter operation is known as garbage collection.
Strong Typing. Before you use a Java variable, you must declare the class of the object it will
hold. Java's strong typing makes it possible to provide a reasonable and safe solution to interlanguage calls in the case of Java and PL/SQL and to integrate Java and SQL. Languages without
strong typing are typically more flexible at development time but make it difficult to build safe
programs because they cannot take advantage of type information at compile time.
No Pointers. Although Java retains much of the flavor of C in its syntax, it does not support
direct pointers or pointer manipulation. You pass all parameters except primitive types by
reference (that is, object identity is preserved), not by value. Java does not provide C's low level,
direct access to pointers, thereby eliminating the major source of bugs, memory corruption, and
memory leaks that plague C programs and that in turn prevents Oracle from allowing such
programs to execute in the same address space as the RDBMS.
Exception Handling. Exception handling is a feature of the Java language. Java exceptions are
objects. Exception handling is a powerful tool for developers to build robust programs. Java even
goes as far as requiring developers to declare which exceptions may be thrown (or signaled) by
methods in any particular class.
Flexible Namespace. Java defines classes and holds them within a hierarchical structure that
mirrors the Internet's domain namespace. This approach enables you to distribute Java
applications while avoiding the possibility of name collisions. Java extensions such as the Java
Naming and Directory Interface (JNDI) that Oracle uses, for example, in its EJB implementation
18

even provide a framework for multiple name services to be federated. Java's namespace approach
is flexible enough for Oracle to incorporate the concept of a schema in the way class names are
resolved while fully complying with the language specification.
Security. The design of Java bytecodes and the virtual machine allow for built-in mechanisms to
verify that Java binary code has not been tampered with in ways that would violate the safety and
security restrictions the language supports. Oracle8i is installed with an instance of
SecurityManager that uses Oracle security to further enhance the features the language supports.
The SecurityManager uses Oracle roles to restrict access to sensitive functionality such as disk
file manipulation while fully complying with the requirements of the JLS.
Standards for Connectivity to Relational Databases. JDBC and SQLJ provide important and
standard ways for programs you write in a general purpose object-oriented programming
language-- Java--to access and manipulate data resident in relational databases. Vendors such as
Oracle provide vendor-specific drivers that allow vendor-independent, portable Java code to
access a specific relational database. Java developers can use vendor-specific extensions to
access vendor-specific features.
Speed. Because Java executes platform-independent bytecodes on top of a virtual machine,
which in turn deals with the specific hardware platform, a degree of inefficiency is inherent in
Java bytecode interpreters as compared to a language such as C. Virtual machine suppliers such
as Oracle address this speed issue in different ways. One popular approach is to use a Just in
Time (JIT) compiler. JITs quickly compile Java bytecodes to native (platform-specific) machine
code, allowing Java code that is run frequently to be executed at speeds closer to languages such
as C. Oracle has adopted a Way Ahead of Time (WAT) approach to gain speed. In the WAT
approach, Aurora translates Java bytecodes to platform-independent C code, which a standard C
compiler then compiles for the target platform.

19

SYSTEM DEVELOPMENT LIFE CYCLE


THE SYSTEM CONCEPT
The term system is derived from the Greek work Systema, which means an organized
relationship among functioning units or the components. A system exists because it is designed
to achieve one or more objectives
A system is an orderly grouping of interdependent component linked together according to a plan
to achieve a specific objective. The word component may refer to a physical part, managerial
steps, or a subsystem in a multilevel structure. Scholars in various disciplines, who are concerned
about the tendency towards the fragmentation of knowledge and the increasing complexity of
phenomena, have sought a unifying approach to knowledge. System Analysis and Design for the
information systems were founded in the general systems theory, which emphasizes a close look
at all the parts of the systems.
System Analysis user here is the application of the system approach to the study and solution of
problems using Computer based systems. System thinking is integral to the system interrelated
interlocking subsystems. The system approach is a way of thinking about the analysis and design
of computer based application. It provides a framework of visualizing the system. System
analysis and Design focus on system, process and technology.
The SDLC is how all systems are created. It is a very powerful technique user for
creation of applications to solve problems using computer systems. With its help you get closest
view of the system which then helps to create it because you are familiar with all sorts of
components of the system. It provides a perfect outline for the system using which the system is
created successfully.
What is SDLC?
SDLC is an acronym for System Development Life Cycle, a methodology that consists of
development activities that have a prescribed order. Once a problem or opportunity for a new
system is recognized a request for developing a new system is forwarded for approval. If it is
20

approved, a study is carried out to ensure that the proposed system is feasible. If it is feasible,
then the systems requirements are specified and are followed by phases of system analysis,
system design, system implementation, and post implementation. A recycling of development
may occur again following system evaluation if the system still requires modification or
redevelopment.
The stages of system development life cycle are:

NEEDS ANALYSIS

FEASIBILITY STUDY

SYSTEM ANLYSIS

SYSTEM DESIGN

IMPLEMENTATION

POST IMPLEMENTATION

SYSTEM
MAINTENANCE

21

1. RECOGNITION OF THE NEED WHAT THE PROBLEM IS?


One must know what the problem is before it can be solved. The basis of the candidate system is
the recognition of a need for improving an information system or a procedure. This needs leads
to a primary survey or an initial investigation to determine whether an alternate system can solve
the problem.
2. FEASIBILITY STUDY :
Depending on the result of the initial investigation, the survey is expanded to more detailed
feasibility study. A feasibility study is a test of system proposal according to its work ability
impact on the organization, ability to meet the users need and effective user or resources.
It focuses on three major questions:1)

What are the users demonstrable needs and how does the candidate
system meet them?

2)

What resources are available for a given candidate system and is the
problem worth solving?

3)

What is the likely impact of the candidate system on the organization?


How well does it fit within the organization master MIS plans?

The result of the feasibility study is a formal proposal. This is simply a report-a formal document
detailing the nature and scope of proposed solution. The proposal summarizes what is known and
what is going to be done.
Feasibility is a preliminary study to investigate the info needs of prospective ends users and
objectives, constraints, resource requirements, cost, benefits and feasibility of a proposed system.
It helps to finalize a statement specifying the scope and objective of the problem and obtain a
rough "Ball Park" estimating the development cost of the project. It is test of system proposals
according to its workability, impact on the organization ability to meet the users need and
effective use of resources. The goal of feasibility study is to evaluate alternative system and to
propose the most feasible and desirable systems for development.
The feasibility of a proposed system can be obtained by four major categories described as:
Organizational Feasibility: This study helps us to find out how well a proposed System
supports the objectives of organization's strategic plan for information system. As I am
making e-banking site it fall under banking organization and it directly supports the
22

objectives of the banking organizations


Operational Feasibility: People are inherently resistant to change, so this study find out
willingness and ability of management, employees customers, suppliers and so on to
operate, use and support a proposed system. Due to User - Friendly forms, Interaction
with Electronic site will be a success in terms of Operational Feasibility.
Economic Feasibility: Economic analysis is the most frequently method used for
evaluating the effectiveness of a candidate system.
Technical Feasibility: Whether reliable hardware and software capable of meeting of
proposed system can be acquired or developed by the business in required time. As our
Package is developed in J2EE which gives features like Portability, Security etc.
Behavioral Feasibility: People are inherently resistant to change, and computers have
been known to facilitate change. An estimate should be made of how strong a reaction
the user staff is likely to have toward the development of a computerized system. It is
common knowledge that computer installation has something to do with turnover,
transfers, retraining, the charges in employee job status. Therefore, it is understandable
that the introduction of a candidate system requires special efforts to educate, sell, and
train the staff on new ways of conducting business.

3. SYSTEM ANALYSIS
It is a detailed study of the various operations performed by a system and their relationships
within and outside of the system. A key question is:
What must be done to solve a problem?
During analysis, data are collected on the available files, decision points and transactions
handled by the present system. Data flow diagrams, interviews, on site observations,

23

questionnaires are system models and tools that are used in Analysis. Training experience and
common sense are required for the collection of the information needed to do the analysis.
We define the analysis is to define the boundaries of the system and to determine whether or not
a system should consider other related systems. During analysis, data is collected on available
files, decision points, transactions handled by the resent system. There are several modes and
tools used in analysis, for exampleinterviews, questionnaires etc.
Analysis of Organizational Environment:

An Organizational Environment

Analysis is an important first step in system analysis. It includes organizational


information its MANAGEMENT STRUCTURE, its PEOPLE, its business
ACTIVITES, ENVIRONMENTAL SYSTEMS it deal with its CURRENT IS and
OPERATIONS of the specific workgroup that will be affected by new / improved
application.
Analysis of Any Present IS:

Before you design a new system, it is very

important to study the system that will be replaced or improved if there is one.
This analysis includes not only the way to present IS. Uses hardware, software
and people resources to accomplish the IS activities of input processing, output
storage and control. This analysis will help to place all these activities and
resources in more desirable and correct manner in new/improved proposed
system.
My E-Banking System is going to run parallel with the Existing Manual System.
System Requirement Analysis:

This is the most difficult step of System

Analysis focusing mainly on the needs of end user. It includes two types of
analysis:
a

Need/User-requirement Analysis:
Determining end users specific information needs.
b

Functional Requirement Analysis:


Determining the information processing capabilities required for each
system activity.
24

4.SYSTEM DESIGN
The term design refers to the technical specification that will be applied and implementing the
candidate system. It also includes the construction of programs and program testing.
The first step is to determine how to output is to be produced and in what format samples of
output are also presented.
Second input data and master files have to be designed to meet the requirements of the proposed
output. The operational phases are handled through program construction and testing, including
the list of programs needed to meet the system objective and complete documentation.
Finally details related to justification and estimate of the impact of the candidate system of the
user and organization are documented and evaluated by management as a step towards
implementation.

5. IMPLEMENTATION:
It is primary concern with the user training, site preparation and file conversion. During the final
testing user acceptance is tested, followed by user training. Depending on the nature of the
system, extensive user training may be required. System testing checks the readiness and
accuracy of the system to access, update and review from new files. Once the programs become
available, test data are read into the computer and processed against the files provided for testing.
If successful, the programs are then run with live data. Otherwise, a diagnostic procedure is user
to locate and correct errors in the program.

6. POST-IMPLEMENTATION AND MAINTAINENCE:


After the installation phase is completed and user staff is adjusted to the changes created by the
candidate system, evaluation and maintenance begin. The importance of maintenance is to
continue to bring the new system to standard. Like any other systems, there is an aging process
that requires periodic maintenance of hardware and software. If the new information is
inconsistent with the design specifications, then changes have to be made. Hardware also
requires periodic maintenance to continue to bring the new system to standards. User priorities,
25

changes in organizational requirements, or environmental factors also call for system


enhancements.

PROJECT TERMINATION
A system project may be dropped at any time prior to implementation, although it becomes more
difficult (and costly) when it goes past the design phase. Generally, projects are dropped if, after
a review process, it is learned that:
~~ Changing objectives or requirements of the user cannot be met by the existing design.
~~ Benefits realized from the candidate system do not justify commitment to

implementation.

~~ There is a sudden change in the users budget or an increase in design costs beyond the
estimate made during the feasibility study.
~~ The project greatly exceeds the time and cost schedule
The first step is to design the output format. Sample of the output are prepared. Second step is to
design the set of the inputs that are to given for the processing. It includes E-R diagrams and
Data flow diagrams (DFDs).

26

PROJECT ANALYSIS
STUDY OF THE SYSTEM
Generally many crimes seen by the public will not reach to the police due to
many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even
reaching the police station. Though some cases are registered they are not investigated properly
due to lack of evidences and Cooperation of the public. This software helps the public to report
about the crimes to the police without any fear in correct time. This is helpful to police in solving
the cases .This is also helpful for higher authorities of police to have an overview about the
progress of the investigation. An online solution is very useful as the solution is inherently
distributive. This distributive characteristic of the online solution helps in getting the different
police stations to share information and get in contact with one another.
With ECOPS, the exchange of information within police stations and other senior
police officers in the departments is faster. It also streamlines the workflow in police department
machinery. A central database permits the police units to operate more efficiently leading to
speedy detection of crime and prosecution monitoring. The senior police officers of the state can
access the reports, which allow them to take quick and timely decisions. Crime analysis reports
will enable the senior police officers to observe the crime trends and to guide the investigating
officers. The technological benefits of ECOPS are to maintain information, monitor and enhance
the performance of the department, to take a critical look at the existing system, processes and
procedures of the department so as to identify and remove the redundancy.
ECOPS is envisaged to reduce the fair amount of paper work and helps in the
automatic maintenance of registers and generation of reports, data analysis, better planning and
coordination, timely decision and speedy detection of crime and prosecution monitoring. All
these factors have contributed to a higher moral of the police officials at all the levels in police
department. The case registered at one police station can be tracked at any police station. This
reduces the discretionary dependence of police. Once the case is registered the investigation and
follow up activities relating to the case cannot be delayed. The grievances handling is more
efficient. Now, the citizens will have access to senior officers through the web. ECOPS
introduced transparency and accountability in the whole system.
Need for Computerization

