Crime Management & Reporting System

68
MAJOR PROJECT REPORT ON CRIME MANAGEMENT AND REPORTING SYSTEM Submitted by SUMI THOMAS PAINUMKAL In partial fulfillment of the requirements for the award of the Degree of Bachelor of Technology in INFORMATION TECHNOLOGY Of COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY March 2009 DEPARTMENT OF INFORMATION TECHNOLOGY Toc H INSTITUTE OF SCIENCE & TECHNOLOGY Arakkunnam P.O, Ernakulam District, KERALA – 682313

description

Major Project done in ASP platform.

Transcript of Crime Management & Reporting System

Page 1: Crime Management & Reporting System

MAJOR PROJECT REPORT

ON

CRIME MANAGEMENT AND REPORTING SYSTEM

Submitted by

SUMI THOMAS PAINUMKAL

In partial fulfillment of the requirements for the award of the

Degree of Bachelor of Technology in

INFORMATION TECHNOLOGY

Of

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

March 2009

DEPARTMENT OF INFORMATION TECHNOLOGY

Toc H INSTITUTE OF SCIENCE & TECHNOLOGY

Arakkunnam P.O, Ernakulam District, KERALA – 682313

Page 2: Crime Management & Reporting System

Toc H INSTITUTE OF SCIENCE&TECHNOLOGY

Arakkunnam P.O, Ernakulam District,KERALA – 682313

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE

This is to certify that the major project entitled “CRIME MANAGEMENT

AND REPORTING SYSTEM” submitted by Sumi Thomas Painumkal of Semester VIII

is a bonafide account of the work done by him/her under our supervision, during the

academic year 2008-2009.

Ms. Sherly K.K. Ms.Meera Ramadas (Project In-charge) (Head, Department of I.T.)

Prof. (Dr).V.Job.Kuruvilla (Head of the institution)

Page 3: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

ACKNOWLEDGEMENT

The successful completion of my project can be attributed to the combined efforts

made by me and the contribution made in one form or other by the individuals I hereby

acknowledge.

First and foremost thank God Almighty for giving me all strength, courage and

blessings to design and complete this project.

I wish to extend my sincere gratitude to the management and our honorable

Principle, Prof.V.Job Kuruvilla for providing me the valuable opportunity to this project.

I also thank Dr.Varghese Paul, Dean (IT & CS) for his support.

I express my sincere gratitude to our Head of the Information Technology

Department, Ms.Meera Ramadas.I also thank her for her sincere help and support.

Words fail to thank adequately our project-in-charge Ms.Sherly K.K. and Project

guide Mr.Prabhu M who gave me all supports and helped me to clear all confusions regarding

the project.

And last but not the least; I thank my family members and my friends for providing

me moral support to achieve my goal.

Thanking you,

Sumi Thomas Painumkal

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 4: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 5: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

ABSTRACT

The Crime Management and Reporting System apply to Police Stations all across the

country .It specifically looks into the Crime detection and prevention. Conviction of criminals depends on

a highly responsive backbone of Information Management. The efficiency of the police and the

effectiveness with which it tackles crime depend on what quality of information it can derive from its

existing records and how fast it can have access to it.

Different modules of this project are Station module, Crime module, Search module and

Administrators module. Each of the station must first register with the software. For the registration part

each station enter their details like station name, address, phone number, station in charge etc. and get

a User Id from the software. Once the station registers with the software they can avail the existing

records. All these are done in the station module. The Crime module is used for entering all details

about the crime. It consists of the date and time, place, nature of crime, location of the crime, police

station where it is recorded etc.In the search module we can search the crime in station wise, nature of

crime, date and time wise.

The Administrators module will be protected by user id and password. Ordinary

users of the software will not be permitted to enter into this area of the software. This module will be

focusing on the Master data maintenance, removal of old and outdated data from the software etc.The

details of Indian Penal Codes and classification of crime will be provided in this software. The project will

be developed using ASP.net 2005 as front end, Microsoft SQL Server 2000 as back end in Windows XP

platform.

