SlideShare uma empresa Scribd logo
1 de 11
Software Requirements
Specification
For
City without Crimes
Version 1.0 approved
Preparedby
Sukriti Khandelwal
(15011255)
Suchitra Agarwal
(15011254)
VSSUT,Burla
August 17, 2017
Software Requirements Specification for My Mission: City without Crimes Page ii
Table of Contents
1. Introduction..............................................................................................................................1
1.1 Purpose..................................................................................................................................1
1.2 Document Conventions ...........................................................................................................1
1.3 Intended Audience and Reading Suggestions............................................................................1
1.4 Product Scope ........................................................................................................................1
1.5 References ..............................................................................Error! Bookmark not defined.
2. Overall Description..................................................................................................................1
2.1 Product Perspective ................................................................................................................1
2.2 Product Functions ...................................................................................................................2
2.3 User Classes and Characteristics..............................................................................................2
2.4 Operating Environment...........................................................................................................2
2.5 Design and Implementation Constraints ...................................................................................3
2.6 User Documentation ................................................................Error! Bookmark not defined.
2.7 Assumptions and Dependencies...............................................................................................2
3. External Interface Requirements ...........................................................................................3
3.1 User Interfaces .......................................................................................................................3
3.2 Hardware Interfaces................................................................................................................3
3.3 Software Interfaces.................................................................................................................3
3.4 Communications Interfaces.....................................................................................................4
4. System Features........................................................................................................................3
4.1 Registration
4.2 Login
4.3 Search
4.4 Complaint Registration
4.5 Feedback
4.6 Blog
4.7 News Section
4.8 Social media Connection
4.9 Action against crime
Error! Bookmark not defined..10 Statistics of system
5. Other Nonfunctional Requirements.......................................................................................8
5.1 Performance Requirements......................................................................................................8
5.2 Safety Requirements ...............................................................................................................9
5.3 Security Requirements ............................................................................................................9
5.4 Software Quality Attributes.....................................................................................................9
6. Other Requirements ................................................................................................................6
Software Requirements Specification for My Mission: City without Crimes Page 1
1 Introduction
1.1 Purpose
The product concerned here is an online comprehensive crime reporting system to engage public, NGOs,
police and government agencies to be more quick, proactive and responsive to fight with crime and
criminals. This SRS describes the whole product.
1.2 Document Conventions
The typographical conventionsused are:
 Underlined Text: The important functional requirements to be implemented and the actors in the
system
 Italics: used inside the brackets,explanations and extension of the concerned statement
 Priorities for each requirement will be displayed in bold besides the requirement.
1.3 Intended Audience and Reading Suggestions
This document is basically intended for developers, project managers,testers,administrators and
documentation writers. The SRS summarizes functions, software, hardware requirements, functional and non
functional requirements of the product. This document also establishes on need for such a system and follow
up the pros and cons with the system.
1.4 Product Scope
This project is aimed at developing a Online Management system for City without crime that is a collection
of registers and report for the effective management of crime. City without crimes is being designed to help,
organize and manage, and to reduce time-consuming administration in key areas of crime reporting system.
With no more than a few mouse clicks, criminal information is available, ready to communicate to others.
City without crimes records information of members, criminals etc in database format. Comparing to an
equivalent manual recording system, the time saved without duplication is enormous.
The system should have a login. The software should include solutions to any of the crime happening in day
to day life. The System should be accessible to the end users, Admin, Police officers and NGOs. For using
the software, the member has to first sign up/register. He/she can chose the language which is preferable to
them.
2 Overall Description
2.1 Product Perspective
As the present manual system is so lengthy and time consuming, it is a good time to propose a new system
which is based on computer. This system can fulfill all the requirements of police stations easily. The main
Software Requirements Specification for My Mission: City without Crimes Page 2
objective of the project is to provide faster means of crime complaint report which will reduce the time
consumed in preparing the reports and get benefit from the latest technology. This is a new, self-contained
product which has been developed from the scratch. The online management system includes the features
such as it provides a secure system to the users,complaint registration, reporting crime and also gives
feedback to users. The SRS covers the entire project and has no sub systems and hence requires no
interfacing.
2.2 Product Functions
The major function of City without Crimes is:
 To provide an efficient documentation and updating all the crime records.
 To provide an interface to the citizens for crime reporting.
 To provide list of NGOs and nearby police stations.
 To provide platform to discuss various issues among the volunteers of locality and the NGOs.
 To provide feedback about the actions taken by the managing authority towards the crime reported.
2.3 User Classesand Characteristics
The various users or actors who all will be involved in the system are:
 Administrator: Administrator will have the complete control over the system. They will
