.

Tuesday, February 19, 2019

Police Thesis

CHAPTER 1 Introduction A. background k noneledge of the deliberate In the earliest years man had a herculean to accomplish their task in short period of while. Their fashions was never accurate and efficient since wad had to do their jobs or responsibilities, manual of armsly. Hence, man has unceasingly looked for a better slipway of doing things, for each invention and new phylogeny man had to ex lean their capabilities for making jobs easier and faster so as let off cartridge holder and drive. Mans curiosity brought for the way of automation.Automation can be defined as a engineering concerned with per geting a process by means of programmed commands combined with automatic feedback control to go through proper execution of the instructions. The development of this technology has become an increasingly restricted on the mathematical function of reck whizzrs and computer related technologies. Advanced placements represent a level of capability and performance that surpass in many ways the abilities of gay to accomplish the same activities.manual of arms procedures in performing legal proceeding cause problems which results to delay in the generation of reports, consume a lot of time in reputationing culture and retrieving of files. One kneadup which uses manual lay body and encountered those problems is the office of Philippine issue police (PNP) Roxas Zamboanga del note. The PNP Roxas, Zamboanga del Norte composing diametrical registered of abhorrence and chance from the different barangay of Roxas Zamboanga del Norte. PNP in cooperation of Local regime social unit (LGU) sh all developed and implement programs on go alonging crime and incident.The Local Government unit of measurement (LGU) should provide the needs of the PNP Roxas Zamboanga del Norte. According to the PNP staff, put downing and retrieving study of the incident and crimes happened and generating of report consume a lot of time since those transactions atomic list 18 through with(p) manually. This is the main reason why the researcher wants to conduct a training in the said office. The researcher wants to military service their office by develop arranging softwargon, making their transactions faster and easier to handle. B. Theoretical role position. This written report is anchored on Roger Clarkes (1999) Diffusion of plan Theory.His opening exposes the pattern of adoption, explains the mechanisms by which they occur, and assists in predicting whether a new invention provide be successful. In its early stages, DOI theory was limited to expert in whiz item field, examining and evaluating the diffusion of a process which relevant to their specialization. For example, medical sociologist would look a new technology occurring in health c ar and memorialize the frequent rates of adoption, at the same time education researcher would larn the spread of new teaching methodologist and its inevitable diffusion throughout the inform frame.Other theory is Everett Rogers (1995) Diffusion of Innovation Theory. She defines macrocosm as an idea, practice, or object that is perceived as new by an psyche or other unit of adoption. In matters little, so far as human fashion is concerned, whether or not an idea is objectively new as measured by the lapse of time since its first use or discovery. The perceived newness of the idea jutms new to the single(a), it is trigger.This definition broadly takes on innovation to embroil not only products much(prenominal) as technological innovation and similarly ideas and processes that stimulate the development of human potential and organic lawal processes. Aside from that, Roger also stated in the year two hundred3 that Diffusion of Innovation theory is the process by which an innovation is communicated through certain transmit over time among the members of a social organization. In other words, the field of the diffusion of innovation is the stud y of how, why, and at what rate new ideas and technology spread through cultures.The shoes of PNP, Roxas, Zamboanga del Norte unmatched of the offices that use a manual carcass in making plot comprehend. Their fare motif procedures are through with(p) through the fileing the nurture into the log book. By adopting the theory the researchers had enhanced the federal agency work of the said office and make know as automatize offensive activity and Incidents inscribe Keeping carcass. C. Conceptual Framework This figure below is the conceptual framework of the study which is represented by these three frames. The first frame refers to the formation currently utilize by the office of the PNP Roxas Station which is Manual inscribe System.Through the employ by the Manual Record System problems occur such as time overwhelming and delay in the recording and retrieving of entropy and generation of reports which can be seen in the second frame. Frame twain (2) is the reaso n why the automatize Record System, Frame three (3) give be the focus of the researchers study in order to help the PNP in the impact of their transactions easier and faster. ManualRecordSystem Time consuming and delayed in the recording and retrieving of study and generation of reports Automated Crime and Incidents Record KeepingSystem depend 1.Conceptual Framework of the study This figure shows the conceptual framework of the study indicating the present system utilise at the PNP in processing their transactions. The problems they confine encountered and the proposed system that that leave help the PNP solve the problems they have encountered. D. Statement of the problem This study aims to design an Automated Record System at the smirch of PNP Roxas Zamboanga del Norte. This study will try to answer the following 1. What are the problems encountered in the Manual Record System at the Office of the PNP Roxas? 2. What system can be made to stub out those problems?E. Objec tives of the Study This study will be conducted in order to 1. let out the problems encountered in the PNP Roxas. 2. Develop a system that could eliminate those problems. F. Scope and terminus ad quem This study was conducted at the Office of the PNP, Roxas Zamboanga del Norte. The study was focused on the identify report, encoding incidences, crimes and generating reports. This study was conducted during the second semester of the SY 2011-2012. G. Significance of the Study The researcher conducted a study on Automated Record System at the Office of the PNP, Roxas Zamboanga del Norte.This study will aim to help the force out prudent in the crimes and incident records and in the generation of reports to reduce time am effort in recording and retrieving of files. Through this Automated Record System, time consumed in recording data of the crimes, incidence and delays in the generation of reports encountered by the someonenel will be reduced if not positively eliminated. For th e researcher, this study will enhance their knowledge regarding system development For the future researchers, this study will serve as their reference in conducting system study. H. Operational definition of Terms Activities or Programs.This refers to the different activities of the PNP like monthly assembly, police drill, etcetera Admin. The one who is in charge and provides the recruitment selective data. Alert Team. The One who is responsible on responding incidents. Finance. The one that responsible on financing matters. Intelligence fragment. The one who is responsible on secret record movement and illegal activities of the community. detective. The one who is responsible on investigative matters. Operation. The one who is responsible on running(a) function PCR. natural law Community Relation the one who is responsible of the alliance of the community and police.Radio Operator. The one who is responsible in transmitting and receiving tuition. gunpoint fib. A report regarding to a happened incidents or crimes. Warrant & Subpoena Server. Te one who is responsible on issuing warrant and subpoena. Chapter 2 redirect examination of Related Literature As we continue to barrel through the information age, it is hard to imagine conducting business without computers. Each solar twenty-four hour periodlight, millions of people working in offices and homes around the world depend on computer technology to do their jobs efficiently and economically.To truly understand the computers history involves a daunting journey through mathematics, physics, and electrical engineering through binary code, Boolean logic, real time, magnetic core memories, floating-point numeral notation, transistors, semiconductors, integrated circuits, and much, mire more. Luckily, near office workers do not need to understand this mixed history to use computers and the dizzying array of bundle programs they execute. When computers were first developed roughly fifty year s ago, the people who programmed them considered the task quite maddening.Fortunately, learning to use a personal computer today is a good deal as fair as spending a few hours reading an instruction manual or following a hands-on tutorial. In recent years, computer technology has been incorporated into a wide range of existumers and industrial product. computing devices are routinely used into word processing, email, depiction games, and other application that rent repetitive tasks that can be automated. The offices and government institutions mentioned below are among the deoxyguanosine monophosphate of offices where application for membership are automated.One example is the Department of Social eudaemonia and Development. They are currently development the e-Donation Management System through a Memorandum of Agreement (MOA) with Globe X-Change Inc. (GXI) and Memorandum of Understanding (MOU) with the National Computer Center (NCC). The DSWD e-Donation Management System a ims to provide the donor community a more convenient and cost-effective option of giving cash gift through the use of technology, such as short messaging serve SMS or text message, as well as via online or internet.Likewise, it is a costume-designed turnkey solution that delivers, managers, and reconciles contri stillion and donations via text online transactions, working on a banking industry-standard ICT security environment, and a stable and scalable database system. This system takes the nature of an electronic payment system which is efficient and transparent, as well as in full received trough donation. another(prenominal) is Tricare records-processing system. The TED system helps civilian providers get paying(a) promptly for the services they provide to Tricare beneficiaries outside of military treatment facilities.Records are touch for provider payments in less than 24 hours in most cases. The ease and speed of the TED system gives providers an incentive to participate in Tricare. change magnitude participation in Tricare networks provides beneficiaries better access to health care. By positive and analyzing the information in each records, the TED system allows providers payments to occur promptly and helps prevent payment of duplicate, fraudulent or erroneous claims. The information in the TED system provides data for developing health care treads and budgets projection.TED system staff members have tasteful more than $140 billion of purchased services for Tricare beneficiaries worldwide since cc4. The Government Services Insurance System also uses the E motorcard System in which using your eCard plus, you can check your GSIS records, renew your active status (for Pensioners), and even concur for GSIS loans, when you go to any emailprotected kiosk installed in all GSIS offices and other study government offices all over the country and manage your eCard Plus standard pressure account or pay bill online.Also the electronic medical record ( EMR) is a computerized medical record created in an organization that delivers care, such as a hospital and doctors surgery. Electronic medical records tend to be part of a local stand-alone health information system that allows storage, retrieval and modification of records. Aside from that the Records management, or RM, is the practice of maintaining the records of an organization from the time they are created up to their eventual disposal. This may include classifying, storing, securing, and conclusion (or in some cases, archival preservation) of records.A record can be every a tangible object or digital information for example, fork up certificate, medical x-rays, office documents, databases, application data, and e-mail. Records management is primarily concerned with the proof of an organizations activities, and is usually applied according to the cheer of the records rather than their carnal formal. Haryana Government is also using a system cognise as Haryana Land Reco rd Information System. This system is a base software system used by the Haryana government for the computerization of pour down records in its tehsils. It was developed by NIC Haryana state whole.Chapter 3 Methodology A. Settings of Study One of the first section citizens read in the local newspaper is the police spot report which contains information on crimes and incident that could chance upon them directly. The kind of information provided, however, largely depends on the publication. Local newspapers typically revue these records, called spot and reports and print the crimes and incidents happen. Many police departments maintained a written daily spot report. A police report is a record of crimes and incident and committed in a certain area during a certain period of time. police agencies are required to keep a record of daily activities that can be inspected by the public. So as a police investigator, a factual, precise, accurate information must be stick on in the poli ce spot record and its depends upon the agency what type of information they want publish. Police spot report in certain cases, credit line a suspects name, age and address. A name of the victim or complaining party might also be included, but police might avoid providing additional of information if discretion is warranted. Where the crime occurred(at a residence, a business or elsewhere) should be noted as well.Likewise, if a vehicle was damaged or an item was stolen, those things might also be noted. This are the information to be put ind in the system to devote it easy to find the crimes in the previous recorded incidents. The purpose of a police spot report is to provide an accurate written account of a police police officers observations during the investigation of a abominable incident. A police spot report can only be written by the officer(s) involved in the investigation of an incident. Each officer who makes a report must swear to its accuracy by sign it.The purpo se of making a police spot report into database is to make the investigator easy to find or locate the file that being input in the previous record. PNP soul The figure below shows the organizational structure of the Office of the PNP. ADMIN Operation Radio Operator Intelligence Division Warrant/Subpoena Server PCR SALAAM Alert Team Investigator Finance intention 2 Organizational Chart The organizational graph of the Office of the Philippine National police Roxas Zamboanga del Norte. This figure shows the hierarchy surveillance at the Office of the Philippine National Police (PNP). B.Research Design and functioning of the Study predication letter was sent to the Office of the Philippine National Police (PNP) asking permit to conduct a study in their office. It was followed with the distribution of questionnaire and the conduct of an interview. The researchers in return were provided useful bills such as the organizational structure and different forms like limelight distin guish form and the master refer of the Crimes and Incidents. The researcher have also browsed the internet to fill some related literatures as their basis for the study. The preparation of the manuscript for the system proposal followed.Upon approval, the researcher started to design an Automated Crimes and Incident Record System. Figure 3 on the next page shows the Gantt chart that reflects he work plan in developing a system. damage and benefits depth psychology was made to determine the affordability and worthiness of the system. Gantt chart (Work Plan Schedule) Planned starting see September 2011 Number of Months Activities Sept Oct Nov Dec Jan Feb March Apr 1.Conducting aninterview 2. Planning 3. job Definition 4.System analysis 5. Presentati on of the proposal Planned completion visit April 2012 Figure 3 (Gantt chart) This chart shows the work plan schedule in developing the system.Different activities were distinguishinged in order to determine the coverage of the certain activity. This chart also shows when the activities begin and end. C. selective information Gathering Procedures The first procedure done by the researchers was conducting an interview to some of the staff of (PNP) for them to know how the PNP Officer processes the Record of Crime and Incidents and what are the problems encountered with regards to the transaction mentioned. When the reserchers found out that the office transactions are done manually, they sent a letter of indicate to the PNP officer.When the permission was granted, they conducted a formal interview to the PNP Officer , at the same time the questionnaire were given in order to gather m ore information Another way in which the researchers collected data was browsing the internet and reading some books. The researchers then prepared the proposal for presentation. D. Research Instruments Interview. A tool that was used to gather additional information on how the PNP Officer processed the Crime and Incidents Records. Questionnaires. A tool that was used to collect valuable information from the PNP Officer regarding the flow of processing the Records of Crime and Incidents.Observation. A tool that was also used to gather information by observing on how the Crime and Incidents Records is being done at the Office of the PNP. Journal. A tool that was used to record all observation and investigations done by the researchers so that they will be guided in the preparation and the final presentation of the proposal. imitate tool. A tool that was used to describe the internal and outer behavior of the system. It was composed of two influences which is the essential and beha vioral lesson. The environmental model describe the external behavior of the system. E. information Analysis data gathered from the research interview was cautiously analyzed and interpreted through the cost and benefit analysis. approachs and Benefits estimates and totals at the equivalent money value of the benefits and cost of this system to establish whether this system is worthwhile and affordable to use. The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefits analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the other one is the strategic benefits which are an opportunity to scavenge few clerical people as the ability to let the organization do things what would be doable with the c urrent system. F. Cost and Benefit Analysis The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefit analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the other one is the strategic benefits which are an opportunity to save few clerical people as the ability to let the organization do things what would be possible with the current system. System Development Cost visual Basic 6. 0Php 9,250. 00 Consultant Fee Php 9,025. 00 TotalPhp 18,275. 00 Present System one-year run Cost Office SuppliesPhp 15,465. 00 ElectricityPhp 2,564. 00 hardware MaintenancePhp 2,000,00 TotalPhp 20,029. 00 Proposed System yearbook Operating Cost SuppliesPhp 7,560. 00 ElectricityPhp 3,600. 40Hardware MaintenancePhp 2,1 00. 00 Total Php 13,260. 40 yearbook Operating CostPhp 13,260. 40 Present Annual Operating Cost A. Supplies 1. Ink (6 tubes/yr 1,130/tube)Php 6,780. 00 2. ornamentation Cartridge (5 boxes/yr 145. 00/box)Php725. 00 3. Bond Paper (5 rims (US long)/yr 240. 00/rimPhp 1,200. 00 (5 rims(US short)/yr 235. 00/rimPhp 1,175. 00 4. stapler (1 pc/yr 145. 00/pcPhp 145. 00 5. Stapler Wire (30 boxes/yr 50. 00/box)Php 1,500. 00 6. Folder (30 pcs/yr 8. 00/pc)Php 240. 00 7. Fastener (15 boxes/yr 150. 00/boxPhp 2,250. 00 8. Puncher (1 pcs/yr 220. 00/pcPhp 220. 00 9. ballpen (30 pcs/yr 8. 00/pc)Php 240. 00 10. fluid Erasure 1 bot. /yr 38. 00/pcPhp 38. 00 Total Php 14,513. 00 Electricity (Annual Consumption) No. of processor 1 No. of Monitor 1 No. of printer 1 Monitor Type Monochrome Working Days 200 familiar Charge 3. 95 Hours Used/Days 6 System Unit spot Consumption/Day (6 hrs/ day * 400 west) 2,400 watt/day HP Printer power Consumption/day (6 hrs/day * 90 watt) 540 watt/ day Monitor Power Consumption/ day (6 hrs / day * 30 watt) 180 watt / day Watt used for by device per day 2,400+540+180=3,120 wattsWatt used for all device / yr (3,210 * 200) 624,000 watts / yr kilowatt used / yr (624,000 watts / 1000) 624 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) =3,120 * 200 =624,000 Amount Due = (kilowatt / yr) * Generation Charge =624 *3. 95 Php 2,464. 80 Proposed System Annual Operating Cost B. Supplies 11. Ink (3 tubes/yr 1,130/tube)Php 3,390. 00 12. Ribbon Cartridge (2 boxes/yr 145. 00/box)Php 290. 00 13. Bond Paper (4 rims (US long)/yr 230. 00/rimPhp 920. 0 (4 rims(US short)/yr 225. 00/rimPhp 900. 00 14. Stapler (1 pc/yr 145. 00/pcPhp 145. 00 15. Stapler Wire (20 boxes/yr 50. 00/box)Php 1,000. 00 16. Folder (22 pcs/yr 8. 00/pc)Php 176. 00 17. Fastener (12 boxes/yr 150. 00/boxPhp 1,800. 00 18. Puncher (1 pcs/yr 220. 00/pcPhp 220. 00 19. Ballpen (18 pcs/yr 8. 00/pc)Php 144. 00 20. Liquid Erasure (1 bot. /yr 38. 00/pcPhp 38. 00 Total Php 9,02 3. 00 Electricity (Annual Consumption) No. of CPU 1 No. of Monitor 1 No. of Printer 1 Monitor Type Monochrome Working Days 200 General Charge 3. 95 Hours Used/Days 8System Unit Power Consumption/Day (8 hrs/ day * 400 watt) 3,200 watt/day HP Printer power Consumption/day (8 hrs /day * 90 watt) 720 watt/ day Monitor Power Consumption/ day (8 hrs / day * 30 watt) 240 watt / day Watt used for by device per day 3,200+720+240=4,160 watts Watt used for all device / yr (4,160 * 200) 832,000 watts / yr Kilowatt used / yr (832,000 watts / 1000) 832 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) 4,160 * 200 =832,000 Amount Due = (kilowatt / yr) * Generation Charge =832 *3. 95 Php 3,286. 40 Annual Benefit Present System Annual Operating Cost = Php 14,513. 00 little Proposed Annual Operating Cost = Php 9,023 Annual Savings Php 5,490. 00 Table of Annual Net Benefit Year Annual saving (1+i)n Present value Cumulative Value 1 5,490. 00 1. 024 5621. 76 5621. 76 2 5,490. 00 1. 049 57 59. 01 11518. 02 3 5,490. 00 1. 74 5896. 26 17688. 78 4 5,490. 00 1. 100 6039. 00 24156. 00 5 5,490. 00 1. 126 6181. 74 30908. 07 This Table shows the table of annual net benefit. Project in voice from 1-5 the cash flow. This table shows that Present value are computed by acquiring the product of annual saving and (1+i)n while the accumulative value is computed by getting the sum of the present value of that particular year and the cumulative value of the previous year. Where I = pertain rate n = no. of years 3% = interest rate Payback Period 2+ Proposed System Annual Operating Cost- Cumulative Value in 3 Years Present Value in 3 Years The Cost and Benefits Analysis given above will help the Finance officer to decide whether to implement a computerized Land Patent Form System. It shows that the total annual operating cost of the present system is Php 14,513. 00 the researchers analysis reveals that the proposed system is lower operating cost, lower supplies expenses, less physi cal space needed, fewer operators required, faster turnaround time, greater accuracy, more worldwide reports and improves morale-financial benefits school pegs at Php 5,490. 0 annually. Base on the cost-benefits estimates, the office would see a return on each investment in 2 years and seven months. In this case, it is very clear that the expected benefits of the proposed system do exceed the expected cost. G. Hardware and Software Hardware and software requirements are very essential in the automation of the system and they are the component in the system analysis. In choosing hardware factors to be considered include the following ability, affordability, speed and robustness of the hardware to save time and energy. H. Hardware and Software ConfigurationHardware Configuration Computer Personal Computer with Pentium (R) or higher(prenominal) processor Memory 512MB of Random Access Memory or high Display 32bit (1024 x 768 pixels) Monitor video Graphics Accelerator (VGA) or Higher Resolution monitor (Super VGA recommended) Hard Dick Requirements At least(prenominal) 700MB of free space Video Display Adapter 64MB (Any branded video card) Key board Features Standard 101/102-Key or Microsoft PS/2 keyboard Mouse Microsoft mouse compatible pointing device Power Supply AVR (Automatic electromotive force Regulator) 500watts & 220volts outlet UPS (Uninterrupted power Supply) 300watts & 220volts outlet Printer EPSON LQ300+2 (dot matrix printer) MP1600Le (photocopier/printer/scanner) Software Configuration Operating System Microsoft windows 2009 tenebrific edition, Windows 98, Windows XP, SP2, SP3, Windows 2000 Application Software MS Office Programming Language Visual Basic I. Essential Model The essential model is a simulation tool shows what the system must do in order to satisfy the users requirements on how the system is implemented. It consist of two major(ip) components namely the environmental model and behavioral model. I. 1. Environmental modelThe environmental model is modeling tool that defines the boundary and the interaction between the system and the environment. It consists of the rumor of the purpose event list and context diagram. I. 1. 1 Statement of take aim The Manual Crime & Incidents Record System of the PNP Roxas Zamboanga del Norte is use to record up ascertain and edits information almost Crime and Incidents such as Car crash, Robbery etc. and surveying of records. It is also used to generate reports such as morsel discipline. I. 1. 2. pillow slip proclivity The event list is a narrative list of all activities that occur in the environment to which the system responses.It has seven events namely 1. PNP head up request minute publish 2. responder Submitted Spot shroud 3. Provincial Police Office crave Report 4. Provincial Police Requires Report 5. regional Police Office request Report 6. PNP Roxas submits the spot report Responder PNP learning ability Spot Report Spot Report Manual Crime and I ncidents Record Keeping System Note Spot Report chieftain list of crimes and incidents outmatch list of crimes and incidents ensure list of crimes and incidents Master list of crimes and incidents Provincial Office Regional Office Figure 4. The Context Diagram that shows the Automated Crime and incidents Record Keeping System.The figure shows the different external entities in which the system responses. The Responder, PNP head, Provincial Police Office, Regional Police Office are the persons involve in the processing of the Crimes and Incidents record system or information and in generation of reports. Legend magnetic pole the external entities of the singular or group of people. Flows the confederacy between processes. operation it represent various individual functions that system carries out. Data Store submit the hookup of data. Responder Spot Report Spot Report Spot Report agitate Spot Report executeRequest Figure 5. Event itemization 1 PNP Head Request Spot Re port This figure shows that when the PNP Head requires a report, the Spot Report institutionalise and Master List of Crimes and Incidents wedge were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend remainder the external entities of the individual or group of people. Flows the affiliation between processes. surgical process it represent various individual functions that system carries out. Data Store store the sight of data. Responder run of the Spot Report Note Spot Report Master list of crimes and incidentsFigure 6. Event List 2 PNP Head Request Spot Report This figure shows that when the PNP Head requires a report, the Spot Report burden and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Terminal the external entities of the individual or group of people. Legend Flows the union between processes. movement it represent various individual functions that system carries out. Data Store store the collection of data. Provincial Police HeadquartersMaster list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Spot Report File Process Request Figure 7. Event List 3 Provincial Police Headquarter request Master List This figure shows that when an PNP Head submits the Spot Report and Master List file to the Provincial Police Office. Legend Terminal the external entities of the individual or group of people. Flows the conjunctive between processes. Process it represent various individual functions that system carries out. Data Store store the collection of data. Process RequestSpot Report PNP Head PNP Head submits the Spot Report Provincial Police Office Figure 8. Event List 4 PNP Head submits Spot Report This figure shows that when an PNP Head submits the Master List file to the Provincial Police Office. Legend Terminal the external entities of the individual or group of people. Process it repr esent various individual functions that system carries out. Flows the joining between processes. Data Store store the collection of data. Master list of crimes and incidents Regional Police Headquarters Master list of crimes and incidents Spot Report FileMaster list of crimes and incidents Process Request Figure 9. Event List 5 Regional Police Headquarter request Master List This figure shows that when the Regional Police Office requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend Terminal the external entities of the individual or group of people. Process it represent various individual functions that system carries out. Flows the connection between processes. Data Store store the collection of data. Process RequestPNP Head Spot Report PNP Head submits the Spot Report Regional Police Office Figure 10. Event List 6 PNP Head submits Spot Report This figure sho ws that when an PNP Head submits the Master List file to the Regional Police Office. Legend Terminal the external entities of the individual or group of people. Flows the connection between processes. Process it represent various individual functions that system carries out. Data Store store the collection of data. 1. 2 Behavioral Model This model is primary concern on the internal behavior of the system to interest with the environment.This model includes Data Flow diagram, Process specifications and Data dictionary. The behavioral model includes the following 1. 2. 1 Data flow diagram (DFD) are used to describe how the system transforms information. They define how information processed and stored and identify how the information flows through the processes. 1. 2. 2 Data dictionary specify relationship between each of said user application. Program and said sets of data stored in said database associated with each of said user application programs. 1. 2. 3 Process Specificati ons a step by step flow of transaction on each process.Top Level Data Flow Diagram 1. Process entering of Spot Report 2. Process Request Spot Report File Spot Report Spot Report Master list of crimes and incidents Spot Report File Spot Report Master list of crimes and incidents Figure 11. This figure shows entire flow of the data through the system. It implies how the transaction is processed and described how the different process involved. Data Store store the collection of data. Flows the connection between processes. Process it represent various individual functions that system carries out. Terminal the external entities of the individual or group of people.Legend 1. Process composure of Spot Report Spot Report Spot Report File Spot Report Figure 12 Process Submission of Spot Report This figure shows that during the process of Submission of Spot Report. Legend Terminal the external entities of the individual or group of people. Flows the connection between processes. Pr ocess it represent various individual functions that system carries out. Data Store store the collection of data. Spot Report Master list of crimes and incidents 2. Process Request Master list of crimes and incidents Spot Report Spot Report File Figure 13Process Request This figure shows that during the Process of Request and Release of Spot Report and Master List File of Crime and Incidents. Legend Terminal the external entities of the individual or group of people. Data Store store the collection of data. Process it represent various individual functions that system carries out. Flows the connection between processes. J. 2. Data Dictionary Alphanumeric=* either number or letter or combination of both* Address=*address of the person where involve in an incidents or crime Character=*a letter, number and special percentage*sContact No. =*Contact No. of Person make emailprotectednumeric Date =*(mm/dd/yy)* emailprotectednumeric Name =Name of person emailprotectedcharacter Numer ic =*a number (0-9)* Request information =*an information of a particular crime or incidents* emailprotected alphameric Record =*It refers to all the information of the requested item which is being inputted by Responder* emailprotectedalphanumeric Record File =*refers to the file in which all the record information about the Crime and Incidents is stored. This file is also used during retrieval of information* alphanumeric Spot Report =*refers to the file in which all the record information about the Crimes and Incidents is stored. This file is also used during retrieval of information* emailprotectedalphanumeric =Full name+age+address+sex+time+date+place+evidence+Materials+summary of the incidents J. 3 Process Specification Process 1 Submission of Spot Report jump Open Spot Report File If Close Close Spot Report File End If End Process 2 Process Request Begin Open Spot Report File If Close Close Spot Report File End If End

No comments:

Post a Comment