BLOGGER TEMPLATES AND TWITTER BACKGROUNDS

Friday, April 9, 2010

GUI SKETCHES

Other Menus











UML Class Diagram

New Use Case Model

Analysis 2

OVERVIEW

In this project we have continued our previous proposal for the software. As we have selected a software for the crime investigation, we have tried to give an outlook of the software . First we have tried to figure out the appropriate use case diagram for our current software. The UML Diagram has also been shown to give a better perspective. At last we have shown the sketch of the software which the software probably look alike. In conclusion , we have done the following procedure to make it more visible and meaningful.
1. Appropriate use case diagram
2. UML class diagram
3. GUI sketch

Use Case model

System Model

Scenarios
Murder of a shopkeeper

There is a crime committed in midvalley shopping mall. A shopkeeper has been killed when he was coming home after closing the shop. As this circumstances the |FBI has been reported over there.
The criminal report indentification system will be used to identify the crime. There is a password to access the software. |Because it holds all the crime reports which are private and confiedential.
Then the police officer takes the evidence such as |DNA, fingerprints, bullets etc.
The police officer will Match the evidence with the previous reports and get the possible suspects name.
After that he will categorize the report on different parts like assassinate, suicide,accident,kidnap, rape etc. What ever data he gets after taking the report , it will update in the software.
The policemen can see the progress of the crime at any time from any branch of police station or crime investigating department.

Non-functional Requirements

Usability: The system can be used in all platform such as, Linux, Windows, Mac etc.
Reliability: The system can be at optimum level of access for 20 persons and will be slow if the system accessed by more than 20 persons at the same time from different location.
Performance: The system shall be able to process the data in 0.5 to 3 seconds.
Implementation: It can be only imply to any law enforcement agency.
Interface: Graphical user, friendly and easy-to-use interface.
Packaging: It cannot be downloaded in the internet and need to be supply by the creator.
Legal: It has the copyright law.

Functional Requirements

1. Crime information update.
2. Password identification
3. The system will require the information of the suspects such as name, address, family.
4. The system shall display the top crime based on priority (Like Murder is more important than kidnap).
5. Evidence Match.
6. Scanning photos with previous photo record, and scan DNA.
7. The system shall record all the reports or news about any crime.
8. Sort the information by date and time.
9. Language change.
10. The system will rearrange the data and the system will be up to date
11. Progressions of any crime.

Proposed System

In this segment, we will have a closer look at the functionality of the software. The software is about how to get the criminal reports for a police station. This software will help a lot of people to solve crimes especially police officers. At the same time, it will reduce costs of documentations and will be able to reduce the period of investigation.

In addition, the software can be accessed by the authorized people such as police, private investigator, judicial institutions and government. The software that has been created is fully protected and secure from any cyber criminal.

Now, it can be categorized into two requirements which are Functional Requirement and Nonfunctional Requirement. The definition of requirement is a statement about the proposed system that all stakeholders agree must be made true in order for the customer’s problem to be adequately solved.

It must be short and concise piece of information, says something about the system, all the stakeholders have agreed that it is valid and it helps solve the customer’s problem

References

Software engineering : principles and practice 3rd ed.
Vliet, Hans van.
Chichester, England : John Wiley & Sons, c2008.
Software specification and design : an engineering approach
Munson, John C.
Boca Raton : Auerbach Publications, 2006.

Objectives and the Success criteria of the Project

1. Control on Project Lifecycle
2. Standards and Methodology
3. Metrics
4. Stakeholders rights
5. Transparency
6. Pro-active approach to avoid post-mortem
7. Universal approach for similar projects
8. Timely completion, sign-offs and payments
9. Customer satisfaction and delight
10. Customer requirements and both end clarity on objectives of the product
11. Team building
12. Roles, responsibilities and accountability
13. Continuous Learning from failures/ overruns – no repetition of same mistakes to
achieve continuous improvement overall
14. First time right approach
15. Quality right from start – ongoing – every step
16. Increase in revenue
17. Avoid revenue loss
18. Reduce costs
19. Avoid cost increases
20. Improved service

Purpose of the system

Every software has an own and defined purpose. This software’s purpose is to work friendly and keep the crime data updated with proper source and knowledge. This crime investigating software will help the user to access and identify the necessary require informations in few clicks. The reliability and time management is a great deal here.

Introduction

What is Software?

A simple question: "What is software?" A very simple answer is: Hardware you can touch, software you can't. But that is too simple indeed.

The software is the information that the computer uses to get the job done. Software needs to be accessed before it can be used. There are many terms used for process of accessing software including running, executing, starting up, opening, and others.
Computer programs allow users to complete tasks. A program can also be referred to as an application and the two words are used interchangeably.
Examples of software programs or applications would be the Operating System (DOS, Windows 9x/Millenium/XP/Vista, O/S2, UNIX, MacOS 9.x/10.x and various others), Wordprocessors (typing letters), Spreadsheet (financial info), Database (inventory control and address book), Graphics program, Internet Browser, Email and many others.

Types

The three basic types of software are; commercial, shareware and open source software. Some software is also released into the public domain without a license.
Commercial software comes prepackaged and is available from software stores and through the Internet.
Shareware is software developed by individual and small companies that cannot afford to market their software worldwide or by a company that wants to release a demonstration version of their commercial product. You will have an evaluation period in which you can decide whether to purchase the product or not. Shareware software often is disabled in some way and has a notice attached to explain the legal requirements for using the product.

Open Source software is created by generous programmers and released into the public domain for public use. There is usually a copyright notice that must remain with the software product. Open Source software is not public domain in that the company or individual that develops the software retains ownership of the program but the software can be used freely. Many popular Open Source applications are being developed and upgraded regularly by individuals and companies that believe in the Open Source concept.

The Software Project

Title of the Project : Criminal Identification Project