Академический Документы
Профессиональный Документы
Культура Документы
SYSTEM
DECEMBER 2018
1
Table of Contents
CHAPTER ONE .................................................................................................................... 4
1.1 INTRODUCTION ................................................................................................... 4
1.2 BACKGROUND OF THE STUDY........................................................................ 5
1.3 PROBLEM STATEMENT ..................................................................................... 8
1.4 RESEARCH OBJECTIVES.................................................................................... 8
1.4.1 GENERAL OBJECTIVE ................................................................................. 8
1.4.2 SPECIFIC OBJECTIVE .................................................................................. 9
1.5 RESEARCH QUESTIONS ..................................................................................... 9
1.6 SCOPE OF THE STUDY ....................................................................................... 9
1.7 SEGNIFICANT OF THE STUDY........................................................................ 10
1.8 ORGANIZATION OF THE STUDY ................................................................... 10
CHAPTER TWO LITERATURE REVIEW ...................................................................... 12
2.1 INTRODUCTION ................................................................................................. 12
2.2 HISTORY OF CRIME REPORTING .................................................................. 14
2.3 RELATIONSHIP BETWEEN POLICE AND CRIME ........................................ 18
2.4 WHAT IS A CRIME? ........................................................................................... 20
2.4.1 Crime Management ........................................................................................ 20
2.4.2 Crime Reporting ............................................................................................. 21
2.4.3 Reporting Methods ......................................................................................... 22
2.5 TYPES OF CRIME ............................................................................................... 23
2.6 ADVANTAGES OF CRIME REPORTING SYSTEM ........................................ 25
2.7 DISADVANTAGE OF CRIME REPORTING SYSTEM ................................... 26
2.8 Existing Crime Information System ...................................................................... 27
2.9 CONCLUSION ..................................................................................................... 29
Chapter III: Methodology .................................................................................................... 30
3.1 Introduction ............................................................................................................... 30
3.1 Methodology ............................................................................................................. 31
3.2 System Description ................................................................................................... 31
3.3 System Development Environment........................................................................... 32
3.4.1 FRONT END TOOL: ..................................................................................... 32
3.3 System Features ............................................................................................................. 35
3.4 Development methodology requirements ............................................................. 35
3.5 HARDWARE REQUIREMENT .......................................................................... 36
3.6 SOFTWARE REQUIREMENT ............................................................................ 36
2
3.7 CONCLUSION ..................................................................................................... 37
3
CHAPTER ONE
1.1 INTRODUCTION
Crime is a human ordeal and is as old as humankind, and Crime is land. It happens at an
explicit place, explicit time and for an explicit reason. It can influence everybody when,
and vulnerability relating to levels of risk posed by internal and external security
being used by governments, corporate bodies and people to screen and decrease chance,
there has been an acknowledgment that the criminal equity framework is restricted in its
ability to control crime which has prompted the investigate of different roads for
handling wrongdoing And this has given a market to privately owned businesses to
This system was gone for execute a Criminal Records Management System, It is a
database framework in which the police keep the record of offenders who have been
captured, to be captured, or got away. This will help the police division in improved
administration of data. The principle substances in the entire procedure includes, the
applicant (the person who documents a First Incident Report (FIR)), injured person,
charged or criminal, case, and examining officer, CRMS tracks the candidate,
unfortunate casualty, denounced, FIR, case and examination officer elements. The
system strength lay in that it takes into account stockpiling of many information for a
criminal, the proposed CRMS improves the wrongdoing recording tasks of the NPF.
The information used by the CRMS is stored in a centralized database which holds
information about criminals, wrongdoing and clients of the framework. The database is
the reason for all activities in the framework and can be easily updated and used to
4
help in the majority of the framework's rules, that is, the all the required data is
put away in one central area and in this way is effectively available. (Awodele, O. et al,
2015).
In the late 1980's the London Metropolitan Police imagined CRIS as an Electronic
Different arrangements were attempted however it was just in August 1994 when an
agreement was concurred with EDS Ltd. in light of new elite PCs and information arranges
that the vision could be understood, The data is put away in an Ingress database
appropriated crosswise over two VAX 7600 focal PCs that reflects every one of the 63
continuously any solicitations for data will naturally incorporate the most a la mode result,
the framework has created data that has prompted numerous captures, the primary detailed,
of time, area, technique and kind of vehicle Stolen, the Police built up a distraction vehicle
and got the guilty parties inside two hours. This is an illustrative case of how a modernized
criminal examination programming can be utilized for master dynamic policing. (Adderley
et al, 2001).
