Documente Academic
Documente Profesional
Documente Cultură
Revision History
Date Description Author Comments
07/09/2016 Version 1.0 Bilal Ahmed First Submission on Turnitin
14/09/2016 Version 1.1 Sajid Hassan Second Submission on Turnitin
Document Approval
The following Software Requirements Specification has been accepted and approved by the
following:
Signature Printed Name Title Date
Supervisor, CSIT-21306 17/09/2016
Table of Contents
1.3 Abbreviations, Definitions & Acronyms: Error: Reference source not found
3 External Interface-Requirements :
6
3.1 Dependencies and Assumptions:
6
3.1.1 System Interfaces:
Error: Reference source not found
3.1.2 User Interfaces:
Error: Reference source not found
3.1.4 Hardware Interfaces:
7
3.1.5 Communications Interfaces:
7
3.3.5 LICENSING REQUIREMENTS
7
3.3.6 Legal,Copyright,and Other Notices
8
3.3.7 Applicable Standards
8
3.3.8 Deliverable
8
3.2 Functional Requirements
8
3.2.1 DPO
9
3.2.2 Administrator
9
3.2.3 SHO
9
3.2.4 Field Officer
9
3.3 Use Case:
9
3.4 Non-Functional Requirements: 12
All access to the system shall be longged
13
This application shall be available 24 hours a day
13
User may access this application in the organization where it is used 13
4 Supporting Information:
Appendix A Background Research on:
17
Appendix B Data Dictionary:
Appendix C Proposal:
5 Diagram
Flow chart
Entity relationship diagram
1 Introduction
Cell phone .for example, cellular telephone or portable tables are fast turning
Into a piece is joining life that encourage the different needs of human. The
Development of new example, casualty, programming and administration it
Has expanded the exhibitions of the phone utilized as a parts of various of the
Purposes. The remote system, for example, WLAN or the cell systems (GPRS.
EDGE. 3G). has turned into an essential part to make mobile device more of
Canny. The change device equipment elevates the mobile phone to be the a
Costly devices, for instance, the utilization of portable route rather than the
GPS guide.
Portable situating is one of the dazzle elements of cell phone. Portable of
Empowers the area based administrations, which of are pervasively turned
Utilization as a part of numerous area mindful application, for example mote
Information organization registration capacity, place suggestion framework.
The dispatch of HTML.S and cutting edge program permits web designers to
Empower the area based site utilization another element called Geo area.
1.1 Purpose:
The software requirements specification provides a complete description
Of all the function of the specifications CRIME REPORTING WEBSITE. With the help of this
Software people easily submit their FIR in the police station. So all the processes of FIR of
Done very easily.
Scope:
The project of vision provide the software will that enhance the efficiency, rules
Cost and time with planning and managing of a crime control. At the start will we
Only focus on core functionality the project and develops more the modules will a
Promote to settlement of core crime investigation events. Next version planning a
Will base on completion of its core functionality.
Mainly throughout the project, focus will the large event as well as small events of
Will be able use to system in good manner. By usage of the solution, following of the
People will directly get benefits.
1 Police
2 Army
3 Nation
1.2 References:
- www.punjabpolice.com
- www.crimenews.com
- www.crimezone.com
1.3 Overview:
In next the final deliverable of my project possesses extension of the
Design phase presented in this deliverable I (SRS). The next version will contain a
Explanatory artifacts mention in this SRS_E_ modeling/ ORM will be accomplished
Of explore the requirements of the web-site in depth. The required types of the a
(Classes) find out of the implemented web pages and site map of generate to show a
Communication of the pages. The communication they will be have presented by using.
UML artifacts. Finally of the interface screen shot will be presented.
1. The vision project software provide will that enhance the efficiency. To reduce
Time and cost with planning correspondence and managing of a crime control.
At the start,
We will focus core on functionality of the project and develops more parts
Will that promote to settlement of core crime investigation events?
2. Next planning version will base on completion core of its functionalities.
Police department
Nation
Army
2 Systems
3 Administrator
User
System
User login information.
Information save of user every with transaction.
Administrator
Can update, add and delete user.
Update, add and delete criminal record.
3 External Interface-Requirements:
Microsoft is used to store data and retrieve. Login details and some improvements efficiency are
also done by storing data in SQL server. The windows is preferred operating system for the server
the demo windows 7 can be used 3.1 external requirements interface.
This application can be accessed internet. Only web server is required a hardware interface to be
to run it. It assumed that web server in a secure environment with necessary firewall and network
Setting done.
TCP/IP installed client machine and http protocols enable to communication between client and
Server.
3.3.8 Deliverable:
A hard copy documents this project as listed below will be delivered on the project presentation
Data.
