You are on page 1of 73

CRIME CONTROL AND MANAGEMENT SYSTEM

A project report submitted in partial fulfillment of the requirements for the degree

of

MASTER OF SCIENCE IN COMPUTER SCIENCE


OF

GAUHATI UNIVERSITY
2016

Submitted by

ABHIJIT DEY

Guided by

DWIPEN LASHKAR

ASSISTANT PROFESSOR

COMPUTER SCIENCE(G.U)

DEPARTMENT OF COMPUTER SCIENCE

GAUHATI UNIVERSITY

GUWAHATI-14

ASSAM.
DEPARTMENT OF COMPUTER SCIENCE

GAUHATI UNIVERISITY
GUWAHATI -781014

ASSAM.

CERTIFICATE

This is to certify that the dissertation entitled CRIME CONTROL AND MANAGEMENT
SYSTEM submitted by ABHIJIT DEY, for partial fulfillment for the requirement of award of the
degree of Master of Science in Computer Science, Gauhati University is a work carried out by
him under my supervision and guidance.

To the best of my knowledge, the work has not been submitted to any other institute for the award of
any other degree or diploma.

Date: Signature of the supervisor

Place: (Name)

Designation

Affiliation
DEPARTMENT OF COMPUTER SCIENCE

GAUHATI UNIVERISITY
GUWAHATI -781014

ASSAM.

CERTIFICATE

This is to certify that the dissertation entitled Crime control and management system submitted by
Abhijit dey, for partial fulfillment for the requirement of award of the degree of Master of Science
in Computer Science, Gauhati University is a work carried out by him under the supervision and
guidance of Dwipen lashkar.

Date: Signature of HOD

Place: (Name)

Designation

Affiliation
DEPARTMENT OF COMPUTER SCIENCE

GAUHATI UNIVERISTY
GAUHATI - 781014

ASSAM.

CERTIFICATE

The dissertation entitled crime control and management system submitted by Abhijit dey, in partial
fulfillment for the requirement of award of the degree of Master of Science in Computer Science,
Gauhati University has been examined

Internal Examiner External Examiner

Date: Date:

Place: Place:
DECLARATION

I hereby declare that the project entitled Crime control and management system has been carried
out by me and submitted in partial fulfillment for the requirement of award of the degree of Master of
Science in Computer Science, Gauhati University. I also declare that any or all contents
incorporated in the dissertation, has not been submitted in form for the award of any other degree of
any other institute or University.

Name:- ABHIJIT DEY

Date: Roll No:091/14

Place: Course &Semester:Msc computer Sc.(4th sem)

Affiliation: GAUHATI UNIVERSITY


ACKNOWLEDGEMENT

At the very outset, I would like to express my heartiest gratitude to my project guide shri Dwipen
lashkar,(Assistant professor),computer science,Gauhati university for his support, encouragement,
advice and motivation to work in this area.

I also offer my sincere thanks to Dr Anjana kakoti Mahanta,computer science,Gauhati university for
her support towards this project.

I also want to give thanks to all my classmate for their constant support and motivation.

Above all, I thank ‘The Almighty’ for being for us always

Name:-ABHIJIT DEY

Date:- Roll No:-091/14

Place:- Course &Semester:-Msc Computer Sc.(4th sem)

Affiliation:-Gauhati University
CONTENTS

CHAPTER 1

1)INTRODUCTION.

2) PROJECT PROFILE

CHAPTER 2

1)INITIAL SYSTEM STUDY.

2)DRAWBACKS OF THE EXISTING SYSTEM.

3)PROBLEM DEFINITION

4)THE PROPOSED SYSTEM.

5)SCOPE OF THE SYSTEM

6)SCOPE OF THE PROJECT

CHAPTER 3-

1)FEASIBILITY ANALYSIS

CHAPTER 4-

SYSTEM ANALYSIS

(1)CONTEXT DIAGRAM.

(2).DATA FLOW DIAGRAM.

(3)ENTITY RELATIONSHIP DIAGRAM

CHAPTER 5-

SYSTEM ANALYSIS

(1)SYSTEM DESIGN

(2)INPUT DESIGN

(3)OUTPUT DESIGN

(4)DATABASE DESIGN

CHAPTER 6

SYSTEM IMPLEMENTATION
CHAPTER 7-
(1)SYSTEM TESTING

(2)TEST PLAN

(3)TEST CASES

CHAPTER 8-CODING

.CHAPTER 9-MAINTENANCE

1)ADAPTIVE MAINTENANCE.

2)CORRECTIVE MAINTENANCE.

3)PERFECTIVE MAINTENANCE.

CHAPTER 10-

1)CONCLUSION

2)FUTURE ENHANCEMENT & LIMITATION

BIBLIOGRAPHY
CHAPTER-1
INTRODUCTION
Crime Reporting System will address not only the cited reasons for not reporting, but also the need of
police departments for more accurate, complete, and reusable information that may free up their time
and resources to allocate them to policing the streets. An online solution is very useful as the solution
is inherently distributive. This distributive characteristic of the online solution helps in getting the
different police stations to share information and get in contact with one another. It also improves
work efficiency of department. Using this application information handling will be easy and fast and
solving cases will be fast. The modules involved are station module, citizen module, crime module.
The main advantage of online application is that, a person can report the crime anytime from
anywhere. Users can view the progress of their complaint online. Need: Although reporting crime has
many societal and individual benefits, it is common for criminal acts to remain unreported. Victims
and witnesses have many reasons for not reporting a crime. Among these reasons, fear of
repercussion, embarrassment or shame, believing the crime is too insignificant or a personal issue,
believing that reporting will not make a difference, and being unable to reach an authority are often
cited .In the existing crime management system, most of the operations are done manually like send
complaints, taking actions against crimes, view status etc. So with the existing system if anybody
wants to complaint against crimes he must do it through the police. If we are doing the system
manually, so many minor errors will occur.
PROJECT PROFILE

With the high increase in population in the country, the economy of India has negatively been
influenced. This has seen its citizens indulging in lots of businesses in order to earn a living. This
makes them so much busy to a point that they don‟t get time to do some of their responsibilities such
as reporting crime. Sometimes the officials end up harassing the citizens reporting the crimes and if
there is a way to report crimes without having to go to police stations then this problem could be
avoided. At other times when one reports about a missing person or property, this gets only to the
police station where you have reported but don‟t get to other police stations all over the County or to
a larger extent all over Assam and this narrows down the area of investigation. In spite of the
development of Information Technology in India, little study has been done to analyze the problems
affecting the performance of the Police department in Assam.

