You are on page 1of 50

INDEX

TitlePage No.

ABSTRACT -------------------------------------------------------------------------------- 1
Chapter 1 introduction--------------------------------------------------------------------- 2-7
1.1 Motivation------------------------------------------------------------------------------- 4
1.2 Scope------------------------------------------------------------------------------- 5
1.3 Objective------------------------------------------------------------------------------- 6
1.4 Application ----------------------------------------------------------------------------- 7
Chapter 2 Literature survey-------------------------------------------------------------- 8-11
2.1 Literature Survey----------------------------------------------------------------------- 10
2.2 Conclusion----------------------------------------------------------------------------- 11
Chapter 3 Problem Statement ----------------------------------------------------------- 12-14
3.1 Problem Statement-------------------------------------------------------------------- 13
Chapter 4 Hardware and Software Requirements ---------------------------------- 15-17
4.1 Software Requirement---------------------------------------------------------------- 15
4.2 Hardware Requirement--------------------------------------------------------------- 16
Chapter 5 Method Used------------------------------------------------------------------- 18-21
5.1 Method---------------------------------------------------------------------------------- 19
Chapter 6 Design Framework ------------------------------------------------------------ 22-30
6.1 ER Diagram----------------------------------------------------------------------------- 23
6.2 Data Flow Diagram-------------------------------------------------------------------- 26
6.3 Used Case Diagram-------------------------------------------------------------------- 29
Chapter 7 Implementation----------------------------------------------------------------- 31-49
7.1 Snapshot --------------------------------------------------------------------------------- 32
7.2 Coding----------------------------------------------------------------------------------- 36
Chapter 8 Testing---------------------------------------------------------------------------- 40-43
8.1 Testing------------------------------------------------------------------------------------ 40
Chapter 9 Conclusion and Future Scope ------------------------------------------------ 44-46
9.1 Conclusion and future scope ---------------------------------------------------------- 45
REFERENCES -------------------------------------------------------------------------------- 47
ABSTRACT

Digitized police management system or E-Cop Record based filing is a system which
provides user a simpler access to the police crime investigation or crime solving system. In
this project we provide a simple way to register or report a crime, rather than storing it
manually, we have decided to digitize the process of keeping police records.
This will be helpful in sensitive situations when the actual records are deliberately misplaced
or sometimes even changed. The project consists of a platform to access police investigatory
system. In this system we can report a crime; also the status of the reported crime can be
inspected. The user can also be provided with a specific unique no. from which they can
access their account.
In this account, all the information which is registered while filing a manual FIR is as it is
present in the digitalized filing system, significant data like name, complaint, officer which
handled the case, progress of the case etc has also been added. Our main motive is to provide
an easy, accessible and secured service to the citizens as well as the police officers, so that
the filing and the recording of evidence cannot be misplaced by any unfair means as the
victims and the cops can directly interact with the investigation system.

1
CHAPTER-1
INTRODUCTION
CRIME MANAGEMENT SYSTEM

2
INTRODUCTION
Crime Management system or police management system is a system which provides user a
very easy way to access to the police crime records and investigations.This software also
provide police to maintain the records , files and criminal related things this easily.This
software provides a platform to access police investigation system and report a crime or to
check details about the reported crime.This system provides forms like user registration form,
crime registration form, women complaint registration form and many more.This software
will provide different username , ids and passwords to the user which will help them to
access their accounts.This project also provide excellent security of data at every level of
user.
The purpose to design this phase is to plan a solution for problem specified by the
requirements system design aims to identify the modules that should be in the system.

 The main purpose of the software is to give upper hand to the users to have all the
information they needed in the correct format without wasting their time sitting in the
police stations for hours.

 This software will resolve each and every query of the user as they will have all the
records in front of them.

 Main motive is to provide an easy accessible service to the citizens as well as the
police departmen

1.1 MOTIVATION

 Crime management system aims at creating a comprehensive and integrated


information and communication technology platform for enhancing .

 Efficiency and effectiveness of policing especially at Police stations.

 Provide the investigating officers with the tools, technology and information
to facilitate faster and more accurate investigation of crime and detection of
criminals.

 Facilitate collection, storage, retrieval, analysis, transfer and sharing of data∙


and information among police stations, districts, state headquarters and
organizations/agencies.

3
 Make the Police functioning citizen friendly and more transparent by
automating the functioning of Police Stations.

 Keep track of the progress of the crime and criminal investigation and
prosecution Cases.

 Improve the Police functioning in various other areas such as Law & Order,
Traffic Management, curbing organized crimes, resource management etc.

 Enhancing transparency and accountability in Police functions and processes.

 To overcome existing problems occurring in maintenance of criminal


information .

1.1 SCOPE

Project scope is the part of project planning that involves determining and documenting a list
of specific project goals, tasks, costs and deadlines. The documentation of a project's scope,
which is called a scope statement, terms of reference or statement of work, explains the
boundaries of the project, establishes responsibilities for each team member and sets up
procedures for how completed work will be verified and approved. During the project, this
documentation helps the project team remain focused and on task. The scope statement also
provides the project team with guidelines for making decisions about change requests during
the project.

