Notes
Notes
on
MISSING PERSON IDENTIFICATION SYSTEM
DEPARTMENT OF MCA
DEPARTMENT OF MCA
CERTIFICATE
This is to certify that the project work entitled, “Missing Person Identification
System” is a bonafide work of Shieak Apsha Madeena bearing Regd.No: 21P31F0058
submitted to the faculty of Master of Computer Applications, in partial fulfillment of the
requirements for the award of the degree of MASTER OF COMPUTER
APPLICATIONS from Aditya College of Engineering & Technology, Surampalem for the
academic year 2022-2023.
Aditya College of Engg & Tech, Aditya College of Engg & Tech,
Surampalem-533437. Surampalem-533437.
External Examiner
DECLARATION
I here by declare that the project entitled “MISSING PERSON IDENTIFICATION
SYSTEM” done on my own and submitted to Aditya College of Engineering & Technology,
Surampalem has been carried out by me alone under theguidance of Mr.K.C.PRADEEP.
Place: Surampalem
Date:
(SK. APSHA MADEENA)
21P31F0058
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mention of people who made it possible, whose constant
guidance and encouragement crowned our efforts with success. It is a pleasant aspect that I
have now the opportunity to express my gratitude for all of them.
The first person I would like to thank is my guide Mr.K.C.Pradeep, M.Tech Assistant
Professor, Aditya College Of Engineering And Technology, Surampalem, His wide
knowledge and logical way of thinking have made a deep impression on me. His
understanding, encouragement, and personal guidance have provided the basis for this project.
He is a source of inspiration for innovative ideas and his kind support is well known to all his
students and colleagues.
I would like to thank all the Management &Technical Supporting Staff for their
timely help throughout the project.
ABSTRACT
ABSTRACT
The missing person identification system using web is an online platform designed to
assist in locating missing individuals. It utilizes web technologies to provide a user-friendly
interface for reporting missing persons, searching for relevant information, and aiding in
identification efforts.
The system consists of a database to store comprehensive details of missing persons,
including personal information, physical characteristics, and last known locations. Users can
report a missing person by submitting relevant information through an online form. The
system enables efficient search functionality, allowing users to query the database based on
various criteria such as name, age, and location. The missing person identification system
using web development is a comprehensive online platform designed to facilitate the
identification and location of missing individuals. This system leverages web development
technologies to create an intuitive and user-friendly interface that allows users to report
missing persons, search for relevant information, and assist in identification efforts.
The system ensures the secure storage and organization of this data for future reference.
The missing person identification system using web development aims to leverage the power
of web technologies to create a centralized and accessible platform for reporting, and
identifying missing individuals. It serves as a valuable tool for individuals, law enforcement
agencies, and communities, ultimately aiding in the timely and successful resolution of missing
person cases.
CONTENTS
PAGE NO.
Chapter 1: INTRODUCTION 01
1.1 Brief Information about the Project 01
1.2 Motivation and Contribution of Project 01
1.3 Objective of the Project 02
1.4 Organization of Project 03
Chapter 2: LITERATURE SURVEY 04
Chapter 3: SYSTEM ANALYSIS 06
3.1 Existing System 06
3.2 Proposed System 06
3.3 Feasibility Study 08
3.4 Functional Requirements 09
3.5 Non-Functional Requirements 10
3.6 System Requirements 12
3.7 Requirements Specification 12
3.7.1 Software Requirements 12
3.7.2 Minimum Hardware Requirements 12
Chapter 4: SYSTEM DESIGN 13
4.1 Introduction 13
4.2 System architecture 13
4.3 Use case Diagram 14
4.4 Class Diagram 18
4.5 Sequence Diagram 20
4.6 Collaboration Diagram 21
4.7 Activity Diagram 21
Chapter 5: TECHNOLOGY DESCRIPTION 24
5.1 Introduction to HTML 24
5.2 Introduction to CSS 25
5.2.1 Applications of CSS 25
5.3 Introduction to Java Script 26
5.4 Introduction to Django 27
5.5 Introduction to Python 28
5.6 Python Features 28
5.7 Introduction to Bootstrap 29
Chapter 6: SAMPLE CODE 33
Chapter 7: TESTING 48
3.8 7.1 Introduction 48
3.9 7.2 Sample Test case Specifications 50
Chapter 8: SCREENSHOTS 52
CONCLUSION 64
BIBLIOGRAPHY 65
LIST OF FIGURES
1. INTRODUCTION
1.1 Brief Information about the Project:
The missing person identification system using web development is a critical application
that harnesses the power of web technologies to assist in locating missing individuals. It
provides a centralized platform where users can report missing persons, search for relevant
information, and contribute to identification efforts. This system leverages the accessibility
and scalability of web development to reach a wider audience and enhance the efficiency of
missing person identification.
Traditionally, the process of reporting and identifying missing persons has been
fragmented and often limited by geographical boundaries. By utilizing web development, this
system breaks down these barriers and allows users from various locations to participate in the
identification process. It serves as a bridge between individuals, law enforcement agencies,
and the community, fostering collaboration and increasing the chances of successful outcomes.
The missing person identification system employs a comprehensive database to store
detailed information about missing individuals. This information includes personal data such
as name, age, and physical characteristics, as well as last known locations and photographs.
The web interface provides an intuitive and user-friendly means for individuals to report
missing persons by filling out online forms with relevant details. This streamlined reporting
process ensures that crucial information is captured accurately and efficiently.
Search functionality is a crucial component of the system, enabling users to query the
database based on specific criteria. Users can search for missing persons using parameters such
as name, age, location, or any available information. The system employs advanced search
algorithms and filters to generate accurate and relevant results. This capability significantly
enhances the identification process by presenting potential matches and aiding in the
comparison of reported cases
The missing person identification system can also incorporate external APIs or databases,
such as law enforcement databases or public records, to augment the available information and
improve the accuracy of matches. By leveraging these additional resources, the system
increases its effectiveness and provides a more comprehensive solution.
Overall, the missing person identification system using web development serves as a vital
tool in the ongoing efforts to locate missing individuals. It harnesses the power of web
technologies to create a centralized and accessible platform, fostering collaboration and
improving the chances of successfully reuniting missing persons with their families
1.2 Motivation and Contribution of the Project:
The Missing Person Identification project aims to address the critical issue of identifying
and locating missing persons. It is motivated by the pressing need to improve the efficiency
and effectiveness of missing person investigations, which can often be challenging and time-
consuming for law enforcement agencies. The project seeks to leverage advancements in
technology and data analysis to provide innovative solutions in this area.
The primary motivation behind this project is to bring closure to families and loved ones
of missing persons. When someone goes missing, it can have a devastating impact on their
family and friends. Uncertainty and lack of information about the whereabouts of a missing
person can lead to emotional distress and prolonged suffering for those left behind. By
1
MISSING PERSON IDENTIFICATION SYSTEM
developing improved methods for identifying missing persons, the project aims to provide
closure to families, helping them find answers and possibly reunite with their loved ones.
The project also recognizes the importance of public safety. In some cases, a missing
person may be at risk or involved in a dangerous situation. Swift identification and location of
missing individuals can aid in their rescue and prevent further harm. By streamlining the
identification process, the project contributes to enhancing public safety and protecting
vulnerable individuals.
Furthermore, the Missing Person Identification project has broader societal implications.
It can assist law enforcement agencies in reducing the backlog of unidentified remains and
missing person cases, thereby improving overall investigative efficiency. The project's
outcomes can also help inform policy decisions and resource allocation related to missing
persons, enabling authorities to allocate their limited resources more effectively.
The project's contributions extend beyond traditional investigation techniques. It leverages
technological advancements such as data analytics, machine learning, and facial recognition to
enhance identification efforts. By developing and deploying innovative tools and
methodologies, the project aims to augment existing investigative capabilities, providing law
enforcement agencies with additional resources to locate and identify missing persons.
In summary, the Missing Person Identification project is motivated by the need to bring
closure to families, enhance public safety, improve investigative efficiency, and leverage
technological advancements. Its contributions lie in its potential to provide answers, protect
vulnerable individuals, inform policy decisions, and offer innovative solutions to the
challenging task of identifying and locating missing persons.
1.3 Objective of the Project:
The objective of the Missing Person Identification project is to develop and implement
effective methods and technologies to improve the identification and location of missing
persons. The project aims to achieve the following specific objectives:
• Enhance identification accuracy: The project seeks to improve the accuracy of
identifying missing persons by leveraging advanced technologies such as facial recognition,
biometrics, and data analytics. By developing robust algorithms and systems, the objective is
to minimize false identifications and increase the likelihood of successful matches.
• Streamline identification processes: The project aims to simplify and streamline the
identification processes used by law enforcement agencies. This includes developing efficient
data management systems, establishing standardized protocols for collecting and sharing
information, and integrating various databases and sources of information to facilitate faster
and more accurate identification.
• Facilitate information sharing: Effective identification of missing persons often
relies on collaborative efforts between different agencies, organizations, and even the public.
