Professional Documents
Culture Documents
Criminal Record System-Group-2
Criminal Record System-Group-2
Student’s Name ID
Submitted to:
Criminal record system
i
Definition, abbreviations and acronyms
ASP.Net Active Server Page dot Network
CRS Criminal Record System
CS6 Creative Suite 6
CD Compact Disk
C#.Net Csharp dot Network
CPC Criminal Procedure Court
EFP Ethiopian Federal Police
FDRE Federal Democratic Republic of Ethiopia
FIR First Information Report
GB Giga Byte
GHZ Gigahertz
IDE Integrated development environment
IE Internet Explorer
MSSQL Microsoft Structure Query Language
MS-Visio Microsoft Visio
OO Object-oriented
OOP Object Oriented Paradigm
PC Personal Computer
RJ Register Jack
Ref Reference
SNNPR Southern Nations, Nationalities and Peoples Region
UC ID Use Case Identification
UI User interface
UML Unified model language
ii
Criminal record system
Acknowledgements
Firstly we would like to thank our almighty GOD to keep as full of health to accomplish and come up with
this research out come. Then we would like to thank object oriented software development instructor in
Select College for giving as this chance to do this research project.
At the last not the least, we would like to express our deepest appreciation to those people who support us
for successful completion of this work.
iii
Abstract
The main objective of this project is to develop a system that enables record and retrieve data related to
crime and criminals over a network. The implementation of our project is using C#and ASP.NET, in such
a way that a server respond for any connection request from clients and then sending back to a list of
recipients. The proposed system applies to all Police stations across the zone and specifically looks into
the subject of criminal Record. It is well understood that Crime Prevention, Detection and Conviction of
criminals depend on a highly responsive backbone of Information Management. The efficiency of the
police function and the effectiveness with which it tackles crime depend on what quality of information it
can derive from its existing records and how fast it can have access to it.
It is proposed to centralize Information Management in Crime for the purposefulness’s of fast and efficient
sharing of critical information across all Police Stations under Ethiopian federal police. Initially, the system
will be implemented across the station and later on, be interlinked so that a Police detective can access
information across all records in the state thus helping speedy and successful completion to cases. The
system would also be used to generate information for pro-active and preventive measures for fighting
crime.
iv
Criminal record system
Table of Contents
Definition, abbreviations and acronyms..................................................................ii
Acknowledgements...................................................................................................iii
Abstract.....................................................................................................................iv
CHAPTER ONE........................................................................................................9
INTRODUCTION.....................................................................................................9
1.1Background of the organization...........................................................................9
1.2 Statement of the problem..................................................................................10
1.3 Objective of the Project.....................................................................................11
1.3.1 General Objective............................................................................................11
1.3.2 Specific Objective............................................................................................11
1.4 Scope and limitation of the proposed system...................................................12
1.4.1 Scope of the project.........................................................................................12
1.5Methodology and Software Used.......................................................................12
1.5.1Methodology.....................................................................................................12
1.5.2 Software Used..................................................................................................13
1.6Feasibility of the project.....................................................................................14
1.6.1Economic Feasibility........................................................................................14
1.6.2 Technical Feasibility.......................................................................................15
1.6.3 Operational Feasibility....................................................................................16
1.6.4 Schedule Feasibility.........................................................................................16
1.6.5Political feasibility............................................................................................16
1.6.6 Legal feasibility...............................................................................................16
1.7Significance and Beneficiary of the Project.......................................................16
1.7.1Significance of the study..................................................................................16
1.7.2Beneficiaries of the project..............................................................................17
1.8 Project plan activity...........................................................................................17
1.9 Project Schedule.................................................................................................18
1.10 Project Organization........................................................................................19
CHAPTER TWO.....................................................................................................21
CURRENT SYSTEM..............................................................................................21
2.1 Description of current system...........................................................................21
2.2 Practices to be preserved from the existing system.........................................22
2.3 Players in the existing system...........................................................................22
2.4 Business rule.......................................................................................................23
v
2.4.1 Phase one- Complaint, Accusation, and Flagrant Offences.........................23
2.4.2 Phase two -Summons and Arrest...................................................................24
2.4.3 Phase three- Police Investigation....................................................................24
2.4.4Phase Four-post arrest procedures.................................................................25
2.4.5 Phase five-public prosecutor’s prosecution...................................................26
2.4.6 Phase six- framing the charge........................................................................27
2.5. Alternative Solutions.........................................................................................27
2.5.1Players in proposed system.............................................................................28
CHAPTER THREE.................................................................................................28
PROPOSED SYSTEM............................................................................................28
3.1 Overview of proposed system............................................................................28
3.2 Functional requirements...................................................................................29
3.2.1 User Requirement...........................................................................................29
3.4 Hardware/Software requirement......................................................................32
3.4.1 Hardware requirements..................................................................................32
3.4.2 Software requirements....................................................................................33
3.5 Security and Safety Procedure..........................................................................33
3.5.1 Security Procedure..........................................................................................33
3.5.2 Safety Procedures............................................................................................34
CHAPTER FOUR....................................................................................................35
SYSTEM DESIGN..................................................................................................35
4. Introduction..........................................................................................................35
4.1 OO (Object Oriented) paradigm.......................................................................35
4.2 Scenarios.............................................................................................................36
4.3 Use case diagram................................................................................................36
4.3.2 Registration use case description...................................................................39
4.3.3 View data use case description.......................................................................40
4.3.4 Give complaints use case description.............................................................41
4.3.5 Delete data use case description.....................................................................42
4.3.6 Search data use case description....................................................................43
4.3.7 Generate reports use case description...........................................................44
4.3.8 Update data use case description...................................................................45
4.3.9Email send use case description......................................................................46
4.3.10 Create account use case description.............................................................47
4.4 Sequence diagram..............................................................................................48
4.4.1 Sequence diagram for login............................................................................48
vi
Criminal record system
vii
Figure 1 Team Organization................................................................................................................................ 19
Figure 2 Login Sequence diagram........................................................................................................................ 49
Figure 4 Sequence diagram information view...................................................................................................... 51
Figure 5 Registration............................................................................................................................................ 52
Figure 6 Delete information.................................................................................................................................. 53
Figure 7 Update information sequence diagram.................................................................................................. 54
Figure 8 Report generation sequence................................................................................................................... 55
Figure 9 Insert Information.................................................................................................................................. 56
Figure 10 Send email............................................................................................................................................ 57
Figure 11 Insert activity diagram......................................................................................................................... 58
Figure 12 Complain activity diagram................................................................................................................... 59
Figure 13 Activity diagram for login................................................................................................................... 60
Figure 14 Activity diagram for search.................................................................................................................. 60
Figure 15 Activity diagram for update data......................................................................................................... 61
Figure 16 Activity diagram for view data............................................................................................................. 61
Figure 17 Activity diagram for delate data........................................................................................................... 62
Figure 18 Class diagram....................................................................................................................................... 63
Figure 19 Deployment diagram............................................................................................................................ 64
Figure 20 ER diagram.......................................................................................................................................... 67
Figure 21 State chart diagram.............................................................................................................................. 70
8
Criminal record system
CHAPTER ONE
INTRODUCTION
Crime is an event that opposes the communities’ interest and well-being of the societies’. Being opposed of
the communities need, information of crime reach the police through different channel such as: complain,
accusing and even investigation of the police. The investigation may be made before the arrest of a suspect
or after the arrest. The police are supposed to hear witnesses and real evidence from the suspected and/or
from the victim person to prove or disprove the innocently of the accused person.