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 6: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

TABLE OF CONTENTS

1. INTRODUCTION………………………………………………………………….. 1

2.SYSTEM ANALYSIS……………………………………………………………… 3

2.1 EXISTING SYSTEM…………………………………………………………. 4

2.2 PROPOSED SYSTEM………………………………………………………..5

2.3 FEASIBILITY STUDY…………………………………………………………6

3. SYTEM REQUIREMENT STUDY…………………………………………….….8

3.1 SYSTEM CONFIGURATION…………………………………………...…...9

3.2 ABOUT THE DEVELOPING SYSTEM……………………………………..10

3.3 OPERATING SYSTEM…………………………………………………….…11

3.4GRAPHICAL USER INTERFACE: MS VISUAL STUDIO 2005……….…13

4. SYSTEM DESIGN……………………………………………………………….…14

4.1 LOGICAL SYSTEM DESIGN………………………………………………..15

4.2 PHYSICAL SYSTEM DESIGN……………………………………………....20

5. SYSTEM IMPLEMENTATION………………………………………………….…25

5.1 IMPLEMENTATION DETAILS…………………………………………….…28

5.2 CODING…………………………………………………………………….…..29

6. SYSTEM TESTING…………………………………………………………….…...50

7. FUTURE ENHANCEMENT………………………………………………………...42

8.CONCLUSION…………………………………………………………………….….58

9. BIBLIOGRAPHY……………………………………………………………….……60

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 7: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:1 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 8: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

The objective of the project is to develop a site in which any citizen can report crimes. If

anybody wants to complaint against crimes he must do it through the police. The Crime Management

and Reporting System make the crime reporting easier. This project will be useful for the Police

Department. The home page is the login page .Only the Administrator and the Station in-charge of

different Police Stations will be able to login to their home pages. The citizen could only report crimes

and knows whether the crime reported by him has been accepted.

The different modules of the project are station module, crime module, administrator’s

module and search module. In the station module, each of the station must first register with the

Software. For the registration part each station enter their details like station name, address, phone no,

station in charge etc. and get a User Id and password from the Software. Once the station registers with

the software they can avail the existing records.

Crime module is used for entering all details about the crime. It contains the date and time, police

station where it is recorded, place, nature of Crime, Location of the Crime etc.All details about the

criminals will be also included in this module.

In the search module we can search the crime in station wise, nature of crime, date and time

wise. Searching of criminals is also possible in this module. The administrator’s module will be protected

by user id and password. Ordinary users of the software will not be permitted to enter into this area of the

software. The module will be focusing on the Master Data Maintenance, Removal of old and outdated

data from the software etc.

Page No:2 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 9: Crime Management & Reporting System

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:3 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 10: Crime Management & Reporting System

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

2. SYSTEM ANALYSIS

System analysis is an important phase of any system development process. The system is

studied to the minute details and analyzed. The system analyst plays the role of an interrogator and

dwells deep in to the working of the present system. In analysis, a detailed study of these operations

performed by a system and their relationships within and outside the system is done. A key question

considered here is, “what must be done to solve the problem?” The system is viewed as a whole and the

inputs to the system are identified. Once analysis is completed the analyst has a firm understanding of

what is to be done.

The project mainly aims to develop an application for the Police Department to handle their crime

investigation process in an easy way. Often people are reluctant to go to Police stations to report crimes.

This project makes reporting of crimes easier.

2.1 EXISTING SYSTEM

In the existing crime management system, most of the operations are done manually like sending

complaints, taking actions against crimes, viewing status etc. So with the existing system if anybody

wants to complaint against crimes he must do it through the police.

If we are doing the system manually, so many minor errors will occur. Error detection in the previous

entries made and data cross verification is another important function. These are done manually, and it

would take time

2.1.1 LIMITATIONS OF EXISTING SYSTEM

The existing system is time consuming and not very user friendly.

Sometimes the complaints may be ignored by the police.

Page No:4 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 11: Crime Management & Reporting System

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Even an efficient officer may not be able to handle more than one case at a time.

As we all know, a covered truth, bribery plays an important role in the existing system.

Many cases were pilled up in the corners, due to lack of commitment in the job.

In most of the cases, the innocent are accused in the existing system.

As per our jurisdiction, “Let thousand criminals escape-not a single innocent be punished “. As

a result of this and other factors that influence investigation, such as bribery, the innocent

becomes accused in several situations in the eyes of Justice.

The existing system is criticized for being inefficient, time consuming, poorly managed, and

lacking flexibility.

Because of the large number of serious crimes, minor complaints may be ignored.

2.2 PROPOSED SYSTEM

The Department of Police is an independent statutory body which was created to maintain an

effective and efficient police service for the public. Their primary task includes securing continuous needs

of the public in an efficient manner. We need the whole hearted support of each and every individual

member of the site and cooperation of the users.