have the technical access to the system. The role of administratorinvolves a great deal of
multitasking like track, compile, and analyze website usage data. He is responsible for
providing service to victims.
 Citizens: Whenever any crime is going on in the locality, it is the duty of every individual to
take an action against it. Citizens are the members joined in the system. They will have
access to all the services of the system.
 Police Officers The police department plays a major role in crime management system in
preventing the criminal activity. Therefore, in each locality there should be police stations.
The police officers work according to the orders given by the admin .
 NGOs:These are the Non Governmental Organizations who mostly help in non social
activities like any crime against women empowerment and others. They conduct several
campaigns which would be useful to act against the crimes.
2.4 Operating Environment
The software is designed to operate in the end users environment basically, considering all the
functions that it should efficiently perform to meet the requirements of better effective
management. For this, the software requirements should include a compatible operating system,
available disk to install all required software, database software to maintain all the records , fast and
stable network connection. The software will be a web resource and product. Since it is a website,
so it needs a working internet connection, any web browser supporting the HTML5 format and
XHTML and JavaScript, current version of Adobe flash player and the software should be protected
from any malicious item so that the antivirus installed will not block the site on any system. The
internal CPU specifications should be at the par with the current standard specs so that there would
Software Requirements Specification for My Mission: City without Crimes Page 3
never be a case of system lagging or system crashing while in use. Updatedversion of the software
need to be installed and manual regular updates need to be done by the admin.
2.5 Designand Implementation Constraints
The developers need to keep in mind that the End users database linked to the CWC need to be
accessible all the times and should never lead to any loss of information. The software developed
should be such that it should take minimum amount of load time .The capital investment over the
whole setup of the cloud based database along with the required number of system is limited and
thus should be met with the proposed budget. It would be better to implement it using bootstrap so
as to accommodate in mobile devices.
2.6 Assumptions and Dependencies
The software works best on the assumption that the latest versions of web browsers will be used to
access the website and the servers are to be kept up and running at all times so that link to site is
never broken and it should be accessible for 24*7. Further the site depends on reliability and safety
factors which will be further described in non- functional requirements. It is needed to think about a
future way of making the system more efficient and easily accessible.
3 External Interface Requirements
3.1 User Interfaces
There is a one login section for registered members. For new users there is a signup/registration
option. Then in the homepage there are different options like crime reporting. There is a section
where we can get ask questions. On the top there is notification icon. Also at the bottom there are
links to FAQ, Blogs, social media. Footer is divided into two parts the bottom left is for Contact us
section and on right there is help section and important links.
3.2 Hardware Interfaces
Minimum requirement for client is Internet Explorer-6 with Intel Pentium or AMD processor and
128 megabyte RAM also disk space of 100 megabyte, where as minimum requirement for server is
Intel Pentium or AMD processor with 1GB RAM and 500 megabyte disk space. The supported
device will be personal computers, android phones, tablets etc.
3.3 Software Interfaces
The website will be capable of running on Internet Explorer-6, Google Chrome or in any higher
versions of these. It is also meant for android users through the targeted devices like tablets and
Software Requirements Specification for My Mission: City without Crimes Page 4
smart phones. It uses web browser supporting HTML5, XHTML, JavaScript and Adobe flash
player.
3.4 Communications Interfaces
Client on internet will be using HTTP/HTTPS/FTP protocols. This system relies on single server
and all the databases are stored in that particular server.
4 System Features
The system features could simply be stated in the form of Functional Requirements. This basically
includes the user and the requirements for their authentication followed by the level of abstraction
that they are provided with while displaying the different segments of CWC.
4.1 Registration
4.1.1 Description and Priority
All the citizens, admin, police officers and NGOs need to register with the CWC by providing the
personal details that is required during the registration in order to avail the facilities of CWC. On
successful registration, a user id and password would be provided to them. They can use these
credentials for future assistance. The priority for this functionality is average .
4.1.2 Stimulus/Response sequences
In this feature the user needs to specify their name and personal details. The job type is a priority in
this that directs them to a page for inputting information that is different for all job types. The user
id and password are another priority that needs to be inputted to move further in the process.
4.1.3 Functional Requirements
To avail the services of the system one must go through a registration process.
The registration process will be different for different actors.
Input: Members basic information such as name, e-mail address/phone number and other personal
details.
Output: Registered successfully and supply the user with an user id and password
.
4.2 Login
4.2.1 Description and Priority
Software Requirements Specification for My Mission: City without Crimes Page 5
A registered user of CWC can login to the system by providing his user id and password as set by
him during registration. If a user has not yet registered , he cannot access the home page and a login
failure message would be shown to him and he would be redirected to the sign up page.
Priority for this is high as without logging in a user can’t use the software.
4.2.2 Stimulus/Response sequences
In this feature, the users need to specify their user id and password in their respective login pages
that is different for different job type. Only after they login they can access the functionalities of
CWC .
4.2.3 Functional Requirements
Login page is very important in order to access the functionalities of CWC. After login citizen,
NGOs, admin get access to their respective accounts and their functionalities. They can then report
crime as a victim, take immediate action as a admin, and act against the crime as a police officer
and NGO.
Input: Login Credentials as user id and password.
Output: Account Access.
4.3 Search
4.3.1 Description and Priority
Any user of CWC can ask questions or search contact number of police officers, NGOs by entering
a string that is a question or a ten digit number. The admin can also search all the information that is
required for the investigation about the crime.
The priority for this functionality is low.
4.3.2 Stimulus/Response sequences
In this feature, the user needs to input the details that is to be searched. As, a result of which the