5
"The criminal record" is definitely not a self-characterizing term. Police,
prosecutorial, legal,
Probation and Jail records all contain data about people who have been captured,
and discipline.
These offices' records all contain data that, whenever revealed to potential bosses
and others, would probably have negative ramifications for the record-
"Criminal record" to allude to a person's history of captures and in addition feelings Jacobs
2015, There is an across the country police-made – and kept up criminal record framework,
in light of captures, to which many, however not all businesses, approach. In any case,
all businesses and every other person do approach state-level criminal court records. Today,
these court records are digitized. Utilizing this data source, private data merchants duplicate
and pitch criminal record data to managers and any other person willing to pay
Conviction that records data about its natives' feelings. Captures and different contacts with
law requirement offices are not part of the 'criminal record', another essential inquiry is to
Criminology scientists have encouraged the making of elective announcing strategies that
fill in as an intervening example between observer’s dread of reaching the police and police
objective for counteracting and fathoming wrongdoing [22, 28]. Occurrences of Internet
6
use to report wrongdoing presently exist. The FBI Tips and Public Leads System and the
Claremont University Consortium's Silent Witness Program are precedents. Utilizing the
Internet, these frameworks address the worries and fears of exploited people Stood up to
We are building up a PC based wrongdoing detailing and talking framework that witnesses
guaranteeing the data is of such quality that police can start an examination. The
wrongdoing revealing and talking framework use characteristic dialect handling innovation
interface to facilitate the meeting procedure and expand memory review. The framework
speaks to the primary PC use of the intellectual meeting. In this article we portray one
experimental assessment to test the adequacy of the PC framework contrasted with the
telling it and for which discipline is forced upon conviction", Recorded wrongdoing
measurements have been gathered since 1857. Police recorded wrongdoing insights gave a
decent measure of patterns in all around detailed wrongdoing which could be utilized at
exclude violations that have not been accounted for to police or that the police chose not to
7
1.3 PROBLEM STATEMENT
for example, get to database, and exceed expectations spreadsheet to keep record
the subjects. This task is being made by CID in Mogadishu. It's proposed to utilize
Somali natives to advise their objections to police headquarters, however the office has
numerous issues including residents can't contact straightforwardly to the Police station
when the experience some unit-security issues. They need to go straightforwardly to the
police headquarters to report Crime. So this undertaking will help encourage individuals
To transmit their worries or grievances through online to the CID by utilizing on the
Our main objective is to solve the problem of the CID on Criminal Records system,
CID Did not have online Registration Criminal Reports management system, So that we
discover the needs of Crime Recording and we doing online Crime Reports
management system.
8
1.4.2 Specific Objective
information
ii. How to retrieve criminals already stored in the system for their information?
iii. How to reduce the number of lost records for the criminals?
iv. How to allow the citizens report crimes online at any place?
The overall aim of CRIS is to develop electronic filing of criminal records that will produce
an automatic edition of the applicant’s certified criminal record and simultaneously provide
to the citizen the possibility of online application submission for the criminal record extract.
The criminal record entries are kept in the repository the same time with the relative paper
ones, criminal Record Information System (CRIS) has been implemented as an accessible
web-based query application, which provides timely and accurate information on offenders.
The public criminal record request service is a web-based information delivery application
which allows citizens to request the extract of their public criminal records. Identification
of the citizen takes place at the public agency in order to receive the criminal record
document. This project, the web based online crime reporting system was made by CID in
9
1.7 SEGNIFICANT OF THE STUDY
The important thing of this research first is to get new knowledge. Second is to discover the
needs of CID crime reporting system because of every police station needs Online Crime
Reporting Management System. This project has significant importance, because it will
provide assistance to the citizens of Somalia. First Allow citizens report crimes online at
any place without having them to physically appear to police stations for reporting the
crimes. It allows the citizens to send complaints by online, And Provides platform to the
the study, problem statement, Research objectives, Research Questions, Scope of the
Chapter 2 – Literature Review. This chapter reviews works done in the earlier
studies or researches which are related to the project Web based crime reporting
system.
The differences between crime and criminal also will be discussed in this chapter.
