Table of Contents

Project Summary…………………………………………………………………………...3

Planning Phase

Systems Request…………………………………………………………….………………...6

Feasibility Analysis

Technical Feasibility……………………………………………………………..……….9

Economical Feasibility………………………………………………………………..….10

Project Plan

Size Estimation…………………………………………………………………………11

Work Breakdown Structure…………………………………………………………….13

Gantt Chart……………………………………………………………………….……. 14

Staffing Plan……………………………………………………………………………15

Standards……………………………………………………………………………….15

Risk Assessment…………………………………………………………………...…..17

Analysis Phase

Requirements Gathering Documentation………………………………………………………20

Data Flow Diagrams

Context-level diagram…………………………………………………………….…..24

Level 0 Diagram……………………………………………………………………....26

Level 1 Diagram………………………………………………………………….…...28

Data dictionary………………………………………………………………………………...33

Design Phase

System Architecture…………………………………………………………………………..43

System Components………………………………………………………………………… 44

Structure Chart………………………………………………………………………………. 45

Logical Design (ER- Diagram)……………………………………………………………… 46

Physical Design……………………………………………………………………………..... 47

Design Input Screens………………………………………………………………………… 49

Design Output Screen/Report………………………………………………………………... 50

Program Test Design…………………………………………………………………………. 51

PROJECT SUMMARY

Are you in a safe area? May be your business is down because of the crime rate in your surroundings. According to the U.S. Chamber of Commerce, crime may be a factor in as many as 30 percent of all business failures. Despite other variables that may contribute to increases in criminal activity, the current economic recession will likelyaccelerate criminal activity ranging from shoplifting and robbery to fraud and embezzlement.

So here is the answer for the questions. Houston Crime Consultancy is a private consultancy firm and think tank that focus on crime watch. This association provides useful decision making information to the business as restaurant chains, gas stations, motels, shopping malls and residents like students, retired people, families of employees about the crime happens in Houston. Covers all locations in Houston. Provides complete detailed statistics of crimes and security in Houston.

Houston Crime Consultancy is based in Houston, Texas. It specializes in providing up to date crime reports to the customers with the detailed description and statistic reports of where(street and location), what (type of offence), when (date and time of day) the crime has occurred.

This company will need a web-based information system. This helps the employees to track the day to day crime data from the police department website and create the reports which are sent to the customers on the basis of the membership status. To get the crime data updated into the database,an automated process is required.The system should be easy to use and user friendly.

The functionality expected from the system is listed below:

  • System should allow the customers to register,do secured payments online and view account and billing details.
  • System should update the database automated from the police department website.
  • System should generate monthly reports for the list of default customers and customer data is collected into the database.
  • Automatic alerts should be sent to the members if there is a new crime in the area.

SYSTEM PLANNING

SYSTEM REQUEST

PROJECT SPONSER:Dr Rob

PROJECT TEAM:Vidyasagar Velamala, Jaykanth Kaveripakam, Surya Regmi, Phani Kandala.

BUSINESS BACKGROUND:

Houston Crime Consultancy is based in Houston, Texas. It specializes in providing up to date crime reports to the customers with the detailed description and statistic reports of where(street and location), what (type of offence), when (date and time of day) the crime has occurred. Houston Crime Consultancy is a private consultancy firm and think tank that focus on crime watch. This association provides useful decision making information to the business as restaurant chains, gas stations, motels, shopping malls and residents like students, retired people, and families of employees about the crime happens in Houston. Covers all locations in Houston. Provides complete detailed statistics of crimes and security in Houston.

BUSINESS NEEDS:

There is no exiting system for this project. Houston crime consultancy provides all the information about the crimes happen in the Houston with respect to place, offense type, date, time and police beats. The company would like to expand their customer base and hence, would like to develop a web-based information system which should be available to customers 24 X 7.

BUSINESS REQUIRMENTS:

This company will need a web-based information system. This helps the employees to track the day to day crime data from the police department website and create the reports which are sent to the customers on the basis of the membership status.

The functionality expected from the system is listed below:

  • System should allow the customers to register, do secured payments online and view account and billing details.
  • System should update the database automated from the police department website.
  • System should generate monthly reports for the list of default customers and customer data is collected into the database.
  • Automatic alerts should be sent to the members if there is a new crime in the area.

BUSINESS VALUE:

This web-based information system will allow customers to register and view the information to their convenience regardless of time and location. The tangible and intangible values are identified below:

Tangible:

$250,000 in sales from providing online services to the customer.

$75,000 cost reduction in labor expenses because of the automatic management of reports and database.

Intangible:

Available 24 x 7 x 365

This system will increase the popularity of the consultancy.

This system will speed up the business process

Customer Convenience

SPECIAL ISSUES AND CONSTRAINTS:

  • System should be user friendly
  • System should be up 24 x 7
  • System should support secure online transactions
  • System should be compatible with diff. browsers
  • System should automatically update the data records.
  • System should send alerts to the registered customers whenever a crime takes place in Houston.

FEASIBILITY ANALYSIS

The following feasibility analysis has been conducted by Vidyasagar Velamala, Jayakanth Kaveripakam, Surya Regmi and Phani Kandala for the web-based system created for the Houston Crime Consultancy.

TECHNICAL FEASIBILITY

Familiarity with Application:

Risk Level:Low

Creating online an entirely new system.

The IT department has extensive knowledge of similar systems and is capable of developing web-based information system.

External consultants are readily available online to provide technology support in this system.

Familiarity with Technology:

Risk Level:Low

The project will be developed using ASP.NET and SQL for the database.

The developers are mostly familiar with the technologies being used.

Project Size:

Risk Level:Low

The project team likely will include less than 5 people.

Business user involvement will be required.

ECONOMIC FEASIBILITY:

According to the cost-benefit analysis below, the new system is considered to be economically feasible. The figures in cost-benefit analysis represent the tangible benefits.

2010 / 2011 / 2012 / 2013 / Total
Benefits
Increased sales from New Customers / $300,000 / $345,000 / $385,000 / $1,030,000
Reduction in Operational Costs / $50,000 / $52,500 / $57881.25 / $160381.25
Total Benefits / $350,000 / $397,500 / $442881.25 / $1190381.25
Development Costs
Servers / $85,000 / $0 / $0 / $0 / $85,000
Printer / $45,000 / $45,000
Software licenses / $25,345 / $0 / $0 / $0 / $25,345
Server software / $15,985 / $0 / $0 / $0 / $15,985
Development labor / $195,745 / $0 / $0 / $0 / $195,745
Total Development Costs / $367,075 / $0 / $0 / $0 / $367,075
Operational Costs
Hardware / $45,000 / $45,000 / $45,000 / $135,000
Software / $20,000 / $20,000 / $20,000 / $60,000
Operational labor / $115,000 / $125,583 / $145,853 / $386,436
Total Operational Costs / $547,075 / $190,583 / $210,853 / $581,436
Total Costs / $322,015 / $138,000 / $142,500 / $146,243 / $748,758
Total Benefits-Total Costs / ($322,015) / $312,000 / $377,500 / $428,757 / $796,242
Cumulative Net Cash Flow / ($322,015) / ($10,015) / $367,485 / $796,242

PROJECT PLAN

Size Estimation:

Functional point approach for Houston Crime Consultancy

Complexity

Description / Total Number / Low / Medium / High / Total
Inputs / 12 / 3 x 3 / 4 x 4 / 5 x 6 / 55
Outputs / 7 / 2 x 4 / 1 x 5 / 4 x 7 / 41
Queries / 24 / 6 x 3 / 8 x 4 / 10 x 6 / 110
Files / 6 / 2 x 7 / 4 x 10 / 0 x 15 / 54
Program Interface / 11 / 5 x 5 / 3 x 7 / 3 x 10 / 61

Total Unadjusted Function Points (TUFP) : 321

\Overall System / 0 - 5
Database Tables / 3
End User Efficiency / 2
Installation ease / 0
Multiple Sites / 3
Performance / 0
Online Data entry / 2
Online Update / 1
Operational ease / 0
Extensibility / 0

0 = no effect on processing complexity; 3 = great effect on processing complexity)

Processing Complexity (PC) : 11

Adjusted Processing Complexity (APC) = 0.65 + (0.01 * 11) = 0.76

Total Adjusted Function Points ( TAFP) = 0.76 * 321 = 243.96

Lines of Code:

Lines of code are determined based on the programming language chosen. All Programming will be done in Visual Basic.Net. We also determined that this is simple system which carries multiply factor of 0.65. Lines of Code are calculated as follows,

Lines of code = .65 * 30 *243.96 = 4757

Estimate Effort Required:

Effort (in person-months) = 1.4 * 4757 lines of codes

= 6.6598 person-months

Estimate Time Required:

Schedule time (months) = 2.5 * (6.6598) 1/3

= 4.7 months

Work Breakdown Structure

Task Name / Duration / Status
System Planning / 6 days / Completed
Create system Request / 2 Day / Completed
Feasibilty study / 2days / Completed
Technical Feasibility / 1 Days / Completed
Organizational Feasibility / 1 Day / Completed
Economic Feasibility / 1 days / Completed
Develop Project Plan / 2Days / Completed
Size Estimations / 1 Day / Completed
Create work Breakdown / 1 Days / Completed
Develop Work Plan / 1Days / Completed
Create PERT chart / 1 Day / Completed
Create Gnatt chart / 1 Day / Completed
Develop Staffing Plan / 1 Day / Completed
Develop Risk Assesment / 1 Day / Completed
System Analysis / 10 Days / Completed
Requirements Gathering / 4 Days / Completed
Interviews / 2 Days / Completed
Questionnaire / 2 Days / Completed
Develop Data Flow Diagrams / 4 Days / Completed
Create Data Dictionary / 4 Days / Completed
System Design / 20 Days / Completed
Develop System Architecture / 4 Days / Completed
Develop Database Design / 5 Days / Completed
Documentation and Design / 3 Days / Completed
Document and Design Input Screens / 1 Days / Completed
Document and Design output Report / 1 Day / Completed
Document and Design Menu System / 1 Day / Completed
Implementation / 15 Days / Completed
Database development / 10 Days / Completed
Program codes / 5 Days / Completed
User Interface / 2 Days / Completed
Program Testing Results / 3 Days / Completed
Go Live / 5 Days / OnSchedule

WORK PLAN:

GANTT CHART:

STAFFING PLAN:

The Project Team will consist of a Project Lead, a User Interface developer, a Database Developer/Database Administrator, a System Analyst, and a Web Administrator.

Project Lead------Vidyasagar Velamala

System Analyst------Phani Kandala

Database Developer/Database Admistrator------Jayakanth Kaveripakam, Vidyasagar Velamala.

User Interface Developer------Surya Regmi,Jaykanth Kaveripakam.

Web Adminstrator------Phani Kandala,Surya Regmi.

STANDARDS:

  1. Documentation Standards:

The date and project name should appear as a header on all documents.

All margins should be set to one inch.

All deliverables should be added to the project binder and recorded in its table of contents

All text should be Times New Roman and size 12

Bold text should only be used when labeling and should not be used in text

  1. Coding Standards:

- Each file should contain the following basic information:

File Name

Purpose

Last Update Date

- Every program should contain one line of comment for every five lines of code.

- All functions should have a comment listing the purpose of the function.

3. Procedural Standards:

Actual task progress should be recorded in the work plan every Monday morning

by 10 AM.

Project meeting updates will be held weekly on Friday morning at 9:30 am

All changes to a requirements document must be approved by the project

manager.

All deliverables must be approved by the project manager.

4. Specification Requirement Standards:

 Name of the program to be created.

Description of the Programs purpose.

Special calculations that need to be computed.

Psuedocode

Due Date

5 .User Interface Standards:

Date and name of reports should appear at the top in bold.

Labels will appear in bold face text, left justified and followed by a colon.

RISK ASSESSMENT:

RISK #1 : The query to create Regional level reports is complex and if not written

properly, it will slow down the generate reports module and the project team does not have a

member who is highly experience in writing complex queries.

LIKELIHOOD OF RISK / MEDIUM.
POTENTIAL IMPACT ON THE PROJECT / This risk will increase the time to complete database programming task by 35%.
WAYS TO ADDRESS THIS RISK: / For this, the database should be properly designed and normalized. Also, the appropriate indexes should be created and the queries should be tuned. A highly experienced database developer who has Database Administration experience will be brought in for the duration of the project.

Risk#2:The credit card transaction should be secure. The project team does not have experience in implementing online transactions.

LIKELIHOOD OF RISK / MEDIUM
POTENTIAL IMPACT ON THE PROJECT / This risk will increase the time to complete the project by 40%.
WAYS TO ADDRESS THIS RISK: / The system analyst will be sent for training to learn about how to implement security technology. The credit card information from website will be sent to credit card clearing house using the latest 40 or 128-bit Secure Socket Layer (SSL) 3.0 technology which will be encrypted.

SYSTEM ANALYSIS

Systems Analysis:

Requirements Gathering Documentation:

Interview:

Name of System: Houston Crime Consultancy

Date: Aug 1st 2010

Prepared by: Team members

Purpose: To get information about the company requirements

Interview Questions

  1. What does the system need to accomplish?
  2. How many systems will the proposed system need to communicate with?
  3. Who will be the users of the system?
  4. What is the timeline of this project?
  5. Is there any particular crime data?
  6. How do customers interact with the system?
  7. What information has to be included in the reports?
  8. What are some of the problems you face on a daily basis?
  9. What are some of the improvements you would like to see in the way users orders are processed?
  10. How many reports can user can have?
  11. How is it going to help the public and police?

Interview Notes Approved By : Dr Rob
Person Interviewed: Mr. Jay
Interviewer: Miss. Phani Kandala.
Purpose of Interview:
  • Understand the basic requirements of Crime Consultancy.
  • Determine the Business Value of the System
  • Determine uses the proposed system?
Summary of the interview:
  • The complete list of the requirements has been obtained.
  • Important factors which the business owner wished for.
  • Benefits with the proposed system are determined.

Questionnaire:

  1. What is your role in the company?

__Accounting __ Management __ Sales Staff

  1. What would you mainly use the system for?

__Inputting Data __ Looking up Data __ Running Reports

  1. What do you like about the way today’s process work?
  1. On average, how many files do you keep with the customer data?

__ 2 __ 3 __ 4 __5

  1. How comfortable are you with using an online system to enter data?

Suggestions:

Be as specific as possible.

  1. Where is most crime occurring in Houston?
  1. Do you feel user would benefit from being able to request reports and enter user data into an online website?

DATA FLOW DIAGRAMS

CONTEXT DIAGRAM

LEVEL 0 DFD

External Entity

Users

Employees

Police department

Processes

Registration

Report request

Report generation process

Processing data

Data store

User and Employee data

Payment data

Report

Crime data

Membership invoice

LEVEL 0 DFD

LEVEL 1 DFD FOR PROCESS1 ( REGISTRATION)

External Entity

Users

Employees

Processes

Employee Registration

Users Registration

Membership Type

Payment Process

Data store

User and Employee data

Payment data

Membership invoice

LEVEL 1 DFD FOR PROCESS 1 (REGISTRATION)

LEVEL 1 DFD FOR PROCESS 2 (REPORT REQUEST)

External Entity

Users

Processes

Crime rate based on zip code

Automated report generation process

Data store

Report

Crime data

LEVEL 1 DFD FOR PROCESS 2 (REPORT REQUEST)

LEVEL 1 DFD FOR PROCESS 3 (PROCESSING DATA)

External Entity

Users

Police department

Processes

Query Processing

Automated data updating and classification

Data store

Report

Crime data

LEVEL 1 DFD FOR PROCESS 3 (PROCESSING DATA)

DATA DICTIONARY

PROCESS DESCRIPTIONS

PROCESS
Name / Registration processing
Process Number / 1.0
Description / Takes user/employee username and password compares it with the data stored in database if it is valid they are allowed to log in or an error message is displayed
Data Flows OUT: / Allow Login
Decline
Data Flows IN: / User name and Password
PROCESS
Name / Report Processing
Process Number / 2.0
Description / Takes the request for the report from the user and executes it, and sends back to the users.
Data Flows OUT: / Allows zip code and report request
Data Flows IN: / Reports and reports generation
PROCESS
Name / Report generation
Process Number / 3.0
Description / Generating the reports
Data Flows OUT: / Employees take the data from crime dept and then executes the data for the reports
Data Flows IN: / Report types
PROCESS
Name / Processing data
Process Number / 4.0
Description / Data will be processed from the crime data
Data Flows OUT: / Employees gets the crime data
Data Flows IN: / Emp ID
PROCESS
Name / Employee Registration Process
Process Number / 1.1
Description / Employee can register in the process ( new employee or current employee
Data Flows OUT: / Employee get a response from the system
PROCESS
Name / User Registration Process
Process Number / 1.2
Description / User can register in the process ( new users or current users
Data Flows OUT: / User gets a response from the system
PROCESS
Name / Memberships Type
Process Number / 1.3
Description / Users get a chance to choose one of many registration process
Data Flows OUT: / User gets a response of what type of members he/she wants to be
PROCESS
Name / Crime rate based on zip code
Process Number / 2.1
Description / Users can ask question what happen in a particular date and time
Data Flows OUT: / User gets a response of what happen in particular data and time he/she wants to know.
PROCESS
Name / Automated Report generation process
Process Number / 2.2
Description / Gets data from the police department on day to daybasic
Data Flows OUT: / Users get a periodic reports and alerts to the registered members
PROCESS
Name / Query processing
Process Number / 4.1
Description / Search reports for the answer, users requested
Data Flows OUT: / Gives the report to the users that was requested
PROCESS
Name / Automated data update and classification
Process Number / 4.2
Description / Automatically updates day to day crime Info from the police department
Data Flows OUT: / Classified crime data is stored in the crime data

Data Dictionary