details would be found.
4.3.3 Functional Requirements
Any question or contact number of police officers can be searched.
Input: A question or a ten digit number.
Output: List of all possible matches
4.4 Complaint Registration
4.4.1 Description and Priority
Software Requirements Specification for My Mission: City without Crimes Page 6
Any member of CWC can report a crime against any kind of criminal activities. All the information
needed are mandatory. If he fails to fill any of these, error would be shown. The priority for this
functionality is high
4.4.2 Stimulus/Response sequences
Here the crime details would be entered by the victim and then the managing authority would
respond to it through the actions they take. The actions taken should be effective and should be
effective.
4.4.3 Functional Requirements
The victim has to report crime against any criminal activities and then a confirmation dialog box
would be shown after the crime has been reported successfully.
Input: crime category, description, time and date of crime, incident location, attachments (if any)
Output: notification will be sent to the member who is reporting.
.
4.5 Feedback
Description and Priority
Through the feedback provided by the victim, the management system gets to know whether the
complaints are fully satisfied or not with the services provided by them. If some feedbacks are
negative the system needs to take preventive actions against the crime again until it is solved.
The priority of this functionality is average.
Stimulus/Response sequences
In this feature, uses it input as the feedback of the victim using the used id or name, they should get
a confirmatory message that the feedback is registered successfully.
4.4.3 Functional Requirements
A member can give his/her opinion and views as feedback which would be taken into consideration
by the managing authority, so that they can improve their performance.
Input: feedback description and opinions.
Output: a notification to the respective member is sent.
.
4.6 Blog
4.6.1 Description and Priority
Software Requirements Specification for My Mission: City without Crimes Page 7
The blog is a page where volunteers of different localities can share his/her views. Their views can
be taken into consideration if the admin feels it necessary to make some changes in the
management system or some ideas that has to be implemented. Its priority is low.
4.4.2 Stimulus/Response sequences
The volunteers can share ideas which they think has to be implemented in the CWC. The
corresponding response will be shown by the managing authority.
4.4.3 Functional Requirements
Input: Reviews on non social crimes like domestic violence by NGOs.
Output: The review is posted on the blog page of the website.
4.7 News section
4.7.1 Description and Priority
The news section is the area where the information and news about the crime is posted. The news
would be about the recently criminal activity going on and the scars and loss it have done to the
people. The priority of this functionality is average.
4.4.4 Stimulus/Response sequences
The admin can post any current news which he thinks that the citizens should be aware of. The
response of the people could be seen in the comment section.
4.4.5 Functional Requirements
Input: News about crime.
Output: News posted on the news section.
4.8 Socialmedia connection
4.3.1 Description and Priority
Through social media discussion could be made by different admins of the locality in a group where
they can discuss about controlling crime in an efficient way by providing the best services. The
group can also be formed among NGOs and volunteers of each locality. The priority of this is
average.
4.4.6 Stimulus/Response sequences
The stimulus and response can be the conversation between the members of the group.
People can also connect social media account to find other members.
Software Requirements Specification for My Mission: City without Crimes Page 8
4.4.3 Functional Requirements
Input: social media profile of the member.
Output: connect to the several other members across the globe.
4.9 Actions against the crime
4.9.1 Description and priority
The police officers will take all the necessary sections against the crime and report about that to the
admin. The priority of this functionality is high.
4.9.2 Stimulus/Response sequences
The input can be the actions taken by the police officers and the response can be the response of the
admin
4.9.3 Functional Requirements
Input: Actions taken against the crime.
Output: Response by the admin.
4.10 Statistics of the system
4.10.1 Description and priority
The online system should be capable of downloading PDF’s, reports which includes yearly , month
wise, current week wise statistics related to crime in the locality. The priority of this functionality is
average.
4.10.2 Stimulus/Response sequences
Whenever any old files or report is to be searched by the admin, the searched statistics which is
stored would appear.
4.10.3 Functional Requirements
Input: The response of the police officers taken against the crime throughout.
Output: Yearly statistics and success of the system would be known.
5 Other Nonfunctional Requirements
5.1 Performance Requirements
The hardware end of the system should be very much efficient in performance. The system should
be accessible 24*7. The system should perform well when many users can access the software
simultaneously. Also the reports which are sent by the members should only be read by the
managing authority, others can’t read or access it. The system should support backup and recovery.
Software Requirements Specification for My Mission: City without Crimes Page 9
It will help the police officers to maintain old records of the crime in a proper statistics so that
whenever any member or administrator wants to search some data, can find it easily.
5.2 SafetyRequirements
The database of CWC should not store any password in plain text, that is, a hashed value has to be
stored. The user must follow the services provided according to the terms and policies which are
posted. The administrative privileges should be provided to more than one person who ensures
check and balance so that one person cannot affect or delete the data. The system should not allow
any third party banner ads on CWC which will take the user or managing authority to any fraud site.
5.3 Security Requirements
The system should be secure enough and high -level encryption algorithm should be used to prevent
crime. If anytime a virus is detected then it could be resolved by the antivirus which should be
loaded when the antivirus is designed. If the app is secure the anti-crime app will trumpet wrong
doing. There should also be security teams that could prevent hacks from any foreign agency.
5.4 Software Quality Attributes
The software should include all the requirements that is needed for CWC and people should have
prior knowledge about it. Any person can’t access the functionalities of CWC, only those who are
the registered users should be given the authority. Updating should be done time to time by the
software developer which includes new and more advanced functionalities about CWC. The update
of FAQ s, phone numbers, complain records, crime reports, should also be made.
6 Other Requirements
Other requirements which could be included in the system is the use of fingerprint authentication. Through
this the complaints registered remain secure and the personal details of the victims too are protected. This
requirement makes the system more secure and outsiders can’t access it.