We see that when a group or society is formed, some rules and laws are made by to follow. The purpose of
these rules and laws are to give a peaceful life to all who are living in that society. Whenever any law is
violated by anyone we say that crime is committed and who break that law is called criminal. To have
peaceful life we need a well-organized law enforcement system. In our Ethiopia, we don’t have very good
facilities in law enforcement sector. But, due to less of facilities some works cannot be done in a very good
way. “The EFP“was created with the objective to maintain public security, ensure the observation of human
and democratic rights.
The police keep records victim on paper and this does not help their efficiency as it does not provide
accurate, reliable and comprehensive data round the clock. In recent times, with the economic hardship of
the country is going through it is common for the police to complain about lack of stationeries in cases
which they may wish to record. The CRS beats the method of paperwork adopted here in Ethiopian Federal
Police (EFP). On this platform, all records are computerized, thus eliminating loss of data through rough
handling by the Police Department, and this makes investigation of future crimes relatively easier. Police
officers now have the ability to immediately generate crime report directly relevant tithe situation at hand
9
rather than searching through numerous, dusty files. Automation is the utilization of technology to replace
human with a machine that can perform more quickly and more continuously.
The CRS will enable the police to have accurate and sufficient statistics on information of a case; the year
crime was committed, who investigated it and other related criminal information. The same information
provides a powerful decision making tool for policemen, investigators, database administrators, judges and
fellow law enforcement agencies and this only emphasizes more on the need for an efficient, accurate,
comprehensive and reliable CRS.
Manual investigative techniques consist of investigators having to compile many documents by hand, or
manually, if you will. The documents are then sorted, based on the relationship to the case, and placed into
individual files. The file will contain the hand written documents of, victim and witness statements, an
evidence list of property collected from scene investigations, scene documentation and photographs, a list of
suspect(s), and miscellaneous information that may later prove to be pertinent to an investigation.
10
Criminal record system
supports easy and protected interchange of information between the involved parties using the specified
level of privileges. Moreover this proposed system will enhance the efficiency and effectiveness of the
nation’s challenge.
The software will improve the way records are maintained by the Police Force. It will
To have a database of every criminal information such as crime committed, record of evidence and
detectives in charge
Enhance proper and efficient management of criminal records by the Ethiopian Federal Police (EFP)
under police stations
To build security and monitoring control to ensure only authorized personnel have access to the
criminal information
To save resource
Help background screening companies make recommendations easily of an applicant without the
stress of going to the police station and searching through files.
11
1.4 Scope and limitation of the proposed system
1.4.1 Scope of the project
This project focuses on the development and implementation of software based on CRS for the Ethiopian
Federal Police (EFP) under police stations. The aim of this project is to develop automated CRS for
Ethiopian Federal Police (EFP) under police stations which solve the existing problems of the station.
1.4.2Limitation
The main limitation of the project is the time and resource to develop it. By considering the remaining time
of the year we limit the scope of the project i.e. we concentrate more on crime Record management.
The application such us Voice recognition, face recognition, fingerprint and online crime control held as
limitation of our system.
Problem identification and specification: The problems associated with the criminal record system are
first identified. This will be done by critically analyzing the existing system and the intended system.
Interview
Document analysis and
Observation
E-mail
12
Criminal record system
Interview: We used interview to gather information about the organization and to elicit
requirements. We asked some question such as what type of problem they face, how they do, and we got
some information about statics of their manual system. We also get some data how they save their data of
crime as well criminal info.
Document Analysis: manually collected files for collecting information. Internet and some research papers
were used as sources to collect information related to this project. The advantage of this document is to refer
previously developed system to fill the gap not done. The system developed may not overcome all suggested
problem for the nation, so the new developer must close this area.
Observation: we observed from manual system that it face the user on problem such as loss of data, time
consuming and their statics of data may be kept on unsafe place and even may be stolen. The other problem
we observed is they send the crime or criminal data from one station to another station manually which may
expose them to vulnerable that means this data may be lost. We also observed the currently working system
and the way how to provide information for the society.
E-mail: we collect a data through electronic mail from different employers of police stations.
Hardware Used: We used the following hard ware to transfer data from one computer to another, to write
documentation and implementation of the project, to print the documentation, and to save the project as a
backup.
PC computer
Flash Disk 16 GB
Printer
13
1.6Feasibility of the project
1.6.1Economic Feasibility
This system is economically feasible because the existing system pay large amount of money for papers and
cards. It pays more than 14,000,000 birr per year to operate the current system. We offer the following
choice which is more feasible economically compared to the existing system.
To show economic feasibility of the project we categorized the economic feasibility into two categories.
They are: -
From our project point of view, Ethiopian Federal Police (EFP) under police stations has got the following
tangible and intangible benefits.
Tangible benefits
A benefit from using the CRS software that can easily measure in terms of money. We have identified the
following tangible benefits
Error reduction
Cost reduction and unnecessary file avoidance
Availability of better information
Increased speed of activities
Intangible benefits
This refers to items that are difficult to measure in terms of money. And it is also a benefit derived from
using the CRS software that cannot be easily measured in terms of money.
Enhancing accuracy
Increasing clients (users) motivation and job satisfaction
It Saves Time
Resource consumption
14
Criminal record system
These costs are difficult to estimate and may not be known this includes:
Operational efficiency
Time
Knowledge
Thus the CRS is economically feasible. Tangible benefits are benefits derived from the creation of an
information system that can be measured in birr and consistency.
15
organization facilities to meet increased operational capacity needs. Investigating the potential or application
of new technologies. We believe that the proposed system is technically feasible.
This project schedule feasible according to the time it has scheduled the documentation and the time to time
activities will be done on time.
1.6.5Political feasibility
Politically the project is free from political risks, since it doesn’t have any political interaction. The
stakeholders have good will to the new system.
16
Criminal record system
An opportunity to exercise how real life problem are solved. Going back and forth through each and
every system development phase and acquire skill in developing web-based system
Enriching theoretical knowledge.
Communication Plan
The team will interviews the police station officer and contacts some user
Managing Task
Every task of this project is done by all member of the project.
17
1.9 Project Schedule
Before planning the project it is expected to divide project into sub tasks and identifying time needed in day
or week or month for each tasks to be performed.