I have analyze the situation and conditions that are necessary for crime reporting by personally
visiting our police station “JALUKBARI POLICE OUTPOST ”.And it took me near about four
months to frame the whole structure of the system.
CHAPTER 2
INITIAL SYSTEM STUDY
Organizational structure of Assam Police comes under direct control of Department of Home Affairs,
Government of Assam. The Assam Police is headed by Director General of Police DGP Mukesh Sahay,
IPS (Present).Assam Police forces are organized into Police Ranges, headed by an Inspector General
of Police(IG) or Deputy Inspector General of Police(DIG) who control several Police Districts.The
Police District is the fulcrum of state police activity and each Police District of the state is headed by
a Superintendent of Police(SP). In many states an SP is assisted by one or more additional SPs and
DSPs. Generally a Police district is same as a revenue district of a state.

The Police District is divided into Police Sub-Divisions and will be under the command of a Deputy
Superintendent of Police(DSP) or Subdivision Police Officer(SDPO).The Police Sub-Division is made up
of one or more Police Circles, and is under the command of an Inspector of Police, often referred to
as the Circle Inspector (CI).Under the Police Circles are the police stations, generally under the
control of a Sub-Inspector(SI).Assam state police force also maintains its own Reserve Armed police
force, Special Armed Police which is responsible for emergencies and crowd control issues. They are
generally activated only on orders from the Rank of DIG and higher-level authorities. The armed
constabulary do not usually come into contact with the general public unless they are assigned to
VIP duty, Insurgency operation, Riot control or to maintain law and order during fairs, festivals,
athletic events, elections, and natural disasters. They may also be sent to quell outbreaks of student
or labour unrest, organised crime, and communal riots; to maintain key guard posts; and to
participate in anti-terrorist operations.

Depending on the type of assignment, the Armed Police force may carry only lathis or lethal
weapons.Assam Police also have an Elite Commando Group known as Black Panther equipped with
Latest weapons and technology for Anti-Terrorist Operations & VVIP protection.Branches.With the
growth and development of the police administration in the post-colonial era, a number of new
branches were established to meet the increasing demands of law and order and also of a peculiar
situation obtained in the state, such as the large-scale infiltration of the foreign nationals from
across the border causing a serious imbalance in the demo graphic structure of the state and
threatening national security. Some of these branches are:

1.Bureau of Investigation (Economic Offenses)

2.Special Branch3.Criminal Investigation Dept.(C.I.D)

4.Assam Police Border Organization

5.Assam Police Radio Organization

6.Assam River Police Organization

7.Directorate of Forensic Science. Assam

8.Village Defense Organization

9.Fire & Emergency Services, Assam

10.Assam Police Highway Patrol Unit.

The Assam Police has grown from strength to strength during the last two decade. In 1980 it had a
force of 40,290 and at the end of the 20th century its numerical strength stands at 60,721.
DRAWBACKS OF THE EXISTING SYSTEM

The existing system of our project is a crime management system which is a manual system
Police station is a place where complainer come up for general reporting about crime against them.
Police station provide facilities like:-

 Consultation with officer in charge.


 Putting FIR.
 Registering Case.
 Putting evidence to crime.

Generally, most police departments in the developed nations have recorded substantial
progress in using ICT in management and service delivery whereas their counter parts in the less
developed nations have not. This has enabled the police stations in developed countries to provide
improved service delivery to its citizens as well as improved interaction with its citizens. The
resulting benefits have been increased transparency, cost reduction among other benefits. However,
ICT has not yet been fully utilized by the police departments in developing nations including our
country thus resulting to poor service delivery to the public.

In the existing crime management system, most of the operations are done manually
like send complaints, taking actions against crimes etc. So with the existing system if anybody wants
to complaint against crimes he must do it through the police station, they have to physically present
themselves to the police stations. If we are doing the system manually, many minor errors will occur,
the crime reporters might as well be afraid to be interrogated while reporting thus making some
crimes going unreported. Error detection in the previous entries made and data cross verification is
another important function. These are done manually, and it would take time.
PROBLEM DEFINITION

With the high increase in population in the country, the economy of India has negatively been
influenced. This has seen its citizens indulging in lots of businesses in order to earn a living. This
makes them so much busy to a point that they don’t get time to do some of their responsibilities such
as reporting crime. Sometimes the officials end up harassing the citizens reporting the crimes and if
there is a way to report crimes without having to go to police stations then this problem could be
avoided. At other times when one reports about a missing person or property, this gets only to the
police station where you have reported but don’t get to other police stations all over the County or to a
larger extent all over Assam and this narrows down the area of investigation. In spite of the
development of Information Technology in India, little study has been done to analyze the problems
affecting the performance of the Police department in Assam.
THE PROPOSED SYSTEM

The aim of proposed system was to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system.

The system provides proper security and reduces the manual work. The existing system has several
disadvantages and many more difficulties to work well. The proposed system tries to eliminate or
reduce these difficulties up to some extent. The proposed system will help the user to reduce the
workload and mental conflict. The proposed system helps the user to work user friendly and he can
easily do his jobs without time lagging. User can easily register his case against the crime online from
anywhere. He can also put paper evidence regarding the crime. Can get regular progress report from
Reported police station.

 The Software is for the automation of Police Station Crime management System.
 It maintains two levels of users:-
 Administrator Level
 User Level

 The Software includes:-


 Maintaining Complainer details.
 Creating Sub admin such as Officer in charge of the station as subadmin.
 Providing feedback report of the investigation progress to complainer.
 Maintaining different query reports for Admin & Users.
SCOPE OF THE SYSTEM
It can be used in any Police head quarter, police station, sub police station for maintaining
crime reporting, criminal details, Informer details and feedback investigation progress.