The system ‘crime management’ is a reporting website that will be used for automating the
mutual process to register different cases in police department. This system will manage the

4
details of all the crimes. The system provides an interface to store the crime details of
criminals and allows the user to search and view records. The system will simplify the overall
procedure of crime files.

The proposed system includes the following features:

 Login for user and admin


 Complaint registration
 View complaint status
 Criminal register management
 Fir management
 Case history details management
 Manage list about most wanted criminals

This system offers following basic functionalities


 The system requests the administrator/user to enter his/her name, password.
 The administrator/user enters his/her name, password.
 The system validates the entered name , password logs the user into the
system.
 The administrator maintains the record of various information, fir’s, crimes
and related objects.

5
1.2 OBJECTIVE
Project objectives are goals, plain and simple. These are the business objectives that you want
the project to accomplish. The main reason why effective objectives are important is that the
more clear your objectives are, the more likely they are to be achieved.

The Objective of Crime Reporting System is to develop a web based application using which
people can report crimes online. It provides the facility of uploading images or videos of
crime scenes so that police can take action immediately. It also provides the information of
missing persons, most wanted criminals and safety tips for the awareness of people.

 Police need not have to maintain records manually since our software maintains all
the records with centralized database.

 The main objective to create crime management system is to reduce time


consumption.

 All the records will be online so there will be no paper work.

 No loss of records.

 Information about criminals and common people is properly maintained.

 We know users are of many categories, like users from who know working with
computers very well and users who don’t know about computers all the category can
use this system . it is user friendly

 This website is made to work efficiently and effectively. It results in regular and
timely action against crime reported . it can be observed that the information is
obtained easily and accurately .

 Update the case details timely to ensure that fast action strategy is applied .

 Detection and convection of criminals by crime management system.

 The aim of this project is to secure and make privacy on crime related data over
manually data storage. This website based project is made for providing the
information and awareness about crimes.

6
1.4 APPLICATION
 It is a software which helps the user to work with the crimes easily.

 After registration one can log in the system as the operator of the system on the
behalf of user. After this he has the other useful interfaces available for further
actions.

 This software reduces danger of all paper work and gives great efficiency.

 The User Interface is very friendly and can be easily used by anyone.

 The user can write FIR and can save it. The saved FIR can be seen only by the valid
users.

 The user must know that which criminal is there and for which crime. So the user can
check it in the database whenever he wants and about whoever he wants.

 It also decreases the amount of time taken to write FIR details and other modules.

 All the details about any complaint or any other criminal can be checked and can be
saved.

 This Crime Management System is a solution to all the problems related to the
crime reports , criminal details, their crime , their punishment and others etc.

 At the end, we can say that this software is performing all the tasks accurately and is
doing the work for which it is made.

7
CHAPTER 2
LITERATURE SURVEY

8
WHAT IS LITERATURE SURVEY?

A literature survey or a literature review in project report is that section which shows the
various analyses and research made in the field of our project, taking into account the various
parameters of the project and the extend of the project. It is the most important part of the
report as it gives us a direction in the area of our research. It helps us to set a goal for our
analysis – thus giving us our problem statement.

A literature survey in a project report represents the study done to assist in the completion
of a project.
The focus of a literature survey is on the following and in this order:

 Existing theories on a topic with universal acceptance across the board


 Books on the subject acting as a reference for the concepts that project uses whether
they are specific or generic.
 Current research concerning the field of the project from the oldest to latest. Research
papers might be a reference for theories nut most cases require a critical comparison
to establish the purpose of the project and improvement
 You may also include another project report and what helped you
 Challenges for the project and by ongoing work if it is available.

Literature surveys are used in ensuring that the used experiments, methodologies and
experiments offer reliability and validity in the research being conducted. The surveys need
to show essential content avoiding much interpretation. One’s opinions and conclusions
require to be separated from the content in the cited sources.
The topic of literature survey must be relevant and narrow for it to be straight to the point. It
identifies the most relevant research papers from a study on the topic. Writing the tutorial on
a subject requires citing of identified literature as much as possible. However, it should not
present any new results but provide a summary of the existing state of knowledge on a
subject.
A project report is an assessment during a process or project conveying these details:

 Accomplished sub goals


 Expended resources
 Problems encountered
 Estimation on whether the project is likely to complete on time and within provided
budget

9
Why do we use literature reviews?
Literature review provide you with a handy guide with a particular topic. If we have limited
time to conduct research, literature review can give you an overview or act as a stepping
stone. It also provides a solid background for the project investigation. Comprehensive
knowledge is essential to most researches and projects.

2.1 LITERATURE SURVEY


1- Preventing children's involvement in crime and anti-social behaviour: A literature review

D Pryor, A Paris - 2005 - dera.ioe.ac.uk


… 52 Parenting 55 Section 4: Conclusion – What the research literature does, and doesn't,
tell
us about preventing crime and anti-social behaviour among young people 56 … regarded by
the
law as incapable of crime. To describe such acts as 'crimes' or such …

2- The impacts of crime on health and health services: A literature review

Fred Robinson &Jane Keithley


Abstract

Crime poses substantial risks to the health of victims and, consequently, generates additional
demand for health services. This literature review examines the current state of knowledge
and understanding of the impacts of crime on physical and psychological health; responses to
the needs of victims by health workers and other professionals; and resulting costs to health
services. The review concludes by identifying issues for research, policy and practice.