To show the project schedule of our project we use the following Gantt chart.
No_ Phases 1st quarter 2nd quarter 3rd quarter 4th quarter 5th quarter 6th quarter
Dec-
15th May-
30th May
Jan
15th May
13nd Mar
14thFeb–
20thMar-
17th Jan-
13rd Feb
June
21th
th
16
1 Project Proposal
2 Requirement Analysis
3 Design
4 Implementation
6 Project Closure
18
Criminal record system
Includes how project content organized and group member organized to develop the project
The project contains generally two phases: Phase І and Phase ІІ.
Phase І contains four chapters, introduction, current system, proposed system, system design using
object oriented paradigm (OOP)
Phase II contains the implementation and testing of the system.
Group Organization.
We choose decentralized control group organization to develop this project because all group members have
the same experience for developing project. No need of chief programmer and other coordinator.
19
No Name Responsibility Description
20
Criminal record system
CHAPTER TWO
CURRENT SYSTEM
This chapter covers description of the existing system, players of the existing system, major
functions/activities, business rules, and other documents of the existing system. This chapter also covers
bottlenecks, practices to be preserved from the existing system, proposed solution for the new system that
address problems of the existing system and finally players of the proposed system.
If they are doing the system manually, so many minor errors will occur. Error detection in the previous
entries made and data cross verification is another important function. These are done manually, and it
would take time.
The operation of criminal procedure begins with the reception of information about the commission of a
crime. The information could reach the police through different channels. These are complaint, accusation
and the occurrence of flagrant offences. They serve as condition precedents to set criminal justice in motion.
Once the criminal justice is triggered, it is often followed by investigation to substantiate the case with
evidence to prove guilt. Arresting the suspect could also be made whenever the law requires or
circumstances justify.
The investigation may be made before the arrest of a suspect or after the arrest. The police are supposed to
hear witnesses and gather other real evidences like exhibit, finger print, blood test, etc. The information
source could be either from the suspect or out of the suspect. The process of undertaking the criminal
investigation raises the constitutional issues of the right to life, liberty, privacy, against self-incrimination,
etc.
21
2.2 Practices to be preserved from the existing system
Obviously the existing system has the aim to keep record of the accused, innocent or victims’ information.
Following this, even if the manual based system changed to computerized, the objective of the two systems
is saving or keeping the data. The hierarchy of the existing system is the mirror for the proposed system to
show gathering of information will be done based on this hierarchy. In other case whether the existing or the
proposed system the two system are undertaken to fulfill or eradicate the communities’ problem .The aim of
the project is to bring about improvement to the organization’s contributions; this report necessarily
concentrates on overcoming weakness and raising standards. To avoid conducting and unfair evaluation
efforts which are made to put this contribution into this context. It believes that partnership work is highly
beneficial to the organization and that partnership work is the way forward to reduce crime and disorder.
The following task will be taking into account with proposed system.
Police
The police perform two essential functions: maintain the peace, and investigate possible criminal wrong
doing. When a crime is committed, the police must determine who committed it so that the criminal can be
prosecuted and brought to justice.
Victim
The first thing a victim of crime (called a complainant by the legal system) needs to do if a crime has been
committed against them is to contact the police. This can be done in one of two ways, either by the
complainant going to the police station or meeting the police at the scene of crime.
Accused
Every accused person in a criminal case is innocent until proven guilty. An accused person will either be
brought before a criminal court after being arrested by the police or by being issued with a summons to
appear by the Clerk of Court.
22
Criminal Record System
Witness
The person who saw the crime or a criminal act being committed, or who can provide other evidence to
prove the crime. The complainant may also be a witness. If you are called as a witness the first thing that
will happen is that you will receive a subpoena which will give you the date and time of the trial and the
where about of the trial. During the trial the witness will be called into court to testify and this may happen
over several different trial dates. The witness should listen carefully to all questions asked of him in court
and answer all to the best of his ability. He should at all times try to remain calm and respectful. Once the
witness has finished testifying he will be excused and may leave the court. Once all the evidence has been
heard and the evidence is completed the magistrate or judge will make a finding as to whether the accused is
guilty or not of the charges laid against him by the prosecutor. If the accused is found guilty then the court
will pass sentence on him
The criminal justices process has a beginning and end. The condition precedents for setting the criminal
justice in motion are complaint, accusation and flagrant offences. These intake mechanisms are related to the
nature of crimes. Under the Ethiopian criminal justice system, in principle, every crime concerns the public
and is the responsibility of law enforcement organs to investigate and prosecute whenever they received
information indicating the commission of offenses(this is called accusation). However, exceptionally, some
crimes are investigated or prosecuted only when the injured person requests criminal proceeding to start
(these are called crimes upon compliant). In addition, providing information concerning the commission of a
crime is a right. But, in exceptional cases provided in the law, it is a duty to inform the commission of such
kind of offenses to the authorities.
Complaint refers to the information presented to law enforcement organs by the injured persons or their
legal representatives to set criminal justice in motion. Unless this condition precedent is satisfied, a criminal
proceeding cannot ensue. As a result, withdrawal of the complaint is also reserved to the victims or their
legal representatives. This mechanism is applied if the criminal code in its special part expressly says so.
The criminal justice is also set in motion whenever there is a flagrant offense (ejekefenj), Normally, an
offence is said to be flagrant when the perpetrator is red handed while committing the crime. It is easy to
apprehend the offender in such cases.
Thus, the beginning of the criminal justice process demands complaint, accusation, or flagrant offense. But
the law has also mechanisms to prevent false accusation and complaint against innocent persons.
23
2.4.2 Phase two -Summons and Arrest
The setting in motion of the criminal justice may result in the summons or the arrest of the suspect.
However, this does not mean that whenever the police receive information about the commission of a crime,
they should summon or arrest the suspect. The responsibility for the protection of innocent persons begins
from the police. Before proceeding to summons or arrest, the police have to make sure that there is a prima
facie case against the suspect i.e. the police must have reasonable grounds to resort to summons or as the
case may be to arrest.
Once the police are convinced that the process should continue, then the police have to contemplate the
mode of bringing the suspect to the police station. The two commonly used mechanisms are summons and
arrest. The effect of the two is the same. But, the means utilized in both cases is completely different.
Summons is a peaceful system of taking a person into custody. On the contrary, arrest involves force. It
brings psychological embarrassment on the part of the detainee. It may result in bodily injury or even death,
in particular, if the suspect refuses to surrender. The extent of force utilized depends upon the gravity of the
offense. For example, it does not seem rational to injure or kill a person for escaping from prosecution for
minor offenses. It is difficult to state a clear rule to be applied all the time. Nevertheless, it is appropriate to
set the upper limits.
