Professional Documents
Culture Documents
FACULTY OF INFORMATICS
DEPARTMENT OF INFORMATION SCIENCE
Final Project
Title: Web Based Criminal Record Management System for Gondar city
Police Station
Prepared By:
Name ID No
1 Ehitnesh Minaye…………………………………….….. GUR/01519/09
2 Gizew Zegeye …......…………………………… … GUR/01595/09
3 Manaye Gizaw…………………………………….……..GUR/01671/09
4 Megersa Usman…………………..…………….............. GUR/01685/09
5 Mulunesh Amsalu………………….………………...…. GUR/01739/09
A Final Project
Submitted to the Department of Information Science, Faculty of Informatics, University of
Gondar, in meeting the preliminary project requirement for partial fulfillment for the award
of degree of Bachelor of Science in Information Science
GONDAR, ETHIOPA
Declaration
This is to declare that this project work which is done under the supervision of Mr. Assefa
Chekole and Ismael Ahmed having the title Criminal Record Management System is the
sole contribution of:
1 Ehitnesh Minaye
2 Gizew Zegeye
3 Manaye Gizaw
4 Megersa Usman
5 Mulunesh Amsalu
No part of the project work has been reproduced illegally which can be considered as
Plagiarism. All referenced parts have been used to argue the idea and have been cited
properly. We will be responsible and liable for any consequence if violation of this
declaration is proven.
Project Advisers
Name of advisor signature date
Mr. Assefa Chekole
Mr. Ismael Ahmed
1.
2.
CRIMINAL RECORD MANAGEMENT SYSTEM FOR GONDAR CITY POLICE STATION 06/24/2019
Acknowledgment
First of all we would like to thank our GOD who giving us the tolerance and strength to do
this project. Next, we would like to express our special thanks of gratitude to our adviser’s
Mr. Assefa Chekole and Mr. Ismael A. for gave us a guide line on how to do project, for their
continuous follow up and guidance throughout the life cycle of the project work. We have
been strongly impressed by their constructive comments and guidance. Finally we would like
to thank police station staff members who help us during data collection.
Abstract
Crime is a human experience and it has to be controlled. Gondar city police station plays a
great role to control crime and criminal activities but the way of managing those criminal
and crime activities done manually and this is due to lack of automated system that supports
the station workers to communicate with community to share information and store, retrieve
and managing criminal records. In order to control crime efficiently we developed web based
system.
The main objective of this project is to develop a web application in which any citizen can
report crimes; if anybody wants to complaint against crimes he must use this web based
system to communication with the police station. The system provides to store records of
crimes and criminals which have made disciplinary case and used to make simply retrieve
information from the database. The system implemented is a typical computerized crime
management system, based on client-server architecture allowing data storage and criminal
record interchange between the police.
Contents
Declaration................................................................................................................................. II
Acknowledgment ....................................................................................................................... II
Abstract .................................................................................................................................... III
CHAPTER ONE .........................................................................................................................1
1. Introduction .........................................................................................................................1
1.1. Background of the organization .....................................................................................2
1.2. Statement of the Problem ..............................................................................................3
1.3. Objectives .....................................................................................................................3
1.3.1. General objective........................................................................................................3
1.3.2. Specific objective .......................................................................................................4
1.4. Scope of the project.......................................................................................................4
1.5. Limitation of the project ................................................................................................4
1.6. Significance of the project .............................................................................................4
1.7. Feasibility study ............................................................................................................5
1.7.1. Operational Feasibility ...........................................................................................5
1.7.2. Economic Feasibility..............................................................................................5
1.7.3. Technical Feasibility ..............................................................................................6
1.8. System development tools .............................................................................................7
1.8.1. Software Requirements ..........................................................................................7
1.8.2. Hardware Requirements .........................................................................................7
CHAPTER TWO ........................................................................................................................8
2. Literature review ..................................................................................................................8
2.1. Related works ...................................................................................................................8
2.1.1. A real time crime records management system for national security agencies .............8
2.2.2. Crime Information Management System.....................................................................9
CHAPTER THREE................................................................................................................... 10
3. Project Methodology ............................................................................................................. 10
3.1. Project approach ............................................................................................................. 10
3.2. Data collection methods .................................................................................................. 10
3.2.1. Interview .................................................................................................................. 10
List of tables:
List of Figures
List of acronyms
CHAPTER ONE
1. Introduction
Criminal record management is possible even though it is not web based with current technology
like computers. But it have a lots of drawback when compared with web based system like
security issue, speed of access a desired record, efficiency and effectiveness of retrieval of
criminal record. Web based system is a computer based system which is stored, processed, and
retrieved by computers. Governments and peoples support to peace and security for their
sustainable development for their country.
