Professional Documents
Culture Documents
S P M P: Oftware Roject Anagement LAN
S P M P: Oftware Roject Anagement LAN
DATE
30/12/2020
Contents
1. INTRODUCTION..................................................................................................................................4
1.1. Project Overview...................................................................................................................4
1.2. Project Deliverables...............................................................................................................4
1.3. Evolution of the SPMP...........................................................................................................5
1.4. Reference Materials...............................................................................................................5
1.5. Definitions and Acronyms......................................................................................................5
2. PROJECT ORGANIZATION.....................................................................................................................5
2.1. Process Model.......................................................................................................................5
2.2. Organizational Structure........................................................................................................6
2.3. Organizational Interfaces.......................................................................................................6
2.4. Project Responsibilities..........................................................................................................6
3. MANAGERIAL PROCESS.......................................................................................................................7
3.1. Management Objectives and Priorities..................................................................................7
3.2. Assumptions, Dependencies, and Constraints.......................................................................7
3.3. Risk Management..................................................................................................................8
3.4. Monitoring and Controlling Mechanisms..............................................................................8
3.5. Staffing Approach..................................................................................................................8
4. Technical Process..........................................................................................................................8
4.1. Methods, Tools, and Techniques...........................................................................................8
4.2. Software Documentation.......................................................................................................8
4.2.1. Software Requirements Specification (SRS)...................................................................8
4.2.2. Software Design Description (SDD)................................................................................8
4.2.3. Software Test Plan.........................................................................................................8
4.3. User Documentation..............................................................................................................8
4.4. Project Support Functions.....................................................................................................8
5. Work Packages, Schedule, and Budget.........................................................................................8
5.1. Work Packages.......................................................................................................................8
5.2. Dependencies........................................................................................................................8
5.3. Resource Requirements.........................................................................................................8
5.4. Budget and Resource Allocation............................................................................................8
5.5. Schedule................................................................................................................................9
6. Additional Components..............................................................................................................10
6.1. Index....................................................................................................................................10
6.2. Appendices..........................................................................................................................10
1. INTRODUCTION
This is a Crime Reporting and Management System. The goal of the system is to facilitate
collection, storage, retrieval, analysis, transfer and sharing of data and information at the
Police Department and between the Police Department and the state Headquarters and the
central police Organizations. We want to make the police functioning citizen friendly and
more transparent by automating the functioning of police departments and to provide the
investigating officers of the civil Police with tools, technology and information to
facilitate investigation of crime and detection of criminals.
CRMS will be helpful for the police department as it converts all the file-based
system into computerized system and allow the police officers to manage all the
criminal record in secure environment. CRMS will be used to facilitate collection,
storage, retrieval, analysis, transfer and sharing of data and information at the Police
Department and allow them to share it between other law enforcement agencies. It is
really helpful in order to overcome crime as its easier to manage all the record you
can register FIR online; you can access data any time you want and moreover all of
the data is secured. We want to Make the police functioning user friendly and more
transparent by automating the functioning of police departments and to Provide the
investigating officers of the Police with the tools, technology and information to
facilitate investigation of crime and detection of criminals. This will save a lot of time
and cost.
1. Tabassum, K., Shaiba, H., Shamrani, S., & Otaibi, S. (2018, April). E-Cops: An
Online Crime Reporting and Management System for Riyadh City. In 2018 1st
International Conference on Computer Applications & Information Security
(ICCAIS) (pp. 1-8). IEEE.
2. Delia, W. M., & Kelley, E. E. (2014). U.S. Patent No. 8,818,829. Washington,
DC: U.S. Patent and Trademark Office.
3. Jaiswal, A., Gunjal, N., PoojaLondhe, S. S., & Solanki, R. (2013). Crime
Automation & Reporting System. International Journal of Science and Modern
Engineering (IJISME), 1.
4. Strom, K. J., & Smith, E. L. (2017). The future of crime data: The case for the
National Incident‐Based Reporting System (NIBRS) as a primary data source for
policy evaluation and crime analysis. Criminology & Public Policy, 16(4), 1027-
1048.