Advantages of the Proposed System:

Reducing crime and disorder.

Confidentiality and anonymity issues.

In the fast moving world, if people lack something it is time. All are busy in their world. It will be

welcomed if services are provided at their will. So the main objective of our product is better

communication, better leadership, reducing crime and disorder etc.The product provides a framework

within which a user can easily work with. That was our next objective. So it should be user friendly.

The product provides a framework, which is error free. We know a crime management system is

actually a serious process. So even a simple error lead to big problems. So it should be error free and our

objective is to build error free software.

Page No:5 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 12: Crime Management & Reporting System

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

2.3 FEASIBILITY STUDY:

A feasibility study is a test of system proposal according to its workability, impact on the

organization, ability to meet user needs and effective use of resources.

The objective of feasibility study is not to solve the problem, but to acquire a sense of its scope.

During the study, the problem definition is crystallized and aspects of the problem to be included in the

system are determined, consequently costs and benefits are estimated with greater detail at this stage.

The result of the feasibility study is a system formal proposal. This is simply a form of documenting or

detailing the nature and scope of proposed solutions. The proposal summarizes what is known and what

is going to be done. Three key considerations involved in the feasibility analysis:

Economic feasibility

Technical feasibility

Behavioral feasibility

2.3.1 ECONOMIC FEASIBILITY:

Economic analysis is the most frequently used method for comparing the cost with the benefit or

income that is expected from developed system.

In the existing system, many people are involved in the process but in the proposed system,

number of persons involved be reduced drastically. So the proposed system is economic.

In the existing system, storage of all these records should be arranged and security should be

provided for the records. In the proposed system, separate security arrangement is not needed since the

software provides security and maintenance is simply and hardly needs one or two persons to operate

the system.

2.3.2 TECHNICAL FEASIBILITY:

The feasibility center on the existing computer system (software, hardware) and to what extend it can

support the proposed addition.

Page No:6 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 13: Crime Management & Reporting System

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

In the proposed system, data can be easily stored and managed in database management system

software.

The results for various queries can be generated easily. Therefore, the system is technically

feasible.

2.3.3 BEHAVIORAL FEASIBILITY:

People are inherently resistant to change and computer has known to facilitate change. An

estimate should be made of how strong a reaction the user staff is likely to have towards the

developments of computerized system.

In the existing system more manpower is required and time factor is more but in the proposed

system, manpower and time factors are reduced .So, the remaining numbers are engaged with some

other important works.

Page 14: Crime Management & Reporting System

Page No:7

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 15: Crime Management & Reporting System

Page No:8

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

3.1 SYSTEM CONFIGURATION:

3.1.1 HARDWARE CONFIGURATION

PROCESSOR -Pentium 4

RAM SIZE -256MB

HARD DISK DRIVE-40GB

CD ROM DRIVE -52X

KEYBOARD -108 keys

MONITOR -SVGA 15 inch

MOUSE -PS/2

3.1.2 SOFTWARE CONFIGURATION

FRONT END -ASP.NET

BACK END -MS SQL SERVER 2000

OPERATING SYSTEM -WINDOWS XP

SCRIPT LANGUAGE -C#

BROWSER -MS INTERNET EXPLORER

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 16: Crime Management & Reporting System

Page No:9

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 17: Crime Management & Reporting System

3.2 ABOUT THE DEVELOPING SYSTEM

The system has developed in ASP.NET as front end and SQL server 2000 as back end.

3.2.1 FRONT END TOOL: ASP.NET(Active Server Pages.net)

WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows programmers to create dynamic

web applications.ASP.NET can be used to create anything from small, personal websites to large,

enterprise-class web applications. ASP.NET is the latest version of Microsoft's Active Server Pages

technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a powerful tool for creating

dynamic and interactive web pages.

ASP: ASP is a server side scripting technology that enables scripts (embedded in web pages) to be

executed by an Internet server ASP is a program that runs inside IIS.IIS stands for Internet Information

Services. IIS comes as a free component with Windows 2000.IIS is also a part of the Windows NT 4.0

Option Pack. The Option Pack can be downloaded from Microsoft.

An ASP file is just the same as an HTML file. An ASP file contains text, HTML, XML and

scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension “.asp”. When

a browser requests an HTML file, the server returns the file. When a browser requests an ASP file, IIS

passes the request to the ASP engine. The ASP engine reads the ASP file, line by line, and executes the

scripts in the file .Finally, the ASP file is returned to the browser as plain HTML.