Mais conteúdo relacionado

Mais procurados

Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposalBeresa Abebe
 
Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)Nidhi Singh
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification systemSameer Telikicherla
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
Crime investigation system
Crime investigation systemCrime investigation system
Crime investigation systemDeepa Rani
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system pptYOGESH SHARMA
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting SystemKusum Sankhala
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013VinothkumaR Ramu
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Crime file system
Crime file system Crime file system
Crime file system deva491
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Protectourwater.ie SRS
Protectourwater.ie SRSProtectourwater.ie SRS
Protectourwater.ie SRSKillian Vigna
 

Mais procurados (20)

Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposal
 
E-Police Android APP
E-Police  Android APPE-Police  Android APP
E-Police Android APP
 
Online FIR System
Online FIR SystemOnline FIR System
Online FIR System
 
Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)
 
Crime record
Crime recordCrime record
Crime record
 
Ppt
PptPpt
Ppt
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Final srs
Final srsFinal srs
Final srs
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Crime investigation system
Crime investigation systemCrime investigation system
Crime investigation system
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system ppt
 
CRMS
CRMSCRMS
CRMS
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
 
Project
ProjectProject
Project
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Crime file system
Crime file system Crime file system
Crime file system
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Protectourwater.ie SRS
Protectourwater.ie SRSProtectourwater.ie SRS
Protectourwater.ie SRS
 

Semelhante a City Without Crime

A Report On Online Crime Reporting Guidance By - Prepared By Muhammad Shoaib
A Report On Online Crime Reporting Guidance By  - Prepared By Muhammad ShoaibA Report On Online Crime Reporting Guidance By  - Prepared By Muhammad Shoaib
A Report On Online Crime Reporting Guidance By - Prepared By Muhammad ShoaibKayla Smith
 
Mobile Application Guideline | Mobile App Development Company
Mobile Application Guideline | Mobile App Development Company Mobile Application Guideline | Mobile App Development Company
Mobile Application Guideline | Mobile App Development Company Arna Softech Private Limited
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemAbhishek Kumar
 
Automated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAutomated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAditya Chauhan
 
Software Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate ManagementSoftware Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate ManagementSharad Srivastava
 