Arrest might be with a warrant or without a warrant. In principle, it should be done with court order (this is
called arrest with warrant). But, in exceptional justifiable circumstances, it is legal to resort to arrest without
a warrant. The clearest case for arrest without warrant is flagrant offense. It is not wise to wait for arrest
warrant while a person is publicly committing a crime justifying arrest. It defeats the purpose of the criminal
law. The danger for human rights, too, is less in such kinds of situations. Thus, arrest without warrant should
be applied for certain justifiable cases. Private persons are also entitled to make arrest without warrant in
such circumstances then they should hand over to the police as soon as possible.
While taking information as well as examination of witnesses, the police have to act in such a way that it is
possible to protect the rights of innocent persons. To the extent possible, the informant or the witness has to
explain the facts taking any kind of responsibility that might follow. To achieve this purpose, the police have
to register the facts known to the informant or the witness acquired through the five senses. Unless the
24
Criminal Record System
witness is expert, it is wrong to take the mere opinion of a witness. For example, the informant or the
witness should not be allowed to say that I know the commission of a crime and who did it. One has to state
the facts as they are acquired through the five senses. Arriving at a conclusion based on the facts obtained is
the business of the competent authorities.
Thus, the police have to handle criminal investigation with due care not to bypass legal restrictions in place
to protect the rights of innocent persons and suspects. Attention has to be given for both the means and the
end of the criminal justice system.
Remand
To protect the rights of suspected persons, it is a constitutional requirement to bring the detained individual
within a reasonable time to the nearest court. The court has to ascertain the legality of the arrest. It cannot
enter into the business of weighing evidence like a trial. This is an early stage. The police usually have to
gather further evidence. The court should limit itself to checking a prima-facie case against the suspect. It is
difficult to formulate a clear rule for every matter. It should be seen on a case by case basis. The court must
allow the detention of the person unless there are legal denies bail or it is necessary till the completion of the
investigation. This demands responsible handling of each and every case. Limiting the time to finalize the
investigation has the advantage of protecting the rights of the suspect. But, it might create difficulty in cases
of exceptional complexity. It seems prudent to leave room for such kinds of unique situations.
To sum up, bringing a suspect to court immediately after arrest guarantees the rights of individuals from not
being curved by the state. The court has to ascertain the legality of the arrest. However, it should not
unnecessarily hamper the legal efforts of the police to prevent and investigate crime. The court should
appraise each and every case striking a balance between the interests of individuals and that of the
community.
25
Release on Bail
In principle, every one arrested suspected of a crime has the right to be released upon conditions set in the
law. The FDRE Constitution guarantees the right to bail. But, it can be denied on certain circumstances i.e.
Denial of bail should be an exception. The accepted grounds for denying release are possibility of
absconding, tampering with evidence, commission of other offences, gravity of an offence, etc. In case a
court determines to release the suspect, it has to take into account several factors, such as, the nature of the
offence, social ties of the suspect, and capacity to bring guarantee. The court could also impose further
conditions on the released person. Their purpose is to limit the danger of absconding, for the protection of
the suspects themselves, and danger to the public. This could be prohibition of emigration, going to certain
places, not contacting victims, electronic monitoring, etc. These non-monetary restrictions are particularly
helpful to protect victims of rape from potential harassment from the suspect.
The release of a suspect could take several forms. These include bond, surety, personal recognizance, and
cash. Generally, they can be classified into monetary and non-monetary. To ensure transparency,
accountability and predictability, many jurisdictions adopt guidelines to handle bail issues.
Release on bail is a conditional undertaking. The suspect or accused has to comply with the terms of the
release. One should attend each and every proceeding of a court. Besides, the non-monetary conditions have
to be respected. Otherwise, it could result in different financial and non-financial consequences. There may
be forfeiture of the amount of money set as a bail. The released person may also be detained as the case may
be.
To conclude, bail is a constitutional right. It could be limited by law on justifiable grounds. It takes different
forms. Failure to comply with bail obligation could entail civil and criminal liability
The case of upon complaint cases is different. It is the absolute right of the victim to decide the fate of the
case until a judgment is entered.
To sum up, the public prosecutor has the key role in the determination of case to be brought to court or
discontinued. But, the police and courts have also some role. In our country, the legal regime regulating
prosecution and interruption is found in the constitution, CPC and many statutes.
26
Criminal Record System
A charge or indictment is written information to an accused. It is used to communicate to the accused the
legal provision alleged to be violated and the particulars of the offence in order that one gets the opportunity
to challenge the truth or otherwise of the charge. Thus, framing a charge is a requirement of due process of
law. After the preparation of the charge, the suspect becomes an accused. .
The FDRE Constitution has guaranteed for the accused persons to be informed of criminal charges in
writing. The prosecution has to frame and file a criminal charge within 15 days. The absence of a clear
sanction has the effect of disregarding it.
In general, a charge/indictment serves to communicate the law violated and particulars of an offence for an
accused. It enables the accused to properly defend. The Ethiopian constitutional and legal provisions relating
to charge resemble the laws of other countries. But, they do lack clarity and detail. The gap found in the
CPC has affected the matters to be included in the charge. The mode of production and exchange of criminal
evidence is not well addressed. In practice, evidence is made part of the charge. There is also variation as
regards the levels of details of the evidence included in the charge.
27
2.5.1Players in proposed system
Administrator
The role of secretary in the system is to write the decision come from the judge through police.
Court secretaries manage the day-to-day inflow and outflow of legal files through the court system.
Specific duties can include processing court orders, such as probation or sentencing orders. They
might also record dispositions, answer questions from the public and explain court procedures to
involved parties, as well as contacting witnesses and attorneys to collect information for court
officials.
Police Officers
Search the criminal
Transfer the criminal to another jail.
Access full information of criminals.
Police can enter all criminal’s information.
Policies can view the all queries raised by the public and takes some action depends up on the proof.
Police can upload some critical criminal cases to administrator.
Police can send mails to others
28
CHAPTER THREE
PROPOSED SYSTEM
3.1 Overview of proposed system
As we have understood the problem of the existing information providing system of Ethiopian Federal
Police (EFP) under police stations, we are proposed to solve the problem of the existing system by
developing web based record management system. The CRS system evaluating all problems occurred during
ever activity on the existing system, the project team has desired to design an automated management
system for the organization. The primary function of a system should be to reduce the working load of the
employee and improve apply the scientific ways of keeping file and data of the victims the secondary
function of a system should be to allow users to add, view , update and delete the records in the database.
The CRS shares information within the police station across in the Ethiopian Federal Police (EFP) under
police stations especially the information on Crime & Criminals for effective working of Police. For
integration at National level, the following Seven Integrated Police Forms standardized by National Crime
Records Bureau have been adopted as the basis for Crime Module development. These integrated forms
cover most of the information needed by Criminal Justice System and the database records the following
information:-
FIR (First Information Register) (occurrence, complaint, accused property detail, brief complaint)
Crime Detail Form (type of crime, features, physical evidence, witness, place of crime)
Arrest/Court Surrender (arrest details, bail details, personal items recovered)
Charge Sheet & Case Disposal Reports (charge sheet information, property recovered/ seized, and
action taken)
Court Disposal (adult, juvenile, punishment)
Result of Appeals
Other registers (interrogation details, case diary, witness details)
Police stations registration module: This module maintains the information about all the police
stations that are registered as per the jurisdiction of the system. It also gets integrated with the employees
who are working in these stations along with their designation.