SCOPE OF THIS PROJECT


This project has been done in the fourth semester of the Master of science in Computer Science
course of Gauhati University. The period of work is roughly five months. Within this project we
accomplish the following part of the system proposed above -

1. Carry out a detailed System Analysis of the Police department of assam.

2. Designing/Creation of relational tables in My SQL RDBMS.

3. Designing of data entry forms to enter

4. Generation of various reports at different stages based on specific query by the


user input.
CHAPTER 3
Feasibility study
In this section we have to discussed about feasibility study of our project. Before going to
feasibility study about our project we have to now discussed about the feasibility study.

Feasibility study is a study of applicability or desirability of any management or procedural


system from the stand point of advantages versus disadvantages in any given case. A study to
determine the time at which it would be practicable or desirable to install such a system when
determine to be advantageous. It is a study to determine whether a plan is capable of being
accomplished successfully. The analysis of a problem to determine if it can be solved effectively. The
operational (will it work?), economical (cost and benefits) and technical (can it built?).

In feasibility analysis section we tried to find out the feasibility of our system from three
points of view:

(a) Economic Feasibility.


(b)Technical Feasibility.
(c) Behavioral Feasibility

Economic Feasibility

From the parameter we have already discussed. We have say that the
system is economically viable. The system could be develop with the existing infrastructure
and the requirement is presumed to be always fulfill. Also the case of hardware and software
for

the proposed system must less than the benefit. That can be desire from the system and we
can accept it to be economically feasible. Even through the period or the time allotted for the
implementation is small, familiarity with the current technology and the application area
makes this project feasible in term of meeting tide schedule. The proposed system (our
project) has many cost advantages over the existing system. The system will minimize the
human efforts required to manage the general information. Also the information will be
processed very quickly. The benefit derived from the proposed system is much more than
cost and so we can accept it as economically feasible.

Technical Feasibility

Technical feasibility is the centers around the existing computer system(Hardware, Software
etc.) and to what extent it can support the proposed system. The minimum requirement of
hardware resources to develop the system is a database, a workstation, a GUI based PC, a
network, one printer and a UPS.

Technically, the development of the system is feasible since all the


resources/components required for the development of the proposed system are available.

The network setup for all the developments is established so that


user’s side will be able to communicate with the server.
Behavioral Feasibility

In general, people resistant to change and computer have been known to facilitate change. A
survey should be made of how strong a strong a reaction the user staff is likely to have towards
the development of the computerized system. It is common knowledge that the computer
installation has something to do turnover, transfer, retaining and change in employee status.

As more and more people are purchasing PC with Internet facilities, the attitude
towards the candidate system seems to be positive. Moreover an easy, unambiguous, attractive
GUI will attract more and more people towards the website. So the proposed system is
behaviourally feasible.

Conclusion

From the above objective made in feasibility study, it is recommended

that the proposed system is feasible and justified and the feasibility could

be followed by the system analysis and system design phase.


CHAPTER 4
SYSTEM ANALYSIS
National surveys demonstrate that millions of crimes go Unreported. Several reasons may contribute
to this lack of reporting. Also Crime reporting needs to be possible 24/7. Although several other
options exist and there are most publicized reporting mechanisms. Internet-based crime reporting
systems allow victims and witnesses of crime to report incidents to police 24/7 from any location. The
aim of this project is to develop an online crime report and managing system which is easily
accessible to the public. The police department and the administrative department. The system is
intended for use in a community to help the residents interact with each other more easily and to
encourage the reporting of suspicious behaviour or crime. This system registers the complaints from
people through online and it will also helpful to police department in catching criminals, in system
and person can give any complaint at any time

DATA FLOW DIAGRAM(DFD)

DFD or Data Flow Diagram is the cornerstone for structured systems analysis and design. A Data
Flow Diagram (DFD) is a graphical representation that depicts information flow and the transforms
that are applied as data move form input to output. Also known as a “Bubble chart”, it has the purpose
of clarifying system requirements and identifying major transformations that will become programs to
system design. So, it is the starting point of the design phase the functionally decomposes the
requirements specifications down to the lowest level.

The Data Flow Diagram can be used to represent a system or software at any level of abstraction.
Data Flow Diagram can even be partitioned into levels that represent increasing information flow and
functional detail. Therefore, the Data Flow Diagram provides a mechanism for functional modeling as
well as information flow modeling.

A level 0 DFD also called a Context Diagram represents the entire software element as a single
bubble with input and output data indicated by incoming and outgoing arrows respectively. Additional
processes and information flow paths are represented as the level 0 DFD is partitioned to reveal more
detail. Each of the processes represented at level 1 is a sub-information of the overall system depicted
in the Context Diagram. This process of expanding a process in a DFD into a set of equivalent smaller
process is calling leveling.

DFDs that are hierarchically organized are called leveled DFDs. For the hierarchy to be consistent,
net inputs and outputs for a process are same as that of the process in the higher level DFD.It views the
system as collection of functions that transform the inputs as desired outputs but does not go into the
details of the transformation. This process modeling tool depicts flow of data through a system and
processing work performed by the system. It has diagram of processes, data stores, data stores view,
entities and data flows.
DFD Symbols

In the DFD, there are four symbols and they are described below along with
their notations.

: A Square defines a source (originator), destination of system data.

: A Circle or a “Bubble” represents a process that transforms incoming


data flow into outgoing data flow.

: An Open Rectangle is a data store- data at rest, or a temporary


repository of Data.

: An arrow identifies data flow – data in motion. It is a pipeline


through which Information flows.

: The data store symbol

: The output device symbol

The DFD methodology is quite effective especially when the design is unclear and the
analyst need a common language for communication. The DFD is easy to understand after a
brief orientation. The main problem however, is the large number of iterations that often are
required to arrive at the most accurate and complete solution.
Data models like 0,1, and 2 level DFDs
(a)Data models like 0,1, and 2 level DFDs
ENTITY RELATIONSHIP DIAGRAM (ER DIAGRAM)

The most important consideration is the database design is to how to store the
information. The various applications and procedures that will use the database introduce
requirements upon the structure of data. In the relational database, the data and the relationships
are represented as collection of tables.
The first in creating a database is designing. First plan, what tables we require and
what they will contain. It also determines how the tables are related. These are the most
important steps and require careful consideration.
It should be determined that information we want to store about things (entities) and
how they are related (relationships). A useful technique is designing the database is to draw the
pictures of tables. The graphical display of database is called Entity-Relationship Diagram. It
is a popular high-level conceptual data model. This model and its variation are frequently used
for conceptual design of database design tools employ its concepts.