The project aims to develop platforms and mechanisms to facilitate seamless information
sharing, enabling the timely dissemination of crucial data across relevant stakeholders.
• Leverage technological advancements: The project seeks to harness the power of
emerging technologies, such as artificial intelligence, machine learning, and data analytics, to
enhance identification efforts. By utilizing these technologies, the project aims to automate
certain aspects of the identification process, analyze large volumes of data more efficiently,
2
MISSING PERSON IDENTIFICATION SYSTEM
and uncover patterns and connections that may aid in locating missing persons.
• Improve investigative efficiency: The objective is to enhance the efficiency of
missing person investigations by providing law enforcement agencies with innovative tools,
methodologies, and resources. This includes developing predictive models to assist in
prioritizing cases, optimizing resource allocation, and reducing the backlog of unidentified
remains and missing person cases.
• Provide closure and support to families: Ultimately, the project seeks to provide
closure to families and loved ones of missing persons. By improving identification methods
and increasing the chances of locating missing individuals, the objective is to offer answers,
peace of mind, and support to those affected by the disappearance of a loved one.
1.4 Organization of the Project:
• Literature Survey: This chapter mainly consists of the background of the project,
possible approaches, introduction, and comparisonof technologies.
• System Analysis: This chapter consists of description of currentsystem, proposed
system, algorithms, and requirement specifications.
• System Design: This chapter mainly consists of modules descriptionand unified
modelling language diagrams: use case diagrams, class diagrams.
• Technology Description: This chapter mainly consists oftechnology used in this
project.
• Sample code: This chapter mainly consists of sample code for fewmodules.
• Testing: This chapter mainly consists of testing techniques and testcases for modules.
• Screenshots: This chapter mainly consists of output screens of thisproject.
• Conclusion: Main conclusion of this project.
3
MISSING PERSON IDENTIFICATION SYSTEM
2. LITERATURE SURVEY
Research on missing person identification encompasses various fields, including forensic
science, biometrics, data analysis, and information systems. Here are some key areas of
literature that have been explored:
1. Missing Persons in a Secure and Free Society: In a study done by Bie, R.,
Nieuwenhuis, C., & Elffers, H. (2017). Identifying. Missing Persons in a secure and free society
is a topic that encompasses the social, legal, and policy aspects related to the occurrence and
management of missing persons cases within a society that values both security and personal
freedoms. It raises important questions about how society responds to the issue of missing
persons while balancing the need for public safety and individual rights.
From a sociological perspective, understanding missing persons involves analyzing various
factors that contribute to their disappearance, such as social inequalities, personal
vulnerabilities, family dynamics, mental health issues, and criminal activities. Sociologists
examine the broader social context and structural factors that may increase the risk of
individuals going missing, such as poverty, homelessness, domestic violence, or involvement
in organized crime.
Efforts to improve the response to missing persons in a secure and free society may include
implementing preventive measures, such as public education campaigns on personal safety and
support programs for vulnerable populations. Additionally, enhancing coordination and
communication among law enforcement agencies, utilizing technological advancements in data
management and identification, and ensuring appropriate support services for families and
friends of missing persons are vital aspects of a comprehensive approach.
Overall, examining missing persons in the context of a secure and free society provides
valuable insights into the social dynamics, policy considerations, and support mechanisms
required to address this complex issue while upholding the principles of safety and individual
freedoms.
2. Social media in missing persons investigations: In a study done by Cassar, D.,
Fahy, D., Horgan, J., & O'Sullivan, C. (2015). Social media has revolutionized the way missing
persons investigations are conducted. It has become an invaluable tool for law enforcement
agencies, organizations, and concerned individuals in their efforts to locate missing individuals.
Through social media platforms, law enforcement agencies can quickly disseminate
information about missing persons, including photographs, descriptions, and relevant details.
This enables widespread sharing of the information, reaching a large audience within seconds.
Social media also allows for the engagement of the public, who can provide tips, sightings, and
other pertinent information that may assist in the investigation. Additionally, law enforcement
agencies can monitor social media activity to gather insights into the missing person's online
presence, contacts, and potential whereabouts. Social media engagement in missing persons
investigations fosters collaboration, generates leads, and provides emotional support to the
families and friends of missing individuals. However, it is crucial to balance the use of social
media with ethical considerations, respecting privacy rights and following established
protocols to ensure responsible and effective utilization of this powerful resource.
3. Missing Persons' Families: In a study done by Fife, T., & Coleman, K. (2015).
Families of missing persons endure unimaginable pain and uncertainty as they navigate through
4
MISSING PERSON IDENTIFICATION SYSTEM
the challenges that come with a loved one's disappearance. The emotional toll can be
overwhelming, as they grapple with a range of intense emotions such as grief, fear, and
helplessness. The absence of closure and unanswered questions further compound their
anguish.
Supporting families of missing persons is crucial. They require access to empathetic and
specialized services, including counseling and therapy, to help them cope with the emotional
and psychological impact. Providing a safe space for them to express their feelings, share their
experiences, and receive guidance is essential.
Practical support is also crucial. Families may need assistance with legal matters, financial
challenges, managing media attention, and accessing resources for their daily needs. Providing
resources and guidance in these areas can alleviate some of the burdens and allow families to
focus on supporting each other and advocating for their missing loved one.
Overall, recognizing the unique needs and challenges faced by families of missing persons is
essential. By providing emotional, psychological, practical, and community support, society
can help alleviate some of the burdens they carry, offering hope and solace during an incredibly
difficult time.
4. Modelling the behavior of missing persons.: Modelling the behavior of missing
persons is a multidimensional task that aims to understand and predict their actions, choices,
and movements during the period they are missing. This process involves analyzing various
factors and patterns to create a comprehensive picture of their behavior:
Personal Characteristics: Understanding the missing person's personality traits, habits, and past
behaviors can provide valuable insights into their potential actions. Factors such as their risk-
taking tendencies, social relationships, and coping mechanisms can influence their behavior
during a period of absence.
Circumstances and Context: Examining the circumstances surrounding the disappearance,
including any known conflicts, recent life events, or significant stressors, can help build a
contextual understanding of their behavior. Factors such as relationship issues, financial
difficulties, or academic/work-related challenges may contribute to their decision-making.
Psychological and Emotional Factors: Consideration of the missing person's mental health
status, emotional state, and any known psychological vulnerabilities can be crucial. Individuals
experiencing emotional distress, depression, anxiety, or other mental health conditions may
exhibit specific patterns of behavior during their absence.
Social Network Analysis: Investigating the missing person's social connections, including
friends, family, and acquaintances, can shed light on potential influences or support systems.
Mapping their social network and identifying key individuals they may turn to or places they
may seek refuge can inform the modeling process.
Geographic and Environmental Factors: Studying the geographical area where the person went
missing, including landmarks, known preferences, and familiarity with the surroundings, can
help predict their possible movements. Knowledge of their routines, favorite places, or hidden
spots may offer insights into potential locations.
5
MISSING PERSON IDENTIFICATION SYSTEM
3. SYSTEM ANALYSIS
3.1 Existing System:
Existing missing person identification systems in web technologies utilize various
approaches and technologies to facilitate the identification and search for missing individuals.
These systems typically involve web-based platforms that allow users to access and contribute
information related to missing persons.
One common approach is the creation of online databases or registries specifically
dedicated to missing persons. These databases provide a centralized repository where
information such as personal details, physical descriptions, photographs, and last known
locations of missing individuals can be stored and accessed by authorized users. Users,
including law enforcement agencies, families, and the public, can search the database, submit
new missing person reports, and provide updates on existing cases.
Some existing systems incorporate advanced search functionalities, allowing users to filter
and narrow down search results based on various criteria such as age, gender, location, or date
of disappearance. Mapping and geolocation technologies are often integrated into these
systems, enabling users to visualize missing person profiles on an interactive map and
potentially identify patterns or clusters.
To enhance visibility and engagement, many systems integrate with social media
platforms, enabling users to share missing person profiles and updates with their networks.
This social media integration helps to amplify the reach and dissemination of information,
increasing the chances of locating missing individuals.
Existing missing person identification systems also prioritize collaboration and
communication among stakeholders. They often include features for users to collaborate, share
information, and discuss leads related to specific missing person cases. Additionally, these
systems may incorporate notifications and alerts to keep registered users informed about newly
reported missing persons or updates on ongoing investigations.
Overall, existing missing person identification systems in web technologies leverage the
power of the internet, databases, search functionality, mapping, and social media integration
to streamline the process of identifying and locating missing individuals, while fostering
collaboration among stakeholders and engaging the public in the search efforts.
3.2 Proposed System:
The proposed missing person identification system in web technologies aims to enhance
and improve the existing methods of identifying and locating missing individuals. It envisions
a comprehensive and user-friendly web-based platform that leverages various technologies to
streamline the process and increase the effectiveness of finding missing persons.