This chapter also will discuss about the importance of the crime reporting.
this project, which includes the techniques used. Flowcharts of the software
programming are included, Even though this project just includes the software parts,
10
Chapter 4 - Design and Analysis- in this chapter the researchers are going to
demonstrate the logical design of the system that is to be developed by drawing the
Entity Relationship Diagrams (ERDs) and the Data Flow Diagrams (DFDs) to show
summary of this project based on the objectives and results. Problems and
11
CHAPTER TWO LITERATURE REVIEW
In this section, we analyze systems that are akin to the proposed system. We will focus on
the systems that are closest in functionality to the CRMS, highlighting their key features,
similarities, history, relationship b/w crime and police, advantages and disadvantages and
existing system.
2.1 INTRODUCTION
Crimes are a typical social issue influencing the personal satisfaction and the monetary
development of a general public. In spite of the fact that wrongdoings could happen all
over, usually offenders chip away at wrongdoing openings they face in most natural
regions for them, by giving an information mining way to deal with decide the most
criminal hotspots and discover the sort, area and time of perpetrated violations, we want
in an exact, succinct, clear and complete way, which at that point turns into a record of an
offered episode to an invested individual for choice to be made. There are numerous sorts
Crime Reporting System will address the refered to explanations behind not announcing,
yet in addition the need of police offices for progressively precise, complete, and reusable
data that may save their time and assets to designate them to policing the roads an online
12
arrangement is valuable as the arrangement is innately distributive. This distributive
normal for the online arrangement helps in getting the diverse police headquarters to
share data and get in contact with each other. It likewise enhances work proficiency of the
office. Utilizing this application data dealing with will be simple and quick and
Crime Report System is a system used to report crimes. It very well may be utilized to
report Crime. This venture is primarily valuable for police headquarters. This framework
will deal with every one of the exercises in a police headquarters utilizing PCs. As of
now, every one of the works are done physically, by mechanizing every one of the
exercises inside a police headquarters can be overseen effectively and successfully, This
framework will deal with every one of the exercises in a police headquarters utilizing
between the framework clients and framework engineers. The goals of this application is
to keep up a mechanized record of all the F.I.R against wrongdoing (Jain, et al., 2017).
Many researchers trust that revealed wrongdoing information are defiled by estimation
mistake emerging from contrasts in police division detailing rehearses crosswise over
announcing by exploited people after some time. Regardless of whether such issues exist,
be that as it may, they don't really block the utilization of revealed wrongdoing
Lately police powers have been improving their conventional strategy for wrongdoing
revealing with new mechanical progressions to build their yield by effectively recording
violations to help their examination (Adderley and Musgrove 1999). Information isn't
13
only a record of wrongdoings, and it likewise contains important data that could be
utilized to connect wrongdoing scenes dependent on the usual way of doing things (MO)
of the offender(s), recommend which guilty parties might be in charge of the wrongdoing
and furthermore distinguish those wrongdoers who work in groups (guilty party systems)
and so forth. In this day and age, PCs are assuming a noteworthy job in the examination
of a wide range of wrongdoing from those that are considered as volume wrongdoing
The role of computers has been increased in all walks of life from the finance sector to
supermarkets. In recent years police forces have been enhancing their traditional method
efficiently recording crimes to aid their investigation (Adderley and Musgrove 1999),
Data is not just a record of crimes, it also contains valuable information that could be
used to link crime scenes based on the modus operandi (MO) of the offender(s), suggest
which offenders may be responsible for the crime and also identify those offenders who
work in teams (offender networks) etc, In today’s world, computers are playing a major
role in the investigation of all types of crime from those that are considered as volume
crime (burglary, vehicle crime, etc.) to major crime such as fraud, drug trafficking,
murder etc., It is not an easy task for a Police analyst to manually unravel the inherent
complexities within police data and this problem is compounded when the analysis is
undertaken by a team. The distribution of the data to the team may cause significant
14
information, which could be useful to solve the crimes, to be missed as each member is
not in possession of all relevant facts. For a long time, criminologists and statisticians
have been applying their skills and knowledge trying to predict when and where the next
set of crimes will occur, with varying degrees of success. The volume of crime and the
greater awareness of modern criminals put a strain on the existing methods. Human
reasoning fails when presented with millions of records. Therefore, there is clearly a
requirement for a tool kit to assist in analyzing the data which will make the best use of
Crime is one of the human security problems confronting humanity across the world.
