Академический Документы
Профессиональный Документы
Культура Документы
BACHELOR OF ENGINEERING
IN
INFORMATION TECHNOLOGY
Developed at:
Developed By:
Joshi Siddhi (ID - 056032)
I declare that final semester report entitled “IT SOLUTIONS FOR INTELLIGENCE
BUREAU” is our own work conducted under the supervision of the external guide Ms.
Jhelam Vohra from TCS Gandhinagar.
We further declare that to the best of our knowledge the report for B.E. final semester
does not contain part of the work which has been submitted for the award of B.E. Degree
either in this or any other university without proper citation.
Joshi Siddhi
Branch: IT
ID No: 056032
Submitted To:
Prof. Harshad Prajapati
Department of Information Technology,
Faculty of Technology,
Dharmsinh Desai University,
Nadiad,
Gujarat.
CERTIFICATE
We would like to thank to Mr. Mihir Solanki (Project Leader) and Ms. Jhelam Vohra
(Module Leader) for giving us an opportunity to work with one of the most esteemed
organization of the world. An enviable work culture and an environment that encourages
creativity and innovation have inculcated in us a sense of discipline and perseverance.
We are indebted to Mr. Hardik Shah, Ms. Nikita Shah, Mr.Dharamendra Mahida
and Mr.Tejas Poojara for guiding us throughout the project development and helped us
conceptualize the idea of the project and helped us streamline our work by providing us
with facility required.
From the bottom of our heart, I would like to express my sincere thanks to our Head of
Department Prof. R.S.Chhajed and our internal guide Prof. Harshad Prajapati, who
gave us an opportunity to undertake such a great challenging and innovative work. We
are grateful to them for their guidance, encouragement, understanding and insightful
support in the development process.
Finally, we would like to thank to all TCS employees, all faculty members of our college,
our friends and our family members for providing their support and continuous
encouragement throughout the project.
The Intelligence Bureau is formed to aid the police force. Its main objective is to collect,
collate and analyze intelligence and advance information for taking appropriate
preventive actions to maintain law and order in the state.
To handle the day-to-day affairs and collection and reporting of information, there are
several branches established to look after specific activities.
Requirement gathering of standard procedures, formats, forms, registers, reports and
various other documents and business processes will enable us to understand, analyze and
propose a new computerized system for better efficiency and efficacy. This will enable in
effective and better utilization of manpower, better and improved reporting framework
and processes with reduced repetitive work and faster decision making.
The branches of Intelligence Bureau do the following activities:
Information Gathering
Consolidation Activities
Forecasting (Analysis Activities)
Record Maintenance Activities
Reporting Activities
IB is the main coordinating authority regarding security, law and order situation with the
Centre and other states. Hence, the Head office is interlinked with information flow of all
kinds of activities and events related to political, communal, religious, elections, students,
unions, farmers, laborers, foreigners, Pakistan nationals, airport, ports and coastal areas
of the state and security related information through these various support units. Work
allocation for above activities is distributed to the branches situated at the head office of
the Intelligence Bureau.
IB has identified the provision of online and instantaneous access to information. The
proposed solution includes the following
The purpose of this project is to mainly computerize the Intelligence Bureau Department.
Hence this project is solely for the work done by the IB. Any other department is not
covered in the scope of this project. Also the project is entirely based on user
requirements as specified by the user and hence it is not possible to add any extra features
apart from those provided by the user. Its scope is limited to the work done by the
Intelligence Bureau Department.
Tata Consultancy Services (TCS) is one of the leading information technology companies
in the world. With a workforce of over 94,000 professionals spread across more than 50
global delivery centers, it helps organizations stay ahead with new technology. Its clients
include seven of the top ten corporations in the Fortune 500 list of the largest
corporations in the United States.
TCS products and services help companies in various sectors effectively meet their
business challenges. With technical expertise and employing a flexible approach to client
relationships, TCS offers its clients: consulting, IT services, business process
outsourcing, infrastructure outsourcing, and engineering and industrial services.
Since its inception, the company has invested in new technologies, processes, and people
in order to help its customers succeed. With inputs from its innovation labs and university
alliances, and drawing on the expertise of key partners, TCS keeps clients up-to-date with
new technology. This has helped the company meet various benchmarks of excellence in
software development - it is the world's first organization to achieve an enterprise-wide
Maturity Level 5 on quality improvement models, CMMI® and P-CMM®, using the
most rigorous assessment methodology, SCAMPISM.
TCS offerings are backed by its investment (over 4% of its revenues) in Research and
Development in cutting edge technology; its software tools foundry at Tata Research
Development and Design Center, Pune is one of the most advanced in the world. TCS
also has research alliances with several world-renowned universities, such as the
University of California at Riverside and San Diego, the Indian Institutes of Technology
(IIT), and the Rotterdam School of Management.
Being with TCS is all about possibilities, growth, learning, teamwork and leading change.
At TCS, there is much more than just technology and software development. TCS
encourages you to think different, challenge the conventional and innovate. People here
from diverse cultural and educational backgrounds bring in a wealth of knowledge and
experience that gives you an opportunity to learn and expand your horizons.
Areas of business
The following TCS services help customers optimize business processes and create
resilient IT infrastructure, ensuring faster business results:
• Consulting
TCS consulting services help enterprises transform the way of doing business by
helping them to optimize business processes, align IT with business requirements,
support IT operations, and design effective risk management strategies.
• IT services
TCS provides system integration and testing solutions, and application development
and management services that help companies make the most of their IT investments.
TCS works with enterprises worldwide, helping them focus on their core business
while accelerating outsourced operations and ensuring round-the-clock service
delivery.
• Infrastructure outsourcing
Industries
TCS helps clients from various industries solve complex problems, mitigate risks, and
become operationally excellent. Some of the industries it serves are:
Looking Ahead
Always looking ahead, TCS is working towards being among the global top ten IT
consulting companies in the coming years. Emphasizing its commitment to quality, TCS
intends to achieve SEI CMM level 5 certification for all its development centers. In
retrospection, TCS has grown over the years not merely in size, geographical spread and
revenue. It has evolved into a corporate culture dedicated to client satisfaction, lasting
relationships and social responsibility. It has become an environment where the best
minds from the top universities are instilled with the finest training possible. Its human
skills are ably backed by the latest in hardware, software and telecommunication links
that span the world.
In addition, it would also cater to the ERP projects being executed by the company for
the global clients. TCS is already working with the Gujarat government on several
projects and the in-house unit would also benefit their other operations in the state.
TCS CEO and Managing Director S Ramadorai said in a statement on their plans in
Gujarat: “TCS plans to play an integral role in the further development of the Gujarat
economy by working with corporations and helping train and develop the talent in the
State.”