The system will feature a centralized database where detailed profiles of missing
individuals can be created and accessed. This includes capturing essential information such as
personal details, physical descriptions, photographs, last known locations, and any additional
relevant data. The database will be designed for efficient storage, retrieval, and search
capabilities, ensuring quick access to information when needed.
To enhance search functionality, the proposed system will implement advanced filtering
options, allowing users to narrow down search results based on specific criteria like age,
6
MISSING PERSON IDENTIFICATION SYSTEM
gender, physical attributes, and time and location of disappearance. Additionally, the system
will integrate mapping and geolocation technologies to visualize missing person profiles on an
interactive map, providing valuable insights and potentially identifying patterns or areas of
interest.
The proposed system will prioritize user engagement and collaboration by incorporating
social media integration. Users will be able to easily share missing person profiles and updates
across various social media platforms, increasing the reach and visibility of the information
and encouraging the public's involvement in the search efforts.
Communication and collaboration features will enable authorized users, including law
enforcement agencies, families, and the public, to contribute information, report sightings, and
discuss leads related to specific missing person cases. The system will facilitate real-time
communication and provide secure channels for sharing sensitive information.
To ensure privacy and security, the proposed system will implement robust access controls
and encryption techniques to protect sensitive data. User authentication and authorization
mechanisms will be in place to ensure that only authorized individuals can access and
contribute to the system.
Overall, the proposed missing person identification system in web technologies aims to
provide a comprehensive, efficient, and collaborative platform that harnesses the power of
web-based technologies to speed up identifying and locating missing individuals. By
leveraging advanced search capabilities, mapping technologies, social media integration, and
secure communication features, the system aims to increase the chances of successfully
reuniting missing persons with their families or guardians.
Advantages:
User Registration and Authentication: The system allows users to register and create
accounts. Users can log in using their credentials, ensuring secure access to the system's
features and data.
Missing Person Profiles: The system provides a user-friendly interface for creating and
managing missing person profiles. Authorized users, such as law enforcement agencies or
family members, can enter details such as the person's name, age, physical description, last
known location, photographs, and any other relevant information.
Search Functionality: The system incorporates a powerful search engine to enable users
to search for missing persons based on various criteria, including name, age, gender, location,
or date of disappearance. Advanced search options can be included to facilitate more refined
searches.
Reporting and Information Submission: The system allows users to report a missing person
and submit relevant information. This could include uploading photographs, providing
additional details about the disappearance, or sharing any leads or sightings. Users should have
the option to provide contact information for further communication.
Notification and Alerts: The system includes a notification feature to alert registered users
about newly reported missing persons or updates on ongoing investigations. Users can
subscribe to receive notifications based on specific criteria, such as location or age range, to
receive relevant information directly.
Social Media Integration: The system integrates with popular social media platforms to
7
MISSING PERSON IDENTIFICATION SYSTEM
amplify the reach and visibility of missing person reports. Users can easily share profiles and
updates on their social media accounts, increasing the chances of locating missing individuals
through community involvement.
Mapping and Geolocation: The system utilizes mapping and geolocation technologies to
display missing person profiles on an interactive map. This allows users to visualize the
geographical distribution of missing persons, identify clusters or patterns, and provide
location-specific information.
Collaboration and Reporting Tools: The system provides collaboration tools for
authorized users to exchange information, discuss leads, and coordinate efforts. It may include
features such as case management, progress tracking, and the ability to generate reports and
analytics for improved decision-making.
Mobile-Friendly Interface: The system is designed to be responsive and mobile-friendly,
allowing users to access and interact with it seamlessly across different devices, including
smartphones and tablets.
Data Privacy and Security: Strong data privacy measures are implemented to protect
sensitive information. This includes encryption of data, secure access controls, and compliance
with relevant privacy regulations to ensure the confidentiality and integrity of the stored data.
3.3 Feasibility Study:
Technical Feasibility:
Technical Expertise: Evaluate the availability of technical expertise and resources required
to develop, implement, and maintain the system, including web development, database
management, and integration with other technologies.
✓ Infrastructure: Assess the existing infrastructure and determine if it can support the
system's requirements, including server capacity, network bandwidth, and data storage
capabilities.
✓ Compatibility: Consider the compatibility of the system with various web browsers,
operating systems, and mobile devices to ensure broad accessibility and usability.
Economic Feasibility:
✓ Cost-Benefit Analysis: Evaluate the costs associated with developing and maintaining
the system, including software development, hardware infrastructure, licensing, and
ongoing support. Compare these costs against the expected benefits, such as improved
efficiency, reduced search times, and potential lives saved.
✓ Return on Investment (ROI): Calculate the potential ROI based on the estimated time
and resources saved, increased public engagement, and the value of successful
outcomes in missing person cases.
✓ Funding Sources: Identify potential funding sources, such as government grants,
partnerships with organizations, or public donations, to support the development and
operation of the system.
Operational Feasibility:
✓ User Requirements: Identify the specific needs and requirements of the users, such as
law enforcement agencies, families, and the public. Ensure that the proposed system
addresses these requirements effectively and improves operational efficiency in missing
person identification efforts.
8
MISSING PERSON IDENTIFICATION SYSTEM
✓ Stakeholder Buy-In: Assess the level of support and buy-in from key stakeholders,
including law enforcement agencies, government bodies, and community organizations.
Engage them early in the process to understand their needs, gain support, and foster
collaboration.
✓ Training and Adoption: Evaluate the feasibility of training users on the system's
functionalities and ensuring its adoption by the target audience. Plan for user training
sessions and provide user-friendly documentation and support to facilitate smooth
adoption and utilization.
Legal and Ethical Considerations:
✓ Data Privacy: Ensure compliance with applicable data protection laws and regulations
to protect the privacy and confidentiality of the information stored in the system.
Implement appropriate security measures, user access controls, and consent mechanisms.
✓ Ethical Considerations: Address ethical concerns related to the system, such as
responsible use of data, prevention of misuse, and safeguarding the rights and dignity of
missing persons and their families.
Risk Analysis:
Identify potential risks and challenges associated with the implementation and operation of the
system, such as technical issues, data breaches, system scalability, or user adoption.
Develop risk mitigation strategies to minimize the impact of these risks and ensure the system's
smooth functioning.
3.4 Functional Requirements:
• User Registration and Authentication:
Allow users to register and create accounts with appropriate roles and permissions.
Implement secure authentication mechanisms to ensure authorized access to the system.
• Missing Person Profile Management:
Enable authorized users to create, update, and manage missing person profiles.
Capture relevant information such as name, age, physical description, last known
location, photographs, and any distinguishing features.
Provide options for adding additional details about the circumstances of the
disappearance.
• Search and Filtering Functionality:
Implement robust search capabilities to allow users to search for missing persons based
on various criteria, such as name, age, gender, location, or date of disappearance.
Provide filtering options to refine search results based on specific attributes or
characteristics.
• Reporting and Information Submission:
Enable users to report missing persons through an intuitive and user-friendly interface.
Capture information from users, such as contact details, relationship to the missing
person, and any relevant information or leads.
Allow users to upload photographs or other supporting documents related to the missing
person.
• Notifications and Alerts:
Send notifications and alerts to registered users about newly reported missing persons or
9
MISSING PERSON IDENTIFICATION SYSTEM
10
MISSING PERSON IDENTIFICATION SYSTEM
The system should have minimal downtime and high availability to ensure uninterrupted
access.
• Security:
The system should employ robust security measures to protect sensitive personal
information.
It should incorporate encryption techniques to secure data transmission and storage.
Access controls should be implemented to restrict unauthorized access to the system and
its data.
• Scalability:
The system should be able to handle an increasing number of users and growing data
volume over time.
It should be designed to accommodate future expansion or integration with additional
functionalities or modules.
• Reliability:
The system should be reliable and provide accurate and consistent information.
It should have mechanisms in place to handle errors and exceptions gracefully.
Regular backups and disaster recovery plans should be implemented to safeguard data.
• Compatibility:
The system should be compatible with different web browsers, operating systems, and
devices.
It should conform to web standards and guidelines to ensure a consistent experience across
platforms.
• Interoperability:
The system should be designed to integrate with existing databases, systems, or external
APIs for data exchange.
It should support data sharing and interoperability between different stakeholders involved
in missing person identification efforts.
• Compliance:
The system should adhere to relevant legal and regulatory requirements, such as data
protection and privacy laws.
It should comply with ethical guidelines and respect the rights and dignity of missing
persons and their families.
• Performance Monitoring and Logging:
The system should include mechanisms for monitoring performance metrics and logging
system activities for auditing and troubleshooting purposes.
It should provide administrators with insights into system usage, performance bottlenecks,
and potential issues.
• Documentation and Support:
The system should have comprehensive documentation, including user manuals and
guides.