An Entity-Relationship(ER) diagram is a specialized graphic that illustrates the


interrelationships between entities in a database. Entity-relationship model is a data modeling
method used to model a system and its requirements in a top down approach. This approach is
commonly used in Database design. The diagrams created using this method are called ER
diagrams
Entity- Relationship model is a popular high level conceptual data model. The conceptual
schema is a concise description of the data requirements of the users and includes detailed
descriptions of the entity types, relationships, and constraints.
These concepts do not include implementation details, they are usually easier to
understand and can be used to communicate with non technical users. The high level
conceptual schema can also be used as reference to ensure that all users’ data requirements are
met and the requirement does not include conflicts. This approach enables the database
designers to concentrate on specifying the properties of the data, without being concerned with
storage details.
ER diagram for the proposed project has the following elements:
Constituent Representing Explanation
Diagram
Entities or It is the basic data item stored in a
Entity sets database about which data can be
stored. In ER diagram the box
contains the name of the entity.

Attributes An attribute is a property of an


Entity.

Relationship
A relationship is an association
among entities.

Connection It links attributes to entity sets and


entity sets to attributes.

Weak Entity Entity types that do not have key


attributes of their own.

Identifying
Relationships Relationship between the owner
entity type and the weak entity.

Key Attribute An attribute which is defin as key


constraint.
Complete ER diagrams with cardinality for the
propsed system.
CHAPTER 5
SYSTEM DESIGN

System design is the solution of a “how to approach to the new system. It is composed of several
steps. It facilitates the understanding and provides the procedural details necessary for the
implementation of the system recommended in the feasibility study. Emphasis is given on translating
the performance requirements into the design specification. Design goes through logical and physical
stages of development.

Logical design reviews the present physical system; prepares input and output specification;
make editing; security and control specification; details the implementation plan and prepares logical
design walk through.

Physical design maps out the details of the physical system; plans the system implementation
plan and specifies hardware and software. System design translates the system requirement into the
ways of the system as recommended in the feasibility study.

After understanding the university admission procedures, purpose of the


database, the performance needs of the application and the ease of maintenance, the
designing part begins. A good design is the foundation to a correct, easily expandable
and maintainable system. A maintainable system is one that is flexible and is simple to
modify, if the system cannot adapt easily to the changing business environment,
exceeding efforts will be required to keep it serviceable. Design is a procedure for creating
the blueprints for a system like the architects drafts for the constructor to create the building.

INPUT DESIGN

Input design in the process of converting user-originated inputs to a computer-based formal.


The goal is to make the data entry as easy, logical and free from errors as possible.

Once the analysis and design of the system has been done, it would be necessary on the part of
us to determine and identify the data that are required to be processed to produce the desired results or
outputs.

Input is one of the expensive phases of the operation of a computerized system and
created some times a major problem. Different types of the problems with a system can usually be
traced back to faulty input design method. Therefore, it is said that the input data are the lifeblood of a
system and have to analyzed and designed with utmost care and consideration.
The input design also determines whether the user can interact efficiently with the system The
proposed system has the ability to store huge database. The Probability of error occurrences is very
rare because the end-user would not be allowed to insert any record although they are able to create an
account but that would be restricted to the access of his part of information only. Besides these, data
entry, data deletion and data updating would be under the domain of the management level of the
heads. This is how the chances of error’s eruption are minimized to let the system function smoothly.

While entering data in the database file, every precaution has been taken to avoid the data
redundancy and data error on entering the data. All necessary actions are taken to reduce the data
redundancy, Reduce the access time avoid the causes of errors.

OUTPUT DESIGN

Computer output is the most important and direct source of information to the user. Efficient
intelligent output design helps the user in decision-making.

Outputs of a system can take different forms. The most common are reports, displays on screen,
printed forms etc. The Outputs also vary in terms of their users such as Administrators, Authorized
Users and General Users etc. Besides, due consideration also need to be given as to who will use the
output and for what purpose. All these point is kept in mind while designing outputs so that the
objectives of the system met in the best possible way.

The outputs are generally produced depending upon the decision send by the inputs. It is
required to meet the functional requirements.

SCREEN DESIGN

With data there is no system, but some data must provide in the right screen for input and
the information produces must be in a format acceptable to the user. The screen carries some data,
which come from people, and information output of the system goes to the people. Screen is a physical
carrier of data of information.

DATABASE DESIGN

The general purpose of database is to handle information as an integrated form. A database is a


collection of interrelated data, stored with minimum redundancy. In data base design, several
objectives are considered.

1) Controlled redundancy’s unique aspect of database design is starting data only once,
which redundancy and improves performance.
2) Easy to learn and use.
3) Data independence .
4) Accuracy and integrity.
5) Privacy and security.
6) Performance Improvement .

A Database can be thought of as a set of logically related files organized to facilitate


access by one or more application programs and to minimize the data redundancy. Intact, a
Database is defined as a stored collection of data, organized on the basis of relationship in the
data rather than the convenience of storage structures. It is not a replacement of files. There
are various types of files in which the records are collected and maintained.
Design of Tables:

Once the relationships have been identified the next step in the design process is
to design the tables for each entity. Determining the number of tables required and the information to
be stored in each of tables required and the information to be stored in each of these tables have to be
done next

Normalization

The relational model was first introduced in 1979 by E.F Codd. The relational model represents
data in the form of tables or relations. In the relation model there is a method called normalization,
which is performed when the resulting database may not have optimal structure and therefore may
contain some redundancy. A well-structured relation database will be one where no data duplication
will occur and no insert, delete or update anomalies occur. Normalization breaks complex database or
table into simpler smaller ones. Hence, after designing the ER diagram normalization up to 3rd normal
form has been done. So, reasons for Normalization are

 Normalization prevents unnecessary duplication of data, thus conserving time & disk
space.
 Normalization makes it easier to extract the information needed from the database. .
 The main objective of normalization is to reduce the redundancy using the principle
of no less decomposition. No less decomposition implies reduction of table into
smaller without loss of information

First Normal Form (1NF):

A relation is in the first normal form if the domain of an attribute includes only atomic value
and the value of any attribute in a tuple is a single value from the domain of that attribute. An
important step in arriving at 1NF is to define a primary key to each table which will uniquely identify
one row of information and would help in extracting.1NF is arrived at by removing the violating
attribute and placing it in a separate relation along with a primary key.