Uses of ASP:

Dynamically edit, change or add any content of a web page.

Customize a web page to make it more useful for individual users.

Another advantage of ASP is its simplicity and speed.

Provide security since your ASP code cannot be viewed from the browser.

Clever ASP programming can minimize the network traffic.

Page No:10

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 18: Crime Management & Reporting System

3.2.2 BACK END TOOL: SQL Server 2000

Microsoft SQL Server 2000 is a relational database management system (RDBMS)

produced by Microsoft. Its primary query language is Transact SQL, an implementation of the ANSI/ISO

standard SQL used by both Microsoft and Sybase.

SQL Server allows multiple clients to use the same database

concurrently. SQL Server provides two modes of concurrency control: pessimistic and optimistic

concurrency. When pessimistic concurrency control is being used, SQL Server controls concurrent

access by using locks. Locks can be either shared or exclusive. Exclusive lock grants the user exclusive

access to the data no other user can access the data as long as the lock is held. Shared locks are used

when some data is being read-multiple users can read data locked with a shared lock, but not acquire an

exclusive lock. SQL Server also provides the optimistic concurrency control mechanism, which is similar

to the multiversion concurrency control used in other databases.

3.3 OPERATING SYSTEM: WINDOWS XP Windows has graphical based multitasking windowing environment that allows programs

written specifically for windows to have a consistent appearance and command structure. This capability

makes even new programs easier to master.

Windows provides several built in routines that allow easy implementation of pull down menus,

scrollbars and dialogue box icons and many other features of a user friendly graphical interface. Starting

with Windows 3.0 through Windows XP, programs can take advantage of new dialog control, menu types

and owner draw control. Our application uses Windows XP Platform.

Characteristics:

Input/Output

Input and Output is essential to the operation of any computer. Input-Output allows the computer to

store and receive data on disks or tapes, to interact with the users terminals and to print the output on

Page No:11

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 19: Crime Management & Reporting System

paper. This form of input-output is provided by the chosen Operating system.

Time Sharing

Time-Sharing is a way of allowing several people to run programs on different terminals

concurrently. This introduces the facility of enabling a group of people to simultaneously approach a

problem on different levels or at the same level, when the need arises.

Communication

Communication refers to the ability of one computer to communicate with other computer and

terminals, to transfer programs and/or data.

Security The OS invokes security that protects one user from another and the OS from all users. Its main

function is to make sure that only authorized users gain access to the computer and its data and those

users do only things that they are authorized to do. As time sharing is available in the OS, a large degree

of security is provided.

Modularity

The design of the OS is modular which allows new capabilities to be added as required.

Reliability Applications are run in their own memory and are unable to corrupt other applications or the system.

System errors are logged.

Portability

Allows Windows XP to run on various platforms.

Page No:12

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY

PROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 20: Crime Management & Reporting System

3.4: GRAPHICAL USER INTERFACE:- MS VISUAL STUDIO 2005

Microsoft Visual Studio is the main integrated Development Environment (IDE) from Microsoft. It can be

used to develop console and Graphical User Interface applications. Visual studio supports languages by

means of language services, which allow any programming language to be supported (to varying

degrees) by the code editor and debugger, provided a language specific service has been authored.

Some important components of Visual Studio 2005 are :

Visual Studio like any other IDE includes a code editor that supports syntax highlighting and code

completion.

Visual Studio also includes a web site editor and designer that allow web pages to be authored by

dragging and dropping widgets. It is used for developing ASP.net applications, and supports

HTML, CSS and JavaScript.

The data designer can be used to graphically edit database schemas, including typed tables,

primary and foreign keys and constraints.

The object browser is a namespace and classlibrary browser for Microsoft .NET. It can be used to

browse the namespaces.

The solution Explorer is used to manage and browse the files in a solution.

Data Explorer is used to manage databases on Microsoft SQL sever instances. It allows creation

and alteration of database tables.

Visual Studio 2005 also includes a local web server, separate from IIS that can be used to host

ASP.NET applications during development and testing. It also supports all SQL Server2005

databases.

Page No:13

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 21: Crime Management & Reporting System

Page No:14

SEMESTER: VIII

BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME

MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 22: Crime Management & Reporting System

The most creative and challenging phase of the system life cycle is system design. The term

design describes a final system and the process by which it is developed. It refers to the technical

specifications that will be applied in implementing the proposed system. It also includes the construction

of program and designing of output, input, code, database and process of the system.