11
MISSING PERSON IDENTIFICATION SYSTEM
12
MISSING PERSON IDENTIFICATION SYSTEM
4. SYSTEM DESIGN
4.1 INTRODUCTION:
The system design of a missing person identification system in web technologies
encompasses the planning and structuring of the system's components and functionalities to
achieve its objectives efficiently. The design phase focuses on defining the system's
architecture, data flow, user interface, and integration with various technologies. At its core,
the system architecture establishes the overall structure, including the client-server model
where the web browser acts as the client communicating with the server for data retrieval and
storage. Scalability is a crucial consideration to accommodate future growth and potential
integration with additional modules or external systems. The data model and database design
determine the structure, relationships, and storage mechanisms for the system's data, ensuring
efficiency, security, and privacy through appropriate measures like encryption and access
controls. The user interface design emphasizes creating an intuitive and user-friendly interface,
considering wireframing, prototyping, and graphical elements that prioritize usability,
accessibility, and responsiveness across different devices. Integration with external systems
and APIs is also a key aspect, facilitating the exchange of data with law enforcement databases,
social media platforms, mapping services, or other relevant systems to enhance functionality
and gather additional information. The system design serves as the foundation for
implementing a robust and effective missing person identification system in web technologies.
4.2 System Architecture:
Description:
The Missing Person Identification System is designed with a comprehensive system
architecture to efficiently locate and identify missing individuals. The architecture consists of
several key components. Firstly, a centralized database stores detailed information about
missing persons, including photographs, physical characteristics, and relevant case details.
This database is securely accessible to authorized law enforcement agencies, enabling efficient
searching and matching. The system also incorporates a robust search engine that utilizes
advanced algorithms to compare input data against the database, generating potential matches
based on similarities. To enhance the system's effectiveness, facial recognition technology is
integrated, allowing for automatic comparison of facial features between the missing person
13
MISSING PERSON IDENTIFICATION SYSTEM
and potential matches. Additionally, the architecture includes a user-friendly interface for law
enforcement personnel to input and retrieve information quickly, streamlining the
identification process. The Missing Person Identification System's well-structured architecture
optimizes data management, search capabilities, and facial recognition to expedite the
identification of missing individuals and reunite them with their families
Missing Person Identification Systems are:
• Missing person identification systems are technological solutions designed to assist in
the search, identification, and reunification of missing individuals with their families or
guardians. These systems utilize various technologies, including web-based platforms,
databases, and communication tools, to facilitate the collection, management, and
dissemination of information related to missing persons.
• These systems typically involve the creation of comprehensive profiles for missing
individuals, including their personal details, physical descriptions, last known locations, and
photographs. The profiles may also include information about the circumstances of their
disappearance, any distinguishing features, or potential leads.
• The systems provide functionalities such as advanced search capabilities, filtering
options, and mapping features to assist in locating missing persons based on various criteria.
They often integrate with external systems, such as law enforcement databases, social media
platforms, or geographic information systems, to gather additional data or share information
with relevant stakeholders.
• Missing person identification systems also support collaboration and communication
among authorized users, such as law enforcement agencies, families, and the public. They may
include features for reporting missing persons, providing updates, sharing leads, and
coordinating search efforts. Notifications and alerts can be sent to registered users to inform
them about newly reported missing persons or updates on ongoing investigations.
• The primary goal of these systems is to leverage technology to improve the efficiency
and effectiveness of locating missing individuals, increasing their chances of being found and
reunited with their loved ones. They serve as valuable tools for raising awareness, engaging
communities, and fostering collaboration in the search for missing persons.
4.3 Use case Diagram:
Use Case diagrams identify the functionality provided by the system (use cases), the users
who interact with the system (actors), and the association between the users and the
functionality. Use Cases are used in the Analysis phase of software development to articulate
the high-level requirements of the system. The primary goals of Use Case diagrams include:
Providing a high-level view of what the system does.
Identifying the users ("actors") of the system.
Determining areas needing human-computer interfaces.
Graphical Notation: The basic components of Use Case diagrams are the Actor, the Use
Case, and the Association.
Actor An Actor, as mentioned, is a user of the system, and is depicted using
a stick figure. The role of the user is written beneath the icon. Actors
are not limited to humans. If a system communicates with another
14
MISSING PERSON IDENTIFICATION SYSTEM
Behind each Use Case is a series of actions to achieve the proper functionality, as well as
alternate paths for instances where validation fails, or errors occur. These actions can be further
defined in a Use Case description. Because this is not addressed in UML, there are no standards
for Use Case descriptions. However, there are some common templates can follow, and whole
books on the subject writing of Use Case description. A use case diagram is a graphical
depiction of a user's possible interactions with a system. A use case diagram shows various use
cases and different types of users the system has and will often be accompanied by other types
of diagrams as well. The use cases are represented by either circles or ellipses.
Participating User
actors
15
MISSING PERSON IDENTIFICATION SYSTEM
16
MISSING PERSON IDENTIFICATION SYSTEM
identifying information.
• User submits the search request.
• The system processes the search query and
compares it with the available data in the database.
• The system retrieves potential matches based on
the search criteria.
• The system presents the list of potential matches
to the user.
Pre-condition User is logged into the Missing Person Identification
System portal.
Post condition The system displays a list of potential matches based
on the user's search criteria.
Table 4.3.3: Use case template for Find Matching
17
MISSING PERSON IDENTIFICATION SYSTEM
18
MISSING PERSON IDENTIFICATION SYSTEM
19
MISSING PERSON IDENTIFICATION SYSTEM
Description:
The Missing Person Identification System class diagram depicts the key classes and their
relationships. The diagram includes classes such as Missing Person, Range , Search Criteria,
User and Missing Person system.
4.5 Sequence Diagram:
Sequence diagrams document the interactions between classes to achieve a result, such as
a use case. Because UML is designed for object-oriented programming, these
communications between classes are known as messages. The Sequence diagram lists objects
horizontally, and time vertically, and models these messages over time.
Graphical Notation: In a Sequence diagram, classes and actors are listed as columns, with vertical
lifelines indicating the lifetime of the object over time.
Object Objects are instances of classes and are arranged
horizontally. The pictorial representation for an object is
a class (a rectangle) with the name prefixed by the object
name (optional) and a semi-colon.
Lifeline The Lifeline identifies the existence of
the object over time. The notation for a Lifeline
is a vertical dotted line extending from an
object.
Activation Activations, modeled as rectangular boxes on the
lifeline, indicate when the object isacting.
Message Messages, modeled as horizontal arrows
between Activations, indicate the communications between
object
20
MISSING PERSON IDENTIFICATION SYSTEM
21
MISSING PERSON IDENTIFICATION SYSTEM
represents the transition from one activity to the next. An activity diagram describes a system
in terms of activities.
Activities are the state that represents the execution of a set of operations.
These are similar to flow chart diagrams and data flow.
Initial state: which state is starting the process?
Action State: An action state represents the execution of an atomic action, typically the
invocation of an operation. An action state is a simple state with an entry action whose only
exit transition is triggered by the implicit event of completing the executionof the entry
action.
Transition: A transition is a directed relationship between a source state vertex and a target
state vertex. It may be part of a compound transition, which takes the static machine from one
static configuration to another, representing the complete response of the static machine to a
particular event instance.
Final state: A final state represents the enclosing composite state's last or "final" state.
There may be more than one final state at any level signifying that the composite state can end
in different ways or conditions.
When a final state is reached and there are no other enclosing states, the entire state machine
has completed its transitions and no more transitions can occur.
22
MISSING PERSON IDENTIFICATION SYSTEM
23
MISSING PERSON IDENTIFICATION SYSTEM
5. TECHNOLOGY DESCRIPTION
5.1 Introduction to HTML:
In the late 1980's, a physicist, Tim Berners-Lee who was a contractor at CERN, proposed
a system for CERN researchers. In 1989, he wrote a memo proposing an internet-based
hypertext system.
Tim Berners-Lee is known as the father of HTML. The first available description of HTML
was a document called "HTML Tags" proposed by Tim in late 1991. The latest version of
HTML is HTML5, which we will learn later in this tutorial.
Hypertext Mark-up Language (HTML), the languages of the world wide web (WWW),
allows users to produce web pages that included text, graphics and pointer to other web pages
(Hyperlinks).HTML is not a programming language but it is an applications of ISO standard
8879, SGML (Standard Generalized Mark -up Language), but specialized to hypertext and
adapted to the web. The idea behind Hypertext one point to another point. We can navigate
through the information based on out interest and preference. A mark-up language is simply a
series of enclosed within the elements shouldbe displayed.
Hyperlinks are underlined or emphasized works that load to other documents or some
portions of the same document. Html can be used to display any type of document on the host
computer, which can be geographically at a different location. It is a versatile language and
can be used on any platform or desktop. HTML provides tags (special code)to make the
document look attractive. HTML provides or not case –sensitive. Using graphics, fonts,
different sizes, colour, etc. can enhance the presentation of the document. Anything that is not
a tag is part of the document itself.
24
MISSING PERSON IDENTIFICATION SYSTEM
25
MISSING PERSON IDENTIFICATION SYSTEM
26
MISSING PERSON IDENTIFICATION SYSTEM
and the communities that formed aroundthem. Many new libraries were created, including
jQuery, Prototype, Dojo Toolkit, and Motoes.