Nations have grappled to contain the rising incidence of homicide, armed robbery, and
kidnap, drug trafficking, sex trafficking, illegal gun running and host of others, United
Nations Office on Drugs and Crime in 2011 reported that homicides globally were
estimated at 468,000 and more than a third (36%) was estimated to have occurred in
Africa, 31% in The Americas, 27% in Asia, 5% in Europe and 1% in the tropical Pacific
region 3, Africa has been on the forefront on global statistics on crime. South Africa and
Nigeria have recorded high incidents of violent and non-violent crimes in recent times.
According to Africa Check, that incidents of murder increased from 15 609 murders in
2011/12 to 16 259 murders in 2012/13 in South Africa, with increase of 650 murder cases
or a 4,2% increase when comparing the total numbers of murders with the previous
years5. According to the same report, murders and attempted murders that take place
during aggravated robbery or inter-group conflict (such as gang or taxi violence), and
vigilantism make up between 35% and 45% of all murders and attempted murders 6.
15
Between 1971 and 1975, the United States Department of Justice conducted victimization
conducted in each city. Information was collected on victimization and reporting for a
variety of crimes and is collected in the United States Department of Justice (1975 a, b,
1976) reports. The strength of these data is the availability of city identifiers that can be
linked to the police staffing data collected annually in the FBI's Uniform Crime Reports.
(Levitt, 1998).
The concept of Crime can be viewed as an: illegal act (an action prohibited by Law or
failure to act as required by law); illegal activity that involves breaking the Law; immoral
activity that is considered unacceptable act that is shameful, unwise or regrettable. Crime
by the Law of the Federal republic of Nigeria (FRN, 1999) is defined as „An act or
omission which renders the person doing the act or making the omission liable to
punishment under the criminal code, or any Act or Law” Crime is brought about by the
violation of the Law as established by the government at all levels, Crime is an infraction
of both the basic principles of law and order and the norms of civilized behavior, Crime is
an offence against the value system of a society. The cost and effects of crime vary
among the various segments of the population and touch almost everyone by some degree
and in general as the economic growth and development of countries increase, it would be
expected that crime level reduces, this may not necessarily be. The various cost of crime
to victims and the society or the economy include; loss of income, property losses, loss in
community productivity, etc. Some other cost of crime, which are less tangible; include
psychological trauma on victims and their family and friends, pain and suffering and a
lower quality of life. In all of these and other associated losses, the ultimate cost is loss of
16
Deterrence Theory and Crime Schelling developed deterrence theory in 1966 as a
preventative military strategy during the Cold War (Paternoster, 2011). The emphasis of
deterrence theory is that punishment serves as a way to minimize and prevent criminal
behaviors (Ritchey & Nicholson-Crotty, 2011; Rizzolli & Stanca, 2012). Deterrence
operates in two ways (a) specifics and (b) generals (Paternoster, 2010; Piquero,
Montaldo (2013) said that crime occurs when someone breaks the law by an overt act,
omission or neglect that can result in punishment. A person who has violated a law, or
has breached a rule, is said to have committed a criminal offense. According to National
Crime Prevention Strategy (1996), Crime results in the deprivation of the rights and
dignity of citizens, and poses a threat to peaceful resolution of differences and rightful
participation of all in the democratic process. It inhibits our citizens from communicating
with one another freely, from engaging in economic activity and prevents entrepreneurs
and investors from taking advantage of the opportunities, which our country offers.
2013).
17
2.3 RELATIONSHIP BETWEEN POLICE AND CRIME
The measure of the police force systematically influences the willingness of exploited
individual wrongdoing reports, at that point UCR information will downplay the genuine
violations to the police when the apparent probability of a wrongdoing being understood is
high. Moreover, the prepared accessibility of a cop at the scene of a wrongdoing may
likewise prompt more wrongdoing reports, and it is anything but difficult to envision that
increments in police labor will influence the probability that native grumblings are
available, announced wrongdoing rates may increment with the extent of the police
constrain, regardless of whether the genuine exploitation rate is falling. The way that
considerably not exactly 50% of all wrongdoings secured by the FBI's Uniform Crime
Reports are really answered to the police uplifts worry over the significance of announcing
reveal a connection between detailed wrongdoings and police nearness e.g., Greenwood
and Wadycki, 1973; Swimmer, 1974; Thaler, 1977, 1978; CarrHill and Stern, 1979;
clients to store police office's case subtleties, Complaint Details, First Information Report
(FIR) Details, and so forth. This Software Package permits Police Departments to store
every one of the subtleties identified with the office and use them at whatever point
18
fundamental. The task reports different cases, FIR report, charge sheet report, Most Wanted
Criminals record, finance, participation reports and furthermore can transfer and view
criminal photographs and filtered archives. The prerequisites for this framework was
The center mission of the police is to control wrongdoing. Nobody question this. To be
sure, proficient wrongdoing battling appreciates wide open help as the essential system of
policing definitely in light of the fact that it epitomizes a profound promise to this goal.