Victims FIR registration module: This module maintains the information related to the first
investigation report of the crime sequences that have taken place. The FIR registers all that a data that is
necessary for the investigation to take place in proper length. It identifies the crime category and the crime
nature.
28
Criminal Record System
Investigating evidence registration module: This module makes a collection of information related to
all the evidences that become categorically important under the normal sequence of the investigation, this
module dynamically concentrates upon the changes that take place while the system of investigation is under
process.
Generally the proposed system will be able to minimize the resources consumption of the police station
because the existing system provides information by using manual so; it is boring and difficulty to work
using paper.
The CRS shall enable officers to login by user name and password.
The CRS shall enable administrator to login by user name and password.
The CRS shall allow constable to login by user name and password.
The CRS shall enable inspector to login by user name and password.
The CRS shall allow clerk to login by user name and password.
The CRS shall allow user to login by user name and password.
The CRS shall enable to send forgot password through email
The CRS shall enable to send forgot account name through email
Administrator
29
The CRS shall allow insert the witness record
The CRS shall allow update the witness record
The CRS shall allow view the witness record
The CRS shall allow delete the witness record
The CRS shall allow insert about police Station Details
The CRS shall allow update about police Station Details
The CRS shall allow delete about police Station Details
The CRS shall allow view about police Station Details
The CRS shall allow view about FIR & Charge sheets
The CRS shall allow view result of cases
The CRS shall allow to generate e-mail notification of registered users
The CRS shall allow view all complaint
The CRS shall enable to update result of appeal
The CRS should organize the search results in paged manner. It should also provide user the
flexibility to navigate to the required page.
The CRS should also provide search capability and allow user filter the search to a greater detail like
crime details, suspect details, victim details, property, victim, arrested, suspect, and witness.
Clerk
The CRS shall enable to register investigation evidence
The CRS shall enable to register victims information
The CRS shall allow register Charge sheets
The CRS shall enable to register victims FIR
The CRS shall enable to register about accused /suspected person information
Inspector
30
Criminal Record System
Constable
The CRS shall enable to record complaint detail
The CRS shall enable to record occurrence of offence
The CRS shall enable to record crime detail
The CRS shall enable to record accused or suspected detail
The CRS shall enable to record result of appeal
The CRS shall enable to update complaint detail
The CRS shall enable to update occurrence of offence
The CRS shall enable to update crime detail
The CRS shall enable to update accused or suspected detail
The CRS shall enable to update result of appeal
The CRS shall enable to view general report. This helps the Constable to view general report details.
User
The CRS should allow to add complaint: This helps the user to report their complaints.
The CRS should allow to add crime report: This helps the user to report crimes.
The CRS should allow to edit complaint: This helps the user to edit his complaint details.
The CRS should allow to edit account: This helps the user to update his or her profile.
The CRS should allow to view complaint status: This allows us to view the status of all complaint
that you have posted earlier.
3.3 Non-functional requirements
Non-functional requirements or system qualities capture required properties of the system, such as
performance, security, maintainability in other words, how well some behavioral or structural aspect of the
system should be accomplished.
Security requirements are important factors in this system as classified data will be stored in the database.
User validation will be done during login to insure that the user is valid and that the user only has access to
his or her permission data. General users will only have access through the user interface. The system will
have consistent interface formats and button sets for all forms in the application, will have a form based
interface for all data entry and viewing formats, and will generate reports that are formatted in a table and
that should look like the existing manual report formats for user friendliness. The system will be easily
maintained by the developer or other authorized trained person and it shall respond as fast as possible in
generating report.
31
Performance: - since the system uses different algorithm such as stored procedural to access data from
database, it will perform the tasks in a small amount of time with valid crime and criminal information. If
internet connection is available system has no any deficiency with the availability of working twenty four
hour in a day and seven days in a week with maximum response time.
Usability:-The system is designed to have user-friendly interfaces and easy navigation which enhances
users’ efficacy of usage. It is also designed in such a way that users can easily learn how to interact with the
system within a thirty to fifty minute.
Security and Access permissions: -One objective of Security and access permissions is to control input
information’s about specific user in order to reduce errors. When information is entered in to the CRS it
should be correct depending on the information stored in the data base that stores specific information about
specific user. Validations of password, range checks, encrypted password mechanisms and recovery of
passwords are taken in to account in our proposed system.
Error handling:-The system will support prevention of wrong data entry by notifying the user about the
possible error.
Efficiency: The response time should be very small i.e. not more than five second seconds
Reliability: is the probability that a system will perform its intended function satisfactorily. So, The CRS
works continues when some interrupts faced to it.
User Interface:-The user interface of the system should be user friendly and easy enough to work with.
Availability: describe the time that our system is ready for use. Availability of our system overview that the
system is, operable, or usable to perform its designated or required function. It is the aggregate of the
resource’s accessibility, reliability, maintainability, serviceability and security.
32
Criminal Record System
Language : C#.NET
Security is the main issue to protect and secure the entire project to unintended loss of data, deletion of data
and modification on data. We try to handle this though
The CRS system provides the following security systems:
Computer viruses: since the system will be using in every computer of authorized person viruses can be
carried internally and externally to our system. Possible measures that can be taken include:
33
Scanning all external storage media for viruses before use.
Installing and using the latest antivirus and providing regular update to the software.
Regular system checking and updating virus definitions.
If there is any firewall attack we will customize our system so that free from such problem
We use backup the complete files with removable disk and CD, if suddenly the computer that contain the
file is damaged.
We duplicate the same folder that contains our project into three and above folder and save the folder in
different drives.
34
Criminal Record System
CHAPTER FOUR
SYSTEM DESIGN
4. Introduction
This chapter deals with the system use case diagrams, the use case descriptions (scenarios), sequence
diagram, and activity diagrams.
After identifying the actors and use cases, the use cases are developed and textual descriptions (scenarios)
are stated. The sequence diagram drawn based on the use cases which are developed for the proposed
system. Activities will be represented by the activity diagrams.
Object-Oriented Paradigm is where we focus real life objects while programming any solution. By focusing
real life objects we mean that over solutions revolves around different objects, which represent respective
objects in real life situation.
Mains benefits of Object-Oriented Paradigm in CRS
Maintainable
Object-Oriented Paradigm methods make code more maintainable. Identifying the source of errors
becomes easier because objects are self-contained. The principles of good methods design contribute
to a system’s maintainability. Maintainability in a sense repair or replace faulty of the system.