Google debuted its Chrome browser in 2008, with the V8 JavaScript engine that was faster
than its competition. The key innovation was just-in-time compilation (JIT), soother browser
vendors needed to overhaul their engines for JIT.in July 2008.
5.4 Introduction to Django:
Django is a high-level Python web framework that enables rapid development of secure
and maintainable websites. Built by experienced developers, Django takes care of much of the
hassle of web development, so you can focus on writing your app without needing to reinvent
the wheel. Django is used for development of different types of websites, in particular, a highly
custom is able app, such as a social media website. Django is a free, open source, high-end
framework written in the famously simple, flexible, and relatively easy-to-learn Python
programming language.
Features of Django Framework:
This is one of the main reasons to start learning Django.
• Python Web-framework
• SEO Optimised.
• High Scalability.
• Versatile in Nature.
• Offers High Security.
• Thoroughly Tested.
• Provides Rapid Development.
Starting a Django project allows you to build your application's entire data model in Python
without needing to use SQL. Using an object-relational mapper (ORM), Django converts
traditional database structure into Python classes to make it easier to work within a fully Python
environment.
Django is the best framework for web applications, as it allows developers to use modules
for faster development. As a developer, you can make use of these modulesto create apps,
websites from an existing source. It speeds up the development processgreatly, as you do not
have to code everything from scratch. Django is a free and opensource web application
framework, written in Python. A web framework is a set of components that helps you to
develop websites faster and easier.
When you're building a website, you always need a similar set of components: a way to
handle user authentication (signing up, signing in, signing out), a management panel for your
website, forms, a way to upload files, etc. Luckily for you, other people long ago noticed that
web developers face similar problems when building a new site, so they teamed up and created
frameworks (Django being one of them) that give you ready-made components to use.
Frameworks exist to save you from having to reinvent the wheel and to help alleviate some of
the overhead when you’re building a new site.
Django can be (and has been) used to build almost any type of website — from content
management systems and wikis, through to social networks and news sites. It can work with
any client-side framework, and can deliver content in almost any format (including HTML,
RSS feeds, JSON, XML, etc). For example, Django provides a secure way to manage user
27
MISSING PERSON IDENTIFICATION SYSTEM
accounts and passwords, avoiding common mistakes like putting session information in
cookies where it is vulnerable (instead cookies just contain a key, and the actual data is stored
in the database) or directly storing passwords rather than a password hash. A password hash is
a fixed-length value created by sending the password through a cryptographic hash function.
Django can check if an entered password is correct by running it through the hash function
and comparing the output to the stored hash value. However due to the "one- way" nature of
the function, even if a stored hash value is compromised it is hard for an attacker to work out
the original password. Django enables protection against many vulnerabilities by default,
including SQL injection, cross-site scripting, cross-site request forgery and click jacking (see
Website security for more details of such attacks). Scalable Django uses a component-
based"shared-nothing" architecture (each part of the architecture is independent of the others,
and can hence be replaced or changed if needed). Having a clear separation between the
different parts means that it can scale for increased traffic by adding hardware at any
level:caching servers, database servers, or application servers.
5.5 Introduction to Python:
Python is a widely used general-purpose, high level programming language.It
was created by Guido van Rossum in 1991 and further developed by the Python
Software Foundation. It was designed with an emphasis on code readability, and its
syntax allows programmers to express their concepts in fewer lines of code.
Python is a programming language that lets you work quickly and integratesystems
more efficiently.
5.6 Features:
• Easy: When we say the word ‘easy’, we mean it in different contexts.
A. Easy to Code:
Python is very easy to code as compared to other popular languages like
Java andC++.
B. Easy to Read:
Being a high-level language, Python code is quite like English. Looking at it, you
can tell what the code is supposed to do. Also, since it is dynamically typed, it
mandates indentation. This aids readability.
• Free and Open-Source:
Firstly, Python is freely available. You can download it from the Python website. Secondly,
itis open source. This means that its source code is available to the public. You can download
it, change it, use it, and distribute it. This is called FLOSS (Free/Libre and Open-Source
Software). As the Python community, we’re all headed toward one goal- an ever-bettering
Python.
• High-Level:
Python is a high-level language. This means that as programmers, we don’t need to
remember the system architecture. Also, we need not manage memory. This makes it more
programmer-friendly and is one of the key python features.
• Object-Oriented:
28
MISSING PERSON IDENTIFICATION SYSTEM
A programming language that can model the real world is said to be object-oriented. It
focuses on objects and combines data and functions. Contrarily, a procedure-oriented language
revolves around functions, which are code that can be reused. Python supports both procedure-
oriented and object-oriented programming which is one ofthe key python features. It also
supports multiple inheritance, unlike Java. A class is a blueprint for such an object. It is an
abstract data type and holds no values.
• Embeddable:
We just saw that we can put code in other languages in our Python source code. However,
it is also possible to put our Python code in a source code in a different language like C++.This
allows us to integrate scripting capabilities into our program of the other language. Large
Standard Library:
Python downloads with a large library that you can use so you don’t have to write your
own code for everything. There are libraries for regular expressions, documentation-
generation, unit-testing, web browsers, threading, databases, CGI, email, image manipulation,
and a lot of other functionality.
• GUI Programming:
Software is not user-friendly until its GUI is made. A user can easily interact with the
software with a GUI. Python offers various libraries for making Graphical user interface for
your applications. For this, you can use Tkinter, wxPython or JPython. These toolkits allow
you for easy and fast development of GUI.
• Dynamically Typed:
Python is dynamically typed. This means that the type for a value is decided at runtime,
not in advance. This is why we don’t need to specify the type of data while declaring it. This
is all about the features of the python programming language.
Web and Internet Development:
Python lets you develop a web application without too much trouble. It has libraries for
internet protocols like HTML and XML, JSON, e-mail processing, FTP, IMAP, and easy-to-
use socket interface. Yet, the package index has more libraries:
• Requests – An HTTP client library
• Beautiful Soup – An HTML parser
• Feed parser – For parsing RSS/Atom feeds
• Paramak – For implementing the SSH2 protocol
• Twisted Python – For asynchronous network programming
5.7 Introduction to Bootstrap:
Bootstrap is a powerful front-end framework that can greatly benefit a missing person
identification system. It provides a range of features and components that contribute to creating
an efficient and user-friendly interface. With its responsive grid system, the system's layout
can adapt to different screen sizes and devices, ensuring accessibility for authorities,
volunteers, and the public.
One of Bootstrap's key advantages is its extensive collection of UI components. These
components, such as buttons, forms, and input fields, can be seamlessly integrated into the
missing person identification system. By utilizing Bootstrap's CSS classes, these components
29
MISSING PERSON IDENTIFICATION SYSTEM
can be styled consistently, resulting in a cohesive and visually appealing user interface. This
enhances the user experience by facilitating easy input and search for information related to
missing persons.
Navigation is crucial in a missing person identification system, and Bootstrap offers an
array of navigation components. Navigation bars, dropdown menus, and sidebars can be
utilized to organize different sections and features of the system. This enables users to navigate
seamlessly through the system, accessing various functionalities and information with ease.
To effectively communicate important updates and notifications, Bootstrap's alert
components are valuable. These alerts can be employed to highlight critical information, such
as new reports, ongoing investigations, or reunification details. By using Bootstrap's alert
components, users can quickly notice and respond to crucial updates, ensuring efficient
collaboration and communication within the system
When displaying detailed information or requesting additional details from users,
Bootstrap's modal components are highly useful. Modals provide a focused and interactive
overlay that allows users to view and enter information without leaving the main interface.
This ensures a seamless user experience and improves efficiency when working with missing
person data.
Bootstrap's customization capabilities are also beneficial for a missing person identification
system. The framework can be tailored to match the system's branding or visual requirements,
ensuring a consistent and unique look and feel. By customizing the styles and components, the
system can maintain its visual identity while providing an intuitive and familiar interface for
users.
Overall, Bootstrap's responsive design, comprehensive UI components, navigation
features, alerts and notifications, modals, and customization options make it an ideal
framework for enhancing the usability and visual appeal of a missing person identification
system. It simplifies the development process and empowers developers to create a seamless
and efficient interface that supports the critical task of identifying and locating missing persons
Features of bootstrap:
Bootstrap is a feature-rich front-end framework that offers a wide range of
components and utilities to streamline web development. Here are some key features
of Bootstrap:
Responsive Grid System: Bootstrap provides a responsive grid system based on a
12-column layout. This grid system allows developers to create responsive and fluid
layouts that automatically adjust to different screen sizes and devices.
Pre-built CSS Components: Bootstrap offers a comprehensive set of CSS
components that can be easily integrated into a project. These components include
buttons, forms, navigation bars, dropdowns, cards, modals, carousels, tooltips, and
much more. They are designed to be reusable, customizable, and consistent across
different browsers.