policing show up superficially to obscure this center.' If these techniques were to leave the
options. In making a decision about the estimation of elective police systems in controlling
police search for hastening causes. While it might be helpful to analyze what some call the
underlying drivers of wrongdoing (e.g., social unfairness, unequal financial chance, poor
tutoring, frail family structures, or dysfunctional behavior), such things are moderately
irrelevant from a police viewpoint since the police practice little impact over them. The
police work on the outside of public activity. They should deal with episodes,
circumstances, and individuals as they are presently not social orders or individuals as they
may have been. Hence, the promptly hastening reasons for genuine wrongdoing are
definitely more vital to the police than are more extensive inquiries regarding the main
19
2.4 WHAT IS A CRIME?
Crime is a geological. It happens at a particular spot, explicit time and for a particular
reason. It can influence everybody and anybody whenever. Wrongdoings are intricate and
continually evolving. Social and mechanical changes presented new targets, apparatuses
and thought processes in wrongdoing. This online web application for keeping up the best
possible everyday citizens grievances for the police office by utilizing this application
individuals, who are apprehensive or don't have enough time to go the police headquarters
for griping about their own legitimate issues here they can give their protest through online
to record any kind of grumbling. It comprises of grumbling box where the general
population can enroll their grievances. Here clients will have the mindfulness about laws
and the particular disciplines for the wrongdoing (Awodele, et al., 2015).
examples are found while others are most certainly not. Factor, for example, social class,
salary level and the condition plays parts in the sorts of wrongdoing that are submitted.
Assets and additionally an absence of assets can impact the likelihood of wrongdoings
must be overseen. Wrongdoing as different definitions relying upon which viewpoint one is
again, is the way toward coordinating and controlling the assets of an association such As
20
its staff, materials, and hardware to accomplish the objectives of the association.
police assets (cash, gear, and faculty) to keep the infringement of law and where it has been
damaged, to secure the culprits and indict them (Jimoh, R. G. et al, 2014).
The past discoveries are enough to persuade readers regarding the significance that
detailing conduct has for the criminal equity framework and the network. Residents,
through the detailing of their wrongdoing encounters begin the criminal equity hardware
preliminary of guilty parties, and their discipline. The deterrent impact of criminal equity is
potentiated too, then again, non-announcing blocks access to remuneration plans, guilty
parties not being captured, and the objective of an increasingly evenhanded criminal equity
framework being accomplished. Be that as it may, not all the exploitation occurrences are
wrongdoings in a specialized sense, and of those which are, some are minor for sure, the
police will total criminal offense reports in just few these episodes. Expanded readiness to
report what individuals see as violations would result in expanded police endeavors in
managing minor episodes, not all of which may result in attractive results to the people in
question; an issue with possibly pessimistic ramifications for the detailing of maybe
arrangement of variables going from earnestness of episodes to trust in the criminal equity
21
framework, A progressively total comprehension of non-announcing, its dispersion and its
associates will enable us to evaluate the execution of our criminal equity offices.
• Oral reports
The tip box usually consists of several locked boxes at key points around the school or
neighborhood. Each box has a slot for inserting written reports. Boxes need to be located in
Places that are reasonably populated - not deserted and not in the middle of heavy traffic.