Reusable
since objects contain both data and functions that act on data, objects can be thought of as self-
contained “boxes”. This makes it easy to reuse code in new systems.
Scalable
Object-Oriented applications are more scalable then their structured programming roots. As an
object’s interface provides a roadmap for reusing an object, it also provides you with all the
information you need to replace the object without affecting others. This makes it easy to replace old
and inefficient code with faster algorithms.
Higher-quality software
Faster development of software and lower cost of development allows more time and resources to
be used in the verification of the software. Although quality is dependent upon the experience of
the teams, object-oriented programming tends to result in higher-quality software
35
Improved software-development productivity
Object-oriented programming is modular, as it provides separation of duties in object-based program
development. It is also extensible, as objects can be extended to include new attributes and behaviors.
4.2 Scenarios
Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the
safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests
the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation
from them. After getting all the proofs against the criminal, it is the duty of the police to present all the
proofs honestly to the court so that the right man can get right punishment. The true and right information
provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful
environment of society. Along with low salary scale, facilities of modern technology such as computerized
system of keeping records are not provided to police department which causes low efficiency. As it is the
age of computers and all the organizations today use computers to maintain their records, so this facility
should also be given to police department in order to increase their efficiency and to save their time. In our
Project we are going to implement a CRS (Criminal Record System). This is a database system in which
police will keep the record of Criminals who have been arrested, to be arrested or escaped. This will help the
Police department to manage their records easily. In police system when an incident occurs, a Petitioner
reports an FIR (First Information Report). Police starts investigation according to law on this FIR. An
investigation Officer supervises the investigation process. The main concerning people in the whole process
are Petitioner (The person who files an FIR), Victim, Accused/Criminal, investigation officer.
Solving crimes comes down to reconstructing the scenario of the crime. Who did what, how, when and
why, are the central elements of investigations. This will subsequently lead to (but also will be influenced
by) a crime scenario; a chronological description of how (the manner), by who and why the crime has
been committed.
Administration
The Administrator plays an import role in the crime and criminal record system. He/she is performing the
actions like viewing the complaints, viewing reminders, generating the reports.
36
Criminal Record System
User
Citizen or the people do the activities like login to the system, view his profile, posting the complaints, and
view the status of his complaint.
Inspector
The Inspectors are the higher officials of the police department and have the responsibility to detect the
criminals and punish them according to the Ethiopian laws.
Constable
A constable is a person holding a particular office, in law enforcement. To put it simply, police officers
maintain law and order: protect members of the public and their property; and prevent, detect and investigate
crime. But of course, it's a much more complex job than that.
Clerk
A police records clerk needs to keep abreast of all recent accidents and crimes, while also responding to
public inquiries. Although the job does not require extensive education, a clerk must be mature and able to
handle a potentially stressful job environment.
37
4.3.1 Login use case description
This use case starts when the actor wishes to Login himself for the use of system.
The system requests the user to enter the information which includes:
User Name
Password
Once the user provides the requested information, system first validates the Information provided.
UC ID UI001
UC Name Login In
Defined by Werkina Gemechu Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable, Clerk and User)
Description This use case allows the actor to login in system.
Pre-condition A valid user name and password.
Post condition If the use case was successful, the user information is login in the system.
Otherwise, the system state is unchanged.
Basic Course of Actor action System response
Action Step1. Step 2.
The user click on login button The system display the login page
from main page The system requests that the user must
Step 3. enter his all valid username and
The user provide username password.
and password Step 5.
Once the user provides the Once the user provides the requested
requested information, one of information, system first validates the
the sub-flows is executed. Information provided.
Step 4. Step 6.
If the user selected “submit”, The system generate account
the Login information sub
flow is executed.
Alternative Course of On cancel If the user chooses the cancel then the
Action use case ends and the basic flow begins.
Invalid information If the user entered the invalid
information then the system will
38
Criminal Record System
UC ID UI002
UC Name Registration
Defined by Tigest bayessa Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable, and Clerk )
Description This use case registers detail information about crime and criminal
39
On cancel If the user chooses the cancel then the
use case ends and the basic flow begins.
Blank information If the user left blank the text boxes that
are mandatory to be filled by him then
the system will generate error message.
Business Rule The text boxes that are mandatory to be filled by him/her must be filled
UC ID UI003
UC Name View data
Defined by Tesfaye Ejeta Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable and User)
Description This use case allows the actor to view in system.
Pre-condition Administrator or Police Officer should be logged in to his account
Post condition If the use case was successful, the user is view the information in the
system. Otherwise, the user is not view the information.
Basic Course of Actor action System response
Action Step1. Step 2.
The user The system displays the view
click on view button page. The system request that the user must
from main page enter all valid information.
Step 3. Step 5.
The user Once the user provides the
provide information requested information, system first validates
Once the the Information provided.
user provides the Step 6.
requested information, The system view information.
one of the sub-flows is
executed.
Step 4.
If the user selected
the view information sub
40
Criminal Record System
flow is executed.
Alternative Course of On cancel If the user chooses the cancel then the use
Action case ends and the basic flow begins.
Invalid information If the user entered the invalid information
then the system will generate an error
message to again fill the information
properly.
Blank information If the user left blank the text boxes that are
mandatory to be filled by him then the
system will generate error message.
Business Rule User enter valid information for view data.
UC ID UI004
UC Name Complaints
Defined by Tamene Mehari Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor User
Description This use case complaint detail information about crime and criminal
41
information sub flow is
executed.
Alternative Course of Invalid information If the user entered the invalid information
Action then the system will generate an error
message to again fill the information
properly.
UC ID UI005
UC Name Delete data
Defined by Aweke Birhanu Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable)
Description This use case delete detail information about crime and criminal
Pre-condition The user must be insert delete information
Post condition If the use case was successful, the user information is deleted in the
crime and criminal database. Otherwise, the system state is unchanged.
Basic Course of Action Actor action System response
step1. The actor click on Step2. The system display the delete page
delete from main page and the system requests the user to enter
step3.Enter “valid” delete the deleted information.
information. Step5. The system deleted on the database
step4. If the user selected
“submit”, the submit
crime and criminal
information sub flow is
executed.
Alternative Course of Invalid information If the user entered the invalid information
Action then the system will generate an error
message to again fill the information
properly.
On cancel If the user chooses the cancel then the use
case ends and the basic flow begins.
Blank information If the user left blank the text boxes that are
mandatory to be filled by him then the
42
Criminal Record System
UC ID UI006
UC Name Search data
Defined by Endale Mamo Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable)
Description This use case search detail information about crime and criminal
Pre-condition The user must be insert searching information
Post condition If the use case was successful, the user information is searching in the
crime and criminal database. Otherwise, the system state is unchanged.