Candidate’s Declaration
College Certificate
Acknowledgement i
Abstract ii
Company Profile iii
Table of Contents vi
List of Figures ix
List of Tables xii
Abbreviations vi
1.0 Introduction 1
1.1 Project Details 1
1.2 Purpose 2
References 138
Experience 139
LIST OF FIGURES:
LIST OF TABLES:
Abbreviations:
1. INTRODUCTION
The functions of Intelligence Bureau broadly include crime detection, crime prevention
and law and order maintenance. All these functions are interlinked to each other, which
depend on the flow of information amongst them.
Departmental hierarchy allows the reporting from bottom to top level with consolidation
of reports at each level. Instructions pass from top to bottom whereas reporting is done
from bottom to top. Crime Units are the places where crime related data is generated and
sent upwards. In the hierarchy as one goes lower, information is more in details.
The Intelligence Bureau is divided in to many sub branches. Each Sub branch gathers
information, investigates and tracks different kinds of crimes.
Currently Intelligence Bureau team works on the Past Experience faced by the senior
officers. So all the decisions are taken by IB are truly according to the Image of the
incident in the officers’ mind. The fact may be different in many cases.
This is so because they don’t have real facts of all the important incidents. They have to
read Related Files for all the incidents and they are running sort of time. Even in many
cases they don’t have related Physical files with them. Due to this they don’t have fact
data with them. So all they can do is to take decisions with the Experience.
In addition to this, there is no scheme with the help of which they can have data reports
generated automatically. This is to be done by hand which is next to impossible.
So these are the main disadvantage of the present system which is being followed by IB
currently.
Another problem is that the superior authority, seating at the head quarter, can never see
the status of the particular file unless he asks the relative local officer or he gets the
Physical file in his hand.
This System will gather all the data about the important incidents, organizations and
people.
The System will generate Reports with the data it has. These reports will be very helpful
in concluding the fact from the data.
The System will be able to take place of Physical files and thus removing the paper work.
Instead of physical file, the system will send the e-file to the authorities and to other
departments when it’s necessary to forward a file in hierarchy.
1.2 PURPOSE
A study has been conducted to understand the current processes being followed by the
Intelligence Bureau, through various standard-interviewing techniques like interviews,
questionnaires, checklist, and role play with each responsible user of the functions of the
main office. The results of this study showed that the current system of management of
Intelligence Bureau requires all the forms, reports etc. to be generated manually. This
requires a lot of hard work to be done by hand and hence a lot of time is also wasted.
The purpose of this project is to propose a new system for the work related to Intelligence
Bureau. This will be the basis for the development and implementation of the
computerized system for better efficiency, effective utilization of manpower, reduced
repetitive processes and reporting systems, and above all, quicker decision making.
This project aims at computerizing the work done by the Intelligence Bureau. This
requires development of forms, procedures, reports etc. which are till now maintained
manually.
On completion of this project, the new system for the Intelligence Bureau will help it in
better manpower and cost management and also in reducing repetitive work.
1.3 SCOPE
The purpose of this project is to mainly computerize the Intelligence Bureau Department.
Hence this project is solely for the work done by the IB. Any other department is not
covered in the scope of this project. Also the project is entirely based on user
requirements as specified by the user and hence it is not possible to add any extra features
apart from those provided by the user. Its scope is limited to the work done by the
Intelligence Bureau Department.
1.4 OBJECTIVE
• Information Gathering
• Consolidation Activities
• Forecasting (Analysis Activities)
• Record Maintenance Activities
• Reporting Activities
IB is the main coordinating authority regarding security, law and order situation with the
Centre and other states. Hence, the Head office is interlinked with information flow of all
kinds of activities and events related to political, communal, religious, elections, students,
unions, farmers, laborers, foreigners, Pakistan nationals, airport, ports and coastal areas
of the state and security related information through these various support units. Work
allocation for above activities is distributed to the branches situated at the head office of
the Intelligence Bureau.
IB has identified the provision of online and instantaneous access to information. The
proposed solution includes the following
•
Building up of Master Data for various applications
• Re-using the data across various applications thereby reducing the data-
redundancy and duplication of work.
• Eclipse
To build complete enterprise level applications, developers need more than Java.
Oracle believes strongly, and has invested heavily, in the combination of Java,
SQL, and XML. Java is used for programming the business and presentation
logic, SQL for interacting with the database, and XML for passing information
between loosely coupled applications.
• J2EE
Fig 1.5.2
J2EE Multi-tier Distributed Application Model
• hibernate
Below are some of the reasons as why hibernate is used extensively:-
• Hibernate Overview:
Architecture
• Spring Framework
Spring is
essentially a technology dedicated to enabling you to build applications using
Plain Old Java Objects (POJOs).
It enables you to
develop components as POJOs containing only your business logic, while the
framework takes care of the many value adds you need to build enterprise
applications — even in areas that you may not have considered when initially
authoring the application.
This goal requires
a sophisticated framework, which conceals much complexity from the developer.
Because your business logic is abstracted from infrastructure concerns, it’s also
likely to enjoy a longer life, improving the return on investment of writing it.
Business logic
should change at the pace of your business; only if it is abstracted from
infrastructure concerns can the impact on your code base of inevitable
infrastructure change (such as choice of application server) be minimized.
Microsoft Visual Source Safe is a version control tool, basically used for proper
and efficient maintenance of the project related documents. All the documents that are
delivered by various vendors at various phases of testing are maintained through this tool.
There is a facility to provide access rights in this tool. So only the team members’
specific to project can access the documents related to their projects. No other person,
other than the team members has access rights to it.
Hence it helps managing the projects, regardless of the file type (text files,
graphics files, binary files, sound files, or video files) by saving them to a database.
When we need to share files between two or more projects, we can share them quickly
and efficiently. When we add a file to VSS, the file is backed up on the database, made
available to other people, and changes that have been made to the file are saved so we can
recover an old version at any time. Members of team can see the latest version of any file,
make changes, and save a new version in the database.
VSS project organization makes team coordination easy and intuitive for more
information on projects.
When a file (or set of files) is ready to deliver to another person, group, Web site,
or any other location, VSS makes it easy to share and secure different versions of the
selected set of files.
Before adding files to the VSS database, there should be a project to place the
files in. When working with VSS, the first thing to do is create one or more projects.
After the project has been created, files or folders can be added to the VSS database
• Coding Architecture
MVC architecture calls for a visual application to be broken up into three separate
parts:
1) Presentation layer:
This layer enables navigation, manipulation and translation onto the users' desktops.
2) Application layer:
This layer consists of an application server and a web server, both handled by the J2EE
application, and a mail server for messaging and workflow in order to provide a
collaborative environment.
3) Data layer:
This layer consists of structured data in the Oracle RDBMS, and unstructured documents
and textual information in J2EE application.
The separation of model and view allows multiple views to use the same enterprise
model. Consequently, an enterprise application's model components are easier to
implement, test, and maintain, since all access to the model goes through these
components.
To support a new type of client, you simply write a view and controller for it and wire
them into the existing enterprise model.
3) Clarity of design:
By glancing at the model's public method list, it should be easy to understand how to
control the model's behavior. When designing the application, this trait makes the entire
program easier to implement and maintain.