3- Community crime prevention: A review and synthesis of the literature


Dennis P. Rosenbaum
Abstract

In the absence of effective formal means for controlling crime in the Western world,
community crime prevention has emerged as a major alternative and supplement to the
criminal justice system. This article attempts to review what is known currently about the
nature, extent, and effectiveness of community-based efforts to prevent residential crime.
Included in this assessment are citizen actions to protect themselves, their property, and their
neighborhood, as well as efforts to prevent crime through changes in the physical
environmental and through innovations in community policing.

10
4- Community crime prevention

DP Rosenbaum - 1986 - books.google.com


… The literature also suggests that these problems will not be solved by simply shifting
ownership
to the … Investigation of Payment methods in Guangdong: Project Report of Guangdong
Provincial
Department of Science and … Chinese Advanced Hospital Management 2004;7:23-25 …

5- MEASURING POLICE IMPACT ON ORGANISED CRIMES..

ABSTRACT

Purpose- This paper aims to the common performance indicators for the policing of organised
crimes, and to purpose a new approach.

CONCLUSION
In real world people are facing a lot of problems in filing a report or regarding crimes in their
area easily and efficiently, this survey helps our system to know the percentage of people
happy or are against this system.

Researches says that this system helps a majority to get their problem solved for a police
officer or even for the peoples.

With the help of researches and articles we got a lot of knowledge about how people are
unaware of the system that are so helpful for them.

People does not have any idea how they can make their lives easy and fruitful by simply
using these software.

In all these one is our crime management system which is built for the betterment of the
criminal system to be managed with full ease.

11
CHAPTER 3
PROBLEM STATEMENT

12
PROBLEM STATEMENT

The conventional police record management system with time has proved to be a threat and a
deliberate means to change data and alter the crime scenes, records and evidences.
Sometimes, the case files are even misplaced, either by unfair means or because of careless
staff handling. This results in important cases being either closed without proper legal
deliberation over it or the victims further being tortured for another statement which might
not be as authentic as the earlier one. The loss of evidence slows down the process of police
investigation and results in an inefficient work-procedure which also makes the handling of
other cases very tedious and cumbersome.
A secured and easy-to-access Report Filing System is required which enables not only the
victims to file FIRs digitally, but also allows the police officials to access the respective case
files with proper case evidences stored in the same. Proposition of a proper authentication
method is a must as only the victims and the officials should be able to see the status of their
cases, also crime record of a person can be added as a special feature as the part of the
project.

PROPOSED SOLUTION

The present world is technology driven as it is employed by many fields in the performance
of their operation. In the case of law enforcement agencies, this is evident in the use of
automated crime record management systems (CRMS) worldwide to keep record of crime
and criminals involved. Crime being an act against the law of a society is a threat to the well-
being of the populace and so, requires efficient and effective monitoring. For this reason,
CRMS have been developed to achieve this purpose.
As per the above problem statement, a leap from the conventional crime record system can be
made to the Digitized Report System which would include the following functionalities in
order to overcome the rendering difficulties:-
 In this project, a website is to be developed which directly connects the victims and
the citizens to the police department. It exclusively provides the facility of reporting
crimes, complaints online through a website login.

 A registration page and a login page for already registered users of the website. The
regular updation of status of the case by the police officials.

 The number of clients that access the website can be umpteen and can connect to the
server, making it easier when simultaneous users are accessing the website.

 A separate page will be developed to make people aware about their fundamental
rights and the court of law. This page will be dedicated only for helpline numbers for
immediate use in case of emergencies for the general public.

13
 The major objective also includes making the system work faster so usage of light-
weight software like JavaScript makes it easier to achieve it.

CHAPTER 4
HARDWARE AND
SOFTWARE
REQUIREMENTS

14
INTRODUCTION:
To be used efficiently, all computer software needs certain hardware components or the other
software resources to be present on a computer. These pre-requisites are known
as(computer)system requirements and are often used as a guideline as opposed to an absolute
rule. Most software defines two sets of system requirements: minimum and recommended.
With increasing demand for higher processing power and resources in newer versions of
software, system requirements tend to increase over time. Industry analysts suggest that this
trend plays a bigger part in driving upgrades to existing computer systems than technological
advancements.

4.1 SOFTWARE REQUIREMENTS:


It deal with defining software resource requirements and prerequisites that need to be
installed on a computer to provide optimal functioning of an application. These requirements
or prerequisites are generally not included in the software installation package and need to be
installed separately before the software is in.

 Platform
A computer platform describes some sort of framework, either in hardware or software,
which allows software to run. Typical platforms include a computer's architecture, operating
system, or programming languages and their runtime libraries.
Operating system is one of the requirements mentioned when defining system requirements
(software). Software may not be compatible with different versions of same line of operating
systems, although some measure of backward compatibility is often maintained. For example,
most software designed for Microsoft Windows XP does not run on Microsoft Windows 98,
although the converse is not always true. Similarly, software designed using newer features
of Linux Kernel v2.6 generally does not run or compile properly (or at all) on Linux
distributions using Kernel v2.2 or v2.4.

 APIs and drivers


Software making extensive use of special hardware devices, like high-end display adaptors,
needs special API or newer device drivers. A good example is DirectX, which is a collection
of APIs for handling tasks related to multimedia, especially game programming,
on Microsoft platforms.