The box (and education about using it) should remind students and citizens of what's
needed For a good report - a dated, legible note describing as much as possible what
happened where, when, how and by whom. Advantages of the tip box include low cost, low
reliance of technology and written records. Disadvantages include unreadable reports and
limited access. Tip boxes also require that someone physically visit and collect reports from
Some include a toll-free line directed to a cell phone. Some reporting lines are partnered
with a hotline. Calls left on a voicemail or answering machine can be retrieved from
anywhere. The report taker doesn't have to visit boxes. The telephone approach allows
22
students to call from school, from home, from a friend or from a pay phone. People tend to
be comfortable talking on the phone, so this approach leaves no lasting record of the report,
unless messages taped or transcribed and checked for accuracy. It also requires resources -
funds or in-kind donations for the equipment, the telephone service, and a secure area in
E-mail and web sites have proved successful in reaching out to those who are
electronically literate. Some systems have both an e-mail box and a web site for crime
reports. Both email and web approaches can provide printed reports to send to appropriate
authorities. There are drawbacks - setting up the web page or e-mail properly (though a
youth can probably provide help). The fact that many Nigerians still may not have
convenient access to computers and the need to ensure security of the system to protect
Written and oral reports have the advantage that many people trust the human link more
than the plastic box or the electronics of phones and e-mails. (Jimoh, R. G. et al, 2014).
There are many different types of crimes but generally Crime occurs in a variety of forms,
1. Major crimes: this crime is most genuine than different violations and incorporates
(murders and assaults, and so forth.) it is helpful to quickly investigate what has
occurred over the most recent 30 years in appreciation of crime examination. Neyroud
and Disley (2007) brought up, since the survey into the imperfect Yorkshire Ripper
23
enquiry (Byford, 1981) there has been a drive to 'institutionalize the way significant
violations, for example, murder, equipped burglary and non-date assault. These
(Jansson, K. 2005).
2. Volume crimes: there are many different types under volume violations and
procedure and, in doing as such, recognize compelling and effective ways to deal with
the examination and recognition of volume wrongdoing. The audit especially intended
to feature from the examination proof those insightful practices and Actions that are
example, theft and shoplifting are undeniably increasingly predominant. They are
the wrongdoers. This makes it hard to interface violations together, most wrongdoing
isn't major.
Singular wrongdoings are of a less genuine nature to society all in all (albeit still
genuine to the people in question). The shear volume of such violations makes diverse
24
kinds of issues for the specialist. The high level of comparability among violations and
the absence of assets for nitty gritty examination of any one specific wrongdoing makes
The test for cutting edge programming designers is to apply current example
To develop a knowledge-based system that will assist the police in the investigation of
residential break & enter incidents that will illustrate the potential for other applications in
iii. Provide the investigator with easy access to: - case parameters, other incidents in the
vicinity, similar cases, patrol officer report narrative, witness information, sighting
ix. This will help the police department to manage their records easily.
x. There is no need for a user to go to the police station to file any complaint.
25
xi. If the police doesn’t react to the complaints the user can forward it to higher
authorities.
xvii. Security.
In the existing system only our can see the details of particular information about the police
stations in our state, the existing system has more workload for the authorized person.
26
vi. Damage of machines due to lack of attention.
vii. The size of the database increases day-by-day, increasing the load on the database.
ix. Training for simple computer operations is necessary for the users working on the
system.
x. Time consuming
An information system (IS) is any framework that changes over information into valuable
data. Kiirya (2007) depicted data frameworks to comprise of segments that associate to
accomplish the goal of giving data about everyday exercises that administrators can use to
programming, work force, databases, and systems to achieve its destinations. Wrongdoing
Information System (CIS) is any framework that could be utilized to track violations or
criminal cases which can likewise help in getting data relating to specific wrongdoings. CIS
Existing online crime reporting management system does not have such medium by clients
can put their protest from any area. They need to visit their closest police area and take a
duplicate of the protest for future reference. Numerous residents falter to visit any police
headquarters and subsequently source data can't be kept classified. Now and again clashes
27
happens between the police headquarters with respect to region, implies which region goes
under their police headquarters and the individual get baffled before setting their gripes. In
the event that any resident is a sufferer of wrongdoing, even in the wake of dialing crisis
number, police individual don't ready to find the precise area of that subject. In this present
framework, client's data will be kept secret and just clients whine will be sent to its closest
police headquarters. Clients gripe number will be sent from the server side naturally. For
distinguishing area and true individual, idea of treats and IP tending to has been utilized.
To dispense with the area clashes between police headquarters, the server will assume an
imperative job. It will look through the location table utilizing IP address and forward
message to that police area from where the message has been gotten. It stores only the
i. Existing applications manage the data and various information’s about the criminals
ii. In present manual system the total process of criminal report generation is not so
fast and friendly. To solve this kind of problem proposed a better and automated
system.