Android application development
Android application developmentAndroid application development
Android application developmentMd. Mujahid Islam
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporationDhavamani Prakash
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management SystemIRJET Journal
 
SOFTWARE DESIGN .docx
SOFTWARE DESIGN                                                   .docxSOFTWARE DESIGN                                                   .docx
SOFTWARE DESIGN .docxrronald3
 
Suryansh.docx
Suryansh.docxSuryansh.docx
Suryansh.docxRapperEzy
 
Kisan Monitoring System Focused on Android based Application
Kisan Monitoring System Focused on Android based ApplicationKisan Monitoring System Focused on Android based Application
Kisan Monitoring System Focused on Android based ApplicationIRJET Journal
 
Community App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionCommunity App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionMike Taylor
 
Community App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionCommunity App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionMike Taylor
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET Journal
 

Semelhante a City Without Crime (20)

A Report On Online Crime Reporting Guidance By - Prepared By Muhammad Shoaib
A Report On Online Crime Reporting Guidance By  - Prepared By Muhammad ShoaibA Report On Online Crime Reporting Guidance By  - Prepared By Muhammad Shoaib
A Report On Online Crime Reporting Guidance By - Prepared By Muhammad Shoaib
 
Mobile Application Guideline | Mobile App Development Company
Mobile Application Guideline | Mobile App Development Company Mobile Application Guideline | Mobile App Development Company
Mobile Application Guideline | Mobile App Development Company
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale System
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
Srs of bms
Srs of bmsSrs of bms
Srs of bms
 
Automated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAutomated crime m_anagement-synopsis
Automated crime m_anagement-synopsis
 
Software Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate ManagementSoftware Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate Management
 
Android application development
Android application developmentAndroid application development
Android application development
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management System
 
SOFTWARE DESIGN .docx
SOFTWARE DESIGN                                                   .docxSOFTWARE DESIGN                                                   .docx
SOFTWARE DESIGN .docx
 
Sds
SdsSds
Sds
 
Suryansh.docx
Suryansh.docxSuryansh.docx
Suryansh.docx
 
Online news 365
Online news 365Online news 365
Online news 365
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design Document
 
Kisan Monitoring System Focused on Android based Application
Kisan Monitoring System Focused on Android based ApplicationKisan Monitoring System Focused on Android based Application
Kisan Monitoring System Focused on Android based Application
 
Community App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionCommunity App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural Interaction
 
Community App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural InteractionCommunity App for Promoting Cross-Cultural Interaction
Community App for Promoting Cross-Cultural Interaction
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental Application
 

Último

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Último (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