4.1 LOGICAL SYSTEM DESIGN:

The logical system design reviews the present system and prepares input and output specifications,

editing, security and control specification details of the implementation plans.

4.1.1 USECASE DIAGRAM:

In designing an efficient and effective system it is important to consider usecase diagram.Usecase

diagram is one of the five diagrams in YML or modeling the dynamic aspects of the system.Usecase

diagram is central to modeling the behaviour of a system, a subsystem or a class.Usecase diagram are

more important for visualizing, specifying and make systems, subsystems and classes approachable and

view of how those elements may be used in context.

Page No:15

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME

MANAGEMENT AND REPORTING SYSTEM

Toc H Institute of Science &TechnologyArakkunnam – 682313

Page 23: Crime Management & Reporting System

USECASE DIAGRAM

The citizen can report crimes. He will enter all details about the crime. It contains the date, time,

spot, nature of crime, location of crime etc.He can view all crimes accepted and closed by the

administrator. Thus he can see whether the crime reported by him has been accepted or not.

The Administrator will accept the complaints if it is genuine. He can create a new police station,

view complaints from the citizens, crime details, criminal details, and victim details, witness details etc.He

can create a new investigation team and assign them to the investigation of a crime. Removal of old and

outdated crime details will be done by him.

Page No:16 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 24: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME

MANAGEMENT AND REPORTING SYSTEM

The Station in-charge can also view the complaints reported by the citizen. Then he will prepare the

FIR and send the FIR to the administrator. The Administrator will assign a team for the investigation. After

investigation all details are entered into the software and the Administrator will close the Crime File. The

station in-charge can search the crime in station wise, nature of crime, date and time wise.

4.1.2 DATAFLOW DIAGRAM

Dataflow diagram is used to define the flow of the system and their resources .It is the way of

expressing system requirements in a graphical manner. It is one of the most ingenious tools used for

structured analysis. It is the starting point of design phase.

Citizen side

The citizen can report complaints using this website. He should provide the complaint

details. He can also view the status of his complaint.

Page No:17 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 25: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Administrator side

Page No:18 Toc H Institute of Science &Technology

Arakkunnam – 682313

Administrator

Login

login

station master

team master

team member

complaints

loginvalidation check uname

pwd register new station

station reg

team reg

teammemberreg

complaintview

teamdetails

memberreg

viewcomlaints

close data

member details

master details

station details

Page 26: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

The Administrator has to login to the website. The username and password is checked with those in the

database. If they matches with the given username and password, he can access the software. The

administrator will register a new Police Station with this software. The administrator will create a new

investigation team and will decide which all members should be in that team. He can view all the reported

complaints, and close the complaint file after the completion of the investigation.

Station in-charge side

Page No:19 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 27: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

The station in-charge has to login to the website using the username and password. The

username and password is checked. If it is correct he can enter into his home page. He can enter the

crime details .He can also perform searches. Similarly, he can enter criminal details also. The station in-

charge can send the FIR to the administrator. He can also set the status, whether the investigation is

progressing or if it is closed. He will also enter the victim’s details.

4.2 PHYSICAL SYSTEM DESIGN:

Following the logical design is the physical design. This produces the working system by

defining the design specifications that tell the programmers exactly what the candidate system must do.

4.2.1 ARCHITECTURAL DESIGN:

Architectural design is a comprehensive framework that describes its form and a structure its

components and how they fit together. Architectural design is a software component that can be

something as simple as program module, but it can also be extended to include database and

middleware that enable the configuration of a network of client and servers .Architectural design focuses

on the representation of the structure of software components their properties and interaction.

This project consists of different modules. The Administrator module helps the administration

of the entire site. The complaints send by the citizen cannot be viewed by all police stations. The

administrator will decide which station should view the complaint.

4.2.2 INTERFACE DESIGN:

Interface design creates an effective communication medium between a human and a

computer. In this project it is the communication between Administrator and station in-charge design.

Since this project requires a database, the client machines require proper connection with the server

machine. The users will interact with the software through the user friendly web pages.

