You are on page 1of 34

1.

INTRODUCTION

1.1 SYNOPSIS
The Crime Records Management System applies to Police Stations all across the country and
specifically looks into the subject crime prevention, detection, conviction of criminals depending
on a highly responsive backbone of Information Management.
Synopsis is a general documentation tool. By means of a modular structure, it adapts to
different styles of embedded documentation, different programming languages and various
output formats. It scales well with the size of the project by allowing processing to be controlled
by making files.

1
1.2 ABOUT THE PROJECT

The Crime Records Management System applies to Police Stations all across the country
and specifically looks into the subject crime prevention, detection, conviction of criminals
depending on a highly responsive backbone of Information Management. The efficiency of the
Police and the effectiveness with which it tackles crime depend on what quality of information it
can derive from its existing records and how fast it can have access to it.

2
2. SYSTEM ANALYSIS

2.1 FEASIBILITY STUDY

Preliminary investigation examine project feasibility, the likelihood the system will
be useful to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
 Technical Feasibility
 Operational Feasibility
 Economical Feasibility

TECHNICAL FEASIBILITY
The technical issue usually raised during the feasibility stage of the investigation
includes the following:
 Does the necessary technology exist to do what is suggested?
 Do the proposed equipments have the technical capacity to hold the data required to use the
new system?
 Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
 Can the system be upgraded if developed?
 Are there technical guarantees of accuracy, reliability, ease of access and data security?

3
Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation
System’. The current system developed is technically feasible. It is a web based user interface for
audit workflow at NIC-CSD. Thus it provides an easy access to the users. The database’s
purpose is to create, establish and maintain a workflow among various entities in order to
facilitate all concerned users in their various capacities or roles. Permission to the users would be
granted based on the roles specified. Therefore, it provides the technical guarantee of
accuracy, reliability and security. The software and hard requirements for the development of
this project are not many and are already available in-house at NIC or are available as free as
open source. The work for the project is done with the current equipment and existing software
technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of
the number of users using the system.

OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned out into information system.
That will meet the organization’s operating requirements. Operational feasibility aspects of the
project are to be taken as an important part of the project implementation. Some of the important
issues raised are to test the operational feasibility of a project includes the following: -
 Is there sufficient support for the management from the users?
 Will the system be used and work properly if it is being developed and implemented?
 Will there be any resistance from the user that will undermine the possible application
benefits?

This system is targeted to be in accordance with the above-mentioned issues. Beforehand,


the management issues and user requirements have been taken into consideration. So there is no
question of resistance from the users that can undermine the possible application benefits.
The well-planned design would ensure the optimal utilization of the computer resources and
would help in the improvement of performance status.

4
ECONOMICAL FEASIBILITY
A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost in
creating the system is evaluated against the ultimate benefit derived from the new systems.
Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources and
technologies available at NIC, There is nominal expenditure and economical feasibility for
certain.

2.2 EXISTING SYSTEM

In the existing crime management system, most of the operations are done manually like
send complaints, taking actions against crimes, view status etc. So with the existing system if
anybody wants to complaint against crimes he must do it through the police. If we are doing the
system manually, so many minor errors will occur. Error detection in the previous entries made
and data cross verification is another important function. These are done manually, and it would
take time.

Drawbacks of the existing system can be concluded as follows:

 The existing system is time consuming and not very user friendly.

 The FIR brought by a person hailing from a family beyond poverty, the existing
system shows ignorance for the same

 The officer dealing with a particular case cannot take decision by himself even when
he is having the first hand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.

 Even an efficient officer cannot/may not able to handle more than one case at a time.

5
 As we all know, a covered truth, Bribery plays an important role in the existing
system.

 Many cases are pilled up in the corners, which are not proved, due to lack of
commitment in the job.

 In most of the cases, the innocent are accused in the existing system.

 As per our jurisdiction, “Let thousand criminals escape-not a single innocent be


punished “. As a result of this and other factors that influence investigation, such
as bribery, the innocent becomes accused in several situations in the eyes of
Justice.

 The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.

 They criticized it for being inefficient, time consuming, poorly managed, disparate
and lacking flexibility.

 Evaluation requires monitoring crime before, during and after the initiative.

 Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.

 Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.