City Without Crime

  • 1. Software Requirements Specification For City without Crimes Version 1.0 approved Preparedby Sukriti Khandelwal (15011255) Suchitra Agarwal (15011254) VSSUT,Burla August 17, 2017
  • 2. Software Requirements Specification for My Mission: City without Crimes Page ii Table of Contents 1. Introduction..............................................................................................................................1 1.1 Purpose..................................................................................................................................1 1.2 Document Conventions ...........................................................................................................1 1.3 Intended Audience and Reading Suggestions............................................................................1 1.4 Product Scope ........................................................................................................................1 1.5 References ..............................................................................Error! Bookmark not defined. 2. Overall Description..................................................................................................................1 2.1 Product Perspective ................................................................................................................1 2.2 Product Functions ...................................................................................................................2 2.3 User Classes and Characteristics..............................................................................................2 2.4 Operating Environment...........................................................................................................2 2.5 Design and Implementation Constraints ...................................................................................3 2.6 User Documentation ................................................................Error! Bookmark not defined. 2.7 Assumptions and Dependencies...............................................................................................2 3. External Interface Requirements ...........................................................................................3 3.1 User Interfaces .......................................................................................................................3 3.2 Hardware Interfaces................................................................................................................3 3.3 Software Interfaces.................................................................................................................3 3.4 Communications Interfaces.....................................................................................................4 4. System Features........................................................................................................................3 4.1 Registration 4.2 Login 4.3 Search 4.4 Complaint Registration 4.5 Feedback 4.6 Blog 4.7 News Section 4.8 Social media Connection 4.9 Action against crime Error! Bookmark not defined..10 Statistics of system 5. Other Nonfunctional Requirements.......................................................................................8 5.1 Performance Requirements......................................................................................................8 5.2 Safety Requirements ...............................................................................................................9 5.3 Security Requirements ............................................................................................................9 5.4 Software Quality Attributes.....................................................................................................9 6. Other Requirements ................................................................................................................6
  • 3. Software Requirements Specification for My Mission: City without Crimes Page 1 1 Introduction 1.1 Purpose The product concerned here is an online comprehensive crime reporting system to engage public, NGOs, police and government agencies to be more quick, proactive and responsive to fight with crime and criminals. This SRS describes the whole product. 1.2 Document Conventions The typographical conventionsused are:  Underlined Text: The important functional requirements to be implemented and the actors in the system  Italics: used inside the brackets,explanations and extension of the concerned statement  Priorities for each requirement will be displayed in bold besides the requirement. 1.3 Intended Audience and Reading Suggestions This document is basically intended for developers, project managers,testers,administrators and documentation writers. The SRS summarizes functions, software, hardware requirements, functional and non functional requirements of the product. This document also establishes on need for such a system and follow up the pros and cons with the system. 1.4 Product Scope This project is aimed at developing a Online Management system for City without crime that is a collection of registers and report for the effective management of crime. City without crimes is being designed to help, organize and manage, and to reduce time-consuming administration in key areas of crime reporting system. With no more than a few mouse clicks, criminal information is available, ready to communicate to others. City without crimes records information of members, criminals etc in database format. Comparing to an equivalent manual recording system, the time saved without duplication is enormous. The system should have a login. The software should include solutions to any of the crime happening in day to day life. The System should be accessible to the end users, Admin, Police officers and NGOs. For using the software, the member has to first sign up/register. He/she can chose the language which is preferable to them. 2 Overall Description 2.1 Product Perspective As the present manual system is so lengthy and time consuming, it is a good time to propose a new system which is based on computer. This system can fulfill all the requirements of police stations easily. The main
  • 4. Software Requirements Specification for My Mission: City without Crimes Page 2 objective of the project is to provide faster means of crime complaint report which will reduce the time consumed in preparing the reports and get benefit from the latest technology. This is a new, self-contained product which has been developed from the scratch. The online management system includes the features such as it provides a secure system to the users,complaint registration, reporting crime and also gives feedback to users. The SRS covers the entire project and has no sub systems and hence requires no interfacing. 2.2 Product Functions The major function of City without Crimes is:  To provide an efficient documentation and updating all the crime records.  To provide an interface to the citizens for crime reporting.  To provide list of NGOs and nearby police stations.  To provide platform to discuss various issues among the volunteers of locality and the NGOs.  To provide feedback about the actions taken by the managing authority towards the crime reported. 2.3 User Classesand Characteristics The various users or actors who all will be involved in the system are:  Administrator: Administrator will have the complete control over the system. They will have the technical access to the system. The role of administratorinvolves a great deal of multitasking like track, compile, and analyze website usage data. He is responsible for providing service to victims.  