Page No:20 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 28: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

4.2.3 DATABASE DESIGN:

Database design is the most important part of the system design phase. In a database

environment common data are available and are used by several users. Instead of each program

managing its own data, authorized users share data across application with the database software

managing the data as an entity. In our project both the administrator and station in-charge share the

crime details and criminal details. The primary objective of database design is fast response time to

inquire, more information at low cost, control of redundancies, clarity and ease of use, data and program

independencies, accuracy and integrity of the system.

Page No:21 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 29: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:22 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 30: Crime Management & Reporting System

5.1 CODING:

The goal of coding phase is to translate the design of the system in to code in a particular

programming language. For a given design, then aim of coding is to implement the design in the best

possible manner.

Code snippets:

ClassLibrary

using System;using System.Collections.Generic;using System.Text;using System.Data;using System.Data.SqlClient;namespace ClassLibrary1{ public class Class1 { SqlConnection con = new SqlConnection("server=.;uid=sa;database=toch"); SqlCommand cmd = new SqlCommand(); public void opencon() { if (con.State == ConnectionState.Open) { con.Close(); } con.Open(); cmd.Connection = con;

} public SqlConnection getcon { get

{ return con;

} }

Page No:42 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 31: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

public SqlCommand getcommand { get { return cmd; } }}}

Class2.cs

using System;using System.Collections.Generic;using System.Text;using System.Data;using System.Data.SqlClient;namespace ClassLibrary1{ public class Class2 { Class1 c1 = new Class1(); DataSet ds = new DataSet(); public void insert(string complaintid,string name ,string address,string gender,string phonenumber,string place,string complaint,string complintfile ) { c1.opencon(); c1.getcommand.CommandText = "insert into complaints values('"+ complaintid +"','" + name + "','" + address + "','" + gender + "','" + phonenumber + "','" + place + "','" + complaint + "','" + complintfile + "') "; c1.getcommand.ExecuteNonQuery(); }

public void insertcriminal(string criminalid,string crimeid,string stationid, string crimename, string criminalname, string housename, string place, string age, string gender,string nickname,string criminaltype,string mop,string comment) { c1.opencon(); c1.getcommand.CommandText = "insert into criminaldetails values('"+criminalid+"','" + crimeid + "','" + stationid + "','" + crimename + "','" + criminalname + "','" + housename + "','"+place +"','" + age + "','" + gender + "','" + nickname + "','" + criminaltype + "','" + mop + "','" + comment + "') "; c1.getcommand.ExecuteNonQuery();

}

Page No:43 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 32: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

public void insertteam(string teamname,string stationname) { c1.opencon(); c1.getcommand.CommandText = "insert into team values('" + teamname + "','" + stationname + "') "; c1.getcommand.ExecuteNonQuery();

}

public void insertmembers(string teamname, string membername, string address, string place, string city, string phone, string age, string gender) { c1.opencon(); c1.getcommand.CommandText = "insert into teammemeber values('" + teamname + "','" + membername + "','" + address + "','" + place + "','" + city + "','" + phone + "','" + age + "','" + gender + "') "; c1.getcommand.ExecuteNonQuery(); }

public void insertvictim(string crimename, string victimname, string age, string gender, string address, string dob, string ms, string comp, string ht, string wt, string im, string cb) { c1.opencon(); c1.getcommand.CommandText = "insert into victimdetails values('" + crimename + "','" + victimname + "','" + age + "','" + gender + "','" + address + "','" + dob + "','" + ms + "','" +comp + "','" + ht + "','" + wt + "','" + im + "','" + cb + "') "; }public void delete(string complaintid) { c1.opencon(); c1.getcommand.CommandText = "delete complaints where complaintid = '"+complaintid +"'"; c1.getcommand.ExecuteNonQuery();

}

public void deletestation(int id) { c1.opencon(); c1.getcommand.CommandText = "delete stationreg where stationid =

" + id + "";

Page No:44 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 33: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

c1.getcommand.ExecuteNonQuery();

}

public void updatestation(int id,string stationname) { c1.opencon();

c1.getcommand.CommandText = "update stationreg set stationname = '"+stationname +"' where stationid="+id+""; c1.getcommand.ExecuteNonQuery();

}

public void insertstation(string stationid,string stationmame, string place, string phone, string stationincharge, string userid, string password ) { c1.opencon(); c1.getcommand.CommandText = "insert into stationreg values('"+stationid+"','" + stationmame + "','" +place + "','" + phone + "','" +stationincharge + "','" +userid + "','" +password + "') "; c1.getcommand.ExecuteNonQuery();