2.3 PROPOSED SYSTEM


Our mission statement directs us to promote the public interest while balancing the Law.
Obviously we’ll not rush to judgment, but will look at the facts and render a thoughtful decision
based on these facts. Organization is an independent statutory body which was created to
maintain an effective an effective and efficient police service for the public. Its primary task
includes securing continuous needs of the public in an efficient manner. As part of the
responsibility, ‘our committee’ is responsible for performance monitoring (performance planning
and review formerly professional standards and performance monitoring) decided to look at the

6
contribution and effectiveness of the organization within the public. We need the whole hearted
support of each and every individual member of the site and cooperation of the users. The
administrator, along with the investigators, lawyers, counselors, and other authorities statutory
partners in our organization. Given their key role in these partnerships, we felt that an overview
of strength and Weakness of the organization is needed.

The aim of the project is to bring about improvement to the organization’s contributions;
this report necessarily concentrates on overcoming weakness and raising standards. To avoid
conducting and unfair evaluation efforts which are made to put this contribution into this context.
It believes that partnership work is highly beneficial to the organization and that partnership
work is the way forward to reduce crime and disorder.

Advantages of the Proposed System:

The scrutiny was carried out through the collection of written and oral evidence.

 Better communication, better leadership, better training, more defined roles in terms
of contribution to contribution to the society.

 Working with partners.

 Reducing crime and disorder.

 Confidently and anonymity issues.

The proposed system has control over all its cells and is perfectly coordinated. Also the
cells can act individually. To take our organization to heights we need the wholehearted co-
operation of the public.

Objectives of the Proposed System

In the fast moving world, if people lack something, it is time. All are busy in their world.
It will be welcomed if services are provided at their will. So the main objective of our product is
better communication, better leadership, reducing crime and disorder etc.

The product provides a framework, which is error free. We know a crime management
system is actually a critical process having many calculations and operations. So each simple
7
error laid to big problem. So it should be error free and our objective is to build error free
software.

3. SYSTEM SPECIFICATION

3.1 HARDWARE REQUIREMENTS:

SYSTEM : Pentium III 700 MHz

HARD DISK : 350 GB

MONITOR : 15 VGA colour monitor

MOUSE : Logitech.

RAM : 2GB

KEYBOARD : 110 keys enhanced.

3.2 SOFTWARE REQUIREMENTS:

OPERATING SYSTEM : Windows XP Professional/7/8/8.1

SOFTWARE USED : Visual Studio 2010

8
9
3.3 SOFTWARE SPECIFICATION

Introduction to .NET Framework

.NET is a software framework which is designed and developed by Microsoft. The first version
of the .Net framework was 1.0 which came in the year 2002. In easy words, it is a virtual
machine for compiling and executing programs written in different languages like C#, VB.Net
etc. It is used to develop Form-based applications, Web-based applications, and Web services.
There is a variety of programming languages available on the .Net platform, VB.Net
and C# being the most common ones. It is used to build applications for Windows, phone, web,
etc. It provides a lot of functionalities and also supports industry standards.

Programming Languages which are designed and developed by Microsoft are:

Main Components of .NET Framework

Common Language Runtime(CLR): CLR is the basic and Virtual Machine component of


the .NET Framework. It is the run-time environment in the .NET Framework that runs the codes
and helps in making the development process easier by providing the various services such as
remoting, thread management, type-safety, memory management, robustness, etc.. Basically, it is
responsible for managing the execution of .NET programs regardless of any .NET programming
language. It also helps in the management of code, as code that targets the runtime is known as
the Managed Code and code doesn’t target to runtime is known as Unmanaged code.

Framework Class Library(FCL): It is the collection of reusable, object-oriented class libraries


and methods, etc that can be integrated with CLR. Also called the Assemblies. It is just like the
header files in C/C++ and packages in the java. Installing .NET framework basically is the
installation of CLR and FCL into the system. Below is the overview of .NET Framework

The combination of Operating System Architecture and CPU Architecture is known as


the platform. Platform dependent means the programming language code will run only on
particular Operating System. A .NET application is platform dependent because of the .NET
framework which is only able to run on the Windows-based operating system. The .Net
application is platform independent also because of Mono framework. Using Mono framework

10
the .Net application can run on any Operating System including windows. Mono framework is a
third party software developed by Novell Company which is now a part of Micro Focus
Company. It is a paid framework.