The National Crime Information Center (NCIC) is a USA automated database of archived
criminal equity data accessible to practically every law requirement organization across the
nation. It is an across the country framework worked by the Federal Bureau of Investigation
(FBI) devoted to serving and supporting locally, state, and government criminal equity
offices in their main goal to maintain the law and secure people in general. The NCIC
ended up operational on January 27, 1967, with the objective of helping law requirement in
securing criminals and finding stolen property. This objective has since extended to
28
incorporate finding missing people and further securing law implementation faculty and the
2.9 CONCLUSION
The project entitled as "Web based of Online Crime Reporting System" is the web based
application it will be very useful for the police department as well as common peoples. This
software provides facility for reporting online crimes, complaints, missing persons and
show related sections. This software is developed with scalability in mind. Additional
modules can be easily added when necessarily. The software is developed with the modular
approach. All modules in the system have been tested with valid data and invalid data and
everything work successfully. Thus, the system has fulfilled all the objectives identified and
is able to replace the existing system. The project provides much security. The Application
is made users friendly to the maximum so that anyone can run the application provided that
could access to the system via the login password. This project manages all details without
any risk. All the objectives were met with satisfaction. The performance of the system is
found to be satisfactory. From a proper analysis of positive points and constraints on the
component, it can be safely concluded that the product is a highly efficient GUI based
component. This application is working properly and meeting to all user requirements. This
29
Chapter III: Methodology
This chapter discusses the procedures and methods used in this project. It also includes the
research design of the project and how the data were gathered, as well as, the research
instruments.
3.1 Introduction
Police provides safety to citizens. It always remains steady for arresting any criminal who
is a threat for the safety of society. After registering the FIR from any citizen, police starts
its work and on that basis it arrests the criminals if proofs are found against them. Once the
criminals are arrested, police starts investigation from them. After getting all the proofs
against the criminal, it is the duty of the police to present all the proofs honestly to the court
so that the right man can get right punishment. The true and right information provided by
the people to police helps a lot in arresting the criminals who try to spoil the peaceful
environment of society.
The objective of the project was to develop a site in which any citizen can report crimes. If
anybody wants to report any kind of crime he/she can do it through the site. The Crime
Management and Reporting System make the crime reporting easier. This project will be
30
3.1 Methodology
A systematic process was followed for the development of the project. The overall system
development process was carried out into different phases like requirement analysis, design,
At first the present system, that is, manual system was overviewed in brief so that the
deficits and irregularities in the current system would be pointed out. The helped the authors
The development process was then started with data collection phase which supported the
The authors of the project have used data provided in the internet and some dummy data for
OCRMS is a system which aims at making records of crimes easier and complaints of users
easier. This system provides an easy way to admin to keep track of records of all the crimes
and saves him loads of manual work, this system makes updating of records easier by both
users and admin and provides updated information about the current crimes status in
happening. The developed system was aided in smooth operation of the organization by
This project was provided an efficient and reliable way to handle all the daily operations of
the organization ranging from entering the personal information of a crimes or society
31
To standardize the database required for smooth operation, Integrate subsystem within the
organization into base system for integrated service. Disseminate information about the
The system has developed in PHP as front end and MYSQL as back end.
PHP is a server side programming language which was designed by Rasmus Lerdof in 1994
the reference implementation is now produced by The PHP Group. As of January 2013,
more than 240 million websites and 2.1 million web-servers installed PHP.
This language will help to get the information from MySQL database to android mobile
application and also help to insert data to MySQL database from android mobile
application.
PHP is a server scripting language, and it is a powerful tool for making dynamic and
interactive Web pages quickly, PHP is a widely-used, free, and efficient alternative to
competitors such as Microsoft's ASP. PHP combined with MySQL are cross-platform (you
32
MySQL Database
MySQL Database is a free open source database software which will help us to save our
data and to retrieve data through php. MySQL is the second most widely used database in
the world. MySQL was named after the daughter of co-founder Michael Widenius, My.
MySQL was initially released on 23 May, 1995 by MySQL AB. Now this is owned by
Oracle Corporation. TYPO3, MODx, Joomla, WordPress, phpBB, MyBB, Druphal are
some of the famous software which are using MySQL, Google, Facebook, Twitter, Flickr
and YouTube are some of those famous and large scale websites which are using MySQL.