Citizens: Whenever any crime is going on in the locality, it is the duty of every individual to take an action against it. Citizens are the members joined in the system. They will have access to all the services of the system.  Police Officers The police department plays a major role in crime management system in preventing the criminal activity. Therefore, in each locality there should be police stations. The police officers work according to the orders given by the admin .  NGOs:These are the Non Governmental Organizations who mostly help in non social activities like any crime against women empowerment and others. They conduct several campaigns which would be useful to act against the crimes. 2.4 Operating Environment The software is designed to operate in the end users environment basically, considering all the functions that it should efficiently perform to meet the requirements of better effective management. For this, the software requirements should include a compatible operating system, available disk to install all required software, database software to maintain all the records , fast and stable network connection. The software will be a web resource and product. Since it is a website, so it needs a working internet connection, any web browser supporting the HTML5 format and XHTML and JavaScript, current version of Adobe flash player and the software should be protected from any malicious item so that the antivirus installed will not block the site on any system. The internal CPU specifications should be at the par with the current standard specs so that there would
  • 5. Software Requirements Specification for My Mission: City without Crimes Page 3 never be a case of system lagging or system crashing while in use. Updatedversion of the software need to be installed and manual regular updates need to be done by the admin. 2.5 Designand Implementation Constraints The developers need to keep in mind that the End users database linked to the CWC need to be accessible all the times and should never lead to any loss of information. The software developed should be such that it should take minimum amount of load time .The capital investment over the whole setup of the cloud based database along with the required number of system is limited and thus should be met with the proposed budget. It would be better to implement it using bootstrap so as to accommodate in mobile devices. 2.6 Assumptions and Dependencies The software works best on the assumption that the latest versions of web browsers will be used to access the website and the servers are to be kept up and running at all times so that link to site is never broken and it should be accessible for 24*7. Further the site depends on reliability and safety factors which will be further described in non- functional requirements. It is needed to think about a future way of making the system more efficient and easily accessible. 3 External Interface Requirements 3.1 User Interfaces There is a one login section for registered members. For new users there is a signup/registration option. Then in the homepage there are different options like crime reporting. There is a section where we can get ask questions. On the top there is notification icon. Also at the bottom there are links to FAQ, Blogs, social media. Footer is divided into two parts the bottom left is for Contact us section and on right there is help section and important links. 3.2 Hardware Interfaces Minimum requirement for client is Internet Explorer-6 with Intel Pentium or AMD processor and 128 megabyte RAM also disk space of 100 megabyte, where as minimum requirement for server is Intel Pentium or AMD processor with 1GB RAM and 500 megabyte disk space. The supported device will be personal computers, android phones, tablets etc. 3.3 Software Interfaces The website will be capable of running on Internet Explorer-6, Google Chrome or in any higher versions of these. It is also meant for android users through the targeted devices like tablets and
  • 6. Software Requirements Specification for My Mission: City without Crimes Page 4 smart phones. It uses web browser supporting HTML5, XHTML, JavaScript and Adobe flash player. 3.4 Communications Interfaces Client on internet will be using HTTP/HTTPS/FTP protocols. This system relies on single server and all the databases are stored in that particular server. 4 System Features The system features could simply be stated in the form of Functional Requirements. This basically includes the user and the requirements for their authentication followed by the level of abstraction that they are provided with while displaying the different segments of CWC. 4.1 Registration 4.1.1 Description and Priority All the citizens, admin, police officers and NGOs need to register with the CWC by providing the personal details that is required during the registration in order to avail the facilities of CWC. On successful registration, a user id and password would be provided to them. They can use these credentials for future assistance. The priority for this functionality is average . 4.1.2 Stimulus/Response sequences In this feature the user needs to specify their name and personal details. The job type is a priority in this that directs them to a page for inputting information that is different for all job types. The user id and password are another priority that needs to be inputted to move further in the process. 4.1.3 Functional Requirements To avail the services of the system one must go through a registration process. The registration process will be different for different actors. Input: Members basic information such as name, e-mail address/phone number and other personal details. Output: Registered successfully and supply the user with an user id and password . 4.2 Login 4.2.1 Description and Priority
  • 7. Software Requirements Specification for My Mission: City without Crimes Page 5 A registered user of CWC can login to the system by providing his user id and password as set by him during registration. If a user has not yet registered , he cannot access the home page and a login failure message would be shown to him and he would be redirected to the sign up page. Priority for this is high as without logging in a user can’t use the software. 4.2.2 Stimulus/Response sequences In this feature, the users need to specify their user id and password in their respective login pages that is different for different job type. Only after they login they can access the functionalities of CWC . 4.2.3 Functional Requirements Login page is very important in order to access the functionalities of CWC. After login citizen, NGOs, admin get access to their respective accounts and their functionalities. They can then report crime as a victim, take immediate action as a admin, and act against the crime as a police officer and NGO. Input: Login Credentials as user id and password. Output: Account Access. 4.3 Search 4.3.1 Description and Priority Any user of CWC can ask questions or search contact number of police officers, NGOs by entering a string that is a question or a ten digit number. The admin can also search all the information that is required for the investigation about the crime. The priority for this functionality is low. 4.3.2 Stimulus/Response sequences In this feature, the user needs to input the details that is to be searched. As, a result of which the details would be found. 4.3.3 Functional Requirements Any question or contact number of police officers can be searched. Input: A question or a ten digit number. Output: List of all possible matches 4.4 Complaint Registration 4.4.1 Description and Priority
