Top Banner
CRIME SECURITY Submitted by Nishan Shah
21

Crime security.

Apr 13, 2017

Download

Documents

Nishan Shah
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Crime security.

CRIME SECURITY

Submitted byNishan Shah

Page 2: Crime security.

CONTENTS 1.INTRODUCTION 2. OBJECTIVE OF THE PROJECT 3.FEASIBILITY STUDY 4. SOFTWARE AND HARDWARE RECQUIREMENTS  5. MICROSOFT .NET FRAMEWORK 6. SYSTEM DESIGN 7. DATA FLOW DIAGRAM(DFD) 8. CONTEXT DIAGRAM 9. SNAPSHOT 10. FUTURE IMPROVEMENT

11. CONCLUSION

Page 3: Crime security.

INTRODUCTIONCrime security is a web based platform to develop public

security site by providing all purpose activities for security. To the growing world of technology everything is needed to be

faster and simple for human benefit purpose like e-mail, e-shopping, e-reservation for train etc. which is to be quickly functioned out and get output immediately with lighting speed.

So now people can access the security site and its services by giving their queries, complaining a file, getting information about the criminal and crime that had occurred within few millisecond of user’s request.

Page 4: Crime security.

OBJECTIVE OF THE PROJECTIt helps in creating social networking website which helps

in making people awareness towards crime and criminals .

This project would mean placing emphasis equally on providing and law enforcement services with proper global social networking and as well as promoting community policing by establishing a rapid response mechanism.

 The project aims to create a simple procedure for getting

details related to police station, officers, CBI agencies and agents, and logging some complaints by common people against someone by suggesting place online without any difficulty, tension and worry.

Page 5: Crime security.

FEASIBILITY STUDYThe main aim of feasibility study is to determine

whether developing the product is technically, financially and operationally feasible.

TECHNICAL FEASIBILITY It is an important step in system studying, as the

system can’t be developed without the technical support.

ECONOMIC FEASIBILITY The cost to conduct a full systems investigation. The cost of hardware and software for the class of

application being consideredOPERATIONAL FEASIBILITY this test of feasibility asks if the system will work

when it is developed are installed.

Page 6: Crime security.

SOFTWARE AND HARDWARE RECQUIREMENTS

Software specification: Platform : WindowsXP Front-end : ASP .NET,C#.NET Back-end : SQL SERVER 2000.Hardware Specification: System Type : INTEL

Processor : Pentium 4Processor Speed : 2.8 GHZHard Disk : 40 GBMemory Size : 128 MB

Page 7: Crime security.

.NET FRAMEWORKThe .NET Framework has two main components:

the common language runtime and the .NET Framework class library.

The common language runtime is the foundation of the .NET Framework.

The class library, the other main component of the .NET Framework, is a comprehensive, object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML Web services.

Page 8: Crime security.

SYSTEM DESIGNReliable System There are two levels of reliability. The first

is meeting the right requirements. A careful and through systems study is needed to satisfy this aspect of reliability.

MaintenanceMore accurately defining user requirement

during system development.Assembling better systems documentation.

Page 9: Crime security.

DATA FLOW DIAGRAM

Page 10: Crime security.
Page 11: Crime security.
Page 12: Crime security.
Page 13: Crime security.

CONTEXT DIAGRAM

Page 14: Crime security.

SNAPSHOT

Page 15: Crime security.
Page 16: Crime security.
Page 17: Crime security.
Page 18: Crime security.
Page 19: Crime security.

FUTURE IMPROVEMENTAs the system is scalable, more modules can be

added as and when required

The database that is used in the system can be connected to the web services.

It can be browser independent so that the site can be opened in any browser.

The system contents can be modified to accept new attributes for any criterion.

Page 20: Crime security.

CONCLUSION

The project has been appreciated by all the users in the organization.

It is easy to use, since it uses the GUI provided in the user dialog.

User friendly screens are provided.The usage of software increases the efficiency,

decreases the effort.It has been efficiently employed as a Site

management mechanism. It has been thoroughly tested and implemented.

Page 21: Crime security.

THANK YOU