4) Efficient modularity:
Modularity of the design allows any of the components to be swapped in and out as the
user or programmer desires - even the model! Changes to one aspect of the program
aren't coupled to other aspects, eliminating many nasty debugging situations. Also,
development of the various components can progress in parallel, once the interface
between the components is clearly defined.
5) Ease of growth:
Controllers and views can grow as the model grows; and older versions of the views
and controllers can still be used as long as a common interface is maintained.
6) Distributable:
With a couple of proxies one can easily distribute any MVC application by only altering
the startup method of the application.
JSP pages in a Model 1 application that use scripting elements, custom tags, or JavaScript
to forward requests should be re-factored to Model 2.
Model 1 architecture is best when the page navigation is simple and fixed, and when a
simple directory structure can represent the structure of the pages in the application. Such
applications usually embed the page flow information in the links between the pages. The
presence of forward in a JSP page implies that logic embedded in the page is making a
decision about the next page to display.
Over time, as the application grows and changes, page flow logic accumulates. The
application becomes difficult to maintain because the page flow logic is distributed across
multiple pages. The best time to switch from Model 1 to Model 2 is before this
maintenance problem arises. This is why it's usually best to choose Model 2 from the
outset, basing the application on an existing Web controller framework that best meets
application requirements. Model 1 remains a viable option for simple, static applications.
To build complete enterprise level applications, developers need more than Java. Oracle
believes strongly, and has invested heavily, in the combination of Java, SQL, and XML.
Java is used for programming the business and presentation logic, SQL for interacting
with the database, and XML for passing information between loosely coupled
Applications.
As MVC model 2 Architecture was used, XML, HTML and SQL provide various code
editors.
Also, AJAX, and Hibernate were used in some common functionalities of the project.
• DAO
• Service
• Value Object(VO)
DAO:
Service:
Value Object:
• The Value Object has a map which contains the mapping between the values
that come from JSP page and the values are forwarded to the service.
• Initially the JSP page will set the action flag and it will transfer the control to
the Controller.
• If action flag refers to a method of service then the Controller will fetch the
data related to that action flag from the database and will call the VOGEN or Service
based on sequence of execution.
• The service will call the DAOImpl associated with that service and in turn
DAOImpl will call the ValueObject which in turn refers to the appropriate table of the
database.
• In reverse order when data is retrieved from the database, VO will return the
data to the DAOImpl which in turn will pass the data to the service which will pass
the data to the appropriate JSP Page.
• All the data which is to be passed from one file to another should be passed in
Map only.
• For captions in the jsp file, a properties file is created, which contains all the
captions present in the jsp file. Separate properties file is created for each language.
Each properties file has the actual caption in that particular language, stored against a
common caption id.
2. PROJECT MANAGEMENT
The part of the system can be implemented using the current technology although
some modifications have to be done at various places. Some alterations with the
prototypes and functionalities would be done in order to work out the cost
constraints and to cope with the scheduling constraints.
• Can the system be integrated with other systems which are already in
place?
Also as this system is going to be used by a large organization, it is likely to deal with
a large number of data. Security of data is also another important requirement. So,
Oracle 10g is more suitable at back-end.
The users of the client organization should be able to operate the software easily, for
whom the software is developed, to gain the advantages of the software. This
demands good user interface. During the software development process prototypes of
the application are developed initially and are shown to client, so the client can give
some additional changes as per their requirements in the operating software. As the
software is developed and modified as per the comments of the users, there is very
little possibility that there will be resistance from end users.
Users may not be highly adept at the technical aspect of computer skills so will
required some training sessions. After that they are expected to be familiarized with
the application. System has been developed considering user characteristics to make it
user-friendly.
This feasibility study measures the cost effectiveness of project. It takes into
consideration cost and benefit.
• Hardware-Software Cost
• Maintenance Cost
The Requirements provided by the users are converted into Users Requirement
Specification as described above. The URS documents are then revised, validated,
authorized and approved by the users. The development commences after the approval
phase i.e. after the signing off of the URS documents. Thus, the URS is concerned to be
the most important document from user and developer prospective. The Developer will
try to adhere to the requirements specified in the URS documents in order to develop the
required application.
TCS has a very long-standing relationship at client side, having logged over 4,500
people. It has provided its expertise to various agencies all over the world, working with
numerous hardware and software technologies, to improve its overall image and provide
better services to its constituents. TCS will bring its vast domain expertise, knowledge of
the best practices and lessons learnt in various implementations at client side to this
project. For this specific requirement analysis, TCS consultants with the help of
designated personnel from CLIENT would familiarize themselves with the overall
DDU (Faculty of Tech., Dept. of IT) 17
Project Management
structure of the office and it’s inter-linkages with other departments/systems. They will
understand the broad working of the office and the other related departments, its
functions, manpower employed, processes etc.
TCS consultants shall meet the representative personnel and document the detailed gaps
between the current system and the proposed solution based on the understanding of the
activities and processes, as they are currently being carried out in the office.
The gaps would be documented and analyzed, and if required and possible reengineering
of process in concurrence with CLIENT to leverage the benefits of the product would be
suggested.
Other areas, which would be considered during the planning and analysis, would be:
Internal Training
TCS will conduct necessary training for the TCS’ project team to carry out the
proposed project. This will be in addition to the regular extensive training
program that is conducted by TCS for its staff and trainees.
Milestones are identified in order to complete the entire project in the time
duration. Milestones are identified for every module of Integrated Workflow Document
Management System.
TCS proposes the following Project Management structure for the successful
development/customization, implementation and maintenance of the Intelligence
Bureau system.
The following is the recommended Project Management structure for the execution of
the project.
TCS proposes the following team structure for the successful implementation of
the project. The TCS team will be headed by a Project Manager and will be supported
by Project Leaders/Module Leaders and Team Members and Trainees.
TCS proposes a multi-disciplinary team for the project. TCS would draw in
knowledge from its pool of resources with expertise ranging from business domain to
the systems administration, systems architect, and Networking and Internet
technology. These experts will act as consultants to the TCS Intelligence Bureau
project team. Other enabling groups within TCS such as Quality Assurance,
Manpower Allocation Task Committee, Operations and Training have important role
in the successful execution of the project.
• Project Manager
The responsibilities of the Project Manager are:
• Project Leader
The responsibilities of the Project Leader are:
• Module Leader
The responsibilities of a Module Leader include:
• Team member
The responsibilities of a team member include:
Module Leaders will report the progress of work in their respective modules to
the Project Leader on a weekly basis. The Project Leaders will in turn submit
weekly status reports to the concerned Project Managers. The status report will
contain:
The Project Manager will monitor the progress of the activities against the plan
and prepare a consolidated Monthly Report to Project Manager (PM) of CLIENT.
This report will cover the project status and deviations against plan.