5. https://www.freestudentprojects.com/studentprojectreport/projectreport/crime-
information-management-system/
6. https://procurement-notices.undp.org/view_file.cfm?doc_id=145932
7. Shih, T. F., Chen, C. L., Syu, B. Y., & Deng, Y. Y. (2019). A cloud-based crime
reporting system with identity protection. Symmetry, 11(2), 255.
8. Pap, A. L. (2020). Neglect, Marginalization, and Abuse: Hate Crime Legislation
and Practice in the Labyrinth of Identity Politics, Minority Protection, and Penal
Populism. Nationalities Papers, 1-19.
9. Buhrman, M. F., Snyder, R. A., Dennis, C. L., Boxberger, R. C., & Ferguson, W.
M. (2013). U.S. Patent No. 8,588,748. Washington, DC: U.S. Patent and
Trademark Office.
10. Mkhwanazi, K., Owolawi, P. A., Mapayi, T., & Aiyetoro, G. (2020, August). An
automatic crime reporting and immediate response system. In 2020 International
Conference on Artificial Intelligence, Big Data, Computing and Data
Communication Systems (icABCD) (pp. 1-6). IEEE.
1.5. Definitions and Acronyms
The system CRMS will be used for automating the manual process of register
different case in police department. This system will manage the details of all the
crimes that are registered in police department. The system provides an interface to
store the crime details and allows the user to search and view records. Our system will
be secure enough to use for sensitive crime and post mortem records.
2. PROJECT ORGANIZATION
In order to effectively migrate existing data from our manual platform to the new
web-based platform, a phased approach has been developed which will result in
minimal/no disruption to day to day operations, administration and reporting
activities. The following is a high-level overview of the phased approach:
Phase I: Hardware/Software will be purchased, and a web-based system will be
created in the web-based environment and tested by the IT development group.
Phase II: IT group will stand up a temporary legacy platform in the technology lab to
be used for day to day operations for crime reporting and administration activities.
This will be used as a backup system.
Phase III: The web-based platform will be populated with all current crime and
administrative data.
Phase IV: All management department police officers will receive training on the
new web-based platform.
Phase V: The web-based platform will go live, and the manual system will be
archived and stood down.
2.2. Organizational Structure
The administrative and managerial interfaces between the project and the primary
entities with which it interacts.
Customer: <name> ALI Phone No:
030078965
3. MANAGERIAL PROCESS
The system is to facilitate collection, storage, retrieval, analysis, transfer and sharing
of data and information at the Police Department and between the Police
Department and the state Headquarters and the central police Organizations. We
want to Make the police functioning citizen friendly and more transparent by
automating the functioning of police departments and to Provide the investigating
officers of the civil Police with tools, technology and information to facilitate
investigation of crime and detection of criminals.
Objective Description
Timely and accurate data Web based tool will allow real-time and accurate storage of
storage all the data
It will provide high level security by using different
Improve security
authentication methods
Cost and time No need of manually entering data, it will save cost and time
of the user by allowing user to store data with just a few
clicks with 100% data security.
ASSUMPTIONS
The migration of data and other management and administrative functions from the
legacy system to the web-based platform will result in greater efficiency with regards
to Police station resources and department processes. The web-based project is also
aligned with department objectives since it uses technology to improve the way we
do tasks. The web-based project was selected for proposal because it provides the
best opportunity to realize benefits while also allowing for the greatest improvement
in efficiency and time/cost reduction. Other alternatives assumed greater risk,
provided less benefits, were too difficult to define, or were not suitably aligned with
department objectives.
Initial estimates for the web-based project are:
● 40-50% reduction in overhead costs in the first 12 months.
● 70-80% immediate decrease in time to generate crime reports.
● 70-80% immediate decrease in the amount of time it takes to find criminal
details.
● 60-70% decrease in department issues in the first 6 months.
DEPENDENCIES
CONSTRAINTS
1) This project requires cost and time and funding. These will make
impact on our project.
2) We don’t have enough tools to complete this project.
3) Creeping changes can impact the delivery in time.
4) Difficult to train our target user in order to tell them how to use this
system.
5) Integration of different departments in our system could cause more
complexity and errors.