Now a day’s technology is being used in almost every company to accomplish specific tasks.
Many businesses are using various business communication technologies to change the way their
employees interact and communicate while at work. Employees can use various communication
tools to interact or exchange information at work such us developing website for online
communication.
Web application is one parts of information technology in which applications and information’s
are stored on servers and users can access that information or application remotely using web
browsers. “Web Based criminal record management system” is a web application that provides
users interact with the system without any physical existence. This system helps the police
department to manage crimes, to generate fast reports, and to retrieve criminal cases in efficient
and effective manner. It also establishing an active and equal partnership between the Police and
the public through which crime and community safety issues can jointly be discussed and
solutions determined and implemented.
In Gondar town there were security departments in order to prevent crimes. Crime is an illegal
action for which someone can be punished by the government. It is expanded to the world highly
and rapidly this also flows to our country as well. So, this case should have taken as serious
problem for the world as well as our country growth. So, to minimize these illegal activities the
government made the police station in different place of the country. Gondar city police Station
has been used manual file handling system since it was established. The mission of the
organization is to take part and play an important role in the struggle against crime and bring
about a sustainable economic development throughout the country by providing peace and
security service. The station has responsible for reporting and storing the nature of the crime, the
location details, the sequence of the crime information on victims. The criminal record system of
the station currently investigated with the problem of recording, storing, retrieving and updating
of crime information to generate reports and decision making purpose. Currently the police
station processes tasks in the form of document based applications or traditional file handling
systems. On the other hand processing of the crime record can be automated by crime record
management system, which is newly implementing. The new system can be taken as to automate
processing tasks with less efforts and resources.
1.3. Objectives
1.3.1. General objective
The general objective of this project is to develop web based Criminal Record Management
System for Gondar city Police Station.
To build data base component that store all crime information of the organization
Provide information access chance and give nomination without go to police station
Can post wanted criminals, wanted criminals and safety tips at any time
the system and the cost needed to find criminal and crime information the manual system is take
high cost than requirement needed to develop the system. The technology that we are going to
use is in common use and is always made available to work with so there is no purchase cost
involved, no huge cost involved in training.
Tangible benefits
Tangible benefits are something that has a physical existence. Cost reduction and avoidance,
increase the income of the organization, improving response time, producing error free out put
such as report generating, and no redundancy, increased management planning and control
Intangible benefits
Increase information processing efficiency, faster decision making, increase accuracy, right
information at the right time, Customer satisfaction. Intangible costs are not always foreseen.
CD To hold files
CHAPTER TWO
2. Literature review
In this chapter, we analyze systems that are related to the new system. We will focus on the
systems that are closest in functionality to the crime record management system (CRMS),
highlighting their key features, similarities, difference, advantages and disadvantages. As stated
in [10] crime is some conduct which, when it leads to a certain state of affairs, is treated in
that jurisdiction as being capable of leading to prosecution and punishment. As presented in
[11] a criminal record or police record is a record of a person's criminal history, generally used
by potential employers, lenders etc. to assess his or her trustworthiness. The information
included in a criminal record and the existence of a criminal record varies between countries and
even between jurisdictions within a country.
in inconsistencies, wastage of disk space and poor control and coordination of data. The
employment of this method results from reasons such as:
Inadequate funding
Corruption and extortion and
Lack of necessary skills and resources for statistical and information management.
CHAPTER THREE
3. Project Methodology
Methodology deals with a range of ways to make the most out of solving key project problems. It
is a composite of philosophies, ideals, and foundations that drive the actions, the methods that
will be used [3].
3.2.2. Observation
In this method all team members have to do is observation and note down the events what the
team observes, during visiting the station to gather data, we have observed that how to store
criminal records and the recorded data.
Gondar city police Station manages all FIRs and investigation files by writing all information on
ledge. In Gondar city the current police station management system, a lot of operations are
accomplished manually registering FIR, registering criminals data, generating reports of
criminals, recording the details of criminals, and Managing the entire police stations within it.
Polices can post safety tips, wanted criminals and missing persons, can generate reports
and can easily search criminals case. In Gondar city police Station criminal record management
system, the users can view wanted criminals, wanted criminals and safety tips in this case
minimize cost, time and they can also access their view post information anywhere through the
system.
Administrator
Police Head
Preventive Police
Register crime
Register criminal
Register FIR
View placement
View nomination
View wanted and missed persons
Detective Officer
Register accuser
Register accused
Manage accuser and accused data
Register employee
Manage employee data
Community
Availability: The system can function 24 hours a day and seven days a week
Efficiency: This system must ensure allocation and use of services being requested for
the users by using minimum memory storage, cost, and time.
Security: The user accesses the system using valid user name and password.