Basic Course of Action Actor action System response
step1. The actor click on Step2. The system display the searching
searching from main page page and the system requests the user to
step3.Enter “valid” enter the searching information.
searching information. Step5. The system searching from database
step4. If the user selected
“submit”, the submit
crime and criminal
information sub flow is
executed.
Alternative Course of Invalid information If the user entered the invalid information
Action then the system will generate an error
message to again fill the information
properly.
Blank information If the user left blank the text boxes that are
mandatory to be filled by him then the
system will generate error message.
Business Rule The id that are mandatory to be filled by him/her must be filled
43
4.3.7 Generate reports use case description
After viewing the complaints the administrator generates reports based on the complaints posted by the
people and forwards these reports to the higher authority’s officials.
UC ID UI007
UC Name Generate reports
Defined by Woynshet Desta Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Administrator
Description This use case allows the actor to generate report in system.
Pre-condition Criminal record must already add in system.
Post condition If the use case was successful, the user is generate report the information in the
system. Otherwise, the administrator will not generate report
Blank information If the user left blank the text boxes that are
mandatory to be filled by him then the
44
Criminal Record System
UC ID UI008
UC Name Update data
Defined by Yosef Metafereya Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Users(Administrator, Inspector Constable)
Description This use case update detail information about crime and criminal
Pre-condition The user must be insert update information
Post condition If the use case was successful, the user information is update in the crime
and criminal database. Otherwise, the system state is unchanged.
Basic Course of Actor action System response
Action step1. The actor click on Step2. The system display the update
update from main page page and the system requests the user to
step3.Enter “valid” update enter the update information.
information. Step5. The system update on the database
step4. If the user selected
“submit”, the submit crime
and criminal information
sub flow is executed.
Alternative Course Invalid information If the user entered the invalid information
of Action then the system will generate an error
message to again fill the information
properly.
On cancel If the user chooses the cancel then the use
case ends and the basic flow begins.
Blank information If the user left blank the text boxes that
are mandatory to be filled by him then the
system will generate error message.
Business Rule Fields that are mandatory to be filled by him/her must be filled
45
4.3.9Email send use case description
Table 11 Email send use case description
UC ID UI009
Defined by Derge Bekele Last updated by -
Defined on 1/13/2023 Last updated on -
UC Name Email generate
Primary Actor Administrator
Description This use case email generate for the user
Pre-condition The user must be insert information for email send
Post condition If the use case was successful, the user in the system generate email.
Otherwise, the system state is unchanged.
Basic Course of Actor action System response
Action step1. The actor click on Step2. The system display the email
email generate from main generate page and the system.
page Requests the user to enter the email
step3.Enter “valid” email generate information.
generate information. Step5. The administrator email generate
step4. If the user selected on the user
“submit”, the submit crime
and criminal information
sub flow is executed.
Alternative Course Invalid information If the user entered the invalid information
of Action then the system will generate an error
message to again fill the information
properly.
On cancel If the user chooses the cancel then the use
case ends and the basic flow begins.
Blank information If the user left blank the text boxes that
are mandatory to be filled by him then the
system will generate error message.
Business Rule The receiver of email should be provided mandatory to be must be filled
by the administrator.
46
Criminal Record System
UC ID UI010
UC Name Create account
Defined by Haddis Solomon Last updated by -
Defined on 1/13/2023 Last updated on -
Primary Actor Administrator
Description This use case creates a new user account
Pre-condition The administrator must be filled information about user
Post condition If the use case was successful, the user information is added in the crime
and criminal database and new account will be created. Otherwise, the
system state is unchanged.
Basic Course of Actor action System response
Action step1. The actor click on Step2. The system display the registration
create new account from page and the system requests the user to
main page enter the registration information.
step3.Enter “valid” Step5. The system register on the database
registration information.
step4. If the user selected
“create”, the create crime
and criminal information
sub flow is executed.
Alternative Course of Invalid information If the user entered the invalid information
Action then the system will generate an error
message to again fill the information
properly.
On cancel If the user chooses the cancel then the use
case ends and the basic flow begins.
Blank information If the user left blank the text boxes that are
mandatory to be filled by him then the
system will generate error message.
Business Rule The text boxes that are mandatory to be filled by him/her must be filled
47
4.4 Sequence diagram
Sequence diagram is a diagram that shows object interactions arranged in time sequence. In particular it
shows objects participating in the interaction and the sequence of messages exchanged.
48
Criminal Record System
49
4.4.3 Sequence diagram for view
Figure 3Sequence diagram information view
50
Criminal Record System
51
4.4.5 Sequence diagram for delete
Figure 5 Delete information
52
Criminal Record System
53
4.4.7 Sequence diagram for report generate
Figure 7 Report generation sequence
54
Criminal Record System
55
4.4.9 Sequence diagram for email send
Figure 9 Send email
This diagram describes the general activity take place in the system.
The actor participating in the system provide different activities, to interact which the system the actors must
take the following actions.
First the actor activist the system & a login by typing user name & password.
The actor fills the form
After the information filled is validated, the actor work and interact with the system.
56
Criminal Record System
57
Figure 11 Complain activity diagram
58
Criminal Record System
59
Activity diagram for update data
60
Criminal Record System
61
Figure 16 Activity diagram for delete data
62
Criminal Record System
63
Figure 18 Deployment diagram
Persistent modeling is used to depict the design of the database, store most important and permanent
information of the system.
The following table discusses the data structure we used on our data base along with the grouped
table name.
64
Criminal Record System
Administrator
Constable
Police Station
65
FaxNo int
ER diagram
Also called an entity-relationship (ER) diagram, a graphical representation of entities and their relationships
to each other, typically used in computing in regard to the organization of data within databases or
information systems.
A graphical representation of an information system that shows the relationship between People, objects,
places, concepts or events within that system. An ERD is a data modeling technique that can help define
business processes and can be used as the foundation for a relational database.
66
Criminal Record System
Figure 19 ER diagram
67
Mapping table:
Administrator
Constable
Complainer
User
FIR
Inspector
Crime
Criminal
Police Station
68
Criminal Record System
tbl_crimeWitnessMaster
tbl_territoryMaster
id
id
witnessId tbl_City_master
territoryId
firNo CityId
territoryName
witnessCollectedDate CityName
description tbl_departmentEmployeesMaster
Description tbl_policeStationMaster
witnessInformation id
id
ZoneId
employeeNo
policeStationId
employeeName
policeSationName
designationId
policeTeritoryId
tbl_crimeCategoryNatureMaster tbl_victimesMaster departmentNo
policeStartingDate
id id
dateOfBirth
inchargeId
natureId victimId
dateOfJoin
posrtalNo
categoryId victimeName
posrtalNo
kebele
crimeName KebeleID
kebele
city
description kebele tbl_designationMaster
city
state
city id
state
country
state designationId
country
woreda
country designationName
woreda
phone
tbl_crimeCategoryMaster houseNo description
id
phoneNo
crimeCategoryId
dateOfBirth
crimeCategoryName
mailId
description
69
Algorithm we used in the CRS:
Login
Begin
Connect to database
End IF
End iF
Else iF
Display Error message: wrong user name and password. Please fill the correct one.