Common Type System (CTS)


It describes set of data types that can be used in different .Net languages in common.
(i.e), CTS ensures that objects written in different .Net languages can interact with each other.
For Communicating between programs written in any .NET complaint language, the types have
to be compatible on the basic level.
The common type system supports two general categories of types: 
Value types:
Value types directly contain their data, and instances of value types are either allocated on the
stack or allocated inline in a structure. Value types can be built-in (implemented by the runtime),
user-defined, or enumerations.

11
Reference types:
Reference types store a reference to the value's memory address, and are allocated on the heap.
Reference types can be self-describing types, pointer types, or interface types. The type of a
reference type can be determined from values of self-describing types. Self-describing types are
further split into arrays and class types. The class types are user-defined classes, boxed value
types, and delegates. 
Common Language Specification (CLS)
It is a sub set of CTS and it specifies a set of rules that needs to be adhered or satisfied by
all language compilers targeting CLR. It helps in cross language inheritance and cross language
debugging.
Common language specification Rules:
It describes the minimal and complete set of features to produce code that can be hosted by CLR.
It ensures that products of compilers will work properly in .NET environment. 
Sample Rules: 

1. Representation of text strings 


2. Internal representation of enumerations 
3. Definition of static members and this is a subset of the CTS which all .NET languages
are expected to support.
4. Microsoft has defined CLS which are nothing but guidelines that language to follow
so that it can communicate with other .NET languages in a seamless manner.

VB.NET

VB.NET is an update to Visual Basic that targets Microsofts .NET Framework. VB.NET has a
lot of similarities to Visual Basic but also some differences. VB.NET is an object-oriented
language, which supports the abstraction, encapsulation, inheritance, and polymorphism features.
It is the most productive tool for rapidly creating a wide range of Windows, Web, Mobile, and
Office applications built on the .NET Framework.

12
The Visual Basic language is designed to be human readable and accessible to everyone from
novice programmers to advanced system architects. All of this is built on top of the .NET
Framework, which guarantees that programs written in Visual Basic run with unsurpassed
scalability and reliability. The .NET Framework provides VB.Net programmers with the ability
to create fully object oriented programs (OOPs), just like the ones created using Java, C# or C++.

Visual Studio

Many programmers says VB.Nets ease of use as the key to its success. Using VB.NET, you can
create a wide variety of applications, such as a Console Applications, that displays its output in
an MS-DOS-like window, Windows Applications that often displays a form-based interface,
Web Applications, Web Services, Mobile Applications etc. I hope this site will help you to
acquire the skills and knowledge necessary to develop various types of applications in VB.NET
in a simplified manner rather than in a complex way.

C# 
C# is a general-purpose, modern and object-oriented programming language pronounced as “C
sharp”. It was developed by Microsoft led by Anders Hejlsberg and his team within the .Net

13
initiative and was approved by the European Computer Manufacturers Association (ECMA) and
International Standards Organization (ISO). C# is a lot similar to Java syntactically and is easy
for the users who have knowledge of C, C++ or Java.
A bit about .Net Framework .Net applications are multi-platform applications and framework can
be used from languages like C++, C#, Visual Basic, COBOL etc. It is designed in a manner so
that other languages can use it. Easy to start: C# is a high-level language so it is closer to other
popular programming languages like C, C++, and Java and thus becomes easy to learn for
anyone.
1. Widely used for developing Desktop and Web Application: C# is widely used for
developing web applications and Desktop applications. It is one of the most popular
languages that is used in professional desktop. If anyone wants to create Microsoft apps,
C# is their first choice.
2. Community: The larger the community the better it is as new tools and software will be
developing to make it better. C# has a large community so the developments are done to
make it exist in the system and not become extinct.
3. Game Development: C# is widely used in game development and will continue to
dominate. C# integrates with Microsoft and thus has a large target audience. The C#
features such as Automatic Garbage Collection, interfaces, object-oriented, etc. make C# a
popular game developing language.
ASP.NET

ASP.NET is a web development platform, which provides a programming model, a


comprehensive software infrastructure and various services required to build up robust web
applications for PC, as well as mobile devices.ASP.NET works on top of the HTTP protocol,
and uses the HTTP commands and policies to set a browser-to-server bilateral communication
and cooperation.ASP.NET is a part of Microsoft .Net platform. ASP.NET applications are
compiled codes, written using the extensible and reusable components or objects present in .Net
framework. These codes can use the entire hierarchy of classes in .Net framework.