 Web browser

15
Most web applications and software depending heavily on internet technologies make use of
the default browser installed on system. Microsoft Internet Explorer is a frequent choice of
software running on Microsoft Windows, which makes use of ActiveX controls, despite their
vulnerabilities.

SOFTWARE REQUIREMENTS FOR PRESENT PROJECT:


OPERATING SYSTEM : Windows 10
PROGRAMMIMG LANGUAGE: HTML, CSS, WORDPRESS.
DATABASE : PHP

4.2 HARDWARE REQUIREMENTS:


The most common set of requirements defined by any operating system or software
application is the physical computer resources, also known as hardware. A hardware
requirements list is often accompanied by a hardware compatibility list (HCL), especially in
case of operating systems. An HCL lists tested, compatibility and sometimes incompatible
hardware devices for a particular operating system or application. The following sub-sections
discuss the various aspects of hardware requirements

 Architecture
All computer operating systems are designed for a particular computer architecture. Most
software applications are limited to particular operating systems running on particular
architectures. Although architecture-independent operating systems and applications exist,
most need to be recompiled to run on a new architecture.

 Processing power
The power of the central processing unit (CPU) is a fundamental system requirement for any
software. Most software running on x86 architecture define processing power as the model
and the clock speed of the CPU. Many other features of a CPU that influence its speed and
power, like bus speed, cache, are often ignored.

 Memory
All software, when run, resides in the random access memory (RAM) of a computer.
Memory requirements are defined after considering demands of the application, operating
system, supporting software and files, and other running processes. Optimal performance of
other unrelated software running on a multi-tasking computer system is also considered when
defining this requirement.

16
 Secondary storage Hard-disk requirements vary, depending on the size of software
installation, temporary files created and maintained while installing or running the
software, and possible use of swap space (if RAM is insufficient).

HARDWARE REQUIREMENTS FOR PRESENT PROJECT:


PROCESSOR : i5 HP 8 generation
th

RAM : 8 GB
MEMORY : 2TB

17
CHAPTER 5
METHODS

18
METHODS
The project method is an educational enterprise in which children solve a practical problem
over a period of several days or weeks. It may involve building a rocket, designing a
playground, or publishing a class newspaper. The projects may be suggested by the teacher,
but they are planned and executed as far as possible by the students themselves, individually
or in groups. Project work focuses on applying, not imparting, specific knowledge or skills,
and on improving student involvement and motivation in order to foster independent
thinking, self-confidence, and social responsibility.
METHOD USED IN OUR SOFTWARE IS DISCUSSED BELOW:-

 PHP (or PHP Hypertext Preprocessor), a server-side scripting language has


been used to create dynamic web pages that can interact with databases. It is a
widely-used open source language that is specifically used for web application
development and can be embedded within HTML.

 The distinguishing feature of PHP is that the scripting code is executed on the
server, which generates HTML that is sent back to the client. The client
receives the result of executing the script without knowing the underlying
code. Developers can configure the web server to process all the HTML files
(containing the PHP script).

 We use the structure created by our HTML code to reference, enhance, and
manipulate elements on a web page using CSS and JavaScript. For instance,
we have used HTML to mark all of the headings on a web page, and then use
CSS to specify the font, size, and color you want to apply to those headings to
reflect a visual design developed for the site.

 Apache and PHP run on many different platforms and operating systems. PHP
can also be integrated with other web servers.

 One or more PHP scripts can be embedded into static HTML files and this
makes client tier integration easy. On the downside, this can blend the scripts
with the presentation.

 Cascading Style Sheets (CSS) has been used for describing the presentation of
a document written in a markup language like HTML. CSS is designed to
enable the separation of presentation and content, including layout, colors, and
fonts.

 JavaScript, a client scripting language is used for creating the graphic effect in
the web pages. It is a standalone language developed in Netscape. It is used

19
when a webpage is to be made dynamic and add special effects on pages like
rollover, roll out and many types of graphics.

 Apache Server does the job to establish a connection between a server and the
browsers of website visitors (Firefox, Google Chrome, Safari, etc.) while
delivering files back and forth between them (client-server structure). Apache
is cross-platform software; therefore it works on both UNIX and Windows
servers.

 The CSS, JS and HTML files are combined in order to get the desired results.

1. Database

 Database administration is done using PHP scripts or using a program like


PHPMyAdmin.

 The next step is to create the database tables for storing the website
information. Creating a database table using PHPMyAdmin is also simple.
Alternatively, one can create and configure the entire database using the
following PHP script:

CREATE TABLE tablename {

Fields

}
Where the Fields are coded as fieldname type(length) extra_info

Example: first varchar(15) NOT NULL

The following command is used in the PHP script to connect to the MySQL
database:

mysql_connect(localhost,$username,$password);

 We use the MySQL server to manage data. It has a well-deserved reputation


for speed: it can manage many millions of facts; it’s very scalable, and
particularly suited to the characteristics of web database applications. Also,
like PHP and Apache, MySQL is open source software.

 There is more than one user who needs to access the data at the same time.

 There is at least a moderate amount of data. For example, you might need to
maintain information about a few hundred customers.

20
 There are relationships between the stored data items. For example, customers
may have any number of related invoices.