3.3. Risk Management
We will use SVN as a version control system to prevent accidental issues from
affecting the prototyping code. We will use the Track bug-tracking system to monitor
developer progress on tasks and to report any bugs.
First of all, the project is basically based on how the crime rate can be reduced by
using our system (Crime Report and Management system) so, the person who are
using our system he/she must have to have the training of how they can catch the
crime. Also, the project team member must have the background knowledge of crime
department such as, in what basis they caught the criminal and what evidence the
crime report department required? Furthermore, By the time the reporter learns of a
robbery, the robbers will probably have fled, the victims will be in hospital,
answering police questions or in a mortuary, while the police themselves will already
have started their investigation.
4. Technical Process
4.1. Methods, Tools, and Techniques
All developers are required to use the Eclipse IDE 3.6 to minimize issues with cross-
compatibility while developing. This allows the use of Eclipse extensions (if
supported by Android). UML diagrams will be generated using the Eclipse plugin:
UML2 Extender SDK. This will also be used to define the process. Rational Rose
will also be used as UML modeling tool that supports iterative development, which
will support the transition from phase 1 to phase 2. Microsoft Visa may also be used
for simpler UML diagrams.
The software user’s manual shall be generated along with the functional requirements
and be validated during the acceptance process. All documentation will be available
from the application and the Team website.
Product Perspective:
1. The web pages (XHTML/JSP) are present to provide the user interface
on customer client side. Communication between customer and server
is provided through HTTP/HTTPS protocols.
2. The client software is to provide the user interface on system user
client side and for this TCP/IP protocols are used.
3. On the server-side web server is for database server for storing the
information.
Software Interface:
Client on Internet: Web Browser, Operating System(any)
1. Web server: Apache Tomcat, Operating system(any)
2. Database Server: MySQL, operating System(any)
3. Development End: NetBeans
Hardware Interface:
Client side:
I.E 6.0 or above Processor RAM Disk Space
Core2 Duo at 2GB 160MB
2.0Ghz
Server Side:
1. Apache Pentium-3 at 4GB 500MB
Tomcat 1GHZ
Server
2. MySQL Pentium-3 at 4GB 500MB
1GHZ
Product Function:
CRIME REPORTING AND MANAGEMENT SYSTEM SHOULD SUPPORT THIS FOLLOWING CASES:
Class of Use Actors Involved Use Case Description of Use
Case
User account usage Police Officer Login Login into account
Administrator <includes>
Data Manager Invalid Id or
Password
Viewing data Administrator View Register <extends>
Police officer 1. View case
register
2. View in-out
register
3. View duty
register
Generating Reports Administrator Report generation <extends>
1. Prisoner
wise report
2. Case wise
report
3. Visitor wise
report
Confirm Administrator Confirm interview All interview
Interview request request requests by
relatives of
prisoners
View Release Administrator Viewing release Information of
Diary Police Officer diary release date of
prisoner
Password Administrator Change Password Change of
Police Officer password
User Characteristics:
Police Officer: should be given read only access to the information of prisoners
Data Manager: should be given the responsibility of adding or updating the
existing information.
Administrator: can be a Jail administrator or government official to handle the
troubleshooting or the managing of the system.
Constraints:
1. Compatibility:
Software should run compatibility (i.e., Under the same operating system,
database and networking capabilities) with the other subsystems software it
works together with
It should allow an administrator to enroll new users and give them access rights
to read the data.
Consultation Meetings:
Consultation meetings were held with CariSECURE stakeholders in St. Kitts
and Nevis, Guyana and St. Lucia to obtain feedback on the current information
management needs of the crime agencies in these countries, and
recommendations for strengthening the information management systems in the
pilot countries. These meetings were held at various times during the month of
November 2017.
Technical Analysis:
A Technical Analysis of the current hardware and software needs of crime
agencies in the three target countries was undertaken by the Consultant as part of
this assessment. The Consultant personally visited crime agency offices in the
three target countries in order to assess what was on the ground.
Coding:
The coding of some important test is provided here like the username and
password
validation, search module and add entry module.