}

public DataSet view() { SqlDataAdapter adp = new SqlDataAdapter("select * from complaints",c1.getcon); adp.Fill(ds); return ds; }

public DataSet viewcrime() { SqlDataAdapter adp = new SqlDataAdapter("select * from crimedetails", c1.getcon);

adp.Fill(ds); return ds;

}

Page No:45 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 34: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

public DataSet viewcriminal() {

SqlDataAdapter adp = new SqlDataAdapter("select * from

criminaldetails", c1.getcon);

adp.Fill(ds); return ds; }

public DataSet viewstation() {

SqlDataAdapter adp = new SqlDataAdapter("select * from stationreg", c1.getcon);

adp.Fill(ds); return ds; }

public DataSet viewvictim() {

SqlDataAdapter adp = new SqlDataAdapter("select * from victimdetails", c1.getcon);

adp.Fill(ds); return ds; }

public string getstationid() { c1.opencon(); c1.getcommand.CommandText = " select isnull(max(stationid)+1,1) from stationreg"; string i; i = c1.getcommand.ExecuteScalar().ToString(); return i; }

Page No:46 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 35: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

public string getcriminalid() { c1.opencon(); c1.getcommand.CommandText = " select isnull(max(criminalid)+1,1) from criminaldetails"; string i;

i = c1.getcommand.ExecuteScalar().ToString(); return i; }

public void insertcrime(string crimeid,string stationid, string crime, string place, string time, string noofcriminals, string noofvictims, string acusename, string date,string remarks) { c1.opencon(); c1.getcommand.CommandText = "insert into crimedetails values('"+crimeid+"','" + stationid + "','" + crime + "','" + place + "','" + time + "','" + noofcriminals + "','" + noofvictims + "','" + acusename + "','" + date + "','"+remarks +"') "; c1.getcommand.ExecuteNonQuery();

} public DataSet readteam() { SqlDataAdapter adp = new SqlDataAdapter("select teamname from team ",c1.getcon ); adp.Fill(ds); return ds; }}}

Crime details

using System;using System.Data;using System.Configuration;

using System.Collections;

using System.Web;

Page No:47 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 36: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;

public partial class crimedetails : System.Web.UI.Page{ ClassLibrary1.Class2 obj = new ClassLibrary1.Class2(); protected void Page_Load(object sender, EventArgs e) { GridView1.DataSource = obj.viewcrime (); GridView1.DataBind(); } protected void Button1_Click(object sender, EventArgs e) { obj.insertcrime(TextBox1.Text,TextBox2 .Text ,TextBox3 .Text ,TextBox4 .Text ,TextBox5 .Text ,TextBox6 .Text ,TextBox7 .Text,TextBox8 .Text ,TextBox9 .Text ,TextBox10 .Text ); GridView1.DataSource = obj.viewcrime(); GridView1.DataBind(); }}

Complaints

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;public partial class sendcomplaints : System.Web.UI.Page{ ClassLibrary1.Class2 obj = new ClassLibrary1.Class2(); protected void Page_Load(object sender, EventArgs e)

{ }

protected void Button1_Click(object sender, EventArgs e)

Page No:48 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 37: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

{ string s; if (RadioButton1.Checked == true) { s = RadioButton1.Text; } else

{ s = RadioButton2.Text; } obj.insert(TextBox1 .Text ,TextBox2.Text, TextBox3.Text, s, DropDownList1.SelectedItem.Text, TextBox6.Text, TextBox7.Text, FileUpload1.FileName);

} protected void Button2_Click(object sender, EventArgs e) {

}}

Page No:49 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 38: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:50 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 39: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Testing is the process of executing the program to find if there are any errors. It is the final

verification and validation activity .In testing phase we have tried to affirm the quality of the product. We

have also tried to eliminate errors in the previous stages.

UNIT TESTING:

ADMINISTRATOR MODULE

Serial No.

Unit Input Expected output Output obtained

status remedies

1.

2.

Login

Station registration

Username and password

Station name, place,Phone No.,Username,password

Check with database for their

relevance and redirect to the

admin home page

Insert into table ‘stationregistration

’In the database

Database is verified

and application redirected to admin

home page

Inserted into table

pass

pass

Page No:51 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 40: Crime Management & Reporting System

SEMESTER: VIII

BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME

MANAGEMENT AND REPORTING SYSTEM

Serial No.