 There is more than one kind of data object. For example, there might be
information about customers, orders, inventory, and other data in an online
store.

 There are constraints that must be rigidly enforced on the data, such as field
lengths, field types, uniqueness of customer numbers, and so on.

21
CHAPTER 6
FLOW DIAGRAMS

22
6.1 ER DIAGRAM –

The ER or (Entity Relational Model) is a high-level conceptual data model diagram. Entity-
Relation model is based on the notion of real-world entities and the relationship between
them.
ER modelling helps you to analyse data requirements systematically to produce a well-
designed database. So, it is considered a best practice to complete ER modelling before
implementing your database.
Entity relationship diagram displays the relationships of entity set stored in a database. In
other words, we can say that ER diagrams help you to explain the logical structure databases.
At first look, an ER diagram looks very similar to the flowchart. However, ER Diagram
includes many specialized symbols, and its meanings make this model unique.

Why use ER Diagrams?

Here, are prime reasons for using the ER Diagram in our project-

 Helps you to define terms related to entity relationship modelling .


 Provide a preview of how all your tables should connect, what fields are going to be
on each table.
 Helps to describe entities, attributes, relationships.
 ER diagrams are translatable into relational tables which allows you to build
databases quickly.
 ER diagrams can be used by database designers as a blueprint for implementing data
in specific software applications.
 The database designer gains a better understanding of the information to be contained
in the database with the help of ERP diagram.
 ERD is allowed you to communicate with the logical structure of the database to
users.

23
ER DIAGRAM OF CRIME MANAGEMENT SYSTEM

Admin
Con
Status
Person
1

1 m 1 m
Has Police station Has Officers
User
Status 1
1 Descrip 1
tion Areaid
id
Add
m
FIR Details Find
Has
Has
Fir ID
Descrip Crime_Id
tion

Date Time m

FIR Details
M 1 m m
Profile Has
Criminals
m

Does

Crime
m

Has

Crimetype

Crime_Id Crimetype Descrip


tion

Fig 6.1
ER DIAGRAM

Crime File Management System entities and their attributes :

Crime Entity : Attributes of Crime are crime_id, crime_criminal_id, crime_name,


crime_type, crime_description

24
Complaints Entity : Attributes of Complaints are complain_id, complain_name,
complain_type, complain_description
FIR Entity : Attributes of FIR are FIR_id, FIR_name, FIR_type, FIR_description
Charge Sheet Entity : Attributes of Charge Sheet are charger_sheet_id, charger_sheetfine,
charger_sheettype, charger_sheet_description
Presioner Entity : Attributes of Presioner are prisoner_id, prisoner_crime_id, prisoner_name,
prisoner_mobile, prisoner_email, prisoner_username, prisoner_password, prisoner_address
Criminals Entity : Attributes of Criminals are criminal_id, criminal_crime_id,
criminal_name, criminal_mobile, criminal_email, criminal_username, criminal_password,
criminal_address

Description of Crime File Management System Database :


The details of Crime is store into the Crime tables respective with all tables
Each entity (Criminals, FIR, Prisoners, Complaints, Crime) contains primary key and unique
keys.
The entity FIR, Prisoners has bind with Crime, Complaints entities with foreign key
There is one-to-one and one-to-many relationships available between Prisoners, Charge
Sheet, Criminals, Crime
All the entities Crime, Prisoners, FIR, Criminals are normalized and reduce duplication of
records
We have implemented indexing on each tables of Crime File Management System tables for
fast query execution.

6.2 DATA FLOW DIAGRAM –

Data flow diagrams are used to graphically represent the flow of data in a business
information system. DFD describes the processes that are involved in a system to transfer
data from the input to the file storage and reports generation.
Data flow diagrams can be divided into logical and physical. The logical data flow diagram
describes flow of data through a system to perform certain functionality of a business. The
physical data flow diagram describes the implementation of the logical data flow.

One of the rule for developing DFD is that all flow must begin with and end at a processing
step. This is quite logical, because data can’t transform on its own with being process. By
using the thumb rule, it is quite easily to identify the illegal data flows and correct them in a
DFD.

25
Why use DFD?
DFD graphically representing the functions, or processes, which capture, manipulate, store,
and distribute data between a system and its environment and between components of a
system. The visual representation makes it a good communication tool between User and
System designer. Structure of DFD allows starting from a broad overview and expand it to a
hierarchy of detailed diagrams. DFD has often been used due to the following reasons:
 Logical information flow of the system
 Determination of physical system construction requirements
 Simplicity of notation
 Establishment of manual and automated systems requirements

There are different level in DFD-


 0-level DFD: It is also known as context diagram. It’s designed to be an abstraction
view, showing the system as a single process with its relationship to external entities.
It represent the entire system as single bubble with input and output data indicated by
incoming/outgoing arrows.

 1-level DFD: In 1-level DFD, context diagram is decomposed into multiple


bubbles/processes.in this level we highlight the main functions of the system and
breakdown the high level process of 0-level DFD into subprocesses.

 2-level DFD: 2-level DFD goes one step deeper into parts of 1-level DFD. It can be
used to plan or record the specific/necessary detail about the system’s functioning.