Unauthorized users can’t access the system.
Error handling: When a user interacts with the system errors may occur. To control this
kind of in accuracies the system generate different user friendly messages.
Scalability: the system adding new features and new user without any problem
User Interface: The interface is user friendly and can properly guide the user how to use
the system and perform operations easily since every link name in the system similar to
the task performed.
System design is the transformation of the analysis model into a system design model. Up to now
we were in the problem domain. System design is the first part to get into the solution domain in
a software development.
The main purpose of system design is to determine how the system is going to build and to
obtain the information needed to direct the actual implementation of the system. It focuses on
understanding the model how the software will be built.
3.5.1. Actor and Use Case Description
Actors: - use in the system to represent user that interact with the system
Actor Identification
1. Police Head
2. System Administrator
3. Criminal preventive police
4. Detective Officer
5. Human Resource Manager
6. Community
View FIR
Create Account
View User Account
Update and Delete User Account
View Employee
View Placement
Register Criminal
Register Crime
View Nomination
View wanted criminals
Register FIR
Register Accused
Register Accuser
View Accuser
View Accused
Register Employee
Update and Delete Employee
View Employee
View news
View missed persons
Use case identification:
Use case is an activities that accomplished by actors. Use case describes a sequence of
actions that provide a measurable value to an actor.[9] In the following table we try to list use
case id, use case name and its description
A use case description is a business analysis presentation of the steps defining the interactions
between a user (called an actor) and a system (usually a computer system). It details the
interactions and sets the expectations of how the user will work within the system.
Alternative course of If the HR manager enters wrong input the system display
action “Incorrect input” and the process turn again from step 5.
Alternative course of If the user enters wrong username or password, the system display invalid input
action message and process turn again from step 1.
Post condition Users can login to the system with their account
Alternative course of User may input wrong user name and password the system display wrong message.
action The process turn back to step 5
Alternative If the user enters the wrong username or password, the system notifies “the wrong
course of action input” and process continues from step 1.
Alternative course of If they fill wrong input the system show incorrect message.
action The process turn back to step 5
Alternative course of If the Preventive police enters wrong username and password the process turn
action again from step 3.
The control flow is drawn from one operation to another. This flow can be sequential, branched,
or concurrent. Activity diagrams deal with all type of flow control by using different elements
such as fork, join, etc.
User Open()
Display
System Home Page Login Form Police Head Page Post Missing Criminal
DataBase
Form
Police Head
Open()
Display()
Check Validity
Invalid input
Check Registration
invalid
Wrong user name and password Try Again
Else
Else Save
Try Again
if not saved
Display Successfully Message
Logout
Figure 10: Design class diagram for criminal record management system
CHAPTER FOUR
4.1. Implementation
Interface Design
This is the design of the new system interface which includes the total layout of the main
interface of the new system.
Home page
We used system testing on a complete system to evaluate the system's compliance with its
specified requirements.
Functional Testing
Functional test is a testing mechanism that provides all the demonstration provided in the
documentation. Functional testing focuses on the following testing items:
Valid Input: all the valid input must be accepted.
Invalid Input: all the invalid input must be rejected.
Functions: all the functions must be working.
Output: all the functions of the application must be working. Systems/Procedure: all the
interfacing systems or procedure must be working properly.
Unit testing
All the components of the system are tested individually to check is there an error on the input,
output or validation mechanism of the system by using system testing.
CHAPTER FIVE
5.1 Conclusion
Criminal record Management System allows police station to store crime details, victim details,
FIR Details, etc. this project allows Police station to store all the details related to the
department and use them whenever necessary. It also able to provide reports of various crimes,
and also be able to upload and view wanted criminals and updated news. The implementation of
the system in the organization will considerably reduce manual data entry, time and also provide
readily calculated reports. The system try to see what problems are in the current criminal record
management system of Gondar city police Station and develop a web based system that fix the
problems of the current system.
5.2. Recommendation
The new system that we developed involves web based criminal record that are managed
in the police station. But there are still areas that may be considered as a further and
important area to improve on, and our suggestion go thus.
There is the need for the justice segments and prison record to be automated.
Enable the system support SMS notification to the community via mobile
Develop multilingual supporting system
Therefore, others who are interested to develop a new system on police criminal record
management system or other related systems can get some initial idea about the system. By
focusing on the limitation and functional areas of the system they can also develop a
better criminal record management system that automates all records managed in police station.
Reference
[1] Guba, E. G. Elements of a proposal. Paper presented at the UCEA meeting, Chapel Hill, NC.
(1961, April).
[2] Jospph Svalcita, Essential system analysis and design 2nd edition
[4] Kawai, D., & Samson, D. (2011). Development Of A Criminals Record Management
System. Information Technology for People Centered Development, 1-8.