Second Normal Form (2NF):

A table is said to be in 2NF when it is 1NF and every attribute in the row is
functionally dependent upon the whole key, and not just part of the key.

This property of depending on the whole key and not just part of the key is called the Full
Functional Dependency.

Third Normal Form (3NF):

A relation is in 3NF when it is in 2NF and every non-key attribute is functionally


dependent only on the primary key and not on any other attribute. The dependency on non
key attribute is called transitive dependency. So, transitive dependency should not be present
in relations to be in 3NF.
File Specification
Once the input data is captured in the system, these may have to preserve either for a
short or long period. The data will generally be stored in the files in a logical manner. The designer
will have to devise the techniques of storing and retrieving data from the files.
The design of file includes decision about the nature and contents of the file itself, such
as, whether it is to be used for storing transaction details, historical data, or reference information.

Display Formats
The computer output is the most important and direct source of information and direct
source of information to the user and intelligent output design should be improve the system
relationship with the user in decision-making. The output is designed to meet the satisfaction of the
user as well as the requirement of the various departments of the organization. Output is so designed
that the user can interact with the output.

Various types of output required by the most systems are external output whose destination is
outside the organization and which require special attention. Internal output whose destination is
within the organization requires careful design.

Developing a system that meets user requirements has led to the new techniques and
methodologies.

The following are the few points to fulfill it.

1) Improved productivity of analyst and programmers.

2) Improved documentation and subsequent maintenance and enhancement.

3) Improved communication among the user, analyst, designer and programmers.

4) Standardize the approach to analyst and design.

5) Simplify design by segmentation.


CHAPTER 6
SYSTEM IMPLEMENTATION
After going through the analyzing and designing part of our project, now we are going to
implement our project using the following technology:

Front end technology is PHP 5


Back end technology is MySQL Server 5.5

Front end technology is PHP 5

PHP is a server-side scripting language. It is a powerful tool for making dynamic and
interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors
such as Microsoft's ASP. In our PHP page we execute scripts on your server.

A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting
block can be placed anywhere in the document. On servers with shorthand support enabled
you can start a scripting block with <? and end with ?>.

A PHP file normally contains HTML tags, just like an HTML file, and some PHP
scripting code. Below, we have an example of a simple PHP script which sends the text
"Hello World" to the browser:

<html>
<body>
<?php
echo"HelloWorld";
?>

</body>
</html>
Database Connection:
Before you can access data in a database, you must create a connection to the
database. In PHP, this is done with the mysql_connect() function. The connection will be
closed automatically when the script ends. To close the connection before, use the
mysql_close() function:

<?php
$con = mysql_connect("localhost","Username","Password");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_close($con);
?>

To select a database :

mysql_select_db("Databasename", $con);

Execute query :

mysql_query($query, $con);

Back end technology is MySQL Server

MySQL is the world's second most widely used open-source relational database management
system. It is named after co-founder Michael Widenius's daughter, My. The SQL phrase stands for
Structured Query Language.

MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the
fast-growing open source enterprise software stack. More and more companies are using
LAMP as an alternative to expensive proprietary software stacks because of its lower cost
and freedom from platform lock-in.
MySQL was originally founded and developed in Sweden by two Swedes and a Finn:
David Axmark, Allan Larsson and Michael "Monty" Widenius, who had worked together
since the 1980's.

Features of MySQL :

 MySQL is a database system used on the web


 MySQL is a database system that runs on a server
 MySQL is ideal for both small and large applications
 MySQL is very fast, reliable, and easy to use
 MySQL supports standard SQL
 MySQL compiles on a number of platforms
 MySQL is free to download and use
 MySQL is developed, distributed, and supported by Oracle Corporation
 MySQL is named after co-founder Monty Widenius's daughter: My

The data in MySQL is stored in tables. A table is a collection of related data, and it
consists of columns and rows.
CHAPTER 7
SYSTEM TESTING
In the testing process the Demo versions of the software i.e. actual replica of the existing system
will be installed so that the users can use it as they like and give their valuable suggestion and advice. There
after security can be incorporated in the system. In this phase we will be using both alpha and beta test, which
will enable the user to check the whole system thoroughly. The said Demo version software can be used for a
period of 15 days to 1 month and during this period only training of the proposed software will be imported.
This phase will allow the entire user to use the system in a much more efficient way.

The design tests for software and other engineered products can be as challenging as the initial
design of the product itself. The objectives of the testing are the finding of errors with a minimum amount of
time and effort.

Any engineered product can be tested in one of two ways:

1) Knowing the specified function that a product has been designed to perform, tests can be
conducted that demonstrate each function is fully operational while at the same time searching
for errors in each function;
2) Knowing the internal workings of a product, tests can be conducted to ensure that “all gears
mesh” that is, internal operations are performed according to specifications and all internal
components have been adequately exercised.

System tests are designed to validate a fully developed system to assure that it meets its requirements.
There are essentially three main kinds of system testing:

1. Alpha testing. Alpha testing refers to the system testing carried out by the test team within
the developing organization.
2. Beta testing. Beta testing is the system testing performed by a select group of friendly
customers.
3. Acceptance testing. Acceptance testing is the system testing performed by the customer to
determine whether to accept or reject the delivery of the system.

After testing our project, project is fully satisfy all the testing procedure.