Duplication of work avoided

Paper work is drastically reduced

Retrieval and access of data is easy

High-Level Project Goals


27

Improve efficiency in police department


Availability of online police service to citizens
Availability of data to senior officials for quick decision making
Better administration

PROJECT DESIGN
28

DIAGRAMS
CONTEXT DIAGRAM:

Register
Complaints

E-COPS

login
Feedback

Feedback
Send Caution
& Alert

USER

View thieves
Info
Login

feedback

POLICE

ADMIN

view
Caution
Complaint &
Alert

This context diagram gives the overview of the entire project. The
modules in this project, user, administrator and the police are interrelated with one
another. They can pass the information required to one another.

DATA FLOW DIAGRAMS


LEVEL -1 DIAGRAM
29

Register
Complaint

USER

Complaints Database

View Status
View Thieves
Status DB
Thieves Database
Crime Img DB

User login process is the Level-1 DFD shown in figure. Here user has to enter into the
registering complaint area. Any one register the complaint so there is user id and password for it.
After entering the complaint and pressing submit it will be send to the complaint database .If his
complaint has been successfully entered in to the database he is allotted with a self generated no
which is used for the further purposes.
The user can view the status of his compliant in the status menu by entering the self generated
no given by the system and the details of the thieves present in the various locations to make him
self cautious .By just selecting the location and the thieves id he can view the details of the
thieves
with
his photo and reward announced on him by the police.
Police
Dept

LEVEL-2 DIAGRAM:

30

P Login database
Login

View Caution

Caution DB

View
Suggestion

Crime DB

Police login is Level-2 DFD as shown in figure. In this level, different police officers of different
locations were provided with their particular user id and password using which they have to
ADMIN
login
in. The entered user id and password were validated and if correct they were made to login.

Here they can view the alert message given by the administrator and also the caution by the
administrator to the particular complaint. Police officers can see the complaints belonging to
their locality only.

LEVEL-3 DIAGRAM:

Login DB
31

Login

View
Problem

Send
Caution

Send
Status

send
Alerts

Caution DB
Complaints DB

Alerts
Status DB

Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login
using user id and password provided to him. After entering user id and password they are
validated and if correct they made to enter into the page. Here he has two tasks they are sending
alert messages and caution for the particular complaint to the police. In the caution first he has to
select the location and then the complaint id and then he has to send the status and caution to the
particular complaint. The entered alert, status, and caution were sent to the respective databases.

ENTITY RELATIONSHIP DIAGRAM


E
R Diagrams represent the relationship between the entities. An ER diagram is composed of
1. Entity is shown by rectangle.
32

2. Attribute is shown by oval.


3. Relationships with rhombus.
4. Optional is shown by circle.
5. Compulsory with dash.
6. Primary key with underscore.
Cid

Loc
Crime type

Description

Alias name

Email

COMPLAINTS

C date

Name
T id

User id
THIEVES

DOB

POLICE

Pwd

Address
Name

Reward

ADMIN

Status

User id
Pwd
Name

UML DIAGRAMS
CLASS DIAGRAMS:
A class diagram shows a set of classes, interfaces, and collaborations and their relationships.
33

COMPLAINTS

CID
CDATE
EMAIL
LOC
DESCRIPTION
CRIME TYPE

THIEVES
TID
NAME
ALIASNAME
DOB
ADDRESS
REWARD
STATUS
PATH

1
1
*

Insert ()
View ()

View ()
Select ()

*
1
ADMINISTRATOR

POLICE DEPT

NAME
USERNAME
PASSWORD

NAME
USERNAME
PASSWORD

1
1

Select ()

Select ()

1
STATUS

1
CAUTION

CID
ADMIN CAUTION

CID
STATUS
Insert ()

Insert ()

ACTIVITY DIAGRAMS:
An activity diagram is a special kind of a state chart diagram that shows the flow from activity
to activity within a system. Here we are having four forms they are
Complaints, User, Administrator, Police.

