0% found this document useful (0 votes)
33 views14 pages

Software Requirement Specifications: Criminal Database Management System Prepared By: Mridul Jain Narendra Chauhan

The document outlines requirements for a Criminal Database Management System with the following key points: 1. The system will store and organize criminal information such as name, address, photos, fingerprints and criminal history in an efficient and consistent way. 2. Authorized officers and law enforcement agencies will be able to access the system to search for criminals by name or crime and obtain reports on criminal activity over time. 3. The system will assign each criminal a unique ID and "fuzzy precedence" rating based on their danger to society. User authentication through username and password will be required.

Uploaded by

mridul92
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views14 pages

Software Requirement Specifications: Criminal Database Management System Prepared By: Mridul Jain Narendra Chauhan

The document outlines requirements for a Criminal Database Management System with the following key points: 1. The system will store and organize criminal information such as name, address, photos, fingerprints and criminal history in an efficient and consistent way. 2. Authorized officers and law enforcement agencies will be able to access the system to search for criminals by name or crime and obtain reports on criminal activity over time. 3. The system will assign each criminal a unique ID and "fuzzy precedence" rating based on their danger to society. User authentication through username and password will be required.

Uploaded by

mridul92
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

CAMPUS CONNECT - INTEGRATED PROJECT DEVELOPMENT SOFTWARE REQUIREMENT SPECIFICATIONS

CRIMINAL DATABASE MANAGEMENT SYSTEM


Version: 1.0 Prepared by : Mridul Jain Narendra Chauhan Kapil Khandelwal

To

arrange the data related to the criminals in a efficient way. To store complete information of a criminal without duplication and with consistency. To make a system that can help officers in their cases by providing the information about the person . To see the criminals shorted by name and crime.

The

authorized officers of police stations .

Some

times the secret agencies such as C.B.I., C.I.D. etc.

The

project contains the information about criminals. Such as address , photo, finger prints ,crimes, previous record and copy of his FIR . It allow to search the criminals by their name and crime . The project assigns fuzzy precedence to criminals.

OPERATING SYSTEM : WINDOWS xp and Windows7


FRONT END BACK END HTML AND JAVA MY-SQL 2005

PLAT FORM

JAVA(JDK1.7)

PROCESSOR RAM Hard

Intel Pentium IV 1GB

disk

20 GB or above

FEATURES
Information Management Searching Facility Unique id for each criminal

DESCRIPTION
Keep information of every criminal

PRIORITY
High

To see the result from DB the searching is necessary. Generating unique id for each criminal

Medium

High

Report generation
Fuzzy precedence

Generate reports by time , crime and criminals name


To show the status and the danger for society by the person

Medium

High

Login

Registration Insertion in DB

Officer

Modification in DB

Information fetch

Address & phone no.

History cases and case status

Photo

Name*

Fuzzy precedence Other names

Unique id*

Crimes * criminal

Finger prints

Case

details Case status Crime Date of crime Place Victim(s) Case investigator Prisons name Time spent in jail

S. No

Types of Requirement

Description

1.

PERFORMANCE REQUIREMENT

Here the DB is very sophisticated so every day the back up is necessary.


THE SYSTEM IS USER FRIENDLY SO NO SPECIAL TRAINING IS REQUIRED

2.

TRAINING REQUIREMENT

3.

SECURITY REQUIREMENT

USER AND ADMIN WILL REQUIRE USERNAME AND PASSWORD TO AUTHENTICATE BEFORE USING THEIR MODULES

http://1000projects.org/javaprojects/crimefile.html

www.scribd.com/BusinessLaw/Technology www.thefreedictionary.com/Database www.wikipedia.org/wiki/Criminal_record

Queries?

You might also like