XAMPP
XAMPP was introduced by Apache Friends on 22 May, 2002. This is an open source cross-
platform web-server solution stack package. This mainly comprises Apache HTTP server,
MySQL database and interpreters for the scripts written in PERL and PHP programming
languages. This was designed with intention to provide test environment on personal
computers without access to internet so that website designers and programmers can use it
to test their websites on their own computers. XAMPP is PHP development environment.
This will help to run PHP, Apache tomcat server and MySQL.
JQUERY
JQuery is advanced JavaScript library of pre-written JavaScript code that can be used in
your
Own coding projects. The Purpose of JQuery is to make it much easier to use JavaScript on
your website. JQuery takes a lot of common tasks that require many lines of JavaScript
code
To accomplish, and wraps them into methods that you can call with a single line of code.
33
The JQuery library contains the following features:
HTML/DOM manipulation
CSS manipulation
AJAX
Utilities
PHP runs on various platforms (windows, Linux, UNIX, mac operating system x,
etc.).
PHP is compatible with almost all servers used today (Apache, IIS, etc.).
PHP can create, open, read, write, delete, and close files on the server.
34
3.3 System Features
As and when require in this application. There is flexibility in all the modules.
The main advantage of online application is that a person can report the crime at
By the future technology user can view the case details and progress of the
Face recognition technology can apply. User or witness of the crime can give the
Reusability is possible as and when require in this application. We can update it next
version.
Reusable software reduces design, coding and testing cost by amortizing effort over several
design. Reducing the amount of code also simplifies understanding, which increases the
This proposed software runs effectively on a computer system which has the minimum
35
3.5 HARDWARE REQUIREMENT
Hardware interfaces specifies the logical characteristics of each interface between the
Software product and the hardware components of the system. Many business type
Applications will not have hardware interfaces, since “Crime Reporting System” is an
The minimum hardware requirement for developed system and its operations include the
following:
Core2Duo.
The minimum software requirements to run the program are listed below:
Editions)
ii. MySQL
iv. Browser e.g. Mozilla Firefox, Safari, chrome, Baidu Browser etc.
In this chapter we discussed the major point of requirement analyze and specification, the
requirement analyze describes the project information about current system, system
description, overview of the system and system features and development environment
hardware requirement and software requirement, and result reached is understanding the
functionality and requirement of the system and easiest access and conclusion.
References
R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime
Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.
Awodele, O., Onuiri Ernest, E., Olaore Olufunmike, A., & Anita, S. O. O. U. E. (2015). A
1-12.
Adderley, Richard & Musgrove, Peter. (2001). Police crime recording and investigation
Jacobs, J., & Larrauri, E. (2015). European Criminal Records & Ex-Offender Employment.
Iriberri, A., & Navarrete, C. J. (2010, January). Internet crime reporting: Evaluation of a
37
Interactive reporting alternative. In System Sciences (HICSS), 2010 43rd Hawaii
Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime prediction
Almanie, T., Mirza, R., & Lor, E. (2015). Crime prediction based on crime types and using
Jakkhupan, W., & Klaypaksee, P. (2014, August). A web-based criminal record system
using mobile device: A case study of Hat Yai municipality. In Wireless and
Jaiswal, A., Gunjal, N., Londhe, P., Singh, S., & Solanki, R. (2013, October) Crime
Jain, N., Agarwal, S., Joshi, G., Gupta, R., & Kataria, A. (2017). Crime File System.
Levitt, S. D. (1998). The relationship between crime reporting and police: Implications
for the use of Uniform Crime Reports. Journal of Quantitative Criminology, 14(1), 61-81.
Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime predictions
Springer, London.
38
Osawe, Cyril Onyepuemu. (2015). Increase Wave of Violent Crime and Insecurity:
Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime prediction
Osawe, Cyril Onyepuemu. (2015). Increase Wave of Violent Crime and Insecurity: A
Kabia, V. S. (2016). The Relationship between Increased Police Patrols and Violent
Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation
Moore, M. H., & Trojanowicz, R. C. (1988). Corporate strategies for policing (No. 6). US
Awodele, O., Onuiri Ernest, E., Olaore Olufunmike, A., & Anita, S. O. O. U. E. (2015).
39
A Real-Time Crime Records Management System for National Security
R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime
Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.
R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime
Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.
Home Office.
Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation
Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation
Raza, S. M., & Rajamanickam, L. (2015). A Proposed Solution for Crime Reporting and
40