Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Chapter 2

2. System analysis
2.1. Over View of Existing System
In the existing crime management system, most of the operations are done manually like sending
complaints, taking actions against crimes, viewing status etc. So with the existing system if
anybody wants to complaint against crimes he must do it through the police. If we are doing the
system manually, so many minor errors will occur. Error detection in the previous entries made
and data cross verification is another important function. These are done manually, and it would
take time.

2.1.1 Limitations of existing system


 The existing manual system is time consuming and not very user friendly.
 The existing system is criticized for being inefficient, time consuming, poorly managed,
and lacking flexibility.
 Because of the large number of serious crimes, minor complaints may be ignored.
 Sometimes the complaints may be ignored by the police.
 Even an efficient officer may not be able to handle more than one case at a time.
 As we all know, a covered truth, bribery plays an important role in the existing system.
 Many cases were pilled up in the corners, due to lack of commitment in the job.

2.2 System requirement Specification


2.2.1. Functional requirement
The functional requirements highlight the specific functions the system should be able to
carry out. Pertaining to the CRMS, the system should:
 Add users (police officers and background screening companies) and assign them
their different level of privileges
 Validate user login details and ensure user-level privileges to information.
 Store and retrieve information about crime and criminals.
 Perform search functions based on some specified criteria’s.
 Perform crime analysis and statistics as well as to generate adequate reports.
 Generate criminal’s report.
2.2.2. Non-functional requirements:

2.2.3. Business rule


2.3 System requiremen t analysis
ENTITIES
These are the entities of CRMS.
1. Petitioner
2. Victim
3. Accused
4. FIR
5. Case
6. Investigation Officer
Petitioner:
A person who is seeking legal
help from police station or he
has some
problem or complaints
regarding the matters under the
jurisdiction of police.
Petitioner may or may not be
the victim of offense.
Victim:
"Victim" means an individual
who suffers, in relation to an
offence.
FIR:
First Information Report (FIR)
is a written document prepared
by the
police when they receive
information from the Petitioner
about the
commission of a cognizable
offence.
Accused:
"Accused" means a person who
is charged with an offence or
crime.
Case:
Case is the issue to be
investigated by the police and
resolved by the
court.
Contact :
mrizwan969@gmail.com

2.3.1. Use case diagram


2.3.2. UML Sequence Diagrams
2.3.3. UML Activity diagram
3 System architecture
SYSTEM ARCHITECTURE ADMIN

 Login
 View Complaints
 Update cases
USER
 User Registration
 User Login
 Complaints
 Crimes
 Missing Persons
 Without Login
MODULE DESCRIPTION
The system comprises 2 major modules with their sub-modules as follows:
ADMIN:

 Login: Admin can log in to his account user id and password


 View Complaints: Admin can view the complaints.
 Update cases: Admin can update the crime cases.
 USER:
 User Registration: The user has to register to file complaints, crimes, or missing
reports.
 User Login: The user can log in to the system to file and check the status of his
complaints or missing reports.
 Complaints: Complaints consist of basic details the system asks and the user has to
fill in to register a complaint and check the status of his complaints.
 Crimes: Crimes consist of all the details that the user has to fill in to register a
complaint and provide a picture, if he has one related to the crime, also can check the
status of the crimes he has filed.
 Missing Persons: The System asks the user to enter all the details of the person with a
photograph. The system also allows the user to check the status of his previous filed
cases.
 Without Login: The System allows the user to check for crimes against the pin code
provided by the user. The User can also check for missing people

You might also like