3.2.1 DPO
Should be DPO allowed to sign in for the system and perform the
activities.
Allowed to visit maps view to visitor or guest.
DPO allowed to filter all crime category on map.
3.2.2 Administrator
3.2.3 SHO
Additional specification imprison requirements that are not included in the use
cases.
These are usually called non functional requirements.
Which are following.
Useability
Reliability
Performance
Security
Useability
This site is use only customer satisfaction. If should have independent and simple
Code thatcan be reused if needed.GUI should be used.
Reliability
The proposed of the reliability system willl be high due to the above functional
Reason the reason for the increase reliability of the system is that be proper storage of
Information the system available all the time
Performance
The performance is at its best if stored locally as a response time much faster
If the product accessed via internet,the limited performance by the connection speed.the only
Limitation is that web server response.the system give responses in 1 second after checking the
web information.
Security
Any user ues the system have a login ID and pasword any notification insert
Delete and update for the site shall be synchronized and done only by the administrator,
4 Supporting Information:
Appendix A Background Research on:
BPEL (business process execution language) has designed specifically to
manage
Pocess flows across service and points.it is an XML based workflow language
which
Facilitates within and between interprises (cobban 2004) ther exist several
altematives
DBA
A database administrator directs are performance all activates related to successful database
Environment responsibilities include designing implementing and maintaining the database
System establishing policies and procedures to the management, security, maintenance and use of
The database management system.
ER
An entity relationship model is a data model describing the data are information aspects of a
Business domain or its process requirements, in an abstracts why that itself to ultimately
Being implements in a database such as relational database
ORM
Object role modeling is a powerful method for designing and querying database models at
The conceptual level, where the application is described its items easily understand by non
Technical user.
5 DIAGRAMS
1 Abstract
Crime Investigative reporting systems used to map reported
the crime to identify groups Crime "designed mobile solution
lead, where users from each of the 4 police station in Rahim
Yar Khan can geo-tag the crime scene, type of crime, date
and the time the crime was committed with a snapshot from
the site.
2 Introduction
The software helps the police to record the daily crimes of
their online store via mobile implementation. The employee
and / or record a witness to the crime through a web
application from the scene to place a picture of Google Maps
along with the date of the incident and sections of applicable
law. [2]Daily reporting software creates crime patterns
across Rahim Yar Khan identifying pockets of crime end time,
an increased incidence of crime and areas that are hotspots.
In addition, the warehouse of online data is not only
activated investigation teams to catch down the culprits
involved but police also able to improve their traditional
3 Literature Review
4 Problem Statement
Today street crimes are most common. It needs instead of
FIR report nearly police Station. We look forward to working
with the government in implementation there praise and see
improvement in effectiveness of police Department. Assign
each particular case officer and other details are user will
tell. Users can view the progress of their complaint online. By
future technology user can view the details of individual
cases and the progress of the complaints on their mobile
phones.
5 Research Questions
I. Crime Management System account has any type of major
challenges?
II. How to report fastly in the short term, and how to report
III. It will be useful in tracking or without a tracking system?
9 Reference
Chatal, p. (2007). Toward smentic web service discovery and dynamic
orchestration based on the formal specificational function domain
knowledge. Paper presented at the 20th international conference on software
system engineering and their application (ICSSEA 2007)
Cobban. M ( 2014). What is BPEL and why is it important to my business.
White paper softcare EC, inc.
Moran M,. Vitvar,. T., Zaremba, M., kotinurmi, p. Haller & A.(2007) semantic
SOA to promote integration oSf heterogeneous B2B services.
1 Shah, A.S., Fayaz, M., Shah, A., and Shah, S.: Testing desktop application:
Police station information management system, International Journal of Software
Engineering and Its Applications, 2016, 10, (7), pp. 101-118
2 Gottschalk, P.: Investigation and prevention of financial crime: Knowledge
management, intelligence strategy and executive leadership (CRC Press, 2016.
2016)
3 Eterno, J.A., Verma, A., and Silverman, E.B.: Police manipulations of crime
reporting: Insiders revelations, Justice Quarterly, 2016, 33, (5), pp. 811-835
4 Myers, Mario Santana Quintero, D., Smuts, K., Mlungwana, N., and Wiltshire,
N.: SAHRIS: South Africas integrated, web-based heritage management system,
Journal of Cultural Heritage Management and Sustainable Development, 2016, 6, (2),
pp. 138-152
5 Ahmad, A., Paul, A., Rathore, M.M., and Chang, H.: Smart cyber society:
Integration of capillary devices with high usability based on CyberPhysical System,
Future Generation Computer Systems, 2016, 56, pp. 493-503