DATA FLOW DIAGRAM OF CRIME MANAGEMENT SYSTEM

Complaint Management
User ID, Complaints

User Online Crime File Administrator


System

Solutions, Feedback

26
Fig 6.2 0 LEVEL DFD

Administrator
View Complaints
complaints Complaint
Details

FIR No: Details


FIR
Login FIR
Management
FIR Details

Postmortem
Mortem details
Management
Mortem
Details

Add
Report
Reports Reports
Generation

View Reports
User

Fig 6.3 1 LEVEL DFD

Administrator Registration details

User name, Password


View user details

Login Online View Complaints


Crime File
System Complaints

Add Solutions
View Feedback

User
Feedback
Add FIR Reports

Add mortem analysis FIR

Mortem Details

27
Fig 6.4 2-LEVEL DFD

0 level data flow explanation-


 Managing all the Crime.
 Managing all the Complaints.
 Managing all the FIR.
 Managing all the Charge Sheet.
 Managing all the Prisoners.
 Managing all the Criminals.
 Managing all the Court.

1 level data flow explanation-


 Processing Crime records and generate report of all Crime.
 Processing Complaints records and generate report of all Complaints.
 Processing FIR records and generate report of all FIR.
 Processing Charge Sheet records and generate report of all Charge Sheet.
 Processing Prisoners records and generate report of all Prisoners.
 Processing Criminals records and generate report of all Criminals.
 Processing Court records and generate report of all Court.

2 level data flow explanation-


 Admin logins to the system and manage all the functionalities of Crime File
Management System.
 Admin can add, edit, delete and view the records of Crime, FIR, Prisoners, Court.
 Admin can manage all the details of Complaints, Charge Sheet, Criminals.
 Admin can also generate reports of Crime, Complaints, FIR, Charge Sheet, Prisoners,
Criminals.
 Admin can search the details of Complaints, Prisoners, Criminals.
 Admin can apply different level of filters on report of Crime, Charge Sheet, Prisoners.
 Admin can tracks the detailed information of Complaints, FIR, Charge
Sheet,Prisoners.

28
6.3 USE CASE DIAGRAM-

A use case diagram is the primary form of system/software requirements for a new software
program underdeveloped. Use cases specify the expected behaviour (what), and not the exact
method of making it happen (how). Use cases once specified can be denoted both textual and
visual representation (i.e. use case diagram). A key concept of use case modelling is that it
helps us design a system from the end user's perspective. It is an effective technique for
communicating system behaviour in the user's terms by specifying all externally visible
system behaviour .

A use case diagram is usually simple. It does not show the detail of the use cases:
 It only summarizes some of the relationships between use cases, actors, and systems.
 It does not show the order in which steps are performed to achieve the goals of each
use case.

Use case diagrams are typically developed in the early stage of development and people often
apply use case modelling for the following purposes:
 Specify the context of a system
 Capture the requirements of a system
 Validate a systems architecture
 Drive implementation and generate test cases
 Developed by analysts together with domain experts

Common components include:

 Actors: The users that interact with a system. An actor can be a person, an
organization, or an outside system that interacts with your application or system. They
must be external objects that produce or consume data.
 System: A specific sequence of actions and interactions between actors and the
system. A system may also be referred to as a scenario.
 Goals: The end result of most use cases. A successful diagram should describe the
activities and variants used to reach the goal.

29
Manage user and full
website

Manage FIR

Manage charge sheet

Registers fir

Add criminals

Admin

Login/logout from system

Search criminal records

Upload documents

Add chargesheets

30
Fig 6.5 USE CASE DIAGRAM

CHAPTER7
IMPLEMENTATION

31
SNAPSHOTS

Fig 7.1
Signup page

Sign Up to get connected directly with the officials of our Indian Police Department. A closer
and a safer way to ensure one’s safety on the go!!

32
Fig 7.2 Home page

33
Fig 7.3
Contact us page
Our services comprise of advocating essential issues to not only the police officials, but also
to higher degree recommended seniors of the governing body, it also specializes in giving a
“how to” tutorial to make the website familiar for the new users, also we have RTI officials in
line for any further queries.

Fig 7.4

34
Fig 7.4
Thousands of criminal cases have been piling up, there are numerous organisingdatabases
and software that have proven to be insufficient when it comes to identificationof specific
cases and targets.
The easiest way to register and report a crime would make it easier for the citizens to
dealwith the present scenario where immediate action is required. E-cops or police
management is a way thatprovides the user to connect with crime investigation or crime
solving system.
In this account all the information is present like name, complaint, officer whichhandled the
case, progress of the case etc. Our main motive is to provide an easyaccessible service to the
citizen, so that they can directly interact with ourinvestigation system.
Online Crime Reporting system is a system which providesuser a very elementary access to
the police crime investigation or crime solving system. Inthis website, we provide a simple
way to register or report a crime. This will prove to be veryhelpful in sensitive situations
where the victim has to report a crime almost immediately. In this website, we provide a
platform toaccess police investigatory system. In this system we can report a crime and we
canalso know our status of reported crime so as to keep track of one's case at hand. Our team
including the back-end and front end developers have put their best foot forward in order to
develop an ideal police case reporting website to file an FIR. You simply carry your police
station on your phone or laptop!!
our team comprises of the following efficient personalities who have made all of this
possible.