The ASP.NET application codes can be written in any of the following languages:

 C#

14
 Visual Basic.Net

 Jscript

 J#

ASP.NET is used to produce interactive, data-driven web applications over the internet. It
consists of a large number of controls such as text boxes, buttons, and labels for assembling,
configuring, and manipulating code to create HTML pages.

ASP.NET Web Forms Model

ASP.NET web forms extend the event-driven model of interaction to the web applications. The
browser submits a web form to the web server and the server returns a full markup page or
HTML page in response.

All client side user activities are forwarded to the server for stateful processing. The server
processes the output of the client actions and triggers the reactions.

Now, HTTP is a stateless protocol. ASP.NET framework helps in storing the information
regarding the state of the application, which consists of:

 Page state

 Session state

The page state is the state of the client, i.e., the content of various input fields in the web form.
The session state is the collective information obtained from various pages the user visited and
worked with, i.e., the overall session state. To clear the concept, let us take an example of a
shopping cart.

User adds items to a shopping cart. Items are selected from a page, say the items page, and the
total collected items and price are shown on a different page, say the cart page. Only HTTP
cannot keep track of all the information coming from various pages. ASP.NET session state and
server side infrastructure keeps track of the information collected globally over a session.

The ASP.NET runtime carries the page state to and from the server across page requests while
generating ASP.NET runtime codes, and incorporates the state of the server side components in

15
hidden fields. This way, the server becomes aware of the overall application state and operates
in a two-tiered connected way.

The ASP.NET Component Model

The ASP.NET component model provides various building blocks of ASP.NET pages.
Basically it is an object model, which describes:

 Server side counterparts of almost all HTML elements or tags, such as <form> and
<input>.

 Server controls, which help in developing complex user-interface. For example, the
Calendar control or the Gridview control.

ASP.NET is a technology, which works on the .Net framework that contains all web-related
functionalities. The .Net framework is made of an object-oriented hierarchy. An ASP.NET web
application is made of pages. When a user requests an ASP.NET page, the IIS delegates the
processing of the page to the ASP.NET runtime system.

The ASP.NET runtime transforms the .aspx page into an instance of a class, which inherits from
the base class page of the .Net framework. Therefore, each ASP.NET page is an object and all
its components i.e., the server-side controls are also objects.

16
4.SYSTEM DESIGN
4.1 SYSTEMFLOWDAIGRAM

Fig 4.1.1 System flow diagram

17
4.2 DATAFLOW DIAGRAM:

LEVEL-0

Fig 4.2.1Data flow diagram LEVEL 0

18
LEVEL-1

4.2.2 Data
flow diagram LEVEL 1
LEVEL 2:

Fig 4.2.3 Data flow diagram LEVEL 2

19
LEVEL 3:

Fig 4.2.4 Data flow diagram LEVEL 3

20
5. SYSTEM DESCRIPTION

MODULES:

 Station Module
 Citizen Module
 Crime Module
 Search Module
 Administrator Module
 Avocation Module

Station module
Each of the station must first register with the Software. For the registration part each
station enter their details like station name, address, phone no, station in charge etc. and get a
User Id from the Software. Once the prospective station registers with the software they can avail
the existing records.

Citizen module
Each of the citizens, who has a complaint to register, must first register with the
Software. For the registration part each person enter their details like name, address, and phone
no., E-Mail ID etc. and get a User Id & password from the Software. Once the registration is
complete, the citizen can sign-in to the website & register their complaint.

21
Crime module
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, Nature of Crime, Location of the Crime etc.

Search module
In this module we can search the crime in station wise, nature of crime.

Administrators Module
The module will be protected by user ID and password. Ordinary users of the software
will not be permitted to enter into this area of the software. The module will be focusing on the
maintenance like Master Data Maintenance, Removal of old and outdated data from the software
etc.

Avocation Module
This Module deals with the Law part of every Crime.

22
6. SYSTEM TESTING

Testing is dynamic method for verification and validation, where the system to be tested
is actually executed and the behaviors of the system is observed. Software testing can be looked
upon as along much process of software development organizations performs that provides the
last opportunity to correct any flaws in the developed system. A system testing is a series of
different tests whose primary purpose is to fully exercise the computer based system.

Testing accounts for largest percentage of technical effort in the software development
process. Software testing must accommodate low level tests that are necessary to verify that a
small source code segment has been correctly implemented as well as high level test that validate
major system functions, against customers’ requirements. No testing is complete without
verification and validation.