[5] Brueghel, Bernd (2000) Object oriented Software Engineering Conquering Complex and
Changing System. Upper Saddle River: Prentic Hall.
[6] Alistair Cockburn. (2000, Feb 21).Effective use of use case (3 rd Ed.) [Online]. Available:
https://alistair.cockburn.us/get/2465. Retrieved on (2017, Jan 09).
[7] Howell, K. E. 2013 Introduction to the Philosophy of Methodology. London: Sage
Publications
[8] "About Non-Functional System Requirement Analysis," 10 May 2019. [Online]. Available:
http://www.scaledagileframework.com/nonfunctional-requirements/
[9]. “UML Use Case Diagrams," June December 2019. [Online].
Available:http://agilemodeling.com/style/useCaseDiagram.htm
[10] M. Wayne, crime Contrasting definitions and perspectives. New York, 2016, pp. 7-8.]
[12] Student Project, "Crime Information Management System - Student Project", 2013.[Online].
Available: http://www.studentprojectcode.com/. [Accessed: 15- may- 2019]
Appendix
Interview protocol sample questions:
1. What are the major tasks performed in the organization?
2. What are the major problems in the current system?
3. How to store criminal records?
4. What are the major officers in the station?
5. Where criminal’s information’s stored?
<body>
<?php
session_start();
$username=$_POST['username'];
$password=$_POST['password'];
$role=$_POST['role'];
$_SESSION['username']=$username;
if($role=="admin")
{
$con = mysql_connect("localhost","root");
mysql_select_db("crms", $con);
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location=\'index.php\';</script>';
}
else if ($status!='Active'){
echo '<script type="text/javascript">alert("Account is blocked please contact the
adminstrator!");window.location=\'index.php\';</script>';
}
else
{
$_SESSION['username']=$row['username'];
header("location:Adminstrator.php");
}
mysql_close($con);
}
else if($role=="HumanResourceManager")
{
$con = mysql_connect("localhost","root");
mysql_select_db("crms", $con);
$sql = "select * from account where username='".$username."' and password='".$password."'
and role='HRManager' ";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
$status=$row["status"];
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location=\'index.php\';</script>';
}
else if ($status!='Active'){
echo '<script type="text/javascript">alert("Account is blocked please contact the
adminstrator!");window.location=\'index.php\';</script>';
}
else
{
$_SESSION['username']=$row['username'];
header("location:HRmanager.php");
}
mysql_close($con);
}
else if($role=="preventivepolice")
{
$con = mysql_connect("localhost","root");
mysql_select_db("crms", $con);
$sql = "select * from account where username='".$username."' and password='".$password."'
and role='PreventivePolice'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
$status=$row["status"];
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location=\'index.php\';</script>';
}
else if ($status!='Active'){
echo '<script type="text/javascript">alert("Account is blocked please contact the
adminstrator!");window.location=\'index.php\';</script>';
}
else
{
$_SESSION['username']=$row['username'];
header("location:PreventivePolice.php");
}
mysql_close($con);
}
else if($role=="DetectiveOfficer")
{
$con = mysql_connect("localhost","root");
mysql_select_db("crms", $con);
$sql = "select * from account where username='".$username."' and password='".$password."'
and role='DetectiveOfficer'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
$status=$row["status"];
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location=\'index.php\';</script>';
}
else if ($status!='Active'){
echo '<script type="text/javascript">alert("Account is blocked please contact the
adminstrator!");window.location=\'index.php\';</script>';
}
else
{
$_SESSION['username']=$row['username'];
header("location:DetectiveOfficer.php");
}
mysql_close($con);
}
else
{
$con = mysql_connect("localhost","root");
mysql_select_db("crms", $con);
$sql = "select * from account where username='".$username."' and password='".$password."'
and role='PoliceHead'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
$status=$row["status"];
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location=\'index.php\';</script>';
}
else if ($status!='Active'){
echo '<script type="text/javascript">alert("Account is blocked please contact the
adminstrator!");window.location=\'index.php\';</script>';
}
else
{
$_SESSION['username']=$row['username'];
header("location:PoliceHead.php");
}
mysql_close($con);
}
?>
</body>
</html>
Glossary
Class Diagram: a type of static structure diagram that describe the structure of a system by
showing system classes, attribute, operation and the relationship among the class.
Component Diagram: is UML diagram depicts how components are wired together to form
Preventive Police: Are those police’s they placed on the area of preventing crime
Use Case Diagram: Graphical Representation of mark full of step wise activity and action with
support for choice, iteration and concurrency.
Sequence Diagram: is a king of interaction diagram that show how process operate with one
another and in what order.