35
Fig 7.6
Login page
The Login page is the lead handler and enabler of our efficient cops, and the fellow citizens
against any crime and reporting an FIR.

36
CODINGS
1- ECOPS.PHP

?php
require "connection.php";
session_start();

function validateCredentials($con, $email, $password){


$query=mysqli_query($con, "SELECT name from registered_users where email='$email'
AND password='$password' LIMIT 1");
if ($query) {
if (mysqli_num_rows($query)>0){
$result=mysqli_fetch_array($query);
$_SESSION['name']=$result[0];
$_SESSION['email']=$email;
$_SESSION['session']=TRUE;
}
else{

echo "WRONG CREDENTIALS";


}
}
}

if(isset($_POST['logout'])){
$_SESSION['session']=FALSE;
}

if(isset($_POST['submit'])){

if((isset($_POST['email'])&&$_POST['email']!="")&&(isset($_POST['password'])&&$_PO
ST['password']!="")){
validateCredentials($conn, $_POST['email'], $_POST['password']);
}else{
echo "Noting set";
}
}

?>
<!DOCTYPE html>
<html>
<head>

37
<title> ECOPS-CITIZEN SERVICE</title>
<link rel="stylesheet"
href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css">
<link rel="stylesheet" type="text/css" href="a.css">
</head>
<body style="background:skyblue;" >
<style>
a{
color:white;
}
</style>

<nav class=".navbar.navbar-default.navbar-static-top" style="background-color: blue;">


<div class="container-fluid" style="height:70px;">
<div class="navbar-header" style="height:70px;">
<img src="images/loggo.png" style="height: 70px;width: 100px; margin-left:1px;
float:left;">
<a class="navbar-brand" href="ECOPS.php" style="font-size: 20px; font-weight: bold; font-
family:'Palatino Linotype', 'Book Antiqua','Palatino, serif';">ECOPS-CITIZEN
SERVICE</a>
</div>
<ul class="nav navbar-nav" style="font-size:18px; font-style: normal; font-weight: bold;
color:#FF5722; font-family:'Palatino Linotype', 'Book Antiqua','Palatino, serif';">
<li><a href="ECOPS.php">HOME</a></li>
<li><a href="ECOPS2.php">SERVICES</a></li>
<li><a href="about.php">ABOUT US</a></li>
<li><a href="contact.php">CONTACT US</a></li>
</ul>
<?php
if($_SESSION['session']==TRUE)
{

echo "<form method=\"POST\" style=\"float:right;\"><span style=\"color:white; font-


size:20px; margin:10px;\">$_SESSION[name]</span>"."<span><button type=\"submit\"
name=\"logout\" class=\"btn btn-info btn-lg\" style=\" font-size:15px;\">Log
Out</button></span></form>";

}
Else
{

echo "<a type=\"button\" class=\"btn btn-info btn-lg\" href=\"registrationp.php\"


style=\"float:right; margin:10px;\">Register</a>";
echo "<button type=\"\" name=\"submit\" class=\"btn btn-info btn-lg\" data-
toggle=\"modal\" data-target=\"#myModal\" style=\"float:right; margin:10px;\">Sign
In</button>";
}?>

38
2- LOGIN.PHP
<?php
/**
* WordPress User Page
*
* Handles authentication, registering, resetting passwords, forgot password,
* and other user handling.
*
* @package WordPress
*/

/** Make sure that the WordPress bootstrap has run before continuing. */
require __DIR__ . '/wp-load.php';

// Redirect to HTTPS login if forced to use SSL.


if ( force_ssl_admin() && ! is_ssl() ) {
if ( 0 === strpos( $_SERVER['REQUEST_URI'], 'http' ) ) {
wp_safe_redirect( set_url_scheme( $_SERVER['REQUEST_URI'], 'https'
) );
exit();
} else {
wp_safe_redirect( 'https://' . $_SERVER['HTTP_HOST'] .
$_SERVER['REQUEST_URI'] );
exit();
}
}

/**
* Output the login page header.
*
* @since 2.1.0
*
* @global string $error Login error message set by deprecated pluggable wp_login()
function
* or plugins replacing it.
* @global bool|string $interim_login Whether interim login modal is being displayed. String
'success'
* upon successful login.
* @global string $action The action that brought the visitor to the login page.
*
* @param string $title Optional. WordPress login Page title to display in the `<title>`
element.
* Default 'Log In'.
* @param string $message Optional. Message to display in header. Default empty.
* @param WP_Error $wp_error Optional. The error to pass. Default is a WP_Error instance.
*/
function login_header( $title = 'Log In', $message = '', $wp_error = null ) {
global $error, $interim_login, $action;

39
// Don't index any of these forms.
add_action( 'login_head', 'wp_sensitive_page_meta' );

add_action( 'login_head', 'wp_login_viewport_meta' );

if ( ! is_wp_error( $wp_error ) ) {
$wp_error = new WP_Error();
}

// Shake it!
$shake_error_codes = array( 'empty_password', 'empty_email', 'invalid_email',
'invalidcombo', 'empty_username', 'invalid_username', 'incorrect_password',
'retrieve_password_email_failure' );
/**
* Filters the error codes array for shaking the login form.
*
* @since 3.0.0
*
* @param array $shake_error_codes Error codes that shake the login form.
*/
$shake_error_codes = apply_filters( 'shake_error_codes', $shake_error_codes );

if ( $shake_error_codes && $wp_error->has_errors() && in_array( $wp_error-


>get_error_code(), $shake_error_codes, true ) ) {
add_action( 'login_footer', 'wp_shake_js', 12 );
}