JavaScript Plugins: Bootstrap comes with a variety of JavaScript plugins that add
interactive and dynamic functionalities to your website or web application. These
plugins handle tasks such as sliders, modals, dropdown menus, tooltips, and form
30
MISSING PERSON IDENTIFICATION SYSTEM
31
MISSING PERSON IDENTIFICATION SYSTEM
quickly assemble and test the visual and interactive elements of a website or web
application, saving time and effort during the initial stages of development.
Mobile-First Development: With the increasing importance of mobile devices,
Bootstrap's mobile-first approach becomes invaluable. By utilizing Bootstrap,
developers can prioritize mobile optimization and ensure that their websites or
applications are designed with mobile users in mind from the outset.
Content Management Systems (CMS): Bootstrap can be integrated into popular
CMS platforms like WordPress, Drupal, and Joomla to enhance the design and
functionality of websites. It provides a consistent and customizable framework for
building themes and templates, allowing developers to create visually appealing and
feature-rich CMS-based websites.
Single-Page Applications (SPAs): Bootstrap can be used in the development of
SPAs, where the entire application resides on a single web page. Its components and
responsive design capabilities enable developers to create dynamic and interactive user
interfaces for SPAs, enhancing the user experience.
Cross-Browser Compatibility: Bootstrap's built-in CSS normalization and
browser compatibility features ensure consistent rendering across different browsers
and platforms. This makes it an excellent choice for projects that require broad cross-
browser support and consistent design across multiple devices.
Custom Design Projects: While Bootstrap provides a default set of styles and
components, it is highly customizable. Developers can override the default styles using
Sass (Syntactically Awesome Style Sheets) and customize the framework to match
specific design requirements, enabling the creation of unique and branded interfaces.
32
MISSING PERSON IDENTIFICATION SYSTEM
6 SAMPLE CODE
1. Index.html :
The "index.html" file is a commonly used default filename for the main HTML file of a
website or web application. It serves as the entry point or the starting page for a website. When
a user accesses a website, the web server typically looks for an "index.html" file in the root
directory of the website and serves it as the initial page.
{% extends 'landing/base.html' %}
{% load static %}
{% block content %}
<!-- ======= Hero Section ======= -->
<section id="hero" class="d-flex align-items-center">
<div class="container">
<div class="row">
<div class="col-lg-6 d-flex flex-column justify-content-center pt-4 pt-lg-0 order-2 order-lg-"
data-aos="fade-up" data-aos-delay="200">
<h1>Even One Missing Person Is One Too Many!</h1>
<h2>Face Find, firmly believes in that, and we are committed to change this by finding
missing people using Computer Vision and Face Recognition Technologies.</h2>
<div class="d-flex justify-content-center justify-content-lg-start">
<a href="#about" class="btn-get-started scrollto">Get Started</a>
<a href="https://youtu.be/onXOQIu5jCg" class="glightbox btn-watch-video"><i
class="bi bi-play-circle"></i><span>Demo Video</span></a>
</div>
</div>
<div class="col-lg-6 order-1 order-lg-2 hero-img" data-aos="zoom-in" data-aos-
delay="200">
<img src="{% static 'landing/img/hero1.png' %}" class="img-fluid animated" alt="">
</div>
</div>
</div>
</section><!-- End Hero -->
<main id="main">
<!-- ======= About Us Section ======= -->
<section id="about" class="about">
<div class="container" data-aos="fade-up">
<div class="section-title">
<h2>About Us</h2>
</div>
<div class="row content">
<div class="col-lg-6">
<p>
The thought of a family member, a friend or someone else you care about going missing can
be terrifying.
33
MISSING PERSON IDENTIFICATION SYSTEM
We at FaceFind help find your loved ones using Face Recognition Technologies. If someone
you know is missing, then,
</p>
<ul>
<li><i class="ri-check-double-line"></i>Register the missing person with us. </li>
<li><i class="ri-check-double-line"></i>We will contact you for a background check.</li>
<li><i class="ri-check-double-line"></i>Once verified, the missing person is added to our
database of missing people.</li>
<li><i class="ri-check-double-line"></i>When volunteers report a suspected missing person,
we use face recognition to identify a potential match with our
database. </li>
<li><i class="ri-check-double-line"></i>If a match is found we will report to the local
authorities and contact you.</li>
</ul>
<a href="{% url 'create_missing_person' %}" class="btn-learn-more">Register
Missing Person</a>
</div>
<div class="col-lg-6 pt-4 pt-lg-0">
<p>
It is estimated that a child goes missing in India every eight minutes. Millions end up in
forced labour, domestic slavery and sex work, in what’s become a lucrative industry.
If you ever suspect a person could have been trafficked this way,
</p>
<ul>
<li><i class="ri-check-double-line"></i>Report the suspected person.</li>
<li><i class="ri-check-double-line"></i>We will cross-verify the report to check its
validity.</li>
<li><i class="ri-check-double-line"></i>Once verified, use face recognition to identify a
potential match with our database of missing people. </li>
<li><i class="ri-check-double-line"></i>If a match is found we will report to the local
authorities and contact the family/guardian. </li>
</ul>
<a href="{% url 'create_reported_person' %}" class="btn-learn-more">Report a
Suspected Missing Person</a>
</div>
</div>
</div>
</section><!-- End About Us Section -->
<!-- ======= Technology Section ======= -->
<section id="services" class="services section-bg">
<div class="container" data-aos="fade-up">
<div class="section-title">
<h2>Technology</h2>
<p>To achieve our goal of finding missing people, we make use of the following
34
MISSING PERSON IDENTIFICATION SYSTEM
technologies,</p>
</div>
<div class="row">
<div class="col-xl-3 col-md-6 d-flex align-items-stretch" data-aos="zoom-in"
data-aos-delay="100">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://getbootstrap.com/">Bootstrap</a></h4>
<p>A free and open-source framework of HTML, CSS and JavaScript, directed at
responsive, mobile-first front-end web development.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-md-0"data-aos="zoom-in"
data-aos-delay="200">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://www.djangoproject.com/">Django</a></h4>
<p>A free and open-source, high-level Python based web framework that enables rapid
development of secure and maintainable websites.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-xl-0"data-aos="zoom-in"
data-aos-delay="300">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://azure.microsoft.com/en-in/services/cognitive-
services/face/#overview">Azure
Face API</a></h4>
<p>An AI service by Microsoft that can detect, identify and analyze faces in images and
videos.</p>
</div>
</div>
<div class="col-xl-3 col-md-6 d-flex align-items-stretch mt-4 mt-xl-0"
data-aos="zoom-in" data-aos-delay="400">
<div class="icon-box">
<div class="icon"><i class="bx bx-layer"></i></div>
<h4><a href="https://www.sqlite.org/index.html">SQLite</a></h4>
<p>An in-process library that implements a self-contained, serverless,
zero-configuration, transactional SQL database engine.</p>
</div>
</div>
</div>
</div>
</section><!-- End Technology Section -->
35
MISSING PERSON IDENTIFICATION SYSTEM
36
MISSING PERSON IDENTIFICATION SYSTEM
</p>
</div>
</li>
<li data-aos="fade-up" data-aos-delay="300">
<i class="bx bx-help-circle icon-help"> </i> <a data-bs-toggle="collapse" data-bs-
target="#faq-list-3" class="collapsed">How does Azure's Face API work? <i class="bx bx-
chevron-down icon-show"> </i> <i class="bx bx-chevron-up icon-close"> </i> </a>
<div id="faq-list-3" class="collapse" data-bs-parent=".faq-list">
<p>
Firstly, it detects a face in the given image and
generates
a unique identifier string for the detected face in the
image.
Then to check if two images contain the same person, we use the Find Similar API, that
searchs for similar-looking faces given a target Face ID and Face ID array. The API returns a
JSON object containing the matched
Face ID from the given array along with the confidence score.
</p>
</div>
</li>
<li data-aos="fade-up" data-aos-delay="300">
<i class="bx bx-help-circle icon-help"></i> <a data-bs-toggle="collapse"
data-bs-target="#faq-list-4" class="collapsed">This seems
interesting. How can I help? <i
class="bx bx-chevron-down icon-show"></i><i
class="bx bx-chevron-up icon-close"></i></a>
<div id="faq-list-4" class="collapse" data-bs-parent=".faq-list">
<p>
Thank you for your interest. Every help towards finding a loved one gone missing counts.
You can help us in the following ways, <br>
<i class="ri-check-double-line"></i>Please
volunteer to spot suspected missing people and report them. <br>
<i class="ri-check-double-line"></i>Connect us with NGOs working in this space. <br>
<i class="ri-check-double-line"></i>Connect us with relevant state and central
government departments. <br>
<i class="ri-check-double-line"></i>Sponsor hosting fees. <br>
<i class="ri-check-double-line"></i>Sponsor Azure API charges. <br>
<i class="ri-check-double-line"></i>Contact us at [email protected] for more details.