D e2c0 0 8 J a 2n 0 0 9 F e 2b 0 0 9 M a2 r0 0 9
ID T a sk N a m e S ta r t F in is h D u r a t io n
2 1/1 22 8/1 2 4/1 1 1/1 1 8/1 2 5/1 1/2 8/2 1 5/2 2 2/2 1/3 8/3 1 5/3 2 2/3 2 9/3
S tu d y o f th e u s e r a n d s y s te m
3 1 /22 /92 0 0 8 1/2/2 0 0 9 1w
R e q u ir e m e n t s
4 S y s t e m A& Dn ae lys igs isn in g 1/5/2 0 0 9 1/2 /02 0 0 9 2w
5 C o d in g o f t h e A p p lic a 1/1
t io /9n2 0 0 9 2/2 /72 0 0 9 6w
6 T e s t in g 3/2/2 0 0 9 3/6/2 0 0 9 1w
After initial discussions with the HR head and preliminary investigation, the requirement
study of the project was done. A pre-Requirement of investigation was prepared which
revealed the exact amount of efforts required in people-person months, the cost that
would be incurred, the risks and the mitigating factors.
Different parameters were taken into consideration while considering the cost factor
incurred in the project:
Consultancy cost: This cost is based on the staffing of the project and its location.
Hardware cost: This cost is based on the cost incurred on the hardware utilized per
person month like computer, tapes etc.
Software cost: This cost includes the cost incurred on the licensing of tools and software
used in the project e.g. Oracle, Microsoft Office etc.
All software development can be characterized as a problem solving loop in which four
distinct stages are encountered:
• Status quo
• Problem definition
• Technical development
• Solution integration
Status Quo represents the current state of affairs.
Problem Definition identifies the specific problem to be solved.
Technical Development solves the problem through the
application of some technology.
The present system has certain major disadvantages. A few to be listed can be
excessive paperwork, time consuming process flow, laborious work environment
for employees, difficulty to access historical data and all these problems lead to
inefficient working of government sector causing dissatisfaction in the general
public.
The system being developed has the main objective of automation and
computerization a lot of tasks being carried out so basically there is a huge
amount of historical data that will be finally fed into the system that will be
developed. Our module was concerned with the customized system development
for the Intelligence bureau employees.
• The present system has certain major disadvantages. A few to be listed can be
excessive paperwork, time consuming process flow, laborious work environment
for employees, difficulty to access historical data and all these problems lead to
inefficient working of government sector causing dissatisfaction in the general
public.
• Apart from the above stated problems there is lack of transparency in the existing
system. This being one of the major drawbacks in the system needs special
attention.
• The problem stated above have certain deep rooted problems like time consuming
process flow for which the government may need to change the structure of the
process flow in certain cases so that the system output can become faster.
• The following listed are the problems or weaknesses of the current system:
Information is scattered among the various branches.
There is no synchronization between the different HOD’s.
Searching & tracking is difficult.
The majority of the functionality performed by the staff in the organization involves a
flow of information along predefined hierarchy of users. The flow consists of information
along with hierarchy or outside the system. It involves reviewing, commenting and
approving along various officers in the hierarchy like Level 0 Officer, Level 1 Officer,
Level 2 Officer, Level 3 Officer, Level 4 Officer, Level 5 Officer, Level 6 Officer and
Level 7 Officer.
START
Accept Request
LEVEL-1 EMPLOYEE
Approved Case
LEVEL-2 EMLOYEE LEVEL-3 EMPLOYEE
To collect relevant Information /
Send back for Correction. Send for approval
Send for approval
Approved Case
Send for approval
Approved Case CIRCULATING BETW EEN
ASST. LEVEL-2 LEVEL- 4 TO 6
EMPLOYEE
Approved Case Send for approval
END
HIGHEST LEVEL
EMPLOYEE
Hardware Requirements
Client Configuration
2 CPU
Operating System: WinNT
RAM: 512MB Minimum
40GB Minimum Free Space on Drive
750MHz
One Server with Oracle 10g Application Server
Other Server with Oracle 10g Database Server
Software Requirements
System Software
3.5 CONSTRAINTS
• There is no hardware limitations to the system as such because once the complete
system is developed after integration of modules exclusive care would be taken
that at the site of deployment of the web portal necessary hardware requirements
are pre-requisitely met.
• There is no hardware configuration heterogeneity in this case of the module or
the complete system being developed.
• There aren’t any high order language requirements that can be considered as a
constraint. All such language requirements are accurately met in such elite
technical organizations.
• Reliability requirements of the system are one of the prime ones in the list.
The system needed to be highly reliable in terms of performance but at this stage
where the complete system is far from completion we cannot gauge its reliability
all we could do is to make the individual module we have developed to be as
reliable as possible.
• Safety and security too are other major concerns of any client. In this case too
there are certain issues related to the security and safety of the system but as
mentioned earlier this stage is not about those concerns.
• Actually another team of experts in security features will provide necessary
standards of security and safety at later stage when the system would have got
into shape after the integration of individual modules.
• Criticality of the module was one of the concerned constraints. The system
was being developed for the users who were mainly employees of the government
sector. They had certain rigid aspects which were to be taken care during
development. Any change in pattern of their workflow would lead to extremely
critical conditions. Thus this was a matter of concern and served as one of the
deep rooted constraints.
• There were very few assumptions made while developing this module of the
system i.e. HDIITS (all modules). They can be listed as below:
• Other than these there are no external dependencies which can cause any
hampering to the system development.
4. SYSTEM ANALYSIS
Study has been conducted to understand the current processes being followed by
the Crime Branch. The study has been conducted through various standard-
interviewing techniques like interviews, questionnaires, checklist, and role play
with each responsible user of the functions of the main office.
Overview of Application
The user shall login to the system and go to Border Activity Details Application and fill
the details. Once he clicks “Submit” button these are saved in the system.
16. Material Status Material Status M List Box. Values can be Married or
of the person Unmarried
Document Found
Address Details
If “City/town” is selected
9. Pin code Pin code for the area O Text Box for
entering the pin
code
If “Village” is selected
17. Pin code Pin code for the area O Text Box for
entering the pin
code
Contact Details
If “City/town” is selected
30. Pin code Pin code for the area O Text Box
If “Village” is selected
38. Pin code Pin code for the area O Text Box for
entering the pin
code
Contact Details
Contact In India
1. First Name First Name of the M Text Box
person
If “City/town” is selected
15. Pin code Pin code for the area O Text Box for
entering the pin
code
If “Village” is selected
23. Pin code Pin code for the area O Text Box for
entering the pin
code
Contact Details
If “Yes” is selected
If “Yes” is selected
Custody Details
If “yes” is selected
The application accounts for storing the details of the security of the ONGC units.
Functionalities of this module are:
• Basic Details
• Security Details
• Oil Theft Details
Output
Basic Details
Unit Location Nearest Name No. Name of Oil sent Oil sent Name Nearest
Name Police of Oil of the to the from the of the police
Station Field Oil Pumping pumping pumping village station
Field Station station station pipeline
from to passing
to
1 2 3 4 5 6 7 8 9 10
Security Details
Order Order From If not Whether If sent outward pending If not
No Date Date declared proposal outward date at office sent then
prohibited, sent or no. reason
then not
reason
20 21 22 23 24 25 26 27 28
Campaign Details
Introduction
The application accounts for storing and maintenance of details of Campaign of
the Nominee Candidate and generation of Campaign Details reports.