Username and Password Validation:
Namespace Police Station Project
Public Partial Class Login
Private Sub Init ()
End Sub Public Sub Click On Password Field ()
Report. Log (Report Level. Info, "Mouse", " Mouse Left Click item’ Login
Form.
Tab_Page_List. Input Fields. Text_Password’ at 175;9. ",
Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password_Info)
Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password. Click (" 175;9
")
End Sub
End Class
End Namespace
Public Sub Login Form ( a Title As String , a Username As String , a Password
As String )
Repo. Login Form. Title. TextValue = aTitle
Repo. Login Form. Username. TextValue = aUsername
Repo. Login Form. Password. TextValue = aPassword
Repo. Login Form. Repeat Password. TextValue = aPassword
End Sub
Search Module:
Public Sub ValidateTextValue (repository item As Ranorex. Adapter, val As
String)
Keyboard. Press ( repository item, val)
Validate. Are Equal (repository item. [ As ](of Ranorex . Text) (). TextValue ,
val )
Report. Screenshot ( repository item, True )
End Sub
Const NullString As String = "( null )"
Public Sub Validate_Database Field (OLEConnectionString As String,
SQLQuery
As String, expectedValue As String, customLogMessage As String )
If OLE Connection String. Trim (). Equals (String. Empty) Or Else OLE
Connection
String. Trim (). Equals (NullString) Then
Throw New Ranorex. RanorexException ("Connection String is empty")
End If
If SQLQuery. Trim (). Equals (String. Empty) Then
Throw New Ranorex. RanorexException ("SQLQuery is empty")
End If
As New OleDbConnection (OLE Connection String)
connection. Open ()
Dim command As OleDbCommand = Nothing
Dim SQLReader As OleDbDataReader = Nothing
Try command = New OleDbCommand (SQLQuery, connection)
SQLReader = command. ExecuteReader ()
SQLReader. Read ()
If SQLReader . FieldCount > 0 Then
Dim actualValue = SQLReader. GetString (0)
If customLogMessage . Trim () . Equals ( String. Empty ) Then
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Test Title/Name: Search with Valid FIR Test Executed Date: 6/6/2020
No
2. Launch the
FIR Search
FIR’s appear in the
Grid i.e.
name,
appearing
with
details
Screen
data number,
CNIC etc.
stored
inAll
FIR’s
data
stored
in
.
All
FIR’s
data
stor
All FIR’s data
stored in database
Post-condition: FIR data displayed.
Test Case Id: 2 Test Design By: QA Engineer
Test Title/Name: Search with Invalid FIR Test Executed Date: 6/6/2020
No
2. Launch the
FIR Search
FIR’s appear in the
Grid i.e.
name,
not
appearing
with
Screen
data number,
CNIC etc.
details
stored
inAll
FIR’s
data
stored
in
.
All
FIR’s
data
stor
All FIR’s data
stored in database
Post-condition: FIR data not displayed.
Suggestion:
A message should be displayed which describe that FIR No. or
CNIC you have entered is incorrect.
Test Title/Name: Search with Invalid CNIC Test Executed Date: 6/6/2020
No
2. Launch the
FIR Search
FIR’s appear in the
Grid
not
appearing
in the
Screen Grid
data
stored
inAll
FIR’s
data
stored
in
.
All
FIR’s
data
stor
All FIR’s data
stored in database
Post-condition: FIR data displayed.
Suggestion:
A message should be displayed which describe that FIR No. or
CNIC you have entered is incorrect.
2. Click on the
Crime
FIR’s moved to a
desired form
desired
form
opened
Register
button data
stored
inAll
FIR’s
data
stored
in
.
All
FIR’s
data
stor
Buttons and their
codding
Post-condition: The desired crime register form should appear on screen.
Suggestion:
There should be problem with the codding.
Test Module Name: Police Station Button Test Design Date: 6/6/2020
2. Click on the
Crime
FIR’s moved to a
desired form
desired
Police
Station
Register
button data form
opened
stored
inAll
FIR’s
data
stored
in
.
All
FIR’s
data
stor
Buttons and their
codding
Post-condition: The desired Police Station form should appear on screen.