Now, after system testing our project snapshot is given below:


HOME PAGE OF THE APPLICATION

ADMINISTRATOR LOGIN PAGE


SUB ADMIN PAGE

USER LOGIN PAGE


CHAPTER 8
CODEING

HOME PAGE

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title>Online Crime Management System</title>

<link rel="stylesheet" href="css/style_main.css" type="text/css">

<!--[if IE 7]>

<link rel="stylesheet" href="css/ie7.css" type="text/css">

<![endif]-->

</head>

<body>

<div id="header">

<div>

<div>

<span>Crime</span>

<a href="index.php" class="logo"><img src="images/CCMS LOGO-1.png" alt=""


/></a>

<span class="tagline">Management</span>

</div>

</div>

</div>

<table width='700' align='center' border='0'>

<tr>

<td align='right'><strong>Today :: </strong><?php

$Today = date('y:m:d');

$new = date('l, F d, Y', strtotime($Today));

echo $new;

?>

</td>
</tr>

</table>

<div id="body">

<div class="header">

<div>

<img src="images/crime5.jpg" alt="">

<ul>

<li><a href="#">Home</a></li>

<li><a href="user/registration.php">New Registration</a></li>

<li><a href="admin/admin_login.php">Admin Login</a></li>

<li><a href="user/user_login.php">User Login</a></li>

</ul>

</div>

</div>

</div>

<div id="footer">

<div>

<p>Copyright &copy; <a href="#">Crime Management System</a></p>

<p align='center'><strong>Designed by : Abhijit Dey</strong></p>

<div>

<span>Stay Connected :</span>

<a href="#" id="facebook">facebook</a>

<a href="#" id="twitter">twitter</a>

</div>

</div>

</div>

</body>

</html>

ADMINISTRATOR LOGIN PAGE-ADMIN LOGIN.PHP

<?php
session_start();

?>

<html>

<head>

<meta http-
equiv="Content-Type" content="text/html; charset=utf-8" />

<title>Online Crime
Management System</title>

<link rel="stylesheet" href="../css/style_main.css" type="text/css">

</head>

<body>

<div id="header">

<div>

<div>

<span>Crime</span>

<a href="index.html"
class="logo"><img src="../images/CCMS LOGO-1.png" alt="" /></a>

<span
class="tagline">Management</span>

</div>

</div>

</div>

<div id="body">

<div class="header">

<div>

<form action=""
method='post'>

<table width='400'
border='2' align='center' bgcolor="#FFA500">

<tr>

<td align="center"
bgcolor="#FFf" colspan="6"><h2>Admin Login Panel</h2></td>

</tr>
<tr>

<td align="right"><font
color="#990000"><strong>Admin Name :</strong></font></td>

<td><input type='text' name='a_name'/></td>

</tr>

<tr>

<td align="right"><font
color="#990000"><strong>Admin Password :</strong></font></td>

<td><input type='password' name='a_pass' /></td>

</tr>

<tr>

<td colspan='4'
align="center"><input type="submit" name="login" value="Login" /></td>

</tr>

</table>

</form>

</div>

<br /><br /><br /><br />

<div>

<ul>

<li><a href="../index.php">Home</a></li>

<li><a href="Sub_Admin.php">New SubAdmin</a></li>

<li><a href="Sub_Admin_Login.php">Sub Admin</a></li>

<li><a href="../logout.php">Logout</a></li>

</ul>

</div>

</div>

</div>

<div id="footer">

<div>

<p>Copyright &copy;
<a href="#">Crime Management System</a></p>
<p
align='center'><strong>Designed by : Abhijit Dey</strong></p>

<div>

<span>Stay Connected
:</span>

<a href="#" id="facebook">facebook</a>

<a href="#" id="twitter">twitter</a>

</div>

</div>

</div>

</body>

</html>

<?php

if(isset($_POST['login']
))

$admin_name=$_POST
['a_name'];

$admin_pass=$_POST['
a_pass'];

include('connection.php'
);

$query =
mysql_query("select * from admin_login where userid='".$admin_name."' and
password='".$admin_pass."'");

$run =
mysql_num_rows($query);

if($run>0)

{
$_SESSION['a_name']
= $admin_name;

header('location:welco
me.php');

else

echo
"<script>

alert('username or
password not matching');

</script>";

?>

SUBADMIN LOGIN PAGE

<?php

session_start();

$x=$_SESSION['username'];

?>

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />


<title>Online Crime Management System</title>

<link rel="stylesheet" href="../css/style.css" type="text/css">

<link rel="stylesheet" href="../css/menu.css" type="text/css">

<!--[if IE 7]>

<link rel="stylesheet" href="css/ie7.css" type="text/css">

<![endif]-->

</head>

<body>

<div id="header">

<div>

<div>

<span>Crime</span>

<a
href="../index.php" class="logo"><img src="../images/CCMS LOGO-1.png" alt="" /></a>

<span class="tagline">Management</span>

</div><br>

</div>

</div>

<div class="nav">

<ul>

<li class="selected"><a
href="welcomeSubAdmin.php">Home</a></li>

<li><a href="PoliceStationList_subadmin1.php">Police Station</a></li>

<li><a href="Case_Report_Progress_Update.php">Report Update</a></li>

<li><a href="ReportSub.php">Report</a></li>

<li><a href="Case.php">Registered Case </a></li>

<li><a href="Informer.php">Informers</a></li>

<li><a
href="../logout.php">Logout</a></li>

</ul>
</div>

<table align='center' width='900' height='60' border='0'>

<tr>

<td align='right'
width=350><strong>Today :: </strong><?php

$Today = date('y:m:d');

$new = date('l, F d, Y', strtotime($Today));

echo $new;

?>

</td>

<td align='right' width='550'


class='style2'><strong>Welcome Sub Admin :: </strong></td>

<td align='left' width='100'


class='style3'><strong> <?php echo $x; ?> </strong></td>

</tr>

</table>

<div id="body">

<div class="header">

<div>

<table width='900'
border='0' align='center'>

<tr>

<td
align='center'><h2>Welcome to Crime Management System</h2></td></center>

</tr>

<tr>

<td><img
src="../images/crime7.jpg"></td>

</tr>

</table><br>
</div>

</div>

</div>

<div id="footer">

<div>

<p>Copyright &copy; <a href="#">Crime Management System</a></p>

<p
align='center'><strong>Designed by : Abhijit Dey</strong></p>

<div>

<span>Stay Connected :</span>

<a href="#" id="facebook">facebook</a>

<a href="#" id="twitter">twitter</a>

</div>

</div>

</div>

</body>

</html>

INFORMER LIST PAGE_INFORMERLIST.PHP

<?php

session_start();