Functionalities of this module are:
• Candidate Details
• Other Details
Input Parameters
Output
Candidate Details
House Candidate Date District Place Start End Party Name of
Field
Name/No. Name Time Time Leader Organization
name
1 2 3 4 5 6 7 8 9
Candidate Details
Name of Type of No. of No. of Place Evens Male Female Total Male(If
important Campaign Vehicles Participants(if Crowd Crowd “Public
Campaigner Rally Meeting”
Selected) is
selected)
10 11 12 13 14 15 16 17 18 19
Other Details
Security Whether District(If Police FIR Date Brief Incharge Address
arrangement crime Yes Station No(If Description Name
for VIP registered Selected) (If Yes Yes of FIR
against Selected) Selected)
candidate?
28 29 30 31 32 33 34 35 36
R1: Login
Description: The Login page is displayed and user is required to enter his username and
password.
Pre Condition: Nil
Input: The user enters his username and password according to his/her designation.
Output: The home page is displayed to the user according to his designation, after
verification of password.
Processing:
Main Scenario:
1. Start the application. User prompted for login and password.
2. User gives the login and password.
3. System does authentication.
Alternate Scenario :
4(a). Authorization fails.
4(a) 1. Prompt the user that he typed the wrong password
4(a) 2. Allow him to re-enter the password.
Main Scenario:
1. User initiates the “Investigation application”.
2. System asks the user for the Letter No.
3. User enters the Letter No.
4. New Investigation schedule for entered Letter No. is created with all the
entered details & transferred to particular Investigation Officer.
Alternate Scenario:
4(a). Investigation schedule with the same Letter No exists.
4(a)1. System asks the user for a different Letter No.
4(a)2. User enters a different Letter No.
4(a)3. New Investigation schedule for entered Letter No. is created with all the
details & transferred to particular Investigation Officer
R7:Create correspondence.
Pre-Condition: User logged in to the new entry functionality mode.
Input: User enters at least the mandatory entries.
R8:Forward correspondence.
Pre-Condition: Worklist is displayed on the screen.
Input: In workluist there is a created correspondence is there with update option.
Output: Particular details saved in the INBOX of the WORKLIST.
Processing:
Main Scenario :
1. User clicks on “Forward” option.
2. Details stored in inbox of the worklist.
3. User at lower level can forward these details to higher level and viseversa.
4. Details shifted to OUTBOX of the user.
Alternate Scenario:
4(a). System asks for mandatory fields’ entry if not done.
4(b). System shows message “Cant create correspondence” if particular
correspondence is not responded( Approved) by higher level user
4(c). user can update the details and then can forward details.
R9:Approve correspondence.
Pre-Condition: Worklist is displayed on the screen.
Input: In workluist there is a forwarded correspondence is there.
Output: Particular details saved in the INBOX of the WORKLIST or at some other place
where user wants to store.
Processing:
Main Scenario :
1. User clicks on “Approve” option.
2. Details stored in inbox of the work list or at some other place where user wants
to store.
3. User at lower level can forward these details to higher level and vise versa.
4. Acceptance message is mailed to lower level user who has forwarded those
details.
Alternate Scenario:
4(a). User can reject the forwarded correspondence.
R10:Reject correspondence.
Pre-Condition: Work list is displayed on the screen.
Input: In work list there is a forwarded correspondence is there.
In current, there is no any software developed related to Crime Branch so time is wasted
to enter data into registers manually. By this project user’s manual work is reduced and
also time is saved. This project also contains workflow which is used to send urgent data
to any higher authority so that delay of work is reduced. And any higher authority can
send any decision to the lower authority so further action will be taken by lower authority
so pending work is very less.
The features to be specially highlighted in the new system being developed are:
flexible enough to accommodate evolving public policies and to divert from the
regular routing.
• The establishment work should be taken care by the system and allow the
staff concentrate more on policy making issues etc.
• The document opening should pass through the ACID test as discussed
above.
• The system should allow a new document to be open only if it satisfies a
series of ACID tests like whether the subject relates to an infeasible request,
whether the subject falls within the original jurisdiction of the Office etc.
• The system should exploit the power of network computing like workflow
automation in selected work areas within the office departments etc.
4.6.1 ER Diagram
5. SYSTEM DESIGN
This presents the logical data model that defines entities required for Intelligence Bureau
application tables.
Overview
The entities in the logical data model have been logically grouped for ease of
understanding. Explanation is not needed for each entity and its attribute of that entity.
Conventions
The entities and attributes have been named as per the SGV standard conventions.
CRIME_COMMITED char(1) NO
ACTIVITY_TYPE bigint(20) NO FK(ActMst)
PERSON_ID bigint(20) NO FK(PersonMst)
IS_NATIONAL char(1) NO
EDU_QUALIFY varchar(50) YES
BIRTH_PLACE varchar(50) YES
ISSUE_AUTHR varchar(50) YES
HEIGHT varchar(50) YES
WEIGHT varchar(50) YES
BUILT varchar(50) YES
MARK_ON_BODY varchar(50) YES
OTHER_DTLS varchar(50) YES
TYPE_FISHERMAN bigint(20) YES FK(FishermanMst)
NAME_BOAT varchar(50) YES
BOAT_OWNER varchar(50) YES
REG_BOAT bigint(20) YES FK(FishermanMst)
REL_PERSON_NAME bigint(20) YES FK(RelativeMst)
TYPE_REL bigint(20) YES FK(RelativeMst)
SUB_CASTE varchar(45) YES
BOAT_REG_NO varchar(45) YES
ATTACHMENT_ID bigint(20) YES FK(AttachmentMst)
OTHER_REL varchar(45) YES
TRN_COUNTER int(11) YES
CORR_ID bigint(20) unsigned YES
APP_KEY bigint(20) unsigned YES
ORG_LOC bigint(20) unsigned YES
RC_STATUS varchar(30) NO
ACT_TAKEN varchar(30) NO
MANDATORY decimal(1,0) NO
TABLE_NAME varchar(255) NO
COLUMN_NAME varchar(255) NO
CLASS_NAME varchar(255) YES
METHOD_NAME varchar(255) YES
METHOD_ARGS varchar(255) YES
DISPLAY_IN_HEADER decimal(1,0) NO
VO_CLASS_NAME varchar(255) YES
PARAMETER_DISPLAY_NAME varchar(800) YES
HOME PAGE
Help
Date Settings Change Password Logout
Home
InBox OutBox
Holiday
All the correspondences List
and their Notification of Displayed
Approval or Rejection are here.
stored here.
All the Links to the
different Applications
are here.
Most Wanted
Criminal’s Details are Latest News is
displayed here with his flashed here.
Photographs .
Help
Date Settings Change Password Logout
Home
Form1 Form 2 Form3 Form4 Form 5 Form 6 Form7
For all the forms Required Labels, Textboxes, Drop Down Lists, Radio
buttons, Attachments etc all the components are arranged here as per the
given format
Help
Date Settings Change Password Logout
Home
Report Name
ALL PARAMETERS ARE ARRANGED HERE
For all the forms Required Labels, Textboxes, Drop Down Lists, Radio
buttons, Attachments etc all the components are arranged here as per the
given format.
6. IMPLEMENTATION PLANNING
The right strategy for implementation of a huge system like Intelligence Bureau is very
critical to make it successful over a period of time. The strategy should cover the people,
processes, and the technology with broad view of the current status on these aspects in
mind.
SrNo.. Factors
No.
1 Infrastructure (Servers, Network Components, Desktops, Scanners, Printers,
etc.)
2 Identification of implementation team from CLIENT
3 Training of DPOs (Departmental Trainers) for training the departmental users
4 Procurement of System Software licenses
5 Training of officers
6 Extraction of Data and entry into masters
7 Digitization of Acts, Rules, Statutes etc and their verification for correctness
and completeness
8 Providing the inputs for Gap Analysis study to TCS
9 Availability of additional servers for maintenance activities for sometime
Each of these critical success factors is taken as inputs for identifying the requirements
for implementation and is discussed in detail in the further sections of this document.
The phases/activities prior to and during implementation, like startup, site preparation,
infrastructure procurement, installation of servers, installation of system software,
Customization and Installation of Intelligence Bureau software are explained in the above
sections.
2. Communal Branches:
Other then these applications Festival/Fair Details, Madrasa Details are there in this
module.
3. Security Module:
4. Election module:
5. Reports:
6. Worklist:
• Worklist shows all the correspondence created by the officers. It has two
sections inbox and outbox.
TCS proposes an Intelligence Bureau solution that has the capability to minimize
security risks by deploying multiple layers of security controls
• Application Security
• Database Security
• Network - Data Transfer Security
• External Security: Firewall and Antivirus
Single sign-on provides users with a single point of entry to all authorized
applications with a single authentication or login process. Application Server
Security includes
g) Audit: A critical aspect of any system security policy is the monitoring and
recording of activities within that system i.e., “auditing”. To address this
requirement, System provides a number of features and functions to enable
accountability of actions taken by users of the database. System does this by
providing accounting and auditing features, which are designed to be as granular
and flexible as possible to ensure that exactly what needs to be accounted and
audited, as dictated by the application or system security policy, is recorded. This
helps to ensure that the size of audit trail remains manageable and the important
records are easily accessible. Application also provides capabilities to permit
accounting and auditing plans to be quickly enabled to implement crisis plans.
Server-Enforced, Row Level Access Control - The system will be the using
RDBMS Databases. These databases will be deployed on the database server and
database access checks will be defined at the system level. No direct access is
granted to RDBMS Databases, all access to these databases is via applications and
hence governed by Access controls.
Audit Trail: The audit trail will be maintained for the following:
• Date/Time stamp for all database access, new inserts, updates and
deletions
• Date/Time stamp on access of important files, attempt on such accesses
• Audit trail for the data access
In view of the threat of cyber attacks TCS proposes the below options to
implement the network security through the software installed on the firewall.
However, this is part of the Network architecture and out of scope of current
proposal.
Firewalls: TCS proposes the use of a firewall that provides required protection
for the Client from internet traffic. Its architecture and functionality should
combine to secure organizations networks, delivering full-featured security and
ensuing complete control of information entering and leaving the Client network.
Anti-Virus Kits: All the Application servers, database servers and the Web-
servers should have the latest anti-virus kits to detect new viruses. These anti-
virus kits will be updated with the latest versions frequently.
Client needs to define security policy for their IT solutions. Security audit needs
to be conducted for conformance with the defined IT Security Policy. However
defining the security policy for the Client or conducting audits is out of the scope
of current proposal.
If the security policy is defined and available during system study, the same will
be incorporated into the security design of the system. However, the overall
Intelligence Bureau related security aspects are discussed in the previous sub-
sections of this Section.
Note: - The above section describes the methodology of securing the application
at various levels by deploying additional software / hardware components. The
proposed application architecture of the system is based on the open standards and
is capable to incorporate the above modes of security.
Objects
The below are the naming convention for the design element used in the form.
All Hidden Fields should be place one after the other to reserve the space in the form.
Description & purpose of each hidden field should be documented in the design spec of
the appropriate components.
Variables
<prefix>_<meaningful name>
prefix : 2 character code.
First alphabet represents the scope of the variable
l - Local
g - Global
Second alphabet represents the type
b - Boolean
c - Currency
s - String
f - Float
i - Integer
l - Long
t - Time
a - Array
v - Variant
The body of the variable names and function names should use mixed case and should be
as long as needed to describe their purpose. To keep the name length reasonable,
abbreviations can be used for standard terms like Init for initialization, Tbl for table, Cnt
for count, Grp for Group etc. Wherever abbreviations are used, try to use them
consistently to improve readability. And in meaningful variable name variable name start
with lower case alphabet and second part of the name should be start with upper case
alphabet like for student name variable name should be studentName.
Recommended Maximum Length for variable names is 32 characters.
Example:
For declaring a global string variable for Group name: gs_grpName.
When passing values to a subroutine/function, use the same variable names in the called
routine as in the calling routine.
All code -should be well commented (Date, Developer etc). All procedures and
functions should begin with a comment to explain what the function/procedure performs.
A brief synopsis is sufficient.
‘***********************************************************************
Ex:
‘***********************************************************************
‘Purpose : This function sends a mail with the doc link attached.
‘Input : Input for this function is the person name to whom it has to be send
‘Output : This function will return a true If the mail is sent else false
‘Limitation : This function will not send a internet mail.
‘Developer Name: Mr. Joe
‘Date : 16th Apr '2007
***********************************************************************
If the some code is function is modified. Then that section of the code should be mark
with comments indicating why the change was made, by whom, when. Format for
Change history is:
‘***********************************************************************
‘Change Requested
‘By whom:
‘When :
‘Why :
‘Developer:
‘***********************************************************************
Ex:
‘***********************************************************************
‘Change Requested
'By whom: Mr. Smith
'When : 20th Apr '2007
'Why : Instead of doc link, main document should be opened
‘Developer: Mr. Joe
‘***********************************************************************
Class
The name of the Class should start with a capital letter and must be a meaningful name
that represents the functionality of the class. Header information is mandatory for all the
java class. This information gives a detailed description about the change history and the
creator of the class. Below format shows the structure of the class.
/*
* PACKAGE : <package name>
* FILENAME : <filename>. java
* @VERSION : 1.0
* @AUTHOR :
* DATE :
*
* REV. HISTORY :
*-----------------------------------------------------------------------------
* DATE AUTHOR DESCRIPTION
*
*-----------------------------------------------------------------------------
*/
Immediately following this header would be the package declaration with a comment as a
header. The name of the package differs with respect to each class. For e.g.,
/* PACKAGE DECLARATION */
package com.tcs;
The required module related class files that are imported, to be placed after packages
have been declared. For e.g.,
The required java package classes will follow after the module level class imports (if
applicable). For e.g.,
The required javax package classes will follow after the java class imports (if applicable).
For e.g.,
The required org package classes will follow after the javax class imports (if applicable).
For e.g.,
Then comes the description about the class and the comments written at various levels in
the class.
/**
* DESCRIPTION ABOUT THE CLASS
*/
} //end of method1
For one particular application all the classes should be start with the same name. Suppose
for BorderActivityDtls, classname should be BorderActivityDtlsVogenImpl,
BorderActivityDtlsServiceImpl, BorderActivityDtlsDaoImpl, BorderActivityDtlsVO etc.
Only postfixes should be changed.
JSP Format
Every JSP would start with a common header.
<!--
/*
* FILENAME : <filename>.jsp
* VERSION : 1.0
* AUTHOR :
* DATE :
* REV. HISTORY :
*
* Description about the jsp
*/
-->
Next follows the various classes imported in the JSP. For e.g.,
<%-- IMPORTED JAVA CLASSES --%>
<%@ page language="java" import="com.tcs.ABC,
java.util.ResourceBundle"%>
Next follows the various beans used in the JSP. For e.g.,
Other standards that need to be followed are specified below. This template shows the
sequence in which the specific content resides in a JSP.
<html>
<head>
<title>Sample JSP</title>
BUSINESS LOGIC
</form>
</body>
</html>
Method Names
All method names should start with the appropriate functionality done by that
function and it should be start with small case alphabet. Like if I want to insert
student record then method name should be insertStudentRecord.
Class StudentServiceImpl
{
public ResultObject insertStudentRecord (Map objectArgs)
{
//business logic
}
}
7. TESTING
Testing is the process carried out on software to detect the differences between its
behavior and the desired behavior as stipulated by the requirements specifications.
Testing is advantageous in several ways. Firstly, the defects found help in the process of
making the software reliable. Secondly, even if the defects found are not corrected,
testing gives an idea as to how reliable the software is. Thirdly, over time, the record of
defects found reveals the most common kinds of defects, which can be used for
developing appropriate preventive measures such as training, proper design and
reviewing
The testing sub-process includes the following activities in a phase dependent manner:
UNIT
TESTINGG
MODULE
TESTING SYSTEM
SUB-SYSTEM TESTING
TESTING
ACCEPTANCE
TESTING TESTING
G
The development process repeats this testing sub-process a number of times for the
following phases.
a) Unit Testing.
b) Integration Testing
Unit Testing tests a unit of code (module or program) after coding of that unit is
completed. Integration Testing tests whether the various programs that make up a system,
interface with each other as desired, fit together and whether the interfaces between the
programs are correct. System Testing ensures that the system meets its stated design
specifications. Acceptance Testing is testing by the users to ascertain whether the system
developed is a correct implementation of the Software Requirements Specification.
Testing is carried out in such a hierarchical manner to ensure that each component is
correct and the assembly/combination of components is correct. Merely testing a whole
system at the end would most likely throw up errors in components that would be very
costly to trace and fix.
We have performed both Unit Testing and System Testing to detect and fix errors. A
brief description of both is given below.
Unit Testing
Objective
The objective of Unit Testing is to test a unit of code (program or set of programs)
using the Unit Test Specifications, after coding is completed. Since the testing
will depend on the completeness and correctness of test specifications, it is
important to subject these to quality and verification reviews.
Testing Process
Verify that all boundary and null data conditions are included.
In black-box testing a software item is viewed as a black box, without knowledge of its
internal structure or behavior. Possible input conditions, based on the specifications (and
possible sequences of input conditions), are presented as test cases.
In white-box testing knowledge of internal structure and logic is exploited. Test cases are
presented such that possible paths of control flow through the software item are traced.
Hence more defects than black-box testing are likely to be found.
The disadvantages are that exhaustive path testing is infeasible and the logic might not
conform to specification. Instrumentation techniques can be used to determine the
structural system coverage in white box testing. For this purpose tools or compilers that
can insert test probes into the programs can be used.
Code Coverage
The way to make sure that you have got all the control flow covered is to cover all the
paths in the program during the testing (via white-box testing). This implies that both
branches are exercised for an ‘if’ statement, all branches are exercised for a case
statement, the loop is taken once or multiple times as well as ignored for a while
statement, and all components of complicated logical expressions are exercised. This is
called Path Testing. Branch Testing reports whether entire Boolean expression tested in
control structures evaluated to both true and false.
4) add-To add
documents found
details.
5) Next- to go to
next tab
6) Create
correspondence-to
create
correspondence
User clicks on Message “Please Alert is popped up Pass
submit without enter personal “Please enter at least
entering values in detailt list for one person‘s
Details of period from/to is" details”.
Personal List for should be popped
period from/to up.
field
User clicks on Message Please Alert is popped up Pass
submit without enter the category" “Please select
entering value in should be popped category”.
Category field up
On click of Message Alert is popped up Pass
submit button “<corresponding “<corresponding
without entering field name> is field name> is
any one of the mandatory" should mandatory".
mandatory fields be popped up.
gets refreshed.
On Click of Next Next tab of the Next Tab is Pass
button in the application is Displayed.
application page opened.
On Click of Add Multiple add table Data is inserted into Pass
personal details ofis generated with multiple add table
the suspect button edit link and table is
in the application displayed on the
page screen.
On Click of Add Multiple add table Data is inserted into Pass
documents is generated with multiple add table
obtained details of edit link and table is
the suspect button displayed on the
in the application screen.
page
3) Next- to go to
next tab
4)Create
correspondence-to
create
correspondence
User clicks on submit Message “Please Alert is popped up Pass
without entering enter physical Please enter physical
values in Details of description detail description detail list
physical description list for period for period from/to is".
List for period from/to from/to is" should
field be popped up.
On click of submit Message Alert is popped up Pass
button without “<corresponding “<corresponding field
entering any one of the field name> is name> is
mandatory fields mandatory" should mandatory".
be popped up.
On Click of Next Next tab of the Next Tab is Pass
button in the application is Displayed.
application page opened.
On Click of Reset Confirmation All Fields Of the Pass
button in the Border message is popped Form are Reset i.e.
Activities Details up and clicking on cleared.
form. OK button a page
gets refreshed.
Photo attachment-click Photo is attached Table containing Pass
on the add attachment attachment is
button displayed with view
or remove link.
next tab
4)Create
correspondence-to
create
correspondence
User clicks on submit Message “Please Alert is popped up Pass
without entering enter Contact in “Please enter Contact
values in Details of India detail list for in India detail list for
Contact in India List period from/to is" period from/to is ".
for period from/to should be popped
field up.