6.1 SYSTEM TESTING:

Testing the system as a whole to validate the system that it meets its specification and
objectives of it users. The system must be tested as they are developed and as subsystems are
created. Testing is considered as the least creative phase of the whole cycle of system
design.System testing is the first time that the entire system can be tested against
theFunctional Requirement Specification (FRS)and/or the System Requirement Specification
(SRS).System testing is testing conducted on a complete, integrated system to evaluate
thesystem's compliance with its specified requirements.

23
The testing activity includes module by module testing which include:

 Unit Testing

 Integration Testing

 Stress Testing

 Acceptance Testing

 Performance Testing

 Security Testing

6.2 UNIT TESTING:

It is the testing done on a single subroutine or a module. A unit test is a procedure used to
validate that a particular module of source code is working properly. The idea about unit tests is
to write test cases for all functions and methods so that whenever a change causes a regression, it
can be quickly identified and fixed. In this we are detecting the edges of the image by using edge
detection technique.

Unit testing comprises the set of tests performed by an individual programmer prior to
integration of the unit into a larger system Coding & debugging (unit testing (integration testing.
A program unit is usually small enough that the programmer who developed it can test it in great
detail, and certainly in greater detail than will be possible when the unit is integrated into an
evolving software product. The method has been applied on several 2D medical image data sets
and it has successfully determined both thresholds and gradients for different tissue interfaces
even when some of the thresholds are almost impossible to locate in their histograms.

The unit testing is done with the several of the medical images present in the dataset. And
this is being marked and it is being detected.

6.3 INTEGRATION TESTING:


24
Integration testing is the phase of software testing in which individual software modules
are combined and tested as a group.Integration testing takes as its input modules that have been
checked out by unit testing, groups them in Trigger aggregates, applies tests defined in an
Integration test plan to those aggregates, and delivers as its output the integrated system ready for
system testing. The purpose of Integration testing is to verify functional, performance and
reliability requirements placed on major design items

Strategies for integrating software components into a functioning product include the
bottom-up strategy, the top down strategy and the sandwich strategy .Careful planning and
scheduling are required to ensure that modules will be available for integration into the evolving
software product when needed. The integration strategy dictates the order in which modules must
be available, and thus exerts a strong influence on the order in which modules are written,
debugged, and unit tested.

In this integration testing is processed by the giving the input of brain image and it
processed in all the modules explained and after all the process completed the output recorded is
correct or not is being verified. The figure shows the various results are being analyzed during
the segmentation process.

6.4 ACCEPTANCE TESTING:

25
Acceptance testing involves planning and execution of functional test, Performance test,
and stress test to verify that the implemented system satisfies its requirements. Acceptance tests
are typically performed by the quality assurance and/or customer organizations. Depending on
local circumstances, the developed.Is to demonstrate the users of the system that the system is
acceptable. The system must process the data required by the user. It can be carried out before or
after the system has been installed. In this we should give the medical image only for the
analyses. If we give an image the system should not work it should properly defined.

6.5 STRESS TESTING:

Stress testing is a form of testing that is used to determine the stability of a given system.
It focuses on the system beyond the maximum design load. When a system is overloaded, it
should degrade gracefully rather than fails catastrophically. That is if all the edge detection
techniques are performed simultaneously ,then it will give the result without any interruption.

6.6 PERFORMANCE TESTING:

Performance testing is testing that is performed to determine how fast some aspect of a system
performs under a particular workload. Performance testing can be combined with stress testing,
in order to see what happens when an acceptable load is exceeded. Here the performance testing
is measured by True positive, False positive, False Negative, where the number of correctly
detected edge pixels called true positive, the number of pixels erroneously classified as edge
pixels called False Positive (FP) and the amount of edge pixels that were not classified as edge
pixels called False Negative (FN). From these measures, some statistical indices have been
proposed such asPco, Pnd, Pfa. These measures are used to compare the results.

7. Backup and Maintenance


26
The main phase of the software cycle is the time in which software performs useful work.
After a system is successfully implemented it should be maintained is a proper manner, system
maintenance is an important aspect is the software development lifecycle. The need for system
maintenance is to makes adaptable to the changes is the system environment there may be social
technical and order environment change, which affect a system which is being implemented.
Software product enhancement may involve providing new functional capabilities improving
uses displays and mode of interaction, upgrading the performances characteristics of the system.
So only the proper system maintenances produces the system can be adapted to scope up with
their changes , software maintenance if of course for more than “finding mistakes”.