$x=$_SESSION['a_name'];

?>

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title>Online Crime Management System</title>

<link rel="stylesheet" href="../css/style.css" type="text/css">

<link rel="stylesheet" href="../css/menu.css" type="text/css">

<!--[if IE 7]>

<link rel="stylesheet" href="css/ie7.css" type="text/css">

<![endif]-->
</head>

<body>

<div id="header">

<div>

<div>

<span>Crime</span>

<a href="welcomeAdmin.php" class="logo"><img


src="../images/CCMS LOGO-1.png" alt="" /></a>

<span class="tagline">Management</span>

</div>

</div>

</div><br>

<div class="nav">

<ul>

<li><a href="welcomeSubAdmin.php">Home</a></li>

</ul>

</div>

<table align='center' width='900' height='60' border='0'>

<tr>

<td align='right' width=270><strong>Today :: </strong><?php

$Today = date('y:m:d');

$new = date('l, F d, Y',


strtotime($Today));

echo $new;

?>

</td>

<td align='right' width='530' class='style2'><strong>Welcome ::


</strong></td>
<td align='left' width='100' class='style3'><strong> <?php echo $x; ?>
</strong></td>

</tr>

</table>

<div id="body">

<div class="header">

<div>

<h1 align="center"> Informers in Police Stations </h1><br /><br />

<table width='1230' border='2' align='center' bgcolor='#fff'>

<tr>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Informer code</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Station Name</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Incharge</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Address</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">City</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">District</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Zone</font></th>

<th align='center'
bgcolor="#CCFF00"><font color="#990000">Email</font></th>

<th align='center' bgcolor="#CCFF00"><font


color="#990000">Contactno</font></th>

</tr>

<?php
include('connection.php');

$que=mysql_query("select * from
informer");

while($call=mysql_fetch_array($que))

?>

<tr>

<td align="center"
class='style1'><?php echo "<br>".$call[0];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[1];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[2];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[3];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[4];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[5];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[6];?></td>

<td align="center"
class='style1'><?php echo "<br>".$call[7];?></td>

<td align="center" class='style1'><?php echo "<br>".$call[8];?></td>

</tr>

<?php

?>

</table>

<br>

</div>
</div>

</div>

<div id="footer">

<div>

<p>Copyright &copy; <a href="#">Online Crime Management System</a></p>

<p align='center'><strong>Designed by :Abhijit Dey</strong></p>

<div>

<span>Stay Connected :</span>

<a href="#" id="facebook">facebook</a>

<a href="#" id="twitter">twitter</a>

</div>

</div>

</div>

</body>

</html>

USER REGISTRATION PAGE REGISTRATION.PHP

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title>Online Crime Management System</title>

<link rel="stylesheet" href="../css/style.css" type="text/css">

<link rel="stylesheet" href="../css/menu.css" type="text/css">

<link rel="stylesheet" type="text/css" href="../css/dialog.css" />

<script type="text/javascript" src="../js/dialog.js"></script>

<link rel="stylesheet" type="text/css" href="../css/style_main.css" />

<!--[if IE 7]>

<link rel="stylesheet" href="css/ie7.css" type="text/css">

<![endif]-->
<script type="text/javascript">

function valid()

ErrorText="";

if(document.RegForm.password.value!=document.RegForm.cpassword.value)

alert("Password didn't match");

document.RegForm.cpwd.focus();

return false;

if(document.RegForm.userid.value=="")

alert("Please enter user name");

document.RegForm.userid.focus();

return false;

if(document.RegForm.pwd.value=="")

alert("Please enter your password");

document.RegForm.pwd.focus();

return false;

if(document.RegForm.cname.value=="")

alert('Please enter Consumer Name');

document.RegForm.cname.focus();

return false;
}

var cname = document.getElementById('cname');

var re= /^[\w ]+$/;

if(!re.test(cname.value)) // Regular Expression for Character


entry

alert("Error: Input to name contains invalid Character!");

RegForm.cname.focus();

return false;

if(document.RegForm.address.value=="")

alert("Please enter Address");

document.RegForm.address.focus();

return false;

var address = document.getElementById('address');

var re= /^[\w ]+$/;

if(!re.test(address.value)) // Regular Expression for Character


entry

alert("Error: Input to address contains invalid Character!");

RegForm.address.focus();

return false;

}
var email = document.getElementById('email');

var filter = /^([a-zA-Z0-9_\.\-])+\@(([a-zA-Z0-9\-


])+\.)+([a-zA-Z0-9]{2,4})+$/;

if(!filter.test(email.value))

alert("Please enter a valid Email ID");

email.focus();

return false;

if(document.RegForm.age.value=="")

alert("Please enter age");

document.RegForm.age.focus();

return false;

var age = document.getElementById('age');

var pattern = /^([0-9]{2})+$/;

if(!pattern.test(age.value))

alert("Invalid age");

return false;

var mobile = document.getElementById('mobile');

var pattern = /^([0-9]{10})+$/;

if(!pattern.test(mobile.value))

alert("Invalid Contactno");

return false;

}
if(document.RegForm.consumerno.value=="")

alert("Please enter consumer no");

document.RegForm.age.focus();

return false;

if(ErrorText="")

Reform.submit();

</script>

</head>

<body>

<div id="dialogoverlay"></div>

<div id="dialogbox">

<div>

<div id="dialogboxhead"></div>

<div id="dialogboxbody"></div>

<div id="dialogboxfoot"></div>

</div>

</div>

<div id="header">

<div>

<div>

<span>Crime</span>

<a href="../admin/index.html" class="logo"><img


src="../images/CCMS LOGO-1.png" alt="" /></a>

<span class="tagline">Management</span>

</div><br>
</div>

</div>

<div class="nav">

<ul>

<li><a href="../index.php">Home</a></li>

<li><a href="#">Feedback</a></li>

<li><a href="../logout.php">Logout</a></li>

</ul>

</div>

<table align='center' width='900' height='60' border='0'>

<tr>

<td align='right' width=270><strong>Today :: </strong><?php

$Today = date('y:m:d');

$new = date('l, F d, Y',


strtotime($Today));

echo $new;

?>

</td>

<td align='left' width='100' class='style3'><strong> </strong></td>

</tr>

</table>

<div id="body">

<div class="header">

<div>

<?php

if(isset($_POST['reg_info']))
{

$username=$_POST['userid'];

$password=$_POST['pwd'];

$cname=$_POST['cname'];

$address=$_POST['address'];

$email=$_POST['email'];

$dob=$_POST['dob'];

$sex=$_POST['sex'];

$phone=$_POST['phone'];

$client_id=$_POST['c_id'];

$con=mysql_connect("localhost","root","");

if($con)

$dbstatus=mysql_select_db("crime");

$rs=mysql_query("insert into registration


values('$username','$password','$cname','$address','$email','$dob','$sex','$phone','$client_id')"
);

if($rs)

echo "<script>Alert.render('Record inserted successfully')</script>";

else

echo "<script>Alert.render('Someone is registered with same


ID')</script>";

else
{

echo "<script>Alert.render('Connection not successfully')</script>";

?>

<form method="post" action="<?php echo $_SERVER['PHP_SELF']; ?>"


name="RegForm">

<table border='2' align='center' bgcolor="#FFA500">

<tr>

<td align="center" bgcolor="#FFf" colspan="6"><h2>New Registration</h2></td>

</tr>

<TR>

<TD>USERID:

</TD>

<TD><input name="userid" type= "text" id="userid" size="30" placeholder="Username">

</TD>

</TR>

<TR>

<TD>PASSWORD:

</TD>

<TD><input name="pwd" type="password" id="pwd" size="30" placeholder="Password">

</TD>

</TR>

<TR>

<TD>CONFIRM PASSWORD:

</TD>

<TD><input name="cpwd" type="password" id="cpwd" size="30"


placeholder="Password">

</TD>

</TR>

<tr>

<td>COMPLAINER NAME:</td>
<td><input name="cname" type="text" id="cname" size="30" align="middle"
placeholder="Name Title"><br></td>

</tr>

<tr>

<td>ADDRESS:

</td>

<td><textarea row=4 col=400 name="address" placeholder="Address"></textarea>

</td>

</tr>

<TR>

<TD>EMAIL ID:

</TD>

<TD><input name="email" type="text" id="email" size="30"


placeholder="client@gmail.com">

</TD>

</TR>

<TR>

<TD>DATE OF BIRTH:

</TD>

<TD><input type="text" name="dob" id="dob" size="30" align="middle"


placeholder="YYYY-MM-DD"><br>

</TD>

</TR>

<tr>

<td>SEX:

</td>

<td> <select name="sex">

<option value="Male">Male</option>

<option value="Female">Female</option>

</select>

</td>

</tr>
<TR>

<TD>CONTACT NUMBER:

</TD>

<TD><input type="text" name="phone" id="phone" size="30" align="middle"


placeholder="10 digits Number"><br>

</TD>

</TR>

<TR>

<TD>CLIENT ID:

</TD>

<TD><input type="text" name="c_id" value="<?php echo rand(100,1000); ?>" id="c_id"


size="30" align="middle" placeholder="c_id"><br>

</TD>

</TR>

<tr>

<td>

</td>

<td>

<input type="submit" name="reg_info" value="Submit" align="centre" onClick="return


valid()">&nbsp;&nbsp;<input name="reset" type="reset" value="Reset" />

</td></tr>

</table>

</td></tr></table>

</form>

</tr>

</table>

<br>

</div>

</div>

</div>
<div id="footer">

<div>

<p>Copyright &copy; <a href="#">Crime Management System</a></p>

<p align='center'><strong>Designed by : Abhijit Dey</strong></p>

<div>

<span>Stay Connected :</span>

<a href="#" id="facebook">facebook</a>

<a href="#" id="twitter">twitter</a>

</div>

</div>

</div>

</body>

</html>
CHAPTER 9
MAINTENANCE

INTRODUCTION:-
This phase provides the necessary software adjustment for the system so that it continues to comply
with the original specifications. Maintenance is necessary to eliminate errors in the working system
during its working life and to tune the system to any variations in its working environment. Often
small system deficiencies are found as a system is brought into operations and changes are made to
remove them. System planners must always plan for resource availability to carry out these
maintenance functions. The importance of maintenance is it continues to bring the new system to
standard.

There are basically three types of maintenance:

Adaptive Maintenance

A software product might need maintenance when the customers need the
product to run on new platform, on new operating systems, or when they need the product to
interface with new hardware or software.

Corrective Maintenance

Corrective maintenances of a software product may be necessary either to


rectify some bugs observed while the system is in use, or to enhance the performance of the
system.

Perfective Maintenance

A software product needs maintenance to support the new features that the
users want or to change different functionalities of the system according to customer demand.
CHAPTER 10
CONCLUSION
The major challenge that was faced during the development of the software was to make the system
flexible enough to cope with requirement that had given from the organization .May there are many
more other feature that should be tracked to make the system a full flea zed one. Project has been
consider as a “Learning project and tried to grain and grip over the technology use for implementation
purpose. Some monotonous feature that are even not implemented that could included in the system.

FUTURE ENHANCEMENT

Although it has been tried to best from my side to fulfill all the necessities of the organization that are
required through that system. No system can be perfect and complete. Possibility of some drawback
or deficiency in it comprehensiveness can not be over ruled. Again there is scope for farther
development of existing system.

In our project also we can include some purpose to extend our project in future and that are given
below:

1. Sub Police Station management system module

2. Criminal trial procedures progress system module etc

LIMITATIONS

1. The application is not tested at the time of power failure .

2.The application is not tested at the time of heavy load.


BIBLIOGRAPHY
Name of books

1. Fundamental of Database System

- Ramez Elmasri

- Shamkant B.Navathe

2. Fundamentals of Software Engineering

- Rajiv Mall

3. Advanced Database Management Systems, IDOL

4. MySQL 5.5, Ivan Bayross, Sharanam Shah

Search engine:

 www.google.com

 www.google.com-image

 www.searchnu.com

Websites :

 www.w3school.com

You might also like