$login_title = get_bloginfo( 'name', 'display' );

/* translators: Login screen title. 1: Login screen name, 2: Network or site name. */
$login_title = sprintf( __( '%1$s &lsaquo; %2$s &#8212; WordPress' ), $title,
$login_title );

if ( wp_is_recovery_mode() ) {
/* translators: %s: Login screen title. */
$login_title = sprintf( __( 'Recovery Mode &#8212; %s' ), $login_title );
}

/**
* Filters the title tag content for login page.
*
* @since 4.9.0
*
* @param string $login_title The page title, with extra context added.
* @param string $title The original page title.
*/
$login_title = apply_filters( 'login_title', $login_title, $title );

?><!DOCTYPE html>
<!--[if IE 8]>

40
CHAPTER 8
TESTING

INTEGRATED TESTING –

41
The objective is to take unit tested components and build a program structure that has been
dictated by design .Integration testing is testing in which a group of components are
combined to produce output.
Integration testing is of four types: (i) Top down (ii) Bottom up (iii) Sandwich (iv) Big-Bang
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of
components is correct and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.

SYSTEM TESTING –

System testing ensures that the entire integrated software system meets requirements. It tests
a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
In this software is tested such that it works fine for different operating system .It is covered
under the black box testing technique. In this we just focus on required input and output
without focusing on internal working.
In this we have security testing, recovery testing , stress testing and performance testing.

PERFORMANCE TESTING –
It is designed to test the run-time performance of software within the context of an integrated
system . It is used to test speed and effectiveness of program.

ALPHA TESTING –
This is a type of validation testing .It is a type of acceptance testing which is done before the
product is released to customers. It is typically done by QA people.

BETA TESTING –
The beta test is conducted at one or more customer sites by the end-user of the software. This
version is released for the limited number of users for testing in real time environment

WHITE BOX TESTING -

42
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose.
Itis used to test areas that cannot be reached from a black box level.
ADVANTAGES:
 Testing can be commenced at an earlier stage. One need not wait for the GUI to be
available.
 Testing is more thorough, with the possibility of covering most paths.

BLACK BOX TESTING –


It also known as Behavioural Testing, is a software testing method in which the internal
structure/design/implementation of the item being tested is not known to the tester. These
tests can be functional or non-functional, though usually functional.
This method attempts to find errors in the following categories:
 Incorrect or missing functions.
 Interface errors.
 Errors in data structures or external database access.
 Behaviour or performance errors.
 Initialization and termination errors.

Test strategy and approach:-


Field testing will be performed manually and functional tests will be written in detail.

Test objectives:-
 All field entries must work properly.
 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.

Features to be tested:-
 Verify that the entries are of the correct format.
 No duplicate entries should be allowed
 All links should take the user to the correct page.

Test Results:-

43
All the test cases mentioned above passed successfully. No defects encountered.

Acceptance Testing:-
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.

44
CHAPTER 9
CONCLUSION AND
FUTURE SCOPE

CONCLUSION AND FUTURE SCOPE

9.1 CONCLUSION
Now-a-days everything is getting computerized. Manual work usually consumes a lot of time
and is error prone. To make complaining easy and manage crime records this application is
very helpful. Thus, Crime Management System overcomes most of the limitations of the
existing system along with being very user friendly application.
45
 So the outcome of all the the hard work done for prison management system is here. It
is a software which helps the user to work with the prisons and crimes easily.

 This software reduces the amount of manual data entry and gives greater efficiency.
The User Interface of it is very friendly and can be easily used by anyone.

 It also decreases the amount of time taken to write FIR details and other modules.

 All the details about any complaint, postmortem or any other criminal can be checked
and can be saved.

 This Crime Management System is a solution to all the problems related to the crime
reports, postmortems, criminals details, their crime , their punishment and others etc.

 At the end, we can say that this software is performing all the tasks accurately and is
doing the work for which it is made.

9.2 FUTURE SCOPE

Apart from serving the primary purpose of digitizing the conventional manual system of
keeping records of FIRs and criminal records along with the evidences, the project can
further be extended to work on the following verticals in a more significant and effective
way.
 A separate account can be created for the affected victims to function on their own
specific criminal cases and to check the status of the FIR filed.

 A common FIR filing platform can be created for the general public incase a victim is
not able to reach the police station and a digital confirmation by the police department
can be sent on the phone itself.

46
 Requests for police security and helpline contacts and services must be at disposal on
the site as the site can also serve as an emergency booth on the go.

 A unique ID must be provided to all the registered users, and the ID should regularly
change and should be sent only on registered phones at the time of login, this adds
another layer of security to the system as the IDs have a chance of being hacked.

 Digital signatures can also be added to the system at the time of login and logout,
automatic logout functioning at the end of a session will also add to the security of the
website.

47
REFERENCES :-
 www.phptpoint.com
 www.slideshare.net
 www.w3school.com
 www.geeksforgeeks.com

48

You might also like