<br>
</p>
</div>
</li>
</ul>
</div>
37
MISSING PERSON IDENTIFICATION SYSTEM
</div>
</section><!-- End Frequently Asked Questions Section -->
<! -- ======= Footer ======= -->
<footer id="footer">
<div class="container footer-bottom clearfix">
<div class="copyright">
© Copyright <strong><span>Face Find</span></strong>. All Rights Reserved
</div>
<div class="credits">
Designed by <a href="https://bootstrapmade.com/">BootstrapMade</a>
</div>
</div>
</footer><!-- End Footer -->
</main>
{% endblock content%}
2. Base.html:
The term "base.html" typically refers to a base or template file used in web development
frameworks that support template engines. In this context, a base.html file serves as a
foundational template that contains common elements shared across multiple web pages within
a website.
% load static %}
<!DOCTYPE html>
<html lang="eng">
<head>
{% block title %}
<title>Missing Person</title>
{% endblock title%}
{% block favicon %}
<link rel="shortcut icon" type="image/png" href="{% static 'favicon/favicon.jpg' %}" />
{% endblock favicon %}
{% block meta %}
{% block meta_charset %}
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
{% endblock meta_charset %}
{% block meta_contentlanguage %}
<meta http-equiv="Content-Language" value="en-US" />
{% endblock meta_contentlanguage %}
{% block meta_viewport %}
<meta name="viewport" content="width=device-width, initial-scale=1.0">
{% endblock meta_viewport %}
{% endblock meta %}
{% block head %}
{% load static %}
<!-- Favicons -->
<link href="{% static 'landing/img/face2.png' %}" rel="icon">
<link href="{% static 'landing/img/apple-touch-icon.png' %}" rel="apple-touch-icon">
<!-- Google Fonts -->
38
MISSING PERSON IDENTIFICATION SYSTEM
39
MISSING PERSON IDENTIFICATION SYSTEM
40
MISSING PERSON IDENTIFICATION SYSTEM
41
MISSING PERSON IDENTIFICATION SYSTEM
)
RELATIONSHIP_CATEGORY_CHOICES = (
("Father", "Father"),
("Mother", "Mother"),
("Brother", "Brother"),
("Sister", "Sister"),
("Husband", "Husband"),
("Wife", "Wife"),
("Guardian", "Guardian"),
("Relative", "Relative"),
("Friend", "Friend"),
("Other", "Other"),
)
CURRENT_STATUS_CHOICES = (
("New", "New"),
("Leads", "Leads"),
("Found", "Found"),
("Closed", "Closed"),
)
# basic info fields
first_name = models.CharField(verbose_name="Given Name", max_length=200,
blank=False, null=False)
last_name = models.CharField(verbose_name="Last Name", max_length=200, blank=False,
null=False)
age = models.CharField(verbose_name="Age of Missing Person",max_length=200,
blank=False, null=False, )
gender = models.CharField(verbose_name="Gender of Missing Person", choices =
GENDER_CATEGORY_CHOICES, max_length=200, blank=False, null=False)
last_seen = models.CharField(verbose_name="Last Seen Location", max_length=200,
blank=False, null=False)
description = models.TextField(verbose_name="Any Other Important
Details",max_length=1000, blank=True, null=True)
photo = models.ImageField(verbose_name="Upload Photo of Missing
Person",upload_to="missingpersons/", blank=False, null=False )
# info of person to be contacted if missing person found
contact_person = models.CharField(verbose_name="Contact Person", max_length=200,
blank=False, null=False)
contact_relationship = models.CharField(verbose_name="Relationship with Missing
Person", choices=RELATIONSHIP_CATEGORY_CHOICES, max_length=200,
blank=False, null=False)
contact_email = models.EmailField(verbose_name="Contact Email ID",max_length=254,
blank=False, null=False)
phone = PhoneNumberField(verbose_name="Contact Number", null=False, blank=False, )
# currents status of case ie new/leads/found/closed
status = models.CharField(verbose_name="Current Status",
choices=CURRENT_STATUS_CHOICES, max_length=200, blank=False, null=False,
default="New")
# fields used in AI face recognition
is_verified = models.BooleanField(verbose_name="Person Background Check Done?",
default=False)
42
MISSING PERSON IDENTIFICATION SYSTEM
43
MISSING PERSON IDENTIFICATION SYSTEM
urlpatterns = [
# urls for missing person list views
path('list-missing-person/', MissingPersonListView.as_view(), name='list_missing_person'),
path('list-missing-person-to-be-verified/', MissingPersonToBeApprovedListView.as_view(),
name='list_missing_person_to_be_verified'),
path('list-missing-person-with-leads/', MissingPersonWithLeadsListView.as_view(),
name='list_missing_person_with_leads'),
path('list-missing-person-found/', MissingPersonFoundListView.as_view(),
name='list_missing_person_found'),
# urls for missing person create, update verify, delete
path('create-missing-person/', MissingPersonCreateView.as_view(),
name='create_missing_person'),
path('update-missing-person/<int:pk>', MisssingPersonUpdateView.as_view(),
name='update_missing_person'),
path('delete-missing-person/<int:pk>', MisssingPersonDeleteView.as_view(),
name='delete_missing_person'),
path('verify-missing-person/<int:pk>', MisssingPersonVerifyView.as_view(),
name='verify_missing_person'),
# url to update status of missing person
path('missing-person-match/<int:pk>', missing_person_update_status,
name='missing_person_match'),
# urls for reported person list views
path('list-reported-person/', ReportedPersonListView.as_view(),
name='list_reported_person'),
path('list-reported-person-to-be-verified/',
ReportedPersonToBeApprovedListView.as_view(),
name='list_reported_person_to_be_verified'),
path('list-reported-person-match-found/', ReportedPersonMatchedListView.as_view(),
name='list_reported_person_match_found'),
path('list-reported-person-match-not-found/',
ReportedPersonNotMatchedListView.as_view(),
name='list_reported_person_match_not_found'),
# urls for reported person create, update verify, delete
path('create-reported-person/', ReportedPersonCreateView.as_view(),
name='create_reported_person'),
path('update-reported-person/<int:pk>', ReportedPersonUpdateView.as_view(),
name='update_reported_person'),
path('delete-reported-person/<int:pk>', ReportedPersonDeleteView.as_view(),
name='delete_reported_person'),
path('verify-reported-person/<int:pk>', ReportedPersonVerifyView.as_view(),
name='verify_reported_person'),
# url for showing found/matched person
path('show-found-person/<str:face_id>', FoundPersonTemplateView.as_view(),
name='show_found_person'),
# urls for form success
path('missing-person-form-success/', MissingPersonFormSuccessView.as_view(),
name='missing_person_form_success'),
path('reported-person-form-success/', ReportedPersonFormSuccessView.as_view(),
name='reported_person_form_success'),
]
44
MISSING PERSON IDENTIFICATION SYSTEM
45
MISSING PERSON IDENTIFICATION SYSTEM
]
WSGI_APPLICATION = 'msengage.wsgi.application'
4. Database:
A database is an organized collection of structured data that is stored and managed in a
systematic manner. It is designed to efficiently store, retrieve, and manage vast amounts of
information. Databases are commonly used in various applications, ranging from simple data
storage systems to complex enterprise-level software.
# https://docs.djangoproject.com/en/4.0/ref/settings/#databases
DATABASES = {
'default': {
'ENGINE': 'django.db.backends.sqlite3',
'NAME': BASE_DIR / 'msengage.sqlite3',
}
}
# Password validation
# https://docs.djangoproject.com/en/4.0/ref/settings/#auth-password-validators
AUTH_PASSWORD_VALIDATORS = [
{
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
},
]
# Internationalization
# https://docs.djangoproject.com/en/4.0/topics/i18n/
LANGUAGE_CODE = 'en-us'
TIME_ZONE = 'Asia/Kolkata'
USE_I18N = True
# USE_TZ = True
# Static files (CSS, JavaScript, Images)
# https://docs.djangoproject.com/en/4.0/howto/static-files/
print ("Using local static and media files")
STATIC_URL = '/static/'
STATIC_ROOT = os.path.join(BASE_DIR, 'static')
print ("Static Files should be at : ", STATIC_ROOT)
MEDIA_URL = "/media/"
MEDIA_ROOT = os.path.join(BASE_DIR, 'media')
print ("Media Files should be at : ", MEDIA_ROOT)
# Default primary key field type
# https://docs.djangoproject.com/en/4.0/ref/settings/#default-auto-field
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
LOGIN_REDIRECT_URL = 'index'
46
MISSING PERSON IDENTIFICATION SYSTEM
LOGOUT_REDIRECT_URL = 'index'
# for sending emails
EMAIL_BACKEND = 'django.core.mail.backends.smtp.EmailBackend'
EMAIL_HOST = 'smtp.gmail.com'
EMAIL_USE_TLS = True
EMAIL_PORT = 587
EMAIL_HOST_USER = config['EMAIL-ID']
EMAIL_HOST_PASSWORD = config['EMAIL-PASSWORD']
47
MISSING PERSON IDENTIFICATION SYSTEM
7 TESTING
7.1 Introduction
In general, software engineers distinguish software faults from software failures. In case of
a failure, the software does not do what the user expects. A fault is a programming error that
may or may not actually manifest as a failure. A fault can also be described as an error in the
correctness of the semantic of a computer program. A fault will become a failure if the exact
computation conditions are met, one of them being that the faulty portion of computer software
executes on the CPU. A fault can also turn into a failure when the software is ported to a
different hardware platform or a different compiler, or when the software gets extended.