  • 8. Software Requirements Specification for My Mission: City without Crimes Page 6 Any member of CWC can report a crime against any kind of criminal activities. All the information needed are mandatory. If he fails to fill any of these, error would be shown. The priority for this functionality is high 4.4.2 Stimulus/Response sequences Here the crime details would be entered by the victim and then the managing authority would respond to it through the actions they take. The actions taken should be effective and should be effective. 4.4.3 Functional Requirements The victim has to report crime against any criminal activities and then a confirmation dialog box would be shown after the crime has been reported successfully. Input: crime category, description, time and date of crime, incident location, attachments (if any) Output: notification will be sent to the member who is reporting. . 4.5 Feedback Description and Priority Through the feedback provided by the victim, the management system gets to know whether the complaints are fully satisfied or not with the services provided by them. If some feedbacks are negative the system needs to take preventive actions against the crime again until it is solved. The priority of this functionality is average. Stimulus/Response sequences In this feature, uses it input as the feedback of the victim using the used id or name, they should get a confirmatory message that the feedback is registered successfully. 4.4.3 Functional Requirements A member can give his/her opinion and views as feedback which would be taken into consideration by the managing authority, so that they can improve their performance. Input: feedback description and opinions. Output: a notification to the respective member is sent. . 4.6 Blog 4.6.1 Description and Priority
  • 9. Software Requirements Specification for My Mission: City without Crimes Page 7 The blog is a page where volunteers of different localities can share his/her views. Their views can be taken into consideration if the admin feels it necessary to make some changes in the management system or some ideas that has to be implemented. Its priority is low. 4.4.2 Stimulus/Response sequences The volunteers can share ideas which they think has to be implemented in the CWC. The corresponding response will be shown by the managing authority. 4.4.3 Functional Requirements Input: Reviews on non social crimes like domestic violence by NGOs. Output: The review is posted on the blog page of the website. 4.7 News section 4.7.1 Description and Priority The news section is the area where the information and news about the crime is posted. The news would be about the recently criminal activity going on and the scars and loss it have done to the people. The priority of this functionality is average. 4.4.4 Stimulus/Response sequences The admin can post any current news which he thinks that the citizens should be aware of. The response of the people could be seen in the comment section. 4.4.5 Functional Requirements Input: News about crime. Output: News posted on the news section. 4.8 Socialmedia connection 4.3.1 Description and Priority Through social media discussion could be made by different admins of the locality in a group where they can discuss about controlling crime in an efficient way by providing the best services. The group can also be formed among NGOs and volunteers of each locality. The priority of this is average. 4.4.6 Stimulus/Response sequences The stimulus and response can be the conversation between the members of the group. People can also connect social media account to find other members.
  • 10. Software Requirements Specification for My Mission: City without Crimes Page 8 4.4.3 Functional Requirements Input: social media profile of the member. Output: connect to the several other members across the globe. 4.9 Actions against the crime 4.9.1 Description and priority The police officers will take all the necessary sections against the crime and report about that to the admin. The priority of this functionality is high. 4.9.2 Stimulus/Response sequences The input can be the actions taken by the police officers and the response can be the response of the admin 4.9.3 Functional Requirements Input: Actions taken against the crime. Output: Response by the admin. 4.10 Statistics of the system 4.10.1 Description and priority The online system should be capable of downloading PDF’s, reports which includes yearly , month wise, current week wise statistics related to crime in the locality. The priority of this functionality is average. 4.10.2 Stimulus/Response sequences Whenever any old files or report is to be searched by the admin, the searched statistics which is stored would appear. 4.10.3 Functional Requirements Input: The response of the police officers taken against the crime throughout. Output: Yearly statistics and success of the system would be known. 5 Other Nonfunctional Requirements 5.1 Performance Requirements The hardware end of the system should be very much efficient in performance. The system should be accessible 24*7. The system should perform well when many users can access the software simultaneously. Also the reports which are sent by the members should only be read by the managing authority, others can’t read or access it. The system should support backup and recovery.
  • 11. Software Requirements Specification for My Mission: City without Crimes Page 9 It will help the police officers to maintain old records of the crime in a proper statistics so that whenever any member or administrator wants to search some data, can find it easily. 5.2 SafetyRequirements The database of CWC should not store any password in plain text, that is, a hashed value has to be stored. The user must follow the services provided according to the terms and policies which are posted. The administrative privileges should be provided to more than one person who ensures check and balance so that one person cannot affect or delete the data. The system should not allow any third party banner ads on CWC which will take the user or managing authority to any fraud site. 5.3 Security Requirements The system should be secure enough and high -level encryption algorithm should be used to prevent crime. If anytime a virus is detected then it could be resolved by the antivirus which should be loaded when the antivirus is designed. If the app is secure the anti-crime app will trumpet wrong doing. There should also be security teams that could prevent hacks from any foreign agency. 5.4 Software Quality Attributes The software should include all the requirements that is needed for CWC and people should have prior knowledge about it. Any person can’t access the functionalities of CWC, only those who are the registered users should be given the authority. Updating should be done time to time by the software developer which includes new and more advanced functionalities about CWC. The update of FAQ s, phone numbers, complain records, crime reports, should also be made. 6 Other Requirements Other requirements which could be included in the system is the use of fingerprint authentication. Through this the complaints registered remain secure and the personal details of the victims too are protected. This requirement makes the system more secure and outsiders can’t access it.