Unit Input Expected output

Output obtained

status remedies

3.

4.

5.

search

Change password

View crimes

Start date and end date

Username and password

Click the link ‘view crimes’

Check database

for the dates and

display crimes during

those days

Update existing

password

Select all records from the

table ‘crimes’

and display it in

gridview

Error due to invalid date

Password changed

All crimes displayed in gridview

fail

success

success

Inserted valid date.

Page No:52 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 41: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

CITIZEN MODULE

Serial No.

Unit Input Expected output

Output obtained

status remedies

1. send complaints Name, address, phone No., complaint file.

Insert into table

‘complaints’in the database

Inserted into table

success

STATION IN-CHARGE MODULE

Serial No. Unit Input Expected output

Output obtained

status remedies

1.

View crimesClick the link ‘view crimes’

Select all records from the table ‘crimes’ and display it in gridview

All crimes displayed in gridview

success

Page No:53 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 42: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Serial No. Unit Input Expected output

Output obtained

status remedies

2.

3.

4.

5.

Team registration

Assign team

Arrest details

Close crimes

Team name, member name,address,phone No.

Crime name, team name, start date

Crime name, criminal name,

arrested date,place,remarks

Crime name,team name,start date,end date,close history

Insert into table’ team’in the database

Insert into table’ team’in the database

Insert into table ’ arrest’in the database

Insert into table ’ arrest’in the database

Inserted into table

Error due to invalid

date

Inserted into table

Inserted into table

success

fail

success

success

Inserted valid date.

Page No:54 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 43: Crime Management & Reporting System

SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

INTEGRATION TESTING:

Serial No. Unit Input Expected

outputOutput

obtainedstatus remedies

1.

2.

3.

Citizen module

Station in-charge

module

Administrator module

complaints

FIR

User name and

password

Insert complaints.

Create FIR

View crimes ,cri

minals, close

crimes

Complaint inserted and station in-charge could view it.

Created FIR and

administrator could view it.

Viewed crimes, criminal

details and FIR.

success

success

success

Page No:55 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 44: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:56 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 45: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Nothing can be ended in a single step. It is the fact that nothing is permanent in this world. So this

project also has some future enhancements in the evergreen and booming IT industry. Change is

inevitable. The project entitled “Crime Management and Reporting System” was successfully designed

developed and tested. The system and the architecture is a compatible one, so addition of new modules

can be done without much difficulty. Since this module has its unique properties it can extend further to

make this system a complete one.

Scope of further development

The various Future Enhancement which shall include in this software are:

We look forward to working with the Government in implementing the recommendations and

seeing an improvement in the effectiveness of the Police Department.

The method of video conferencing can be added to make the project livelier.

An intercom facility will add a little more flexible communication between the Administrator,

Station in-charge and investigation team members.

Not withstanding this drive and progress, the Panel believes that more fundamental changes are

needed. It hopes that the recommendation made in this report will assist in changing the culture

around partnership.

Page No:57 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 46: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:58 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 47: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

The project entitled ‘Crime Management and Reporting System’ is very useful for the Police

Department. The project was designed, implemented and tested successfully. The Software developed is

found to be working efficiently and effectively. It undertakes regular and timely action against the crimes

reported. It can be observed that the information can be obtained easily and accurately.

The project provides much security. The simplicity and friendliness are the advantages

of this project. The Software is made user friendly to the maximum so that any one can run the software

provided he could access to the system via the login password.

This project manages all details without any risk. All the objectives were met with

satisfaction. The performance of the system is found to be satisfactory.

Page No:59 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 48: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

Page No:60 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 49: Crime Management & Reporting System

SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGYPROJECT TITLE :CRIME MANAGEMENT AND REPORTING SYSTEM

BOOKS REFERED :

Active Server Pages for Dummies. IDG Books worldwide, 2001

Scott Stabbert, Authentication and security for Internet developers

C#.NET Illuminated ,Art Gittleman California State University, Long Beach

C# Professional Projects,Nithin Pandey ,Geetanjali Arora.

Microsoft Visual C#.NET ,Mickey Williams

ONLINE HELP :

Howard, Michael. “Microsoft Internet Information Server Security” available at

www.csharpcorner.com

www.microsoft.com/sql

www.databasejournal.com/features/mssql

www.microsoft.com/vcsharp

Page No:61 Toc H Institute of Science &Technology

Arakkunnam – 682313

Page 50: Crime Management & Reporting System