Corrective Maintenance:
The first maintenance activity occur because it is unreasonable to assume that
software testing will uncover all latent error is a large software system during the use of any
large diagnosis and correction of one or more error is called corrective maintenance.

Adaptive Maintenance:
The second activity is that contributes to a definition of maintenances occur because
of the rapid changes that is encountered in every aspect of computing. Therefore adapting
maintenance termed as an activity that modifies software to properly interface with a changing
environment is both necessary and common place.

Perceptive Maintenance:
The third activity that may be applied to a definition of maintenances occur when a software
package is successful as the software issued recommendation for new capabilities modification
to existing functions and general enhancement are received from users, to satisfy request in this
category, perceptive maintenance is performed. This activity account for the majority of all effort
expended on the software maintenance.

Preventive Maintenance:

27
The fourth Maintenance activity occurs when software is changed to improve the future
maintainability or reliability or to provide a better basic for future enhancement of an called
preventive maintenance. This activity is characterized by reverse engineering and reengineering
technology

28
8. FUTURE ENHANCEMENT

Anything cannot be ended in a single step. It is the fact that nothing permanent in this
world. So this utility also has some future enhancements in the evergreen and booming IT
industry. Change is inevitable. The project entitled “Crime Reporting System” was successfully
designed developed and tested. The system and the architecture is a compatible one, so addition
of new modules can be done without much difficulty. Since this module has its unique
properties it can extend further to make this system a complete one.
Scope of further development
The various Future Enhancement which shall include in this software are:
 We look forward to working with the Government in implementing the recommendations
and seeing an improvement in the effectiveness of the organization
 The method of video conferencing can be added to make the project more lively
 An intercom facility will add a little more flexible communication between the Master
and Branch In Charge, Master and Members, etc.
Notwithstanding this drive and progress, the Panel believes that more fundamental
changes are needed. It hopes that the recommendation made in this report will assist in changing
the culture around partnership.

9. CONCLUSION
29
The Software developed is found to be working efficiently and effectively. It results in
regular and timely action against crime reported. It can be observed that the information can be
obtained easily and accurately.

The Software is made user friendly to the maximum so that any lay man can run the
software provided he could access to the system via the login password.

It believes that partnership work is highly beneficial to the organization and that
partnership work is the way forward to reduce crime and disorder

Hence, we wish to remind that its culture should fully endorse partnership work; we urge
to ensure the attention they require.

30
APPENDIX

SCREEN SHOT

31
CODING:

32
BIBLIOGRAPHY
1. criminal justice information management system. (2010). Retrieved from
www.replaceportal.com: http://www.replaceportal.com/what-we-do/criminal-justice-
information-system-(crimsys).html
2. Falaye, A., Adama, N., & Agemerien, F. (2013, November). Design And Implementation
Of Crime Investigation System Using Biometric Approach(Nigeria Police Force). The
pacicific journal of science and technlogy.
3. Govardhan, N. M. (September 2010). A Comparison Between Five Models Of Software
Engineering. IJCSI International Journal of Computer Science Issues, Vol. 7, Issue
4. International council on archives. (2008). Principles and Functional Requirements for
Records in Electronic Office Environments – Module 2: Guidelines and Functional
Requirements for Electronic Records Management Systems,. 13.
5. Kawai, D., & Samson, D. (2011). Development Of A Criminals Record Management
System.Information Technology for People Centred Development, 1-8.
6. Korth, H. (2010). Database system concepts. Macgraw-Hill. Retrieved 2015
7. Kyobe, M.E; Molai, P; Salie, T. (2009). Investigating electronic record management and
compliance with regulatory requirements in south african universities. peer reviewed
article, 1-2.
8. Mubaraka, C., Jirgi, I. M., & Nanyanci, P. L. (2013). Integrating ICT in Traffic Police
Department in Uganda;Design and development of traffic case management system.
Innovative systems design and engineering, 1-11.
9. Muhammad, D., Muhammad, R., Muhammad, J., Faheemullah, & Ali, K. (n.d.).
CRIMINAL RECORDS MANAGEMENT SYSTEM.

WEBSITES:

 http://www.highcourtofkerala.com/
 http://www.casecitation.com/

33
34

You might also like