User documentation is basically referring to the need of the current era and also for
the need of the crime report department who faced daily struggle in order to caught
the criminal. The current system that are planned and developed by the Gujranwala
Crime report and Management system by the persons: Ali Saqib, Samer Suhail.
Work plan for online is to develop the online website for entering the crime with the
individual specific name and as well as the person who commit the crime with the
personal information. For paper documentation, we will develop the system that the
officer can used for detecting the current location of the criminal. And we get the
online help from the articles of Aamir Khan and Amit Singh because they explained
very well in detailed the current system and how the crime report department can add
the features to make it more efficient.
5.2. Dependencies
The estimated time required to complete the project is almost 8 months. And we also
required the time-to-time communication with the crime report department because
on the personal level we have to gain the knowledge of crime report department of
what techniques they apply in order to report the crime and also, sometimes we have
to travel with the officers to see how they do the research and how they train their
team. And what individual must have the characteristics to become part of the crime
report department. We need the current specific system for entering the reports of the
crime. And furthermore, the statistical expert that can show the rate of the crimes in a
specific area.
The following table captures the cost and savings actions associated with the Crime
Reporting and Management System. At the bottom of the chart is the net savings for
the first year of the project.
Action Description First year
Type costs (-
Action indicates
anticipate
d savings)
Purchase Web-based Initial investment for Crime Reporting $400,000.0
Cost
product and licenses and Management System 0
Cost for IT group to install new
Software installation and
Cost software and for the training group to $20,000.00
training
train all employees
-
Saving An immediate reduction in the cost of
Stationary $183,495.0
s annual stationary budget.
0
When the system will be computerized
Clerks no longer required then there is no need to hire hundred
Saving -
to manage criminal of clerks in the offices to manage all
s $71,744.00
record. the criminal record. This will save a
lot of cost.
The maintenance of the systems will
System maintenance be required in order to keep things
Cost $42,000
required every 7months going in that case cost will be
increased a little.
Reduce employee Saving Savings in cost to out-process exiting -$50,000
turnover by 10% s employee and recruit, hire, and train
new employees is approximately
$50,000 in the first year.
$305,239.0
Net First Year Savings
0
Based on the cost benefit analysis above we see that by authorizing the Crime
reporting and management system, it will save $305,239.00 in the first year alone.
This represents a significant improvement in our operating costs and is a clear
indicator of the benefit this project will have on the company.
5.5. Schedule
The following are the major project milestones identified at this time. As the project
planning moves forward and the schedule is developed, the milestones and their
target completion dates will be modified, adjusted, and finalized as necessary to
establish the baseline schedule:
6. Additional Components
6.1. Index
The recommended web-based platform will methodically migrate the data and
functions of our current legacy system to our new web-based platform in order to
preserve data integrity and allow adequate time to train all management department
police officers on their responsibilities and respective administrative functions. This
web-based platform is compatible with all other current systems and will improve
the accuracy and efficiency of crime reporting. Some of the ways that this
technology will achieve its desired results are:
● Police officers will be able to enter and edit crime reports at any time from any
location instead of entering it manually in police station.
● Crime statistics, reports and criminal details will be immediately accessible for
investigation purpose or for monitoring purpose. This will save time and cost.
● Forensic department will be able to access this platform directly and will be able
to enter or edit post-mortem reports which reduces the burden on police officers.
6.2. Appendices
Risks:
The process of developing an annual Top Ten Risk list helps bring governance and
management focus to the key risks which may prevent it from achieving its stated
goals and objectives as outlined in the today Strategic Plan. Committees were
engaged to formally include the discussion of risk and annually identify the Top risks
within the scope of their respective mandates. These risks are used to help inform the
identification of the Top 10 list. summarizes the specific risks identified over the past
seven years which have been categorized into risk types or themes. It is important to
note the fact that although a particular risk may drop off the Top 10 list, it does not
mean that it has been fully addressed or that it is no longer a significant risk that must
be managed and monitored.
The key risks can be allocated into two broad categories, those that are either
externally or internally driven. Provincial Government funding and general economic
conditions are clear examples of externally driven risks for which strategies must
continue to be developed to mitigate their impact.
Work break Down Structure: