0% found this document useful (0 votes)
28 views

Notes

This document describes a project report for a Missing Person Identification System. The system utilizes web technologies to provide an online platform for reporting missing persons, searching for relevant information, and aiding in identification efforts. It consists of a database to store details of missing persons and enables efficient search functionality. The system aims to leverage the power of web technologies to create a centralized and accessible platform for reporting and identifying missing individuals.

Uploaded by

srihemabiccavolu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Notes

This document describes a project report for a Missing Person Identification System. The system utilizes web technologies to provide an online platform for reporting missing persons, searching for relevant information, and aiding in identification efforts. It consists of a database to store details of missing persons and enables efficient search functionality. The system aims to leverage the power of web technologies to create a centralized and accessible platform for reporting and identifying missing individuals.

Uploaded by

srihemabiccavolu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

A Project Report

on
MISSING PERSON IDENTIFICATION SYSTEM

Submitted in partial fulfillment of the


requirements for the award of the
degreeof

MASTER OF COMPUTER APPLICATIONS


SUBMITTED BY
SHIEAK APSHA MADEENA
(21P31F0058)
Under the Esteemed Guidance of
Mr.K.C.Pradeep, M.Tech
Assistant Professor

DEPARTMENT OF MCA

ADITYA COLLEGE OF ENGINEERING &TECHNOLOGY


(Approved by AICTE, Affiliated to JNTUK, Kakinada & Accredited by NBA, NAAC with ‘A+')
Recognized by UGC under the sections 2(f) and 12(b) of the UGC act 1956
Surampalem-533437, East Godavari District, Andhra Pradesh.
2021-2023
ADITYA COLLEGE OF ENGINEERING &TECHNOLOGY
(Approved by AICTE, Affiliated to JNTUK, Kakinada & Accredited by NBA, NAAC with
‘A+')Recognized by UGC under the sections 2(f) and 12(b) of the UGC act 1956
Surampalem-533437, East Godavari District, Andhra Pradesh.
2021-2023

DEPARTMENT OF MCA

CERTIFICATE

This is to certify that the project work entitled, “Missing Person Identification
System” is a bonafide work of Shieak Apsha Madeena bearing Regd.No: 21P31F0058
submitted to the faculty of Master of Computer Applications, in partial fulfillment of the
requirements for the award of the degree of MASTER OF COMPUTER
APPLICATIONS from Aditya College of Engineering & Technology, Surampalem for the
academic year 2022-2023.

Project Guide Head of the Department


Mr.K.C.Pradeep, M.Tech Mr.R.V.V.N.BheemaRao, M.Tech
Assistant Professor, Associate Professor,

Department of MCA, Department of MCA,

Aditya College of Engg & Tech, Aditya College of Engg & Tech,

Surampalem-533437. Surampalem-533437.

External Examiner
DECLARATION
I here by declare that the project entitled “MISSING PERSON IDENTIFICATION

SYSTEM” done on my own and submitted to Aditya College of Engineering & Technology,
Surampalem has been carried out by me alone under theguidance of Mr.K.C.PRADEEP.

Place: Surampalem
Date:
(SK. APSHA MADEENA)
21P31F0058
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mention of people who made it possible, whose constant
guidance and encouragement crowned our efforts with success. It is a pleasant aspect that I
have now the opportunity to express my gratitude for all of them.

The first person I would like to thank is my guide Mr.K.C.Pradeep, M.Tech Assistant
Professor, Aditya College Of Engineering And Technology, Surampalem, His wide
knowledge and logical way of thinking have made a deep impression on me. His
understanding, encouragement, and personal guidance have provided the basis for this project.
He is a source of inspiration for innovative ideas and his kind support is well known to all his
students and colleagues.

I wish to thank Mr.R.V.V.N.Bheemarao, M. Tech, Head of the Department,


AdityaCollege Of Engineering And Technology, Surampalem, has extended his supportfor
the success of this project.

I also wish to thank Dr.D.Sanjay S, Principal, Aditya College Of Engineering


And Technology, Surampalem, who has extended his support for the success of this project.

I would like to thank all the Management &Technical Supporting Staff for their
timely help throughout the project.
ABSTRACT
ABSTRACT
The missing person identification system using web is an online platform designed to
assist in locating missing individuals. It utilizes web technologies to provide a user-friendly
interface for reporting missing persons, searching for relevant information, and aiding in
identification efforts.
The system consists of a database to store comprehensive details of missing persons,
including personal information, physical characteristics, and last known locations. Users can
report a missing person by submitting relevant information through an online form. The
system enables efficient search functionality, allowing users to query the database based on
various criteria such as name, age, and location. The missing person identification system
using web development is a comprehensive online platform designed to facilitate the
identification and location of missing individuals. This system leverages web development
technologies to create an intuitive and user-friendly interface that allows users to report
missing persons, search for relevant information, and assist in identification efforts.
The system ensures the secure storage and organization of this data for future reference.
The missing person identification system using web development aims to leverage the power
of web technologies to create a centralized and accessible platform for reporting, and
identifying missing individuals. It serves as a valuable tool for individuals, law enforcement
agencies, and communities, ultimately aiding in the timely and successful resolution of missing
person cases.
CONTENTS

PAGE NO.
Chapter 1: INTRODUCTION 01
1.1 Brief Information about the Project 01
1.2 Motivation and Contribution of Project 01
1.3 Objective of the Project 02
1.4 Organization of Project 03
Chapter 2: LITERATURE SURVEY 04
Chapter 3: SYSTEM ANALYSIS 06
3.1 Existing System 06
3.2 Proposed System 06
3.3 Feasibility Study 08
3.4 Functional Requirements 09
3.5 Non-Functional Requirements 10
3.6 System Requirements 12
3.7 Requirements Specification 12
3.7.1 Software Requirements 12
3.7.2 Minimum Hardware Requirements 12
Chapter 4: SYSTEM DESIGN 13
4.1 Introduction 13
4.2 System architecture 13
4.3 Use case Diagram 14
4.4 Class Diagram 18
4.5 Sequence Diagram 20
4.6 Collaboration Diagram 21
4.7 Activity Diagram 21
Chapter 5: TECHNOLOGY DESCRIPTION 24
5.1 Introduction to HTML 24
5.2 Introduction to CSS 25
5.2.1 Applications of CSS 25
5.3 Introduction to Java Script 26
5.4 Introduction to Django 27
5.5 Introduction to Python 28
5.6 Python Features 28
5.7 Introduction to Bootstrap 29
Chapter 6: SAMPLE CODE 33
Chapter 7: TESTING 48
3.8 7.1 Introduction 48
3.9 7.2 Sample Test case Specifications 50
Chapter 8: SCREENSHOTS 52
CONCLUSION 64
BIBLIOGRAPHY 65
LIST OF FIGURES

S.NO FIGURE NO NAME OF THE FIGURES PAGE NO

01 4.2 System architecture 13

02 4.3 Use case diagram 15

03 4.4 Class diagram 19

04 4.5 Sequence Diagram 20

05 4.6 Collaboration Diagram 21


06 4.7 Activity Diagram 23

07 7.2.1 Sample test case table 50

08 7.2.2 Sample test case table 51

09 7.2.3 Sample test case table 51


MISSING PERSON IDENTIFICATION SYSTEM

1. INTRODUCTION
1.1 Brief Information about the Project:
The missing person identification system using web development is a critical application
that harnesses the power of web technologies to assist in locating missing individuals. It
provides a centralized platform where users can report missing persons, search for relevant
information, and contribute to identification efforts. This system leverages the accessibility
and scalability of web development to reach a wider audience and enhance the efficiency of
missing person identification.
Traditionally, the process of reporting and identifying missing persons has been
fragmented and often limited by geographical boundaries. By utilizing web development, this
system breaks down these barriers and allows users from various locations to participate in the
identification process. It serves as a bridge between individuals, law enforcement agencies,
and the community, fostering collaboration and increasing the chances of successful outcomes.
The missing person identification system employs a comprehensive database to store
detailed information about missing individuals. This information includes personal data such
as name, age, and physical characteristics, as well as last known locations and photographs.
The web interface provides an intuitive and user-friendly means for individuals to report
missing persons by filling out online forms with relevant details. This streamlined reporting
process ensures that crucial information is captured accurately and efficiently.
Search functionality is a crucial component of the system, enabling users to query the
database based on specific criteria. Users can search for missing persons using parameters such
as name, age, location, or any available information. The system employs advanced search
algorithms and filters to generate accurate and relevant results. This capability significantly
enhances the identification process by presenting potential matches and aiding in the
comparison of reported cases
The missing person identification system can also incorporate external APIs or databases,
such as law enforcement databases or public records, to augment the available information and
improve the accuracy of matches. By leveraging these additional resources, the system
increases its effectiveness and provides a more comprehensive solution.
Overall, the missing person identification system using web development serves as a vital
tool in the ongoing efforts to locate missing individuals. It harnesses the power of web
technologies to create a centralized and accessible platform, fostering collaboration and
improving the chances of successfully reuniting missing persons with their families
1.2 Motivation and Contribution of the Project:
The Missing Person Identification project aims to address the critical issue of identifying
and locating missing persons. It is motivated by the pressing need to improve the efficiency
and effectiveness of missing person investigations, which can often be challenging and time-
consuming for law enforcement agencies. The project seeks to leverage advancements in
technology and data analysis to provide innovative solutions in this area.
The primary motivation behind this project is to bring closure to families and loved ones
of missing persons. When someone goes missing, it can have a devastating impact on their
family and friends. Uncertainty and lack of information about the whereabouts of a missing
person can lead to emotional distress and prolonged suffering for those left behind. By

1
MISSING PERSON IDENTIFICATION SYSTEM

developing improved methods for identifying missing persons, the project aims to provide
closure to families, helping them find answers and possibly reunite with their loved ones.
The project also recognizes the importance of public safety. In some cases, a missing
person may be at risk or involved in a dangerous situation. Swift identification and location of
missing individuals can aid in their rescue and prevent further harm. By streamlining the
identification process, the project contributes to enhancing public safety and protecting
vulnerable individuals.
Furthermore, the Missing Person Identification project has broader societal implications.
It can assist law enforcement agencies in reducing the backlog of unidentified remains and
missing person cases, thereby improving overall investigative efficiency. The project's
outcomes can also help inform policy decisions and resource allocation related to missing
persons, enabling authorities to allocate their limited resources more effectively.
The project's contributions extend beyond traditional investigation techniques. It leverages
technological advancements such as data analytics, machine learning, and facial recognition to
enhance identification efforts. By developing and deploying innovative tools and
methodologies, the project aims to augment existing investigative capabilities, providing law
enforcement agencies with additional resources to locate and identify missing persons.
In summary, the Missing Person Identification project is motivated by the need to bring
closure to families, enhance public safety, improve investigative efficiency, and leverage
technological advancements. Its contributions lie in its potential to provide answers, protect
vulnerable individuals, inform policy decisions, and offer innovative solutions to the
challenging task of identifying and locating missing persons.
1.3 Objective of the Project:
The objective of the Missing Person Identification project is to develop and implement
effective methods and technologies to improve the identification and location of missing
persons. The project aims to achieve the following specific objectives:
• Enhance identification accuracy: The project seeks to improve the accuracy of
identifying missing persons by leveraging advanced technologies such as facial recognition,
biometrics, and data analytics. By developing robust algorithms and systems, the objective is
to minimize false identifications and increase the likelihood of successful matches.
• Streamline identification processes: The project aims to simplify and streamline the
identification processes used by law enforcement agencies. This includes developing efficient
data management systems, establishing standardized protocols for collecting and sharing
information, and integrating various databases and sources of information to facilitate faster
and more accurate identification.
• Facilitate information sharing: Effective identification of missing persons often
relies on collaborative efforts between different agencies, organizations, and even the public.
The project aims to develop platforms and mechanisms to facilitate seamless information
sharing, enabling the timely dissemination of crucial data across relevant stakeholders.
• Leverage technological advancements: The project seeks to harness the power of
emerging technologies, such as artificial intelligence, machine learning, and data analytics, to
enhance identification efforts. By utilizing these technologies, the project aims to automate
certain aspects of the identification process, analyze large volumes of data more efficiently,

2
MISSING PERSON IDENTIFICATION SYSTEM

and uncover patterns and connections that may aid in locating missing persons.
• Improve investigative efficiency: The objective is to enhance the efficiency of
missing person investigations by providing law enforcement agencies with innovative tools,
methodologies, and resources. This includes developing predictive models to assist in
prioritizing cases, optimizing resource allocation, and reducing the backlog of unidentified
remains and missing person cases.
• Provide closure and support to families: Ultimately, the project seeks to provide
closure to families and loved ones of missing persons. By improving identification methods
and increasing the chances of locating missing individuals, the objective is to offer answers,
peace of mind, and support to those affected by the disappearance of a loved one.
1.4 Organization of the Project:
• Literature Survey: This chapter mainly consists of the background of the project,
possible approaches, introduction, and comparisonof technologies.
• System Analysis: This chapter consists of description of currentsystem, proposed
system, algorithms, and requirement specifications.
• System Design: This chapter mainly consists of modules descriptionand unified
modelling language diagrams: use case diagrams, class diagrams.
• Technology Description: This chapter mainly consists oftechnology used in this
project.
• Sample code: This chapter mainly consists of sample code for fewmodules.
• Testing: This chapter mainly consists of testing techniques and testcases for modules.
• Screenshots: This chapter mainly consists of output screens of thisproject.
• Conclusion: Main conclusion of this project.

3
MISSING PERSON IDENTIFICATION SYSTEM

2. LITERATURE SURVEY
Research on missing person identification encompasses various fields, including forensic
science, biometrics, data analysis, and information systems. Here are some key areas of
literature that have been explored:
1. Missing Persons in a Secure and Free Society: In a study done by Bie, R.,
Nieuwenhuis, C., & Elffers, H. (2017). Identifying. Missing Persons in a secure and free society
is a topic that encompasses the social, legal, and policy aspects related to the occurrence and
management of missing persons cases within a society that values both security and personal
freedoms. It raises important questions about how society responds to the issue of missing
persons while balancing the need for public safety and individual rights.
From a sociological perspective, understanding missing persons involves analyzing various
factors that contribute to their disappearance, such as social inequalities, personal
vulnerabilities, family dynamics, mental health issues, and criminal activities. Sociologists
examine the broader social context and structural factors that may increase the risk of
individuals going missing, such as poverty, homelessness, domestic violence, or involvement
in organized crime.
Efforts to improve the response to missing persons in a secure and free society may include
implementing preventive measures, such as public education campaigns on personal safety and
support programs for vulnerable populations. Additionally, enhancing coordination and
communication among law enforcement agencies, utilizing technological advancements in data
management and identification, and ensuring appropriate support services for families and
friends of missing persons are vital aspects of a comprehensive approach.
Overall, examining missing persons in the context of a secure and free society provides
valuable insights into the social dynamics, policy considerations, and support mechanisms
required to address this complex issue while upholding the principles of safety and individual
freedoms.
2. Social media in missing persons investigations: In a study done by Cassar, D.,
Fahy, D., Horgan, J., & O'Sullivan, C. (2015). Social media has revolutionized the way missing
persons investigations are conducted. It has become an invaluable tool for law enforcement
agencies, organizations, and concerned individuals in their efforts to locate missing individuals.
Through social media platforms, law enforcement agencies can quickly disseminate
information about missing persons, including photographs, descriptions, and relevant details.
This enables widespread sharing of the information, reaching a large audience within seconds.
Social media also allows for the engagement of the public, who can provide tips, sightings, and
other pertinent information that may assist in the investigation. Additionally, law enforcement
agencies can monitor social media activity to gather insights into the missing person's online
presence, contacts, and potential whereabouts. Social media engagement in missing persons
investigations fosters collaboration, generates leads, and provides emotional support to the
families and friends of missing individuals. However, it is crucial to balance the use of social
media with ethical considerations, respecting privacy rights and following established
protocols to ensure responsible and effective utilization of this powerful resource.
3. Missing Persons' Families: In a study done by Fife, T., & Coleman, K. (2015).
Families of missing persons endure unimaginable pain and uncertainty as they navigate through

4
MISSING PERSON IDENTIFICATION SYSTEM

the challenges that come with a loved one's disappearance. The emotional toll can be
overwhelming, as they grapple with a range of intense emotions such as grief, fear, and
helplessness. The absence of closure and unanswered questions further compound their
anguish.
Supporting families of missing persons is crucial. They require access to empathetic and
specialized services, including counseling and therapy, to help them cope with the emotional
and psychological impact. Providing a safe space for them to express their feelings, share their
experiences, and receive guidance is essential.
Practical support is also crucial. Families may need assistance with legal matters, financial
challenges, managing media attention, and accessing resources for their daily needs. Providing
resources and guidance in these areas can alleviate some of the burdens and allow families to
focus on supporting each other and advocating for their missing loved one.
Overall, recognizing the unique needs and challenges faced by families of missing persons is
essential. By providing emotional, psychological, practical, and community support, society
can help alleviate some of the burdens they carry, offering hope and solace during an incredibly
difficult time.
4. Modelling the behavior of missing persons.: Modelling the behavior of missing
persons is a multidimensional task that aims to understand and predict their actions, choices,
and movements during the period they are missing. This process involves analyzing various
factors and patterns to create a comprehensive picture of their behavior:
Personal Characteristics: Understanding the missing person's personality traits, habits, and past
behaviors can provide valuable insights into their potential actions. Factors such as their risk-
taking tendencies, social relationships, and coping mechanisms can influence their behavior
during a period of absence.
Circumstances and Context: Examining the circumstances surrounding the disappearance,
including any known conflicts, recent life events, or significant stressors, can help build a
contextual understanding of their behavior. Factors such as relationship issues, financial
difficulties, or academic/work-related challenges may contribute to their decision-making.
Psychological and Emotional Factors: Consideration of the missing person's mental health
status, emotional state, and any known psychological vulnerabilities can be crucial. Individuals
experiencing emotional distress, depression, anxiety, or other mental health conditions may
exhibit specific patterns of behavior during their absence.
Social Network Analysis: Investigating the missing person's social connections, including
friends, family, and acquaintances, can shed light on potential influences or support systems.
Mapping their social network and identifying key individuals they may turn to or places they
may seek refuge can inform the modeling process.
Geographic and Environmental Factors: Studying the geographical area where the person went
missing, including landmarks, known preferences, and familiarity with the surroundings, can
help predict their possible movements. Knowledge of their routines, favorite places, or hidden
spots may offer insights into potential locations.

5
MISSING PERSON IDENTIFICATION SYSTEM

3. SYSTEM ANALYSIS
3.1 Existing System:
Existing missing person identification systems in web technologies utilize various
approaches and technologies to facilitate the identification and search for missing individuals.
These systems typically involve web-based platforms that allow users to access and contribute
information related to missing persons.
One common approach is the creation of online databases or registries specifically
dedicated to missing persons. These databases provide a centralized repository where
information such as personal details, physical descriptions, photographs, and last known
locations of missing individuals can be stored and accessed by authorized users. Users,
including law enforcement agencies, families, and the public, can search the database, submit
new missing person reports, and provide updates on existing cases.
Some existing systems incorporate advanced search functionalities, allowing users to filter
and narrow down search results based on various criteria such as age, gender, location, or date
of disappearance. Mapping and geolocation technologies are often integrated into these
systems, enabling users to visualize missing person profiles on an interactive map and
potentially identify patterns or clusters.
To enhance visibility and engagement, many systems integrate with social media
platforms, enabling users to share missing person profiles and updates with their networks.
This social media integration helps to amplify the reach and dissemination of information,
increasing the chances of locating missing individuals.
Existing missing person identification systems also prioritize collaboration and
communication among stakeholders. They often include features for users to collaborate, share
information, and discuss leads related to specific missing person cases. Additionally, these
systems may incorporate notifications and alerts to keep registered users informed about newly
reported missing persons or updates on ongoing investigations.
Overall, existing missing person identification systems in web technologies leverage the
power of the internet, databases, search functionality, mapping, and social media integration
to streamline the process of identifying and locating missing individuals, while fostering
collaboration among stakeholders and engaging the public in the search efforts.
3.2 Proposed System:
The proposed missing person identification system in web technologies aims to enhance
and improve the existing methods of identifying and locating missing individuals. It envisions
a comprehensive and user-friendly web-based platform that leverages various technologies to
streamline the process and increase the effectiveness of finding missing persons.
The system will feature a centralized database where detailed profiles of missing
individuals can be created and accessed. This includes capturing essential information such as
personal details, physical descriptions, photographs, last known locations, and any additional
relevant data. The database will be designed for efficient storage, retrieval, and search
capabilities, ensuring quick access to information when needed.
To enhance search functionality, the proposed system will implement advanced filtering
options, allowing users to narrow down search results based on specific criteria like age,

6
MISSING PERSON IDENTIFICATION SYSTEM

gender, physical attributes, and time and location of disappearance. Additionally, the system
will integrate mapping and geolocation technologies to visualize missing person profiles on an
interactive map, providing valuable insights and potentially identifying patterns or areas of
interest.
The proposed system will prioritize user engagement and collaboration by incorporating
social media integration. Users will be able to easily share missing person profiles and updates
across various social media platforms, increasing the reach and visibility of the information
and encouraging the public's involvement in the search efforts.
Communication and collaboration features will enable authorized users, including law
enforcement agencies, families, and the public, to contribute information, report sightings, and
discuss leads related to specific missing person cases. The system will facilitate real-time
communication and provide secure channels for sharing sensitive information.
To ensure privacy and security, the proposed system will implement robust access controls
and encryption techniques to protect sensitive data. User authentication and authorization
mechanisms will be in place to ensure that only authorized individuals can access and
contribute to the system.
Overall, the proposed missing person identification system in web technologies aims to
provide a comprehensive, efficient, and collaborative platform that harnesses the power of
web-based technologies to speed up identifying and locating missing individuals. By
leveraging advanced search capabilities, mapping technologies, social media integration, and
secure communication features, the system aims to increase the chances of successfully
reuniting missing persons with their families or guardians.
Advantages:
User Registration and Authentication: The system allows users to register and create
accounts. Users can log in using their credentials, ensuring secure access to the system's
features and data.
Missing Person Profiles: The system provides a user-friendly interface for creating and
managing missing person profiles. Authorized users, such as law enforcement agencies or
family members, can enter details such as the person's name, age, physical description, last
known location, photographs, and any other relevant information.
Search Functionality: The system incorporates a powerful search engine to enable users
to search for missing persons based on various criteria, including name, age, gender, location,
or date of disappearance. Advanced search options can be included to facilitate more refined
searches.
Reporting and Information Submission: The system allows users to report a missing person
and submit relevant information. This could include uploading photographs, providing
additional details about the disappearance, or sharing any leads or sightings. Users should have
the option to provide contact information for further communication.
Notification and Alerts: The system includes a notification feature to alert registered users
about newly reported missing persons or updates on ongoing investigations. Users can
subscribe to receive notifications based on specific criteria, such as location or age range, to
receive relevant information directly.
Social Media Integration: The system integrates with popular social media platforms to

7
MISSING PERSON IDENTIFICATION SYSTEM

amplify the reach and visibility of missing person reports. Users can easily share profiles and
updates on their social media accounts, increasing the chances of locating missing individuals
through community involvement.
Mapping and Geolocation: The system utilizes mapping and geolocation technologies to
display missing person profiles on an interactive map. This allows users to visualize the
geographical distribution of missing persons, identify clusters or patterns, and provide
location-specific information.
Collaboration and Reporting Tools: The system provides collaboration tools for
authorized users to exchange information, discuss leads, and coordinate efforts. It may include
features such as case management, progress tracking, and the ability to generate reports and
analytics for improved decision-making.
Mobile-Friendly Interface: The system is designed to be responsive and mobile-friendly,
allowing users to access and interact with it seamlessly across different devices, including
smartphones and tablets.
Data Privacy and Security: Strong data privacy measures are implemented to protect
sensitive information. This includes encryption of data, secure access controls, and compliance
with relevant privacy regulations to ensure the confidentiality and integrity of the stored data.
3.3 Feasibility Study:
Technical Feasibility:
Technical Expertise: Evaluate the availability of technical expertise and resources required
to develop, implement, and maintain the system, including web development, database
management, and integration with other technologies.
✓ Infrastructure: Assess the existing infrastructure and determine if it can support the
system's requirements, including server capacity, network bandwidth, and data storage
capabilities.
✓ Compatibility: Consider the compatibility of the system with various web browsers,
operating systems, and mobile devices to ensure broad accessibility and usability.
Economic Feasibility:
✓ Cost-Benefit Analysis: Evaluate the costs associated with developing and maintaining
the system, including software development, hardware infrastructure, licensing, and
ongoing support. Compare these costs against the expected benefits, such as improved
efficiency, reduced search times, and potential lives saved.
✓ Return on Investment (ROI): Calculate the potential ROI based on the estimated time
and resources saved, increased public engagement, and the value of successful
outcomes in missing person cases.
✓ Funding Sources: Identify potential funding sources, such as government grants,
partnerships with organizations, or public donations, to support the development and
operation of the system.
Operational Feasibility:
✓ User Requirements: Identify the specific needs and requirements of the users, such as
law enforcement agencies, families, and the public. Ensure that the proposed system
addresses these requirements effectively and improves operational efficiency in missing
person identification efforts.

8
MISSING PERSON IDENTIFICATION SYSTEM

✓ Stakeholder Buy-In: Assess the level of support and buy-in from key stakeholders,
including law enforcement agencies, government bodies, and community organizations.
Engage them early in the process to understand their needs, gain support, and foster
collaboration.
✓ Training and Adoption: Evaluate the feasibility of training users on the system's
functionalities and ensuring its adoption by the target audience. Plan for user training
sessions and provide user-friendly documentation and support to facilitate smooth
adoption and utilization.
Legal and Ethical Considerations:
✓ Data Privacy: Ensure compliance with applicable data protection laws and regulations
to protect the privacy and confidentiality of the information stored in the system.
Implement appropriate security measures, user access controls, and consent mechanisms.
✓ Ethical Considerations: Address ethical concerns related to the system, such as
responsible use of data, prevention of misuse, and safeguarding the rights and dignity of
missing persons and their families.
Risk Analysis:
Identify potential risks and challenges associated with the implementation and operation of the
system, such as technical issues, data breaches, system scalability, or user adoption.
Develop risk mitigation strategies to minimize the impact of these risks and ensure the system's
smooth functioning.
3.4 Functional Requirements:
• User Registration and Authentication:
Allow users to register and create accounts with appropriate roles and permissions.
Implement secure authentication mechanisms to ensure authorized access to the system.
• Missing Person Profile Management:
Enable authorized users to create, update, and manage missing person profiles.
Capture relevant information such as name, age, physical description, last known
location, photographs, and any distinguishing features.
Provide options for adding additional details about the circumstances of the
disappearance.
• Search and Filtering Functionality:
Implement robust search capabilities to allow users to search for missing persons based
on various criteria, such as name, age, gender, location, or date of disappearance.
Provide filtering options to refine search results based on specific attributes or
characteristics.
• Reporting and Information Submission:
Enable users to report missing persons through an intuitive and user-friendly interface.
Capture information from users, such as contact details, relationship to the missing
person, and any relevant information or leads.
Allow users to upload photographs or other supporting documents related to the missing
person.
• Notifications and Alerts:
Send notifications and alerts to registered users about newly reported missing persons or

9
MISSING PERSON IDENTIFICATION SYSTEM

updates on ongoing investigations.


Allow users to subscribe to specific criteria-based notifications, such as location, age
range, or other relevant attributes.
• Social Media Integration:
Integrate with popular social media platforms to allow users to share missing person
profiles and updates, increasing visibility and engagement.
Provide easy-to-use sharing options to encourage the community to participate and
disseminate information.
• Mapping and Geolocation:
Utilize mapping and geolocation technologies to display missing person profiles on an
interactive map.
Enable users to visualize the geographical distribution of missing persons and identify
clusters or patterns.
Allow users to provide location-specific information or sightings.
• Collaboration and Communication:
Facilitate collaboration and communication among authorized users, such as law
enforcement agencies, families, and the public.
Provide features for sharing updates, discussing leads, and coordinating efforts on
specific missing person cases.
Include messaging or commenting capabilities to enable communication and information
exchange.
• Reporting and Analytics:
Generate reports and analytics to provide insights into missing person cases, such as
trends, patterns, or correlations.
Enable authorized users to track progress, analyse data, and make informed decisions
regarding search efforts.
• Data Privacy and Security:
Implement strong data privacy measures to protect sensitive personal information.
Ensure compliance with relevant data protection regulations and establish secure access
controls.
Encrypt sensitive data and implement mechanisms to prevent unauthorized access or data
breaches.

3.5 Non-Functional Requirements:


• Usability:
The system should have a user-friendly interface that is intuitive and easy to navigate.
It should provide clear instructions and guidance to users throughout the system.
The system should be accessible to users with varying levels of technical expertise.
• Performance:
The system should be responsive and provide fast search and retrieval of missing person
records.
It should be capable of handling a large volume of data and user queries without significant
delays.

10
MISSING PERSON IDENTIFICATION SYSTEM

The system should have minimal downtime and high availability to ensure uninterrupted
access.
• Security:
The system should employ robust security measures to protect sensitive personal
information.
It should incorporate encryption techniques to secure data transmission and storage.
Access controls should be implemented to restrict unauthorized access to the system and
its data.
• Scalability:
The system should be able to handle an increasing number of users and growing data
volume over time.
It should be designed to accommodate future expansion or integration with additional
functionalities or modules.
• Reliability:
The system should be reliable and provide accurate and consistent information.
It should have mechanisms in place to handle errors and exceptions gracefully.
Regular backups and disaster recovery plans should be implemented to safeguard data.
• Compatibility:
The system should be compatible with different web browsers, operating systems, and
devices.
It should conform to web standards and guidelines to ensure a consistent experience across
platforms.
• Interoperability:
The system should be designed to integrate with existing databases, systems, or external
APIs for data exchange.
It should support data sharing and interoperability between different stakeholders involved
in missing person identification efforts.
• Compliance:
The system should adhere to relevant legal and regulatory requirements, such as data
protection and privacy laws.
It should comply with ethical guidelines and respect the rights and dignity of missing
persons and their families.
• Performance Monitoring and Logging:
The system should include mechanisms for monitoring performance metrics and logging
system activities for auditing and troubleshooting purposes.
It should provide administrators with insights into system usage, performance bottlenecks,
and potential issues.
• Documentation and Support:
The system should have comprehensive documentation, including user manuals and
guides.

11
MISSING PERSON IDENTIFICATION SYSTEM

3.6 System Requirements:


The missing person identification system in web technologies requires a robust hardware
and software infrastructure. On the hardware side, a reliable server infrastructure with ample
processing power, memory, and storage capacity is necessary to handle the expected user load
and data volume. Additionally, high-speed internet connectivity is crucial for seamless system
operation and efficient data transfer. On the software front, a web server software such as
Apache or Nginx is needed to host the web application and handle HTTP requests. Backend
programming languages and frameworks, such as PHP, Python, or Node.js, are necessary for
data processing, logic implementation, and database integration. A suitable database
management system like MySQL or PostgreSQL is essential for secure storage and retrieval
of missing person data. The frontend requires HTML, CSS, and JavaScript to create a user-
friendly and responsive web interface. Security measures, including encryption protocols for
data transmission, authentication mechanisms, access controls, and intrusion detection
systems, should be implemented to safeguard the system and protect sensitive information.
Integration with external systems or APIs, scalability to handle concurrent user requests, and
compliance with regulatory requirements are additional system requirements. Regular
maintenance, updates, user support, and performance monitoring complete the system
requirements to ensure a reliable and efficient missing person identification system in web
technologies.

3.7 Requirement Specifications:


3.7.1 Software Requirements:
• Operating System : Windows 10
• Front End : HTML, CSS, JAVASCRIPT,
BOOTSTRAP
• Back End : Python – 3.8.0
• Framework : Django
3.7.2 Minimum Hardware Requirements:

• Processor : Intel i3 core


• Speed : 3.60 GHz
• RAM : 4GB
• ROM : 500GB

12
MISSING PERSON IDENTIFICATION SYSTEM

4. SYSTEM DESIGN
4.1 INTRODUCTION:
The system design of a missing person identification system in web technologies
encompasses the planning and structuring of the system's components and functionalities to
achieve its objectives efficiently. The design phase focuses on defining the system's
architecture, data flow, user interface, and integration with various technologies. At its core,
the system architecture establishes the overall structure, including the client-server model
where the web browser acts as the client communicating with the server for data retrieval and
storage. Scalability is a crucial consideration to accommodate future growth and potential
integration with additional modules or external systems. The data model and database design
determine the structure, relationships, and storage mechanisms for the system's data, ensuring
efficiency, security, and privacy through appropriate measures like encryption and access
controls. The user interface design emphasizes creating an intuitive and user-friendly interface,
considering wireframing, prototyping, and graphical elements that prioritize usability,
accessibility, and responsiveness across different devices. Integration with external systems
and APIs is also a key aspect, facilitating the exchange of data with law enforcement databases,
social media platforms, mapping services, or other relevant systems to enhance functionality
and gather additional information. The system design serves as the foundation for
implementing a robust and effective missing person identification system in web technologies.
4.2 System Architecture:

Fig 4.2 System Architecture

Description:
The Missing Person Identification System is designed with a comprehensive system
architecture to efficiently locate and identify missing individuals. The architecture consists of
several key components. Firstly, a centralized database stores detailed information about
missing persons, including photographs, physical characteristics, and relevant case details.
This database is securely accessible to authorized law enforcement agencies, enabling efficient
searching and matching. The system also incorporates a robust search engine that utilizes
advanced algorithms to compare input data against the database, generating potential matches
based on similarities. To enhance the system's effectiveness, facial recognition technology is
integrated, allowing for automatic comparison of facial features between the missing person

13
MISSING PERSON IDENTIFICATION SYSTEM

and potential matches. Additionally, the architecture includes a user-friendly interface for law
enforcement personnel to input and retrieve information quickly, streamlining the
identification process. The Missing Person Identification System's well-structured architecture
optimizes data management, search capabilities, and facial recognition to expedite the
identification of missing individuals and reunite them with their families
Missing Person Identification Systems are:
• Missing person identification systems are technological solutions designed to assist in
the search, identification, and reunification of missing individuals with their families or
guardians. These systems utilize various technologies, including web-based platforms,
databases, and communication tools, to facilitate the collection, management, and
dissemination of information related to missing persons.
• These systems typically involve the creation of comprehensive profiles for missing
individuals, including their personal details, physical descriptions, last known locations, and
photographs. The profiles may also include information about the circumstances of their
disappearance, any distinguishing features, or potential leads.
• The systems provide functionalities such as advanced search capabilities, filtering
options, and mapping features to assist in locating missing persons based on various criteria.
They often integrate with external systems, such as law enforcement databases, social media
platforms, or geographic information systems, to gather additional data or share information
with relevant stakeholders.
• Missing person identification systems also support collaboration and communication
among authorized users, such as law enforcement agencies, families, and the public. They may
include features for reporting missing persons, providing updates, sharing leads, and
coordinating search efforts. Notifications and alerts can be sent to registered users to inform
them about newly reported missing persons or updates on ongoing investigations.
• The primary goal of these systems is to leverage technology to improve the efficiency
and effectiveness of locating missing individuals, increasing their chances of being found and
reunited with their loved ones. They serve as valuable tools for raising awareness, engaging
communities, and fostering collaboration in the search for missing persons.
4.3 Use case Diagram:
Use Case diagrams identify the functionality provided by the system (use cases), the users
who interact with the system (actors), and the association between the users and the
functionality. Use Cases are used in the Analysis phase of software development to articulate
the high-level requirements of the system. The primary goals of Use Case diagrams include:
 Providing a high-level view of what the system does.
 Identifying the users ("actors") of the system.
 Determining areas needing human-computer interfaces.
Graphical Notation: The basic components of Use Case diagrams are the Actor, the Use
Case, and the Association.
Actor An Actor, as mentioned, is a user of the system, and is depicted using
a stick figure. The role of the user is written beneath the icon. Actors
are not limited to humans. If a system communicates with another

14
MISSING PERSON IDENTIFICATION SYSTEM

application, and expects input or delivers output, then that


application can also be considered anactor.
Use Case A Use Case is functionality Provided by the system, Use
Cases are depicted with an ellipse.The name of the use case is
written within the ellipse.
Directed These Associations are used to link Actors with
Association UseCases, and indicate that an Actor
participates in the Use Case in some form.

Behind each Use Case is a series of actions to achieve the proper functionality, as well as
alternate paths for instances where validation fails, or errors occur. These actions can be further
defined in a Use Case description. Because this is not addressed in UML, there are no standards
for Use Case descriptions. However, there are some common templates can follow, and whole
books on the subject writing of Use Case description. A use case diagram is a graphical
depiction of a user's possible interactions with a system. A use case diagram shows various use
cases and different types of users the system has and will often be accompanied by other types
of diagrams as well. The use cases are represented by either circles or ellipses.

Fig 4.3 Use Case Diagram


Use case:
Templates:

Use case name Portal Login

Participating User
actors

15
MISSING PERSON IDENTIFICATION SYSTEM

Flow of events • User accesses the Missing Person Identification


System portal.
• User enters their username and password.
• System verifies the entered credentials.
• If the credentials are valid, the system grants
access to the user.
• User gains access to the system's features and
functionalities.
Pre-condition User has a valid account in the system.
Post condition User is logged into the Missing Person
Identification System portal.
Table 4.3.1: Use case template for Portal Login

Use case name Upload Photo


Participating
User
actors
Flow of events • User navigates to the "Upload Photo" section of
the portal.
• User selects the option to upload a photo.
• User chooses the photo file from their local
device.
• User initiates the upload process.
• The system validates the uploaded photo format
and size.
• If the photo meets the requirements, the system
associates it with the missing person's record.
• The system generates a unique identifier for the
uploaded photo.
Pre-condition User is logged into the Missing Person
Identification System portal.
Post condition The photo is successfully uploaded and associated
with the missing person's record.
Table 4.3.2: Use case template for Upload Photo

Use case name Find Matching


Participating User
actors
Flow of events • User navigates to the "Find Matching" section of
the portal.
• User enters relevant search criteria, such as
physical descriptions, last known location, or any other

16
MISSING PERSON IDENTIFICATION SYSTEM

identifying information.
• User submits the search request.
• The system processes the search query and
compares it with the available data in the database.
• The system retrieves potential matches based on
the search criteria.
• The system presents the list of potential matches
to the user.
Pre-condition User is logged into the Missing Person Identification
System portal.
Post condition The system displays a list of potential matches based
on the user's search criteria.
Table 4.3.3: Use case template for Find Matching

Use case name Get Person Details


Participating User
actors
Flow of events • User navigates to the "Get Person Details"
section of the portal.
• User enters the unique identifier or relevant
search criteria for the missing person.
• User submits the request for person details.
• The system retrieves the detailed information
associated with the missing person's record.
• The system presents the person details to the
user, including physical descriptions, last known
location, and any other relevant information.
Pre-condition User is logged into the Missing Person Identification
System portal.
Post condition The system displays detailed information about the
requested missing person.
Table 4.3.4: Use case template for Get Person Details

Use case name Matching Found or Not


Participating User
actors
Flow of events • User navigates to the "Matching Found or Not"
section of the portal.
• User enters the unique identifier or relevant
search criteria for the missing person.
• User submits the request to check the matching
status.

17
MISSING PERSON IDENTIFICATION SYSTEM

• The system checks its database and searches for


any updates on matching persons.
• If a matching person has been found, the system
provides relevant details and notifies the user.
• If no matching person has been found, the
system informs the user that no match has been
identified.
Pre-condition User is logged into the Missing Person
Identification System portal.
Post condition The system displays the matching status and
provides relevant information, if available, or notifies
the user of the absence of a matching person.
Table 4.3.5: Use case template for Matching Found or Not
4.4 Class Diagram:
Class diagrams identify the class structure of a system, including the properties and
methods of each class. Also depicted are the various relationships that can exist between
classes, such as an inheritance relationship. Part of the popularity of Class diagrams stems from
the fact that many CASE tools, such as Rational XDE, will auto-generate code in a variety of
languages, these tools can synchronize models and code, reducing the workload, and can also
generate Class diagrams from object-oriented code. The class diagram is the main building
block of object-oriented modelling. It is used for general conceptual modellingof the structure
of the application, and for detailed modelling, translating the models into programming code.
Class diagrams can also be used for data modelling. The classes in a class diagram represent
both the main elements, interactions in the application, and the classes to be programmed.
In the diagram, classes are represented with boxes that contain three compartments:
• The top compartment contains the name of the class. It is printed in bold and
centered, and the first letter is capitalized.
• The middle compartment contains the attributes of the class. They are left-
aligned and the first letter is lowercase.
• The bottom compartment contains the operations the class can execute. Theyare
also left-aligned and the first letter is lowercase.
In the design of a system, a number of classes are identified and grouped together in a class
diagram that helps to determine the static relations between them. In detailed modelling, the
classes of the conceptual design are often split into subclasses. In order to further describe the
behavior of systems, these class diagramscan be complemented by a state diagram or UML
state machine
A class diagram is an illustration of the relationships and source code dependencies among
classes in the Unified Modelling Language (UML). In thiscontext, a class defines the methods
and variables in an object, which is a specific entity in a program or the unit of code
representing that entity.
The standard class diagram is composed of three sections:
Upper section: Contains the name of the class. This section is always required, whether
youare talking about the classifier or an object.

18
MISSING PERSON IDENTIFICATION SYSTEM

Middle section: Contains the attributes of the class. ...


Bottom section: Includes class operations (methods).
Class: Classes are building blocks in object-oriented programming. A class is depicted
using a rectangle divided into three sections. The top section is name of class, the middle
section defines the properties of a class. The bottom section List the methods of class
Association: An Association is a generic relationship between two classes and is modelled
by a line connecting the two classes. This line can be qualified with the type of relationship
and can also feature multiplicity rule.
Class diagram describes the attributes and operations of a class and also the constraints
imposed on the system. The class diagrams are widely used in the modelling of object oriented
systems because they are the only UML diagrams, which can be mapped directly with object-
oriented languages. Class diagram is a static diagram. It represents the static view of an
application. Class diagram is not only used for visualizing, describing, and documenting
different aspects of a system but also for constructing executable code of the software
application. Class diagram shows a collection of classes, interfaces, associations,
collaborations, and constraints. It is also known as a structural diagram.

Fig 4.4 Class Diagram

19
MISSING PERSON IDENTIFICATION SYSTEM

Description:
The Missing Person Identification System class diagram depicts the key classes and their
relationships. The diagram includes classes such as Missing Person, Range , Search Criteria,
User and Missing Person system.
4.5 Sequence Diagram:
Sequence diagrams document the interactions between classes to achieve a result, such as
a use case. Because UML is designed for object-oriented programming, these
communications between classes are known as messages. The Sequence diagram lists objects
horizontally, and time vertically, and models these messages over time.
Graphical Notation: In a Sequence diagram, classes and actors are listed as columns, with vertical
lifelines indicating the lifetime of the object over time.
Object Objects are instances of classes and are arranged
horizontally. The pictorial representation for an object is
a class (a rectangle) with the name prefixed by the object
name (optional) and a semi-colon.
Lifeline The Lifeline identifies the existence of
the object over time. The notation for a Lifeline
is a vertical dotted line extending from an
object.
Activation Activations, modeled as rectangular boxes on the
lifeline, indicate when the object isacting.
Message Messages, modeled as horizontal arrows
between Activations, indicate the communications between
object

Fig 4.5 Sequence Diagram

20
MISSING PERSON IDENTIFICATION SYSTEM

4.6 Collaboration Diagram


Like the other Behavioral diagrams, Collaboration diagrams model the interactions
between objects. This type of diagram is a cross between an object diagram and a sequence
diagram. Unlike the Sequence diagram, which models the interaction in a column and row
type format, the Collaboration diagram uses the free-form arrangement of objects as found
in an Object diagram. This makes it easier to see all interactions involving a particular object.
Object: Objects are instances of classes and are arranged horizontally.
The pictorial representation for an object is a class (a rectangle)
with the name prefixed by the object name (optional) and a
semi-colon.
Lifeline: The Lifeline identifies the existence of
the object over time. The notation for a Lifeline is a vertical
dotted line extending from an object.
Activation: Activations, modeled as rectangular boxes on the lifeline,
indicate when the object is acting.
Message: Messages, modeled as horizontal arrows between
Activations, indicate the communications between objects.

Fig 4.6 Collaboration Diagram for Missing Person Identification System

4.7 Activity Diagram:


This shows the flow of events within the system. The activities that occur with in a use case
or an object’s behavior typically occur in a sequence. An activity diagram is designed to be
simplifiedto look at what happens during operations or a process.
Each activity is represented by a rounded rectangle the processing within an activity goes
to compilation and then an automatic transmission to the next activity occurs. An arrow

21
MISSING PERSON IDENTIFICATION SYSTEM

represents the transition from one activity to the next. An activity diagram describes a system
in terms of activities.
Activities are the state that represents the execution of a set of operations.
These are similar to flow chart diagrams and data flow.
Initial state: which state is starting the process?

Action State: An action state represents the execution of an atomic action, typically the
invocation of an operation. An action state is a simple state with an entry action whose only
exit transition is triggered by the implicit event of completing the executionof the entry
action.

Transition: A transition is a directed relationship between a source state vertex and a target
state vertex. It may be part of a compound transition, which takes the static machine from one
static configuration to another, representing the complete response of the static machine to a
particular event instance.

Final state: A final state represents the enclosing composite state's last or "final" state.
There may be more than one final state at any level signifying that the composite state can end
in different ways or conditions.
When a final state is reached and there are no other enclosing states, the entire state machine
has completed its transitions and no more transitions can occur.

Decision: A state diagram (and by derivation an activity diagram) expresses a decision


when guard conditions are used to indicate different possible transitions that depend onBoolean
conditions of the owning object.

22
MISSING PERSON IDENTIFICATION SYSTEM

Fig 4.7 Activity diagram for Missing Person Identification System

23
MISSING PERSON IDENTIFICATION SYSTEM

5. TECHNOLOGY DESCRIPTION
5.1 Introduction to HTML:
In the late 1980's, a physicist, Tim Berners-Lee who was a contractor at CERN, proposed
a system for CERN researchers. In 1989, he wrote a memo proposing an internet-based
hypertext system.
Tim Berners-Lee is known as the father of HTML. The first available description of HTML
was a document called "HTML Tags" proposed by Tim in late 1991. The latest version of
HTML is HTML5, which we will learn later in this tutorial.
Hypertext Mark-up Language (HTML), the languages of the world wide web (WWW),
allows users to produce web pages that included text, graphics and pointer to other web pages
(Hyperlinks).HTML is not a programming language but it is an applications of ISO standard
8879, SGML (Standard Generalized Mark -up Language), but specialized to hypertext and
adapted to the web. The idea behind Hypertext one point to another point. We can navigate
through the information based on out interest and preference. A mark-up language is simply a
series of enclosed within the elements shouldbe displayed.
Hyperlinks are underlined or emphasized works that load to other documents or some
portions of the same document. Html can be used to display any type of document on the host
computer, which can be geographically at a different location. It is a versatile language and
can be used on any platform or desktop. HTML provides tags (special code)to make the
document look attractive. HTML provides or not case –sensitive. Using graphics, fonts,
different sizes, colour, etc. can enhance the presentation of the document. Anything that is not
a tag is part of the document itself.

• HTML stands for Hyper Text Mark up Language


• HTML is the standard mark up language for creating Web pages
• HTML describes the structure of a Web page
• HTML consists of a series of elements
• HTML elements label pieces of content such as "this is a heading", "this is a
paragraph", "this is a link", etc.
• HTML elements tell the browser how to display the content
• The <!DOCTYPE html> declaration defines that this document is an HTML5
document
• The <html> element is the root element of an HTML page
• The <head> element contains meta information about the HTML page
• The <title> element specifies a title for the HTML page (which is shown in the
browser's title bar or in the page's tab)
• The <body> element defines the document's body, and is a container for all the visible
contents, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
• The <h1> element defines a large heading
• The <p> element defines a paragraph

24
MISSING PERSON IDENTIFICATION SYSTEM

Basic HTML Tags:


< ! --- >Specific comments.

<A>…. </A> Creates Hypertext links.

<B>…. </B> Creates Hypertext links.

<Big>…. </Big>Formatted text in large-font.

<Body>…. </Body> contains all tags and text in the Html-document.

<Centre> ...... </Centre>Creates Text.


5.2 Introduction to CSS:
CSS is used to control the style of a web document in a simple and easy way.CSS is the
acronym for "Cascading Style Sheet". This tutorial covers both the versions CSS1, CSS2 and
CSS3, and gives a complete understanding of CSS, starting from its basics to advanced
concepts. Cascading Style Sheets, fondly referred to as CSS, is a simple design language
intended to simplify the process of making web pages presentable. CSS is a MUST for students
and working professionals to become a great Software Engineer specially when they are
working in Web Development Domain. I will list down some of the key advantages of learning
CSS:
Create Stunning Web site - CSS handles the look and feel part of a web page. Using CSS,
you can control the color of the text, the style of fonts, the spacing between paragraphs, how
columns are sized and laid out, what background images or colors are used, layout designs,
Variations in display for different devices and screen sizes as wellas a variety of other effects.
Become a web designer - If you want to start a career as a professional web designer, HTML
and CSS designing is a must skill. Control web - CSS is easy to learn and understand but it
provides powerful control over the presentation of an HTML document. Most commonly, CSS
is combined with the mark up languages HTML or XHTML.
Cascading Style Sheets, fondly referred to as CSS, is a simply designed language intended
to simplify the process of making web pages presentable. CSS allows you to apply styles to
web pages. More importantly, CSS enables you to do this independent of the HTML that makes
up each web page. CSS is easy to learn and understand, but it provides powerful control over
the presentation of an HTML document.
CSS is the language that defines the presentation of a web page. It is used to add color,
background images, and textures, and to arrange elements on the page. However, CSS does a
lot more than just paint a pretty picture. It is also used to enhance the usability of a website.
The image below shows the front page of YouTube. On the left, isa regular rendering of the
page, and on the right, you can see how it looks without CSS.
5.2.1 Applications of CSS:
As mentioned before, CSS is one of the most widely used style language over the web. I'm
going to list few of them here: CSS saves time - You can write CSS once and then reuse same
sheet in multiple HTML pages. You can define a style for each HTML element and apply it to
as many Web pages as you want. Pages load faster - If you are using CSS, you do not need to
write HTML tag attributes every time. Just write one CSS rule of a tag and apply it to all the

25
MISSING PERSON IDENTIFICATION SYSTEM

occurrences of that tag. So, less code


• Easy maintenance - To make a global change, simply change the style, and all
elements in all the web pages will be updated automatically.
• Superior styles to HTML - CSS has a much wider array of attributes than HTML, so
you can give a far better look to your HTML page in comparison to HTML attributes.
• Multiple Device Compatibility - Style sheets allow content to be optimized for more
than one type of device. By using the same HTML document, different versions of a
website can be presented for handheld devices such as PDAs and cellphones or for
printing.
• Global web standards - Now HTML attributes are being deprecated and it is being
recommended to use CSS. So, it's a good idea to start using CSS in all the HTML pages
to make them compatible to future browsers.
It is easier to make the web pages presentable using CSS. It is easy to learn and understand
and used to control the presentation of an HTML document. CSS helps us to control the text
color, font style, the spacing between paragraphs, sizing of columns, layout designs, and many
more. It is independent of html, and we can use it with any XML-based markup language. It is
recommended to use CSS because they are being deprecated. So, for making HTML pages
compatible with future browsers, it is good to start using CSS in HTML pages.
5.3 Introduction to Java Script:
JavaScript is a high-level, often just-in-time compiled language that conforms to the
ECMAScript standard. It has dynamic typing, prototype-based object-orientation, and first-
class functions. It is multi-paradigm, supporting event-driven, functional, and imperative
programming styles. It has application programming interfaces (APIs) for working with text,
dates, regular expressions, standard data structures, and the Document Object Model. The
ECMAScript standard does not include any input/output (I/O), such asnetworking, storage, or
graphics facilities. In practice, the web browser or other runtime system provides JavaScript
APIs for I/JavaScript engines were originally used only in web browsers but are now core
components of some servers and a variety of applications.
The most popular runtime system for this usage is Node.js. Although Java and JavaScript
are similar in name, syntax, and respective standard libraries, the two languages are distinct
and differ greatly in design.
During the period of Internet Explorer dominance in the early 2000s, client-side scripting
was stagnant. This started to change in 2004, when the successor of Netscape, Mozilla, released
the Firefox browser. Firefox was well received by many, taking significant market share from
Internet Explorer.
To this end, Adobe Systems released the Tamarin implementation as an open- source
project. However, Tamarin and ActionScript 3 were too different from established client-side
scripting, and without cooperation from Microsoft, 4 never reached fruition. Meanwhile, very
important developments were occurring in open-source communities not affiliated with
ECMA work. In 2005, Jesse James Garrett released a white paper in which he coined the term
Ajax and described a set of technologies, of which JavaScript was the backbone, to create web
applications where data can be loaded in the background, avoiding the need for full page
reloads. This sparked a renaissance period of JavaScript, spearheaded by open-source libraries

26
MISSING PERSON IDENTIFICATION SYSTEM

and the communities that formed aroundthem. Many new libraries were created, including
jQuery, Prototype, Dojo Toolkit, and Motoes.
Google debuted its Chrome browser in 2008, with the V8 JavaScript engine that was faster
than its competition. The key innovation was just-in-time compilation (JIT), soother browser
vendors needed to overhaul their engines for JIT.in July 2008.
5.4 Introduction to Django:
Django is a high-level Python web framework that enables rapid development of secure
and maintainable websites. Built by experienced developers, Django takes care of much of the
hassle of web development, so you can focus on writing your app without needing to reinvent
the wheel. Django is used for development of different types of websites, in particular, a highly
custom is able app, such as a social media website. Django is a free, open source, high-end
framework written in the famously simple, flexible, and relatively easy-to-learn Python
programming language.
Features of Django Framework:
This is one of the main reasons to start learning Django.
• Python Web-framework
• SEO Optimised.
• High Scalability.
• Versatile in Nature.
• Offers High Security.
• Thoroughly Tested.
• Provides Rapid Development.
Starting a Django project allows you to build your application's entire data model in Python
without needing to use SQL. Using an object-relational mapper (ORM), Django converts
traditional database structure into Python classes to make it easier to work within a fully Python
environment.
Django is the best framework for web applications, as it allows developers to use modules
for faster development. As a developer, you can make use of these modulesto create apps,
websites from an existing source. It speeds up the development processgreatly, as you do not
have to code everything from scratch. Django is a free and opensource web application
framework, written in Python. A web framework is a set of components that helps you to
develop websites faster and easier.
When you're building a website, you always need a similar set of components: a way to
handle user authentication (signing up, signing in, signing out), a management panel for your
website, forms, a way to upload files, etc. Luckily for you, other people long ago noticed that
web developers face similar problems when building a new site, so they teamed up and created
frameworks (Django being one of them) that give you ready-made components to use.
Frameworks exist to save you from having to reinvent the wheel and to help alleviate some of
the overhead when you’re building a new site.
Django can be (and has been) used to build almost any type of website — from content
management systems and wikis, through to social networks and news sites. It can work with
any client-side framework, and can deliver content in almost any format (including HTML,
RSS feeds, JSON, XML, etc). For example, Django provides a secure way to manage user

27
MISSING PERSON IDENTIFICATION SYSTEM

accounts and passwords, avoiding common mistakes like putting session information in
cookies where it is vulnerable (instead cookies just contain a key, and the actual data is stored
in the database) or directly storing passwords rather than a password hash. A password hash is
a fixed-length value created by sending the password through a cryptographic hash function.
Django can check if an entered password is correct by running it through the hash function
and comparing the output to the stored hash value. However due to the "one- way" nature of
the function, even if a stored hash value is compromised it is hard for an attacker to work out
the original password. Django enables protection against many vulnerabilities by default,
including SQL injection, cross-site scripting, cross-site request forgery and click jacking (see
Website security for more details of such attacks). Scalable Django uses a component-
based"shared-nothing" architecture (each part of the architecture is independent of the others,
and can hence be replaced or changed if needed). Having a clear separation between the
different parts means that it can scale for increased traffic by adding hardware at any
level:caching servers, database servers, or application servers.
5.5 Introduction to Python:
Python is a widely used general-purpose, high level programming language.It
was created by Guido van Rossum in 1991 and further developed by the Python
Software Foundation. It was designed with an emphasis on code readability, and its
syntax allows programmers to express their concepts in fewer lines of code.
Python is a programming language that lets you work quickly and integratesystems
more efficiently.
5.6 Features:
• Easy: When we say the word ‘easy’, we mean it in different contexts.
A. Easy to Code:
Python is very easy to code as compared to other popular languages like
Java andC++.
B. Easy to Read:
Being a high-level language, Python code is quite like English. Looking at it, you
can tell what the code is supposed to do. Also, since it is dynamically typed, it
mandates indentation. This aids readability.
• Free and Open-Source:
Firstly, Python is freely available. You can download it from the Python website. Secondly,
itis open source. This means that its source code is available to the public. You can download
it, change it, use it, and distribute it. This is called FLOSS (Free/Libre and Open-Source
Software). As the Python community, we’re all headed toward one goal- an ever-bettering
Python.
• High-Level:
Python is a high-level language. This means that as programmers, we don’t need to
remember the system architecture. Also, we need not manage memory. This makes it more
programmer-friendly and is one of the key python features.
• Object-Oriented:

28
MISSING PERSON IDENTIFICATION SYSTEM

A programming language that can model the real world is said to be object-oriented. It
focuses on objects and combines data and functions. Contrarily, a procedure-oriented language
revolves around functions, which are code that can be reused. Python supports both procedure-
oriented and object-oriented programming which is one ofthe key python features. It also
supports multiple inheritance, unlike Java. A class is a blueprint for such an object. It is an
abstract data type and holds no values.
• Embeddable:
We just saw that we can put code in other languages in our Python source code. However,
it is also possible to put our Python code in a source code in a different language like C++.This
allows us to integrate scripting capabilities into our program of the other language. Large
Standard Library:
Python downloads with a large library that you can use so you don’t have to write your
own code for everything. There are libraries for regular expressions, documentation-
generation, unit-testing, web browsers, threading, databases, CGI, email, image manipulation,
and a lot of other functionality.
• GUI Programming:
Software is not user-friendly until its GUI is made. A user can easily interact with the
software with a GUI. Python offers various libraries for making Graphical user interface for
your applications. For this, you can use Tkinter, wxPython or JPython. These toolkits allow
you for easy and fast development of GUI.
• Dynamically Typed:
Python is dynamically typed. This means that the type for a value is decided at runtime,
not in advance. This is why we don’t need to specify the type of data while declaring it. This
is all about the features of the python programming language.
Web and Internet Development:
Python lets you develop a web application without too much trouble. It has libraries for
internet protocols like HTML and XML, JSON, e-mail processing, FTP, IMAP, and easy-to-
use socket interface. Yet, the package index has more libraries:
• Requests – An HTTP client library
• Beautiful Soup – An HTML parser
• Feed parser – For parsing RSS/Atom feeds
• Paramak – For implementing the SSH2 protocol
• Twisted Python – For asynchronous network programming
5.7 Introduction to Bootstrap:
Bootstrap is a powerful front-end framework that can greatly benefit a missing person
identification system. It provides a range of features and components that contribute to creating
an efficient and user-friendly interface. With its responsive grid system, the system's layout
can adapt to different screen sizes and devices, ensuring accessibility for authorities,
volunteers, and the public.
One of Bootstrap's key advantages is its extensive collection of UI components. These
components, such as buttons, forms, and input fields, can be seamlessly integrated into the
missing person identification system. By utilizing Bootstrap's CSS classes, these components

29
MISSING PERSON IDENTIFICATION SYSTEM

can be styled consistently, resulting in a cohesive and visually appealing user interface. This
enhances the user experience by facilitating easy input and search for information related to
missing persons.
Navigation is crucial in a missing person identification system, and Bootstrap offers an
array of navigation components. Navigation bars, dropdown menus, and sidebars can be
utilized to organize different sections and features of the system. This enables users to navigate
seamlessly through the system, accessing various functionalities and information with ease.
To effectively communicate important updates and notifications, Bootstrap's alert
components are valuable. These alerts can be employed to highlight critical information, such
as new reports, ongoing investigations, or reunification details. By using Bootstrap's alert
components, users can quickly notice and respond to crucial updates, ensuring efficient
collaboration and communication within the system
When displaying detailed information or requesting additional details from users,
Bootstrap's modal components are highly useful. Modals provide a focused and interactive
overlay that allows users to view and enter information without leaving the main interface.
This ensures a seamless user experience and improves efficiency when working with missing
person data.
Bootstrap's customization capabilities are also beneficial for a missing person identification
system. The framework can be tailored to match the system's branding or visual requirements,
ensuring a consistent and unique look and feel. By customizing the styles and components, the
system can maintain its visual identity while providing an intuitive and familiar interface for
users.
Overall, Bootstrap's responsive design, comprehensive UI components, navigation
features, alerts and notifications, modals, and customization options make it an ideal
framework for enhancing the usability and visual appeal of a missing person identification
system. It simplifies the development process and empowers developers to create a seamless
and efficient interface that supports the critical task of identifying and locating missing persons
Features of bootstrap:
Bootstrap is a feature-rich front-end framework that offers a wide range of
components and utilities to streamline web development. Here are some key features
of Bootstrap:
Responsive Grid System: Bootstrap provides a responsive grid system based on a
12-column layout. This grid system allows developers to create responsive and fluid
layouts that automatically adjust to different screen sizes and devices.
Pre-built CSS Components: Bootstrap offers a comprehensive set of CSS
components that can be easily integrated into a project. These components include
buttons, forms, navigation bars, dropdowns, cards, modals, carousels, tooltips, and
much more. They are designed to be reusable, customizable, and consistent across
different browsers.
JavaScript Plugins: Bootstrap comes with a variety of JavaScript plugins that add
interactive and dynamic functionalities to your website or web application. These
plugins handle tasks such as sliders, modals, dropdown menus, tooltips, and form

30
MISSING PERSON IDENTIFICATION SYSTEM

validation. They are built on popular JavaScript libraries like jQuery.


Typography and Styling: Bootstrap provides a typography system that offers a set
of predefined styles for headings, paragraphs, lists, and other text elements. It also
includes CSS classes for text alignment, text color, background color, and spacing,
making it easy to style content.
Responsive Utilities: Bootstrap includes a set of responsive utility classes that can
be used to control the visibility, alignment, and spacing of elements based on different
screen sizes. These utility classes enable developers to create responsive designs and
handle specific layout requirements.
Customization and Theming: Bootstrap allows customization to match your
project's design requirements. Developers can use Sass (Syntactically Awesome Style
Sheets) to modify the default variables and styles, creating a unique look and feel.
Bootstrap also provides an online customization tool where you can select and
download a custom build based on your needs.
Cross-Browser Compatibility: Bootstrap is designed to work consistently across
different browsers and platforms. It takes care of handling browser inconsistencies and
provides a solid foundation for building websites and applications that function well on
various devices and browsers.
Comprehensive Documentation and Community Support: Bootstrap offers
extensive documentation with examples, code snippets, and guidelines to help
developers understand and utilize its features effectively. Additionally, Bootstrap has a
large and active community of developers who contribute to its development, provide
support, and share resources.
These features make Bootstrap a popular choice for web developers, as it simplifies
the process of building responsive, visually appealing, and consistent web interfaces
with less effort. Whether you're working on a small personal project or a large-scale
web application, Bootstrap can significantly enhance your development workflow.
Applications of bootstrap:
Responsive Website Development: Bootstrap's responsive grid system and built-
in components make it an ideal choice for creating responsive websites. It allows
developers to build websites that automatically adapt to different screen sizes and
devices, providing a consistent user experience across desktops, tablets, and
smartphones.
Web Application Development: Bootstrap offers a wide range of UI components
and JavaScript plugins that streamline the development of web applications. Developers
can leverage these components to create intuitive interfaces and incorporate interactive
features such as modals, dropdowns, carousels, and form validation into their web
applications.
Prototyping and Rapid Development: Bootstrap's pre-built components and
responsive grid system make it an excellent tool for rapid prototyping. Developers can

31
MISSING PERSON IDENTIFICATION SYSTEM

quickly assemble and test the visual and interactive elements of a website or web
application, saving time and effort during the initial stages of development.
Mobile-First Development: With the increasing importance of mobile devices,
Bootstrap's mobile-first approach becomes invaluable. By utilizing Bootstrap,
developers can prioritize mobile optimization and ensure that their websites or
applications are designed with mobile users in mind from the outset.
Content Management Systems (CMS): Bootstrap can be integrated into popular
CMS platforms like WordPress, Drupal, and Joomla to enhance the design and
functionality of websites. It provides a consistent and customizable framework for
building themes and templates, allowing developers to create visually appealing and
feature-rich CMS-based websites.
Single-Page Applications (SPAs): Bootstrap can be used in the development of
SPAs, where the entire application resides on a single web page. Its components and
responsive design capabilities enable developers to create dynamic and interactive user
interfaces for SPAs, enhancing the user experience.
Cross-Browser Compatibility: Bootstrap's built-in CSS normalization and
browser compatibility features ensure consistent rendering across different browsers
and platforms. This makes it an excellent choice for projects that require broad cross-
browser support and consistent design across multiple devices.
Custom Design Projects: While Bootstrap provides a default set of styles and
components, it is highly customizable. Developers can override the default styles using
Sass (Syntactically Awesome Style Sheets) and customize the framework to match
specific design requirements, enabling the creation of unique and branded interfaces.

32
MISSING PERSON IDENTIFICATION SYSTEM

6 SAMPLE CODE
1. Index.html :
The "index.html" file is a commonly used default filename for the main HTML file of a
website or web application. It serves as the entry point or the starting page for a website. When
a user accesses a website, the web server typically looks for an "index.html" file in the root
directory of the website and serves it as the initial page.
{% extends 'landing/base.html' %}
{% load static %}
{% block content %}
<!-- ======= Hero Section ======= -->
<section id="hero" class="d-flex align-items-center">
<div class="container">
<div class="row">
<div class="col-lg-6 d-flex flex-column justify-content-center pt-4 pt-lg-0 order-2 order-lg-"
data-aos="fade-up" data-aos-delay="200">
<h1>Even One Missing Person Is One Too Many!</h1>
<h2>Face Find, firmly believes in that, and we are committed to change this by finding
missing people using Computer Vision and Face Recognition Technologies.</h2>
<div class="d-flex justify-content-center justify-content-lg-start">
<a href="#about" class="btn-get-started scrollto">Get Started</a>
<a href="https://youtu.be/onXOQIu5jCg" class="glightbox btn-watch-video"><i
class="bi bi-play-circle"></i><span>Demo Video</span></a>
</div>
</div>
<div class="col-lg-6 order-1 order-lg-2 hero-img" data-aos="zoom-in" data-aos-
delay="200">
<img src="{% static 'landing/img/hero1.png' %}" class="img-fluid animated" alt="">
</div>
</div>
</div>
</section><!-- End Hero -->
<main id="main">
<!-- ======= About Us Section ======= -->
<section id="about" class="about">
<div class="container" data-aos="fade-up">
<div class="section-title">
<h2>About Us</h2>
</div>
<div class="row content">
<div class="col-lg-6">
<p>
The thought of a family member, a friend or someone else you care about going missing can
be terrifying.

33
MISSING PERSON IDENTIFICATION SYSTEM

We at FaceFind help find your loved ones using Face Recognition Technologies. If someone
you know is missing, then,
</p>
<ul>
<li><i class="ri-check-double-line"></i>Register the missing person with us. </li>
<li><i class="ri-check-double-line"></i>We will contact you for a background check.</li>
<li><i class="ri-check-double-line"></i>Once verified, the missing person is added to our
database of missing people.</li>
<li><i class="ri-check-double-line"></i>When volunteers report a suspected missing person,
we use face recognition to identify a potential match with our
database. </li>
<li><i class="ri-check-double-line"></i>If a match is found we will report to the local
authorities and contact you.</li>
</ul>
<a href="{% url 'create_missing_person' %}" class="btn-learn-more">Register
Missing Person</a>
</div>
<div class="col-lg-6 pt-4 pt-lg-0">
<p>
It is estimated that a child goes missing in India every eight minutes. Millions end up in
forced labour, domestic slavery and sex work, in what’s become a lucrative industry.
If you ever suspect a person could have been trafficked this way,
</p>
<ul>
<li><i class="ri-check-double-line"></i>Report the suspected person.</li>
<li><i class="ri-check-double-line"></i>We will cross-verify the report to check its
validity.</li>
<li><i class="ri-check-double-line"></i>Once verified, use face recognition to identify a
potential match with our database of missing people. </li>
<li><i class="ri-check-double-line"></i>If a match is found we will report to the local
authorities and contact the family/guardian. </li>
</ul>
<a href="{% url 'create_reported_person' %}" class="btn-learn-more">Report a
Suspected Missing Person</a>
</div>
</div>
</div>
</section><!-- End About Us Section -->
<!-- ======= Technology Section ======= -->
<section id="services" class="services section-bg">
<div class="container" data-aos="fade-up">
<div class="section-title">
<h2>Technology</h2>
<p>To achieve our goal of finding missing people, we make use of the following

34
MISSING PERSON IDENTIFICATION SYSTEM

technologies,</p>
</div>
<div class="row">
<div class="col-xl-3 col-md-6 d-flex align-items-stretch" data-aos="zoom-in"
data-aos-delay="100">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://getbootstrap.com/">Bootstrap</a></h4>
<p>A free and open-source framework of HTML, CSS and JavaScript, directed at
responsive, mobile-first front-end web development.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-md-0"data-aos="zoom-in"
data-aos-delay="200">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://www.djangoproject.com/">Django</a></h4>
<p>A free and open-source, high-level Python based web framework that enables rapid
development of secure and maintainable websites.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-xl-0"data-aos="zoom-in"
data-aos-delay="300">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://azure.microsoft.com/en-in/services/cognitive-
services/face/#overview">Azure
Face API</a></h4>
<p>An AI service by Microsoft that can detect, identify and analyze faces in images and
videos.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-xl-0"
data-aos="zoom-in" data-aos-delay="400">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://www.sqlite.org/index.html">SQLite</a></h4>
<p>An in-process library that implements a self-contained, serverless,
zero-configuration, transactional SQL database engine.</p>
</div>
</div>
</div>
</div>
</section><!-- End Technology Section -->

35
MISSING PERSON IDENTIFICATION SYSTEM

<!-- ======= Frequently Asked Questions Section ======= -->


<section id="faq" class="faq section-bg">
<div class="container" data-aos="fade-up">
<div class="section-title">
<h2>Frequently Asked Questions</h2>
</div>
<div class="faq-list">
<ul>
<li data-aos="fade-up" data-aos-delay="100">
<i class="bx bx-help-circle icon-help"></i> <a data-bs-toggle="collapse"
class="collapse" data-bs-target="#faq-list-1">What happens after
I register a Missing Person? <i
class="bx bx-chevron-down icon-show"></i><i
class="bx bx-chevron-up icon-close"></i></a>
<div id="faq-list-1" class="collapse show" data-bs-parent=".faq-list">
<p>
Once you have successfully registered a missing person,
we will contact you for a background check followed by
which,
we generate a unique Face ID for the missing person
using Azure's Face API.
When volunteers report a suspected missing person, we
verify and generate a Face ID the same way.
We then use Azure's Find Similar API to identify a
potential match with our database of missing person Face
IDs.
If a match is found we will report to the local
authorities and contact you.
</p>
</div>
</li>
<li data-aos="fade-up" data-aos-delay="200">
<i class="bx bx-help-circle icon-help"></i> <a data-bs-toggle="collapse"
data-bs-target="#faq-list-2" class="collapsed">What happens
after I report a Suspected Missing Person? <i
class="bx bx-chevron-down icon-show"></i><i
class="bx bx-chevron-up icon-close"></i></a>
<div id="faq-list-2" class="collapse" data-bs-parent=".faq-list">
<p>
Once you have successfully reported a suspected missing person, we will cross-verify the
report to check its validity.We then generate a unique Face ID for the missing person using
Azure's Face API, followed by which, we use Azure's Find Similar API to identify a potential
match with our database of missing person Face IDs. If a match is found we will report to the
local authorities and contact the family/guardian.

36
MISSING PERSON IDENTIFICATION SYSTEM

</p>
</div>
</li>
<li data-aos="fade-up" data-aos-delay="300">
<i class="bx bx-help-circle icon-help"> </i> <a data-bs-toggle="collapse" data-bs-
target="#faq-list-3" class="collapsed">How does Azure's Face API work? <i class="bx bx-
chevron-down icon-show"> </i> <i class="bx bx-chevron-up icon-close"> </i> </a>
<div id="faq-list-3" class="collapse" data-bs-parent=".faq-list">
<p>
Firstly, it detects a face in the given image and
generates
a unique identifier string for the detected face in the
image.
Then to check if two images contain the same person, we use the Find Similar API, that
searchs for similar-looking faces given a target Face ID and Face ID array. The API returns a
JSON object containing the matched
Face ID from the given array along with the confidence score.
</p>
</div>
</li>
<li data-aos="fade-up" data-aos-delay="300">
<i class="bx bx-help-circle icon-help"></i> <a data-bs-toggle="collapse"
data-bs-target="#faq-list-4" class="collapsed">This seems
interesting. How can I help? <i
class="bx bx-chevron-down icon-show"></i><i
class="bx bx-chevron-up icon-close"></i></a>
<div id="faq-list-4" class="collapse" data-bs-parent=".faq-list">
<p>
Thank you for your interest. Every help towards finding a loved one gone missing counts.
You can help us in the following ways, <br>
<i class="ri-check-double-line"></i>Please
volunteer to spot suspected missing people and report them. <br>
<i class="ri-check-double-line"></i>Connect us with NGOs working in this space. <br>
<i class="ri-check-double-line"></i>Connect us with relevant state and central
government departments. <br>
<i class="ri-check-double-line"></i>Sponsor hosting fees. <br>
<i class="ri-check-double-line"></i>Sponsor Azure API charges. <br>
<i class="ri-check-double-line"></i>Contact us at [email protected] for more details.
<br>
</p>
</div>
</li>
</ul>
</div>

37
MISSING PERSON IDENTIFICATION SYSTEM

</div>
</section><!-- End Frequently Asked Questions Section -->
<! -- ======= Footer ======= -->
<footer id="footer">
<div class="container footer-bottom clearfix">
<div class="copyright">
&copy; Copyright <strong><span>Face Find</span></strong>. All Rights Reserved
</div>
<div class="credits">
Designed by <a href="https://bootstrapmade.com/">BootstrapMade</a>
</div>
</div>
</footer><!-- End Footer -->
</main>
{% endblock content%}
2. Base.html:
The term "base.html" typically refers to a base or template file used in web development
frameworks that support template engines. In this context, a base.html file serves as a
foundational template that contains common elements shared across multiple web pages within
a website.
% load static %}
<!DOCTYPE html>
<html lang="eng">
<head>
{% block title %}
<title>Missing Person</title>
{% endblock title%}
{% block favicon %}
<link rel="shortcut icon" type="image/png" href="{% static 'favicon/favicon.jpg' %}" />
{% endblock favicon %}
{% block meta %}
{% block meta_charset %}
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
{% endblock meta_charset %}
{% block meta_contentlanguage %}
<meta http-equiv="Content-Language" value="en-US" />
{% endblock meta_contentlanguage %}
{% block meta_viewport %}
<meta name="viewport" content="width=device-width, initial-scale=1.0">
{% endblock meta_viewport %}
{% endblock meta %}
{% block head %}
{% load static %}
<!-- Favicons -->
<link href="{% static 'landing/img/face2.png' %}" rel="icon">
<link href="{% static 'landing/img/apple-touch-icon.png' %}" rel="apple-touch-icon">
<!-- Google Fonts -->

38
MISSING PERSON IDENTIFICATION SYSTEM

<link href = "https://fonts.googleapis.com/CSS? Family = Open+Sans :


300,300i,400,400i,600,600i,700,700i|Jost:300,300i,400,400i,500,500i,600,600i,700,700i|Pop
pins:300,300i,400,400i,500,500i,600,600i,700,700i"
rel="stylesheet">
<!-- Vendor CSS Files -->
<link href="{% static 'landing/vendor/aos/aos.css'%}" rel="stylesheet">
<link href="{% static 'landing/vendor/bootstrap/css/bootstrap.min.css'%}" rel="stylesheet">
<link href="{% static 'landing/vendor/bootstrap-icons/bootstrap-icons.css'%}"
rel="stylesheet">
<link href="{% static 'landing/vendor/boxicons/css/boxicons.min.css'%}" rel="stylesheet">
<link href="{% static 'landing/vendor/glightbox/css/glightbox.min.css'%}" rel="stylesheet">
<link href="{% static 'landing/vendor/remixicon/remixicon.css'%}" rel="stylesheet">
<link href="{% static 'landing/vendor/swiper/swiper-bundle.min.css'%}" rel="stylesheet">
<!-- Template Main CSS File -->
<link href="{% static 'landing/css/style.css'%}" rel="stylesheet">
<!-- icons & illustration -->
<!-- <a href="https://icons8.com">Icons8</a> -->
<!-- <a href="https://storyset.com/web">Web illustrations by Storyset</a> -->
<!-- =======================================================
* Template Name: Arsha - v4.7.1
* Template URL: https://bootstrapmade.com/arsha-free-bootstrap-html-template-corporate/
* Author: BootstrapMade.com
* License: https://bootstrapmade.com/license/
======================================================== -->
{% endblock head %}
{% block style %}
{% endblock style %}
</head>
<body>
<!-- ======= Header ======= -->
<header id="header" class="fixed-top " style="background-color: rgba(55, 81, 126, 0.9);">
<div class="container d-flex align-items-center">
<h1 class="logo me-auto"><a href="{% url 'index' %}" class="logo me-auto"><img
src="{% static 'landing/img/face2.png' %}" alt=""> Missing Person</a></h1>
<nav id="navbar" class="navbar">
<ul>
{% if user.is_authenticated %}
<!-- if user is admin show only home, register, views and logout links -->
<li><a class="nav-link scrollto active" href="{% url 'index' %}#hero">Home</a></li>
<li class="dropdown"><a href="#"><span>Register & Report</span> <i
class="bi bi-chevron-down"></i></a>
<ul>
<li><a href="{% url 'create_missing_person' %}">Register Missing Person</a></li>
<li><a href="{% url 'create_reported_person' %}">Report Suspected Missing
Person</a></li>
</ul>
</li>
<li class="dropdown"><a href="#"><span>View Missing Persons</span> <i
class="bi bi-chevron-down"></i></a>
<ul>

39
MISSING PERSON IDENTIFICATION SYSTEM

<li><a href="{% url 'list_missing_person' %}">View All</a></li>


<li><a href="{% url 'list_missing_person_to_be_verified' %}">To Be Approved</a></li>
<li><a href="{% url 'list_missing_person_with_leads'%}">Leads</a></li>
<li><a href="{%url 'list_missing_person_found'%}">Found</a></li>
</ul>
</li>
<li class="dropdown"><a href="#"><span>View Reported Persons</span> <i
class="bi bi-chevron-down"></i></a>
<ul>
<li><a href="{% url 'list_reported_person' %}">View All</a></li>
<li><a href="{% url 'list_reported_person_to_be_verified' %}">To Be Approved</a></li>
<li><a href="{% url 'list_reported_person_match_found' %}">Match Found</a></li>
<li><a href="{% url 'list_reported_person_match_not_found' %}">Match Not
Found</a></li>
</ul>
</li>
<li><a class="getstarted scrollto" href="{% url 'logout'%}">Logout</a></li>
{% else %}
<!-- if user is not admin show only home, about, services, register faq and login links -->
<li><a class="nav-link scrollto" href="{% url 'index' %}#about">About</a></li>
<li><a class="nav-link scrollto" href="{% url 'index '%}#services">Technology</a></li>
<li class="dropdown"><a href="#"><span>Register & Report</span> <i
class="bi bi-chevron-down"></i></a>
<ul>
<li><a href="{% url 'create_missing_person' %}">Register Missing Person</a></li>
<li><a href="{% url 'create_reported_person' %}">Report Suspected Missing
Person</a></li>
</ul>
</li>
<li><a class="nav-link scrollto" href="{% url 'index' %}#faq">FAQ</a></li>
<li><a class="getstarted scrollto" href="{% url 'login'%}">Login</a></li>
{% endif %}
</ul>
<i class="bi bi-list mobile-nav-toggle"></i>
</nav><!-- .navbar -->
</div>
</header><!-- End Header -->
{% block content %}
{% endblock content %}
<!-- back to top arrow -->
<div id="preloader"></div>
<a href="#" class="back-to-top d-flex align-items-center justify-content-center"><i
class="bi bi-arrow-up-short"></i></a>
<!-- Vendor JS Files -->
{% block script %}
<script src="{% static 'landing/vendor/aos/aos.js' %}"></script>
<script src="{% static 'landing/vendor/bootstrap/js/bootstrap.bundle.min.js' %}"></script>
<script src="{% static 'landing/vendor/glightbox/js/glightbox.min.js' %}"></script>
<script src="{% static 'landing/vendor/isotope-layout/isotope.pkgd.min.js' %}"></script>
<script src="{% static 'landing/vendor/swiper/swiper-bundle.min.js' %}"></script>

40
MISSING PERSON IDENTIFICATION SYSTEM

<script src="{% static 'landing/vendor/waypoints/noframework.waypoints.js' %}"></script>


<script src="{% static 'landing/vendor/php-email-form/validate.js' %}"></script>
<!-- Template Main JS File -->
<script src="{% static 'landing/js/main.js' %}"></script>
{% endblock script %}
</body>
</html>
from django import forms
from people.models import MissingPerson, ReportedPerson
#Forms for the missing person db
class MissingPersonCreateForm(forms.ModelForm):
class Meta:
model = MissingPerson
# fields = "_all_"
exclude = ['status', 'is_verified', 'face_id', 'found_location', 'found_time', 'is_contacted']
class MissingPersonUpdateForm(forms.ModelForm):
class Meta:
model = MissingPerson
exclude = ['face_id', 'is_verified', 'found_location', 'found_time', 'is_contacted']
# fields = "_all_"
class MissingPersonVerifyForm(forms.ModelForm):
class Meta:
model = MissingPerson
# exclude = ['face_id']
fields = ['is_verified']
#Forms for the reported person db
class ReportedPersonCreateForm(forms.ModelForm):
class Meta:
model = ReportedPerson
# fields = "_all_"
exclude=['is_verified','face_id','is_matched_with_missing_person','matched_confindence',
'matched_face_id' ]
class Reported Person Update Form (forms. Model Form):
class Meta:
model = ReportedPerson
exclude = ['face_id']
# fields = "_all_"
class ReportedPersonVerifyForm(forms.ModelForm):
class Meta:
model = ReportedPerson
# exclude = ['face_id']
fields = ['is_verified']
from django.db import models
from phonenumber_field.modelfields import PhoneNumberField
# missing person model
class MissingPerson(models.Model):
GENDER_CATEGORY_CHOICES = (
("Male", "Male"),
("Female", "Female"),
("Other", "Other"),

41
MISSING PERSON IDENTIFICATION SYSTEM

)
RELATIONSHIP_CATEGORY_CHOICES = (
("Father", "Father"),
("Mother", "Mother"),
("Brother", "Brother"),
("Sister", "Sister"),
("Husband", "Husband"),
("Wife", "Wife"),
("Guardian", "Guardian"),
("Relative", "Relative"),
("Friend", "Friend"),
("Other", "Other"),
)
CURRENT_STATUS_CHOICES = (
("New", "New"),
("Leads", "Leads"),
("Found", "Found"),
("Closed", "Closed"),
)
# basic info fields
first_name = models.CharField(verbose_name="Given Name", max_length=200,
blank=False, null=False)
last_name = models.CharField(verbose_name="Last Name", max_length=200, blank=False,
null=False)
age = models.CharField(verbose_name="Age of Missing Person",max_length=200,
blank=False, null=False, )
gender = models.CharField(verbose_name="Gender of Missing Person", choices =
GENDER_CATEGORY_CHOICES, max_length=200, blank=False, null=False)
last_seen = models.CharField(verbose_name="Last Seen Location", max_length=200,
blank=False, null=False)
description = models.TextField(verbose_name="Any Other Important
Details",max_length=1000, blank=True, null=True)
photo = models.ImageField(verbose_name="Upload Photo of Missing
Person",upload_to="missingpersons/", blank=False, null=False )
# info of person to be contacted if missing person found
contact_person = models.CharField(verbose_name="Contact Person", max_length=200,
blank=False, null=False)
contact_relationship = models.CharField(verbose_name="Relationship with Missing
Person", choices=RELATIONSHIP_CATEGORY_CHOICES, max_length=200,
blank=False, null=False)
contact_email = models.EmailField(verbose_name="Contact Email ID",max_length=254,
blank=False, null=False)
phone = PhoneNumberField(verbose_name="Contact Number", null=False, blank=False, )
# currents status of case ie new/leads/found/closed
status = models.CharField(verbose_name="Current Status",
choices=CURRENT_STATUS_CHOICES, max_length=200, blank=False, null=False,
default="New")
# fields used in AI face recognition
is_verified = models.BooleanField(verbose_name="Person Background Check Done?",
default=False)

42
MISSING PERSON IDENTIFICATION SYSTEM

face_id = models.CharField(verbose_name="Face ID of Missing Person",max_length=200,


blank=True, null=True, )
# if found, location from where the volunteer reported
found_location = models.CharField(verbose_name="Found Location", max_length=200,
blank=True, null=True)
found_time = models.DateTimeField( blank=True, null=True)
is_contacted = models.BooleanField(verbose_name="Contact person has been informed?",
default=False)
created_date = models.DateTimeField(auto_now_add=True)
modified_date = models.DateTimeField(auto_now=True)
class Meta:
verbose_name = 'Mising People'
verbose_name_plural = 'Missing People'
ordering = ('first_name', )
def _str_(self):
return str(self.first_name) + " " + str(self.last_name) + " " + str(self.face_id)
class ReportedPerson(models.Model):
reported_location = models.CharField(verbose_name="Found Location", max_length=200,
blank=False, null=False)
description = models.TextField(verbose_name="Any Other Important
Details",max_length=1000, blank=True, null=True)
photo = models.ImageField(verbose_name="Upload Photo of Reported
Person",upload_to="reportedpersons/", null=False, blank=False,)
# fields used in AI face recognition
is_verified = models.BooleanField(verbose_name="Is this valid reporting?", default=False)
face_id = models.CharField(verbose_name="Face ID of Reported Person",max_length=200,
blank=True, null=True, )
is_matched_with_missing_person = models.BooleanField(verbose_name="Has the match
found?", default=False)
matched_confindence = models.CharField(verbose_name="Details of Match",
max_length=200, blank=True, null=True)
matched_face_id = models.CharField(verbose_name="Face ID of Matched
Person",max_length=200, blank=True, null=True, )
created_date = models.DateTimeField(auto_now_add=True)
modified_date = models.DateTimeField(auto_now=True)
class Meta:
verbose_name = 'Reported People'
verbose_name_plural = 'Reported People'
ordering = ('created_date', )
def _str_(self):
return str(self.created_date)
3. Django:
Django is a high-level Python web framework that simplifies and accelerates web
development by providing a robust set of tools and functionalities. It follows the Model-View-
Controller (MVC) architectural pattern and emphasizes the concept of "batteries included,"
which means that Django includes many built-in features and libraries to handle common web
development tasks.
from django.urls import path
from .views import *

43
MISSING PERSON IDENTIFICATION SYSTEM

urlpatterns = [
# urls for missing person list views
path('list-missing-person/', MissingPersonListView.as_view(), name='list_missing_person'),
path('list-missing-person-to-be-verified/', MissingPersonToBeApprovedListView.as_view(),
name='list_missing_person_to_be_verified'),
path('list-missing-person-with-leads/', MissingPersonWithLeadsListView.as_view(),
name='list_missing_person_with_leads'),
path('list-missing-person-found/', MissingPersonFoundListView.as_view(),
name='list_missing_person_found'),
# urls for missing person create, update verify, delete
path('create-missing-person/', MissingPersonCreateView.as_view(),
name='create_missing_person'),
path('update-missing-person/<int:pk>', MisssingPersonUpdateView.as_view(),
name='update_missing_person'),
path('delete-missing-person/<int:pk>', MisssingPersonDeleteView.as_view(),
name='delete_missing_person'),
path('verify-missing-person/<int:pk>', MisssingPersonVerifyView.as_view(),
name='verify_missing_person'),
# url to update status of missing person
path('missing-person-match/<int:pk>', missing_person_update_status,
name='missing_person_match'),
# urls for reported person list views
path('list-reported-person/', ReportedPersonListView.as_view(),
name='list_reported_person'),
path('list-reported-person-to-be-verified/',
ReportedPersonToBeApprovedListView.as_view(),
name='list_reported_person_to_be_verified'),
path('list-reported-person-match-found/', ReportedPersonMatchedListView.as_view(),
name='list_reported_person_match_found'),
path('list-reported-person-match-not-found/',
ReportedPersonNotMatchedListView.as_view(),
name='list_reported_person_match_not_found'),
# urls for reported person create, update verify, delete
path('create-reported-person/', ReportedPersonCreateView.as_view(),
name='create_reported_person'),
path('update-reported-person/<int:pk>', ReportedPersonUpdateView.as_view(),
name='update_reported_person'),
path('delete-reported-person/<int:pk>', ReportedPersonDeleteView.as_view(),
name='delete_reported_person'),
path('verify-reported-person/<int:pk>', ReportedPersonVerifyView.as_view(),
name='verify_reported_person'),
# url for showing found/matched person
path('show-found-person/<str:face_id>', FoundPersonTemplateView.as_view(),
name='show_found_person'),
# urls for form success
path('missing-person-form-success/', MissingPersonFormSuccessView.as_view(),
name='missing_person_form_success'),
path('reported-person-form-success/', ReportedPersonFormSuccessView.as_view(),
name='reported_person_form_success'),
]

44
MISSING PERSON IDENTIFICATION SYSTEM

from pathlib import Path


import os
import json
with open('./config.json', 'r') as f:
config = json.load(f)
# Build paths inside the project like this: BASE_DIR / 'subdir'.
BASE_DIR = Path(_file_).resolve().parent.parent
# Quick-start development settings - unsuitable for production
# See https://docs.djangoproject.com/en/4.0/howto/deployment/checklist/
# SECURITY WARNING: keep the secret key used in production secret!
SECRET_KEY = 'django-insecure-
xgfz+t%xz6m=$sf6af@=^hm%+ew&#pscf$7(+x56f_u*&l(fz$'
# SECURITY WARNING: don't run with debug turned on in production!
DEBUG = True
ALLOWED_HOSTS = ['*']
# Application definition
INSTALLED_APPS = [
'django.contrib.admin',
'django.contrib.auth',
'django.contrib.contenttypes',
'django.contrib.sessions',
'django.contrib.messages',
'django.contrib.staticfiles',
'landing',
'people',
]
MIDDLEWARE = [
'django.middleware.security.SecurityMiddleware',
'django.contrib.sessions.middleware.SessionMiddleware',
'django.middleware.common.CommonMiddleware',
'django.middleware.csrf.CsrfViewMiddleware',
'django.contrib.auth.middleware.AuthenticationMiddleware',
'django.contrib.messages.middleware.MessageMiddleware',
'django.middleware.clickjacking.XFrameOptionsMiddleware',
]
ROOT_URLCONF = 'msengage.urls'
TEMPLATES = [
{
'BACKEND': 'django.template.backends.django.DjangoTemplates',
'DIRS': [os.path.join(BASE_DIR, 'templates')],
'APP_DIRS': True,
'OPTIONS': {
'context_processors': [
'django.template.context_processors.debug',
'django.template.context_processors.request',
'django.contrib.auth.context_processors.auth',
'django.contrib.messages.context_processors.messages',
],
},
},

45
MISSING PERSON IDENTIFICATION SYSTEM

]
WSGI_APPLICATION = 'msengage.wsgi.application'
4. Database:
A database is an organized collection of structured data that is stored and managed in a
systematic manner. It is designed to efficiently store, retrieve, and manage vast amounts of
information. Databases are commonly used in various applications, ranging from simple data
storage systems to complex enterprise-level software.
# https://docs.djangoproject.com/en/4.0/ref/settings/#databases
DATABASES = {
'default': {
'ENGINE': 'django.db.backends.sqlite3',
'NAME': BASE_DIR / 'msengage.sqlite3',
}
}
# Password validation
# https://docs.djangoproject.com/en/4.0/ref/settings/#auth-password-validators
AUTH_PASSWORD_VALIDATORS = [
{
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
},
]
# Internationalization
# https://docs.djangoproject.com/en/4.0/topics/i18n/
LANGUAGE_CODE = 'en-us'
TIME_ZONE = 'Asia/Kolkata'
USE_I18N = True
# USE_TZ = True
# Static files (CSS, JavaScript, Images)
# https://docs.djangoproject.com/en/4.0/howto/static-files/
print ("Using local static and media files")
STATIC_URL = '/static/'
STATIC_ROOT = os.path.join(BASE_DIR, 'static')
print ("Static Files should be at : ", STATIC_ROOT)
MEDIA_URL = "/media/"
MEDIA_ROOT = os.path.join(BASE_DIR, 'media')
print ("Media Files should be at : ", MEDIA_ROOT)
# Default primary key field type
# https://docs.djangoproject.com/en/4.0/ref/settings/#default-auto-field
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
LOGIN_REDIRECT_URL = 'index'

46
MISSING PERSON IDENTIFICATION SYSTEM

LOGOUT_REDIRECT_URL = 'index'
# for sending emails
EMAIL_BACKEND = 'django.core.mail.backends.smtp.EmailBackend'
EMAIL_HOST = 'smtp.gmail.com'
EMAIL_USE_TLS = True
EMAIL_PORT = 587
EMAIL_HOST_USER = config['EMAIL-ID']
EMAIL_HOST_PASSWORD = config['EMAIL-PASSWORD']

47
MISSING PERSON IDENTIFICATION SYSTEM

7 TESTING
7.1 Introduction
In general, software engineers distinguish software faults from software failures. In case of
a failure, the software does not do what the user expects. A fault is a programming error that
may or may not actually manifest as a failure. A fault can also be described as an error in the
correctness of the semantic of a computer program. A fault will become a failure if the exact
computation conditions are met, one of them being that the faulty portion of computer software
executes on the CPU. A fault can also turn into a failure when the software is ported to a
different hardware platform or a different compiler, or when the software gets extended.
Software testing is the technical investigation of the product under test to provide stakeholders
with quality related information
System Testing and Implementation:
The purpose is to exercise the different parts of the module code to detect coding errors.
After this the modules are gradually integrated into subsystems, which are then integrated
themselves too eventually forming the entire system. During integration of moduleintegration
testing is performed. The goal of this is to detect designing errors, while focusing the
interconnection between modules. After the system was put together, system testing is
performed. Here the system is tested against the system requirements to see if all requirements
were met and the system performs as specified by the requirements. Finally accepting testing
is performed to demonstrate to the client for the operation of the system.
For the testing to be successful, proper selection of the test case is essential. There aretwo
different approaches for selecting test case. The software or the module to be tested is treated
as a black box, and the test cases are decided based on the specifications of the system or
module. For this reason, this form of testing is also called “black box testing”.
The focus here is on testing the external behaviour of the system. In structural testing the
test cases are decided based on the logic of the module to be tested. A common approach here
is to achieve some type of coverage of the statements in the code. The two forms of testing are
complementary: one tests the external behaviour, the other tests the internal structure.
Testing is an extremely critical and time-consuming activity. It requires proper planning of
the overall testing process. Frequently the testing process starts with the test plan. This plan
identifies all testing related activities that must be performed and specifies the schedule,
allocates the resources, and specifies guidelines for testing. The test plan specifies conditions
that should be tested; different units to be tested, and the manner in which the module will be
integrated together. Then for different test unit, a test case specification document is produced,
which lists all the different test cases, together with the expected outputs, that will be used for
testing. During the testing of the unit the specified testcases are executed and the actual results
are compared with the expected outputs. The final output of the testing phase is the testing
report and the error report, or a set of such reports. Each test report contains a set of test cases
and the result of executing the code with the test cases. The error report describes the errors
encountered and the action taken to remove the error.
Testing Techniques:
Testing is a process, which reveals errors in the program. It is the major quality measure
employed during software development. During testing, the program is executed with a set of

48
MISSING PERSON IDENTIFICATION SYSTEM

conditions known as test cases and the output is evaluated to determine whether the program
is performing as expected. To make sure that the system does not have errors, the different
levels of testing strategies that are applied at differing phases of software development are:
Black Box Testing
In this strategy some test cases are generated as input conditions that fully execute all
functional requirements for the program. This testing has been uses to find errors in the
following categories:
✓ Incorrect or missing functions
✓ Interface errors
✓ Errors in data structure or external database access
✓ Performance errors
✓ Initialization and termination errors. In this testing only the output ischecked for
correctness. The logical flow of the data is not checked.
White Box Testing
In this testing, the test cases are generated on the logic of each module by drawing flow
graphs of that module and logical decisions are tested on all the cases. It has been uses to
generate the test cases in the following cases:
✓ Guarantee that all independent paths have been executed.
✓ Execute all logical decisions on their true and false sides.
✓ Execute all loops at their boundaries and within their operational.\
✓ Execute internal data structures to ensure their validity.
Testing StrategiesUnit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests
perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of abusiness process performs
accurately to the documented specifications and contains clearly defined inputs and expected
results.
This System consists of 3 modules. Those are Reputation module, route discovery module,
audit module. Each module is taken as unit and tested. Identified errors are correctedand
executable unit are obtained.
Integration testing:
Integration tests are designed to test integrated software components to determine if they
runas one program. Testing is event driven and is more concerned with the basic outcome of
screens or fields.
Integration tests demonstrate that although the components were individually satisfaction,
asshown by successfully unit testing, the combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from the
combination of components.

49
MISSING PERSON IDENTIFICATION SYSTEM

System Testing:
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing is
the configuration-oriented system integration test.
Functional Testing:
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centred on the following items
Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures : interfacing systems or procedures must be invoked.


Organization and preparation of functional tests is focused on requirements, key functions,
or special test cases. In addition, systematic coverage pertaining to identify Business process
flows, data fields, predefined processes, and successive processes.
7.2 SAMPLE TEST CASES SPECIFICATIONS:
Test Cases::
Test Test case Input Expected Observed Result
case id name Output Output

When user
T1 having an Email, Successful Successful Pass
account password login login
login

User giving Email,


T2 wrong id or password, Invalid user Invalid user Pass
password voter id

Table 7.2.1: Sample Test Cases Specification

50
MISSING PERSON IDENTIFICATION SYSTEM

Test Test case Input Expected Observed Result


case id name Output Output
Criteria List of List of
(e.g., name, missing missing
T3 Search for a age, last persons persons Pass
Missing Person seen matching the matching the
location) criteria criteria

Missing Confirmation Confirmatio


person of successful n of
details addition of successful
(name, age, the missing addition of
T4 Add a photo, last person record the missing Pass
Missing Person seen person
location, record
description,
contact
information
)
Table 7.2.2: Sample Test Cases Specification

Test Test case Input Expected Observed Result


case id name Output Output
Empty list Empty list
or or
Search for a Invalid or appropriate appropriate
Missing non-existent error error
T5 Person with criteria message message Pass
Invalid indicating indicating
Criteria no no
matching matching
records records
found found
Table 7.2.3: Sample Test Cases Specification

51
MISSING PERSON IDENTIFICATION SYSTEM

8. SCREENSHOTS

Fig 8.1 Screenshot of Home Page


Description: In the above screenshot it displays the home page of missing person
identification. It gives some information about the homepage user login, user registration,
admin login.

52
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.2 Screenshot of User Login Page


Description: The above screenshot displays User Login Page. In this page user can fill
the username and created password.

53
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.3 Screenshot of User Login Page


Description: The above screenshot represents the Login page. Here user can fill the
username and password which was used while creating the page.

54
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.4 Screenshot of Registration Page


Description: The above screenshot displays the Registration page. In this page user can
upload the details of missing person. It includes name, last name, age of the person, gender,
last seen location and other details.

55
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.5 Screenshot of Report a missing person Page


Description: The above screenshot displays the page in which user can fill the details of
the missing person after they found. In this user can upload the details like found location,
photo of reported person.

56
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.6 Screenshot of Django Administration Page


Description: The above screenshot displays the Django administration page. In this it
contains the details of missing person and reported person. First user have to fill the username
and password category then admin can accept the user.

57
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.7 Screenshot of Add Reported People


Description: The above screenshot displays the page which contains all the details of
the reported people after they found.

58
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.8 Screenshot of Add Reported People filling details


Description: The above screenshot displays the displays the page which contains all the
details of the reported people after they found. It includes location where the person found,
details of the person, photo of the person who was reported, face ID. It checks whether the
missing person and the found person is matched or not by the face ID of the person.

59
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.9 Screenshot of Add Missing People


Description: The above screenshot displays the page which contains the blocks where
details of the missing people can be filled.

60
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.10 Screenshot of Add Missing People filling details


Description: The above screenshot displays the missing person page where the user can
fill the details of the person. It includes name, age, gender, last seen location, and uploading
photo of the missing person.

61
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.11 Screenshot of List of Reported People


Description: The above screenshot displays the List of reported people. It can be edited
and deleted whenever user requires. It displays the details of person who was reported on May
15, 2023.

62
MISSING PERSON IDENTIFICATION SYSTEM

Fig 8.12 Screenshot of List of Reported People


Description: The above screenshot displays the List of reported people. It can be edited
and deleted whenever user requires. It displays the details of person who was reported on May
15, 2023.

63
MISSING PERSON IDENTIFICATION SYSTEM

CONCLUSION
The Missing Person Identification System, integrated with web-based technologies, has
brought about significant advancements in the search and identification of missing individuals.
The use of the internet and online platforms has revolutionized the way information is shared,
accessed, and analyzed, greatly improving the effectiveness and efficiency of the system.
Through dedicated websites, online databases, and social media platforms, the Missing
Person Identification System has facilitated seamless communication and collaboration among
law enforcement agencies, search organizations, and the general public. This
interconnectedness has accelerated the dissemination of information about missing persons,
allowing for a wider reach and increased chances of locating them.
The web-based system has enabled the creation of comprehensive online databases
containing vital details, such as physical descriptions, photographs, last known locations, and
personal characteristics, all easily accessible to authorized users. This centralized repository of
information serves as a valuable resource for investigators and search teams, assisting in the
quick identification of missing individuals.
FUTURE SCOPE:
The future scope of Missing Person Identification Systems holds significant potential for
advancements and improvements in several areas:
Data Integration and Collaboration: Enhancements can be made to integrate Missing Person
Identification Systems with other databases and systems, such as law enforcement databases,
social media platforms, and facial recognition systems.
Artificial Intelligence and Machine Learning: Leveraging AI and machine learning
techniques can improve the accuracy and speed of identifying potential matches.
Real-time Data Analysis: Integrating real-time data sources, such as surveillance cameras,
mobile devices, and social media feeds, into Missing Person Identification Systems can
enhance their effectiveness.
Mobile and Wearable Technology: Expanding the system's capabilities to include mobile
applications and wearable devices can enable field officers and volunteers to directly access
and contribute to the system.
Social Media Monitoring: Given the widespread use of social media platforms, incorporating
social media monitoring capabilities into Missing Person Identification Systems can provide
valuable insights.
Data Privacy and Security: As with any system handling sensitive information, ensuring
robust data privacy and security measures will remain a crucial aspect.
International Collaboration: Facilitating cross-border collaboration and information
exchange among different countries Missing Person Identification Systems can improve the
chances of identifying missing individuals who may have travelled or crossed borders.

64
MISSING PERSON IDENTIFICATION SYSTEM

BIBLIOGRAPHY/REFERENCES
TEXT BOOKS:
1) JavaScript Enlightenment, D.Flanagam.
2) Beginning Web Programing-Jon Duckett Wrox.
3) Web Technologies, Uttam K Roy, Oxford University Press.
4) Django for beginners, William.s Vincent
5) Light weight django, Julia Eliman& Mark lavin
6) HTML and CSS QuickStart Guide - David Durocher
7) Deno Web Development - Gary Cornell
WEB SITES:
1. Help ID. (n.d.). Missing Person Identification System. Retrieved from
https://helpid.vancouver.ca/
2. International Centre for Missing & Exploited Children. (n.d.). Missing Children
Databases. Retrieved from https://www.icmec.org/missing-children-
databases/
3. National Missing and Unidentified Persons System (NamUs). (n.d.). Retrieved
from https://www.namus.gov/
4. NCMEC CyberTipline. (n.d.). Missing Children Search. Retrieved from
https://report.cybertip.org/.
REFFERENCES:
1. Bie, R., Nieuwenhuis, C., & Elffers, H. (2017). Missing Persons in a Secure and
Free Society: A Sociological View on a Social Problem. European Journal on
Criminal Policy and Research, 23(2), 147-164.
2. Cassar, D., Fahy, D., Horgan, J., & O'Sullivan, C. (2015). Social media in missing
persons investigations: An exploratory study of law enforcement experiences in
Ireland. International Journal of Police Science & Management, 17(2), 99-109.
3. Fife, T., & Coleman, K. (2015). Missing Persons' Families: The Human
Experience. Taylor & Francis.
4. Rombouts, J., De Pauw, G., & Smits, W. (2018). Modelling the behavior of
missing persons. European Journal on Criminal Policy and Research, 24(2), 149-
167

65

You might also like