34

1 .COMPLAINTS

COMPLAINTS

CID

LOC

CRIME

DESCRIPTION

SUBMIT
.

PUBLIC

LOGIN

2. PUBLIC

SEND COMPLAINTS

GETS COMPLAINT ID

VIEW STATUS & MESSAGES

35

3. POLICE
POLICE

LOGIN

VIEW COMPLAINT

VIEW CAUTION

SEND STATUS

36

4. ADMINSTARTOR

ADMIN

LOGIN

ALERT

SEND ALERT

CAUTION

SELECT LOC
SELECT COMPLALINT

ENTER CAUTION AND STATUS

37

Class Diagram:
The class diagram is used to refine the use case diagram and
define a detailed design of the system. The class diagram classifies the actors defined
in the use case diagram into a set of interrelated classes. The relationship or
association between the classes can be either an "is-a" or "has-a" relationship.

Admin
username
password
complaint_id
user_complaint
complaint_status

+1

+*

login()
viewcomplaint()
viewstatus()
logout()

+1

Police
username
password
complaint_id
user_complaint
rep_id
report
complaint_status
login()
viewcomplaint()
sendstatus()
sendreport()
viewreport()
logout()

User
+*
username
password
complaint_id
user_complaint
complaint_status
login()
reg()
lodgecomplaint()
viewstatus()
logout()

38

Sequence Diagram:

A sequence diagram represents the interaction between

different objects in the system. The important aspect of a sequence diagram is that it is

39

time-ordered. Different objects in the sequence diagram interact with each other.

Admin

Police

User

login
Registration,login

login

lodge Complaint

View Complaint

View Complaint
Send Status

notify

notify

View Status

View Status

40

Use Case Diagram:


The use case diagram is used to identify the primary elements and
processes that form the system. The primary elements are termed as "actors" and the
processes are called "use cases." The use case diagram shows which actors interact
with each use case.

41

Login

Registration

Lodge Complaint

Admin

View User Complaint

View Complaint Status


User

Send Status
Police Personell

Send Reports

View Report

Logout

Collaboration Diagram:
A collaboration diagram groups together the interactions between
different objects. The interactions are listed as numbered interactions that help to trace
the sequence of the interactions. The collaboration diagram helps to identify all the
possible interactions that each object has with other objects.

42

1: login
7: View Complaint
12: View Status

Admin

2: Registration,login
11: View Status

3: login
6: View Complaint
8: Send Status

5:
9: notify

4: lodge Complaint
Police

User
10: notify

SCREEN SHOTS:

43

CONCLUSION
The technological benefits of ECOPS are to maintain information, monitor and enhance
the performance of the department, to take a critical look at the existing system, processes and
procedures of the department so as to identify and remove the redundancy.

44

The case registered at one police station can be tracked at any police station.
This reduces the discretionary dependence of police. Once the case is registered the investigation
and follow up activities relating to the case cannot be delayed.
All these factors have contributed to a higher moral of the police officials at all
the levels in police department. This project result in great improvement in the organizations
functioning by reducing the effort spent by the general people.
GOALS:

Improve efficiency in police department


Availability of online police service to citizens
Availability of data to senior officials for quick decision making
Better administration and co-ordination
Speedy detection of crimes
Duplication of work avoided
Retrieval and access of data is easy
Paper work is drastically reduced
Automatic maintenance of registers

BIBILIOGRAPHY
References and Web Resources
Java user site: www.java.com.
Java at Sun Microsystems., Inc - java.sun.com
45

Java Virtual Machine Specifications, 2nd Ed. - Java.Sun.com


Java Virtual Machine - Wikipedia
http://java.sun.com/products/jsp/
http://en.wikipedia.org/wiki/JavaServer_Pages
http://en.wikipedia.org/wiki/Java_Database_Connectivity
http://jakarta.apache.org/tomcat/tomcat-5.5-doc

46

Vous aimerez peut-être aussi