Software testing is the technical investigation of the product under test to provide stakeholders
with quality related information
System Testing and Implementation:
The purpose is to exercise the different parts of the module code to detect coding errors.
After this the modules are gradually integrated into subsystems, which are then integrated
themselves too eventually forming the entire system. During integration of moduleintegration
testing is performed. The goal of this is to detect designing errors, while focusing the
interconnection between modules. After the system was put together, system testing is
performed. Here the system is tested against the system requirements to see if all requirements
were met and the system performs as specified by the requirements. Finally accepting testing
is performed to demonstrate to the client for the operation of the system.
For the testing to be successful, proper selection of the test case is essential. There aretwo
different approaches for selecting test case. The software or the module to be tested is treated
as a black box, and the test cases are decided based on the specifications of the system or
module. For this reason, this form of testing is also called “black box testing”.
The focus here is on testing the external behaviour of the system. In structural testing the
test cases are decided based on the logic of the module to be tested. A common approach here
is to achieve some type of coverage of the statements in the code. The two forms of testing are
complementary: one tests the external behaviour, the other tests the internal structure.
Testing is an extremely critical and time-consuming activity. It requires proper planning of
the overall testing process. Frequently the testing process starts with the test plan. This plan
identifies all testing related activities that must be performed and specifies the schedule,
allocates the resources, and specifies guidelines for testing. The test plan specifies conditions
that should be tested; different units to be tested, and the manner in which the module will be
integrated together. Then for different test unit, a test case specification document is produced,
which lists all the different test cases, together with the expected outputs, that will be used for
testing. During the testing of the unit the specified testcases are executed and the actual results
are compared with the expected outputs. The final output of the testing phase is the testing
report and the error report, or a set of such reports. Each test report contains a set of test cases
and the result of executing the code with the test cases. The error report describes the errors
encountered and the action taken to remove the error.
Testing Techniques:
Testing is a process, which reveals errors in the program. It is the major quality measure
employed during software development. During testing, the program is executed with a set of
48
MISSING PERSON IDENTIFICATION SYSTEM
conditions known as test cases and the output is evaluated to determine whether the program
is performing as expected. To make sure that the system does not have errors, the different
levels of testing strategies that are applied at differing phases of software development are:
Black Box Testing
In this strategy some test cases are generated as input conditions that fully execute all
functional requirements for the program. This testing has been uses to find errors in the
following categories:
✓ Incorrect or missing functions
✓ Interface errors
✓ Errors in data structure or external database access
✓ Performance errors
✓ Initialization and termination errors. In this testing only the output ischecked for
correctness. The logical flow of the data is not checked.
White Box Testing
In this testing, the test cases are generated on the logic of each module by drawing flow
graphs of that module and logical decisions are tested on all the cases. It has been uses to
generate the test cases in the following cases:
✓ Guarantee that all independent paths have been executed.
✓ Execute all logical decisions on their true and false sides.
✓ Execute all loops at their boundaries and within their operational.\
✓ Execute internal data structures to ensure their validity.
Testing StrategiesUnit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests
perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of abusiness process performs
accurately to the documented specifications and contains clearly defined inputs and expected
results.
This System consists of 3 modules. Those are Reputation module, route discovery module,
audit module. Each module is taken as unit and tested. Identified errors are correctedand
executable unit are obtained.
Integration testing:
Integration tests are designed to test integrated software components to determine if they
runas one program. Testing is event driven and is more concerned with the basic outcome of
screens or fields.
Integration tests demonstrate that although the components were individually satisfaction,
asshown by successfully unit testing, the combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from the
combination of components.
49
MISSING PERSON IDENTIFICATION SYSTEM
System Testing:
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing is
the configuration-oriented system integration test.
Functional Testing:
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centred on the following items
Valid Input : identified classes of valid input must be accepted.
When user
T1 having an Email, Successful Successful Pass
account password login login
login
50
MISSING PERSON IDENTIFICATION SYSTEM
51
MISSING PERSON IDENTIFICATION SYSTEM
8. SCREENSHOTS
52
MISSING PERSON IDENTIFICATION SYSTEM
53
MISSING PERSON IDENTIFICATION SYSTEM
54
MISSING PERSON IDENTIFICATION SYSTEM
55
MISSING PERSON IDENTIFICATION SYSTEM
56
MISSING PERSON IDENTIFICATION SYSTEM
57
MISSING PERSON IDENTIFICATION SYSTEM
58
MISSING PERSON IDENTIFICATION SYSTEM
59
MISSING PERSON IDENTIFICATION SYSTEM
60
MISSING PERSON IDENTIFICATION SYSTEM
61
MISSING PERSON IDENTIFICATION SYSTEM
62
MISSING PERSON IDENTIFICATION SYSTEM
63
MISSING PERSON IDENTIFICATION SYSTEM
CONCLUSION
The Missing Person Identification System, integrated with web-based technologies, has
brought about significant advancements in the search and identification of missing individuals.
The use of the internet and online platforms has revolutionized the way information is shared,
accessed, and analyzed, greatly improving the effectiveness and efficiency of the system.
Through dedicated websites, online databases, and social media platforms, the Missing
Person Identification System has facilitated seamless communication and collaboration among
law enforcement agencies, search organizations, and the general public. This
interconnectedness has accelerated the dissemination of information about missing persons,
allowing for a wider reach and increased chances of locating them.
The web-based system has enabled the creation of comprehensive online databases
containing vital details, such as physical descriptions, photographs, last known locations, and
personal characteristics, all easily accessible to authorized users. This centralized repository of
information serves as a valuable resource for investigators and search teams, assisting in the
quick identification of missing individuals.
FUTURE SCOPE:
The future scope of Missing Person Identification Systems holds significant potential for
advancements and improvements in several areas:
Data Integration and Collaboration: Enhancements can be made to integrate Missing Person
Identification Systems with other databases and systems, such as law enforcement databases,
social media platforms, and facial recognition systems.
Artificial Intelligence and Machine Learning: Leveraging AI and machine learning
techniques can improve the accuracy and speed of identifying potential matches.
Real-time Data Analysis: Integrating real-time data sources, such as surveillance cameras,
mobile devices, and social media feeds, into Missing Person Identification Systems can
enhance their effectiveness.
Mobile and Wearable Technology: Expanding the system's capabilities to include mobile
applications and wearable devices can enable field officers and volunteers to directly access
and contribute to the system.
Social Media Monitoring: Given the widespread use of social media platforms, incorporating
social media monitoring capabilities into Missing Person Identification Systems can provide
valuable insights.
Data Privacy and Security: As with any system handling sensitive information, ensuring
robust data privacy and security measures will remain a crucial aspect.
International Collaboration: Facilitating cross-border collaboration and information
exchange among different countries Missing Person Identification Systems can improve the
chances of identifying missing individuals who may have travelled or crossed borders.
64
MISSING PERSON IDENTIFICATION SYSTEM
BIBLIOGRAPHY/REFERENCES
TEXT BOOKS:
1) JavaScript Enlightenment, D.Flanagam.
2) Beginning Web Programing-Jon Duckett Wrox.
3) Web Technologies, Uttam K Roy, Oxford University Press.
4) Django for beginners, William.s Vincent
5) Light weight django, Julia Eliman& Mark lavin
6) HTML and CSS QuickStart Guide - David Durocher
7) Deno Web Development - Gary Cornell
WEB SITES:
1. Help ID. (n.d.). Missing Person Identification System. Retrieved from
https://helpid.vancouver.ca/
2. International Centre for Missing & Exploited Children. (n.d.). Missing Children
Databases. Retrieved from https://www.icmec.org/missing-children-
databases/
3. National Missing and Unidentified Persons System (NamUs). (n.d.). Retrieved
from https://www.namus.gov/
4. NCMEC CyberTipline. (n.d.). Missing Children Search. Retrieved from
https://report.cybertip.org/.
REFFERENCES:
1. Bie, R., Nieuwenhuis, C., & Elffers, H. (2017). Missing Persons in a Secure and
Free Society: A Sociological View on a Social Problem. European Journal on
Criminal Policy and Research, 23(2), 147-164.
2. Cassar, D., Fahy, D., Horgan, J., & O'Sullivan, C. (2015). Social media in missing
persons investigations: An exploratory study of law enforcement experiences in
Ireland. International Journal of Police Science & Management, 17(2), 99-109.
3. Fife, T., & Coleman, K. (2015). Missing Persons' Families: The Human
Experience. Taylor & Francis.
4. Rombouts, J., De Pauw, G., & Smits, W. (2018). Modelling the behavior of
missing persons. European Journal on Criminal Policy and Research, 24(2), 149-
167
65