End else if
END
70
Criminal Record System
The home page is the first page that users see. The home page captures the attention of users, including
administrator, officers, citizen, secretary and other inspector.
To provide visual continuity between all pages, a banner graphic should appear at the top of each page, and
load quickly. The remaining space on the home page screen could be filled with introductory text and
hypertext links to other parts of the system. The home page may include optional design has several
hypertext links, with the following purposes:
The “search” button links to the main search page, where the user can build a query and find specific data of
crime and criminal.
The “related links” button takes the user to a list of related web sites. At a minimum, the list could include
links to web sites that belong to organizations that will add additional information to the criminal record
system.
The “register” button links to a registration page. Registered users will have the advantage of receiving e-
mail confirmation.
The “feedback” button provides an electronic mail connection to the Webmaster and allow users to send
questions when they have trouble using the site.
The “help” link can provide simple instructions for using the system. This link should be available on all
screens. Additionally the link could provide basic definitions of terminology used throughout the system and
information on creating an account, as well as basic contact information.
Administration page
A system should include a web page that can be used for administration purposes and not accessible to the
public. It should accessible only to approved administrators who need instant access to information about the
performance of the web site. Access to the administrative page can be controlled through a login screen.
Use of a system should be logged to gain a better understanding of how users might benefit from a CRMS.
System administrators could use the record of user activity to identify functional areas that require
improvement. An administrative page could include the following features:
71
A summary of the system use logs,
Functions for adding, deleting, and updating all records
Functions for controlling e-mail notifications to registered users
General communication in the organization
72
Criminal Record System
CHAPTER FIVE
SYSTEM IMPLEMENTATION
Introduction
This chapter basically highlights the issues dealt with the implementation phases. In this
implementation we focus on where objectives of physical operations of our system turned into
reality i.e. real working model. In this phase the coding convention has made it possible as it’s the
real phase of objectivity to reality. Then we tested the code until most of the errors have been
detected and corrected.
The goal of our implementation is to introduce our system for the users in real sense that how they
use this new system which is developed for their intended objectives. In this chapter object oriented
implementation includes the following developing algorithm coding, installation testing and at last
summary of implementation.
The functional system from the design phase above is the key input to the implementation phase.
The deliverable of the implementation phase (the project) is the operational system that will enter
the operation and support stage of the system’s life cycle.
73
74
Criminal Record System
75
76
Criminal Record System
Testing evaluates our software product to ensure that it satisfies its planned purpose. A test that is modified
to and consistent with development methodologies provides an observable and structured approach to
verifying requirements and quantifiable performance. To test the system the following testing mechanism
has been used:
Log in
77
User
Feature to pass criteria The system checks mandatory fields are registered or
not.
Unit testing: - After a development of this system an individual program module or component has been
tested to ensure that it works according to its predetermined specifications, operates within acceptable
parameters, and meets the appropriate standards.
The social and meeting net system units are tested unit by unit. Some of testing samples are given below
A: Login
Validated user
B: Administrator
78
Criminal Record System
Integration Testing:- Integration of our system deal with a number of components that complete; it will
test to ensure that they integrate well with each other, the operating system, and other components as well as
to achieve the central objectives.
Quality Assurance Testing (QAT): -After preceded the above testing strategies the whole system will test
with the participation of appropriate employees in Ethiopian Federal Police (EFP) under police stations.
Behind this some questionnaires will prepared for them on how they get the system.
Once all the software components have been integrated, the system (or a major portion of it) is tested by
non-development technicians i.e. experts from the quality assurance domain.
User Acceptance Testing:- Commonly known as the beginning and the ending test, the completed system
(or a major portion of it) is released to a selected group of users for testing in the real-world. So we have
tested our system with our advisor whether it is completed and well-being functional.
Security Testing: -Security testing has also been completed by accessing the system with user name and
password authentication and authorization privileges with restrictions. For example without the valid user
name and password tester may get in to access the system.
Performance Testing: -Determines how our system performs in the range of possible environments in
which it may be used. This testing is done by configuring the system in different environments like different
operating systems, on different networks and different hardware configurations.
Our system has tried to test all the system components throughout the implementation process. Even before
an application is installed, it makes sense to verify that the basic Platform is capable of achieving its design
capabilities.
Installation
Is the act of making the program ready for execution and is the process of moving from the source code to
unable software.
Before converting the existing manual system of the organization to automated system, first we need to
understand the business rule that the organization follows. When converting the manual system to automated
system, we followed the business rule of the organization. This let us to know the gap functionality of our
system: how does it is applicable and not applicable.
79
Identifying Functions of the Proposed System
After stating the problems we identified functions of proposed system. We listed specific activities done by
specific user of the system. These functional requirements are used during use case development, system
implementation and in other parts of the system documentation and development.
System Design
In this stage, we designed what the proposed system’s database, system architecture; class diagram will look
like in the real world. It is used to forecast the appearance of the proposed system in advance.
System Implementation
System implementation is converting the written system into real system. This became true through coding.
System implementation is the last stage of the documentation process of this system.
Supporting users: our system have on screen help hence whenever the user face a problem he/should fix
small error occurring on the program or on over all of the system. If a little beat big error such the
probability of crash or failing occurs the administrator will help.
In analysis, we tried to model the new and proposed system using UML diagrams: USE CASE diagrams,
sequence diagrams, class diagrams. The new system might look and feel with greater comfort and desired
objectivity.
In design phase, we extended work analysis with more models. The class type architecture, class diagrams in
analysis were extended in design to step closer to the implementation.
80
Criminal Record System
In general; during the various phases of the project, we have learnt a lot in multidisciplinary technologies
required to be embed with this system and these technologies would be useful in our future techno-economic
career. We have adopted the real cracks of computer science concepts so that the quality and standards can
be achieved optimally.
We have applied the best efforts towards the achievement of our desired objectives of the proposed system.
We tried our best to design a better architecture of the proposed Ethiopian Federal Police (EFP) under police
stations Criminal System. We conclude that we have achieved our utmost objectives for the promising
solutions to Ethiopian Federal Police (EFP) under police stations Criminal record System.
When and where; whom and in what way this system would be used for its intended objectives, certainly it
will play a vital role in ensuring it’s all intended applications in effective and efficient way.
81
Reference
[1] Synopsis of crime management system in asp.net Accessed time: 1/23/2023___12: 30 are from
[2]http://www.scribd.com/doc/102668447/Synopsis-of-crime-management-system-in-asp-net#scribd
[4]“Criminal Records Ohio Information System” Accessed time: 1/19/2015 6:47am from
[5]http://society.ezinemark.com/criminalrecords-ohio-information- system171e851d4ae.html
82