On click of submit Message Alert is popped up Pass
button without “<corresponding “<corresponding field
entering any one of the field name> is name> is
mandatory fields mandatory" should mandatory".
be popped up.
On Click of Reset Confirmation All Fields Of the Pass
button in the Border message is popped Form are Reset i.e.
Activities Details up and clicking on cleared.
form. OK button a page
gets refreshed.
field
On click of submit Message Alert is popped up Pass
button without “<corresponding field “<corresponding
entering any one of the name> is mandatory" field name> is
mandatory fields should be popped up. mandatory".
data is displayed.
8. USER MANUAL
The User Manual Guide makes you facilitated to use the software in a very proper manner. For,
Help
This tool is provided with a concept of providing help to solve the queries related to the
project.
Home
Password Change
Logout
This tool is provided to exit from the current form and switch to the login page
Attachment
Calendar
This is the main page of the complete IB module. This page contains all the application
Link, work list, Holiday List etc.
In this form all the Personal details of the accused and Documents Found from the
accused is entered by the user. Both details have multiple add functionality.
In this form all the Contact Details of the accused entered by the user. Here two types of
addresses are there. Present Address and permanent address of the accused.
In this form all the Physical Description of the accused entered by the user. Other then
physical description photo attachment of the accused is there.
In this form Contact Details of relatives or friend of the accused in India entered by the
user. Other then these details photo attachment is also there. More then one friend or
relative’s entry can be done.
In this form Apprehension details of the accused entered by the user. Other then these
details Custody details are also there. More then one Apprehension details and Custody
details entry can be done.
In this form Criminal Antecedents details of the accused entered by the user. Here two
search components are there-Location search (To search location of the Police Station)
and another is Case search(To search case details).
In this form Release details of the accused entered by the user. Release Date, time, Name
and details of the agency handing over and Name and details of the agency hand over all
these details are there in this form.
And after filling this(last form) ,submit the form. If submission is successful then Success
message is displayed else Error massage will display.
In this form just we have to entered particular details to search particular details. If no
parameter is entered and if we press “Search” each and every data is displayed. By
clicking on “edit” link all forms are populated for updation.Here all the entries for India
is searched i.e. crime committed in india.
Location search -To search location of the Police Station (complete address).
Here correspondence is created and lower level officer Forward these details to the higher
level Officer. Higher level officer can approve or Reject this correspondence.
LIMITATIONS
The part of the system can be implemented using the current technology although some
modifications had to be done at various places. At various places some alterations with
the prototypes and functionalities would be done in order to work out the cost constraints
and to cope with the scheduling constraints.
In the Parameterized report limitations like selecting at most up to eight fields, etc would
be implemented. This is done to get optimum balance between the requirements and cost
factors.
This application is used by only Government Officers. Not used by common person. So if
any one wants to know the status of their FIR or complain then its not Possible. This can
be solved by designing a Portal.
In this application search is limited to String or by number. Can not do search by photo
and figure prints.
ENHANCEMENT
In Future we are going to design a Portal through which any person besides Government
officers can check the status of their FIR or Complain Status.
Our system can use MYSQL in back-end. In future we are going to make such system in
which any back end can use.
The setup allows TCS to solve problems by providing solution to the users either over a
telephone or by simulating the problem, logging it, marking it as a defect. The problem
reported could be a defect in the system due to non-satisfaction of requirements or a
change in requirements leading to enhancements. The following are the methods, which
will be used to facilitate the help desk.
• Telephone call support, Fax – the user can call to specified office numbers to get
their queries solved. This facility will be operational during the normal working
hours.
• E-mail support – the user can send their queries through e-mails.
• FAQs – the support will also be offered through Frequently Asked Questions
(FAQs). This is a list that will be compiled from the most frequently encountered
doubts and questions and will be provided to all users at a central location and
updated periodically.
Based on its experience, TCS proposes to extend this helpdesk as a centralized helpdesk
for all Client officers/users so that all calls either related to Intelligence Bureau or
Hardware, Network, Anti-Virus are received here first and later diverted to relevant
vendors working on these profiles. In this case, the centralized helpdesk need to be made
up with personnel from all the vendors working on the above areas at Client. This
helpdesk would the single point of contact for all the help that users require at Client.
Usage of Libraries:
Configuration control would be implemented through the use of Software libraries. These
libraries provide the means of identifying, labeling and capturing software items and
tracking changes to them. Libraries to be used in would be identified depending on their
usage.
The future of the e-Governance is in going wireless. Laptops with Wi-Fi, Mobiles all
wireless devices can be used in e-Governance and can play an important role for effective
administration.
Any new update in Knowledge Bank can be delivered to employees on their wireless
devices. Employees can subscribe to such facilities to get themselves updated at any time,
even when they are not at their desk.
10.1 CONCLUSION
• HDIITS will be helpful to perform paperless work and manage all data.
10.2 DISCUSSION
ITS –IB will be helpful to perform paperless work and manage all data.
This provides easy, accurate, unambiguous and faster data access.
SOA (Service Oriented Architecture) enabling quick and dynamic interfaces between
various government entities and the freedom to choose from competing technologies also.
By making demo application and using online material to study spring and
Hibernate and with help of my mentors I solved it.
• Moreover the lack of practical know-how of these aspects did cause a few
hindrances in early stages of training but later with the help and guidance of team
members it became easier to cope up with these concepts and applications.
• Initially I did face certain hiccups because of the lack of knowledge about the
working patterns in actual software Industry. But with passage of time I coped
up with the pressures of working in a tight schedule trying to beat the clock to
complete given tasks in time slots allotted.
• To be a bit more precise about the learning during the project work I would
like to mention the technical knowledge gained about Java programming,
Spring and Hibernate Frameworks, version control tools like VSS,
development tools like Eclipse and many more such technical aspects.
• The greatest learning curve during these months was learning about the work
culture in software industries, the interpersonal skills gained through the team
work and efficient work patterns to resist against stress and work pressure yet
achieve the targets given.
REFERENCES
WEB RESOURCES
• www.javaworld.com
• www.springframwork.com
• www.javascriptkit.com
• www.java2s.com
• www.w3schools.com
• www.roseindia.net
BOOKS
EXPERIENCE
Throughout the process, I enjoyed working with the organization and it was a great
learning experience. I had the privilege of going through entire Software Development
Life Cycle right from the requirement gathering phase.
Working with a globally renowned CMM level-5 company, was a great learning
experience to learn their standards and application areas. This company has widened my
horizons of knowledge to a very large extent. Till now I was exposed only to the
theoretical side of learning. With this project I have attained a lot of understanding from
the practical point of view.
This immeasurable knowledge gaining experience for me has already sown its seeds into
my career and I hope to carry it with me throughout my professional life.
This firm has not only helped me develop as a programmer but as an individual by letting
me realize my potential and believing in my capabilities and hence boosting my
confidence.
This project will always remain an integral part of my resume and I hope my wonderful
experience here would provide a boost in my career as well.