Professional Documents
Culture Documents
net/publication/351519845
CITATION READS
1 15,730
3 authors, including:
Avdesh Bhardawaj
Juno Terra Technology Private Limited
97 PUBLICATIONS 139 CITATIONS
SEE PROFILE
All content following this page was uploaded by Avdesh Bhardawaj on 12 May 2021.
*
Department of Mechanical Engineering, ITM University, Gurgaon, Haryana 122017
2sharmabhuvanesh1993@gmail.com
^
Department of Civil Engineering, IIT Delhi, Hauz Khas, New Delhi 110016
3avdeshsir@gmail.com
Abstract— The Online Crime Reporting System is an solving activity that requires intensive communication
application that covers complete case management system between the system users and system developers. System
and this project will help in managing all activities of the analysis or study is an important phase of any system
police station. It can used to report crimes and manage all development process. The system is studied to the minutest
the activities in a police station using computers by detail and analyzed. The system analyst plays the role of the
tracking all the details of complaints, most wanted interrogator and dwells deep into the working of the present
criminal, police station, etc. Currently, most tasks are system. The system is viewed as a whole and the input to the
done manually, but by computerizing all the activities system are identified. The outputs from the organizations are
inside a police station the working systems can be traced to the various processes. System analysis is concerned
managed easily and effectively. The modules involved in with becoming aware of the problem, identifying the relevant
this project are: Login for user and admin, complaint variables, analyzing, and synthesizing the various factors and
registration, view complaint status, criminal register determining an optimal or at least a satisfactory solution or
management, case history details management, manage program of action. A detailed study of the process must be
the list about most wanted criminals, latest news made by various techniques like interviews, questionnaires,
regarding crime in the city, Safety tips for individuals, etc. The data collected from these sources must be scrutinized
especially for women and also for vendors. This project is to arrive to a conclusion. The conclusion is an understanding
helpful in the Automation of police station records, of how the system functions. This system is called the existing
including complaints, criminal records, Admin, User and system. Now the existing system is subjected to close study
Police Station Management System, etc. and problem areas are identified. The designer now functions
as a problem solver and tries to sort out the difficulties that the
Keywords— case management system, complaints registration, enterprise faces. The solutions are given as proposals. The
safety tips, police station, automation. proposal is then weighed with the existing system analytically
and the best one is selected. The proposal is presented to the
I. INTRODUCTION user for an endorsement by the user. The proposal is reviewed
The software to be produced is on “Crime Reporting on user request and suitable changes are made. This is a loop
System”. The main authority is given to the Admin. He that ends as soon as the user is satisfied with the proposal [2].
provides unique username and password for each employee Preliminary study is the process of gathering and interpreting
through which the user can login and perform the activities facts, using the information for further studies on the system.
given by the Admin [1]. As soon as a new employee joins the Preliminary study is a problem solving activity that requires
company Admin assigns tasks to him/her. Next is the main intensive communication between the system users and
module of the system that is the Crime module. In this all the system developers. It does various feasibility studies. In these
crime information will be stored in the database. First studies a rough figure of the system activities can be obtained,
complaint details will be added into the system, and then from which the decision about the strategies to be followed for
Station employee checks, complaint is related to crime or law effective system study and analysis can be taken.
and order. If it is a crime, it goes to a criminal record. As soon
as this task is completed FIR charge sheet will submit to the A. Existing System
court. • Lack of security of data.
• More manpower.
II. SYSTEM ANALYSIS • Time consuming.
Objective: System analysis is a process of gathering and • Consumes large volume of pare work.
interpreting facts, diagnosing problems and the information to • Needs manual calculations.
recommend improvements in the system [2]. It is a problem • No direct role for the higher officials.
Ashwani Sharma#, Bhuvanesh Kumar Sharma*, Avdesh Bhardawaj#
B. Output Design
A quality output is one, which meets the requirements of the
end user and presents the information clearly. In output design
it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most
important and direct source information to the user. Efficient
and intelligent output design improve the system's relationship
to help user decision-making [7]. Designing computer output
should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each
Fig. 4 Administrator user interaction module
output element is designed so that people will find the system
can use easily and effectively.
B. Controls
System Access Controls: Ensuring that unauthorized users
don't get into the system, and by encouraging (and sometimes
forcing) authorized users to be security-conscious–for
example, by changing their passwords on a regular basis. The
Fig. 6 Entity-relationship diagram system also protects password data and keeps track of who's
IX. SYSTEM SECURITY doing what in the system, especially if what they're doing is
security-related (e.g., logging in, trying to open a file, using
A. Checks special privileges).
A check provides a binary result—true or false, yes or no.
Checking is all about asking and answering the question Data Access Controls: Monitoring who can access what data,
“Does this assertion pass or fail?” Such simple assertions tend and for what purpose. Your system might support
to be machine-decidable and are, in and of them, value-neutral. discretionary access controls; with these, you determine
When a check passes, we don’t know whether the program whether other people can read or change your data [4]. Your
works; we only know that it’s still working within the scope of system might also support mandatory access controls; with
our expectations [2]. The program might have serious these, the system determines access rules based on the security
problems, even though the check passes. To paraphrase levels of the people, the files, and the other objects in your
Dkijstra, “checking can prove the presence of bugs, but not system.
their absence.” Machines can recognize inconsistencies and
problems that they have been programmed to recognize, but Discretionary Access Controls: Discretionary access control
not new ones. Testing doesn’t tell us whether the program (DAC) is an access policy that restricts access to files (and
works either—certainty on such questions isn’t available—but other system objects such as directories and devices) based on
testing may provide the basis of a strong inference addressing the identity of users and/or the groups to which they belong
the question “problem or no problem?” Testing is, in part, the [10]. What's discretionary about discretionary access control?
process of finding out whether our checks have been good In contrast to mandatory access control, in which the system
enough. When we find a problem through testing, one controls access, DAC is applied at your own discretion. With
reasonable response is to write one or more checks to make DAC, you can choose to give away your data; with MAC, you
sure that that particular problem doesn’t crop up again. can't. Not only does DAC let you tell the system who can
Checking is something that we do with the motivation of access your data, it lets you specify the type of access allowed.
Ashwani Sharma#, Bhuvanesh Kumar Sharma*, Avdesh Bhardawaj#
For example, you might want everyone in the system to be
able to read a particular file, but you might want only yourself
and your manager to be able to change it [10]. Most systems
support three basic types of access:
Read- If you have read access to a file, you can read the file.
Write- If you have write access to a file, you can write
(change or replace) the file.
Execute- The execute permission is relevant only if the file is
a program. If you have executed permission for a file, you can
run the program.
Self/Group/Public Controls: In many systems, you control
access to your files by dividing the world of users into three
categories, and telling the system what the users in each
category can do with your file. Some systems call
these self/group/public controls. In UNIX, they're
called user/group/other (UGO) controls:
Fig. 9 Missing person
X. RESULTS
Fig. 10 Most wanted
Fig. 8 Homepage
XIII. REFERENCES
[1] S. Maghu, S. Sehra and A. Bhardawaj, Inside of Cyber Crimes and
Information Security: Threats and Solutions”, International Journal of
Information & Computation Technology, Volume 4, Number 8 spl., pp. 835-
840, 2014.
[2] P. Bhateja, P. Sehrawat and A. Bhardawaj, An Analysis of Data Mining,
Web Image Mining and their Applications, International Journal of
Fig. 12 Post Complaints Information and Computation Technology, Vol. 3, No. 6, pp. 603-608, 2013.
[3] C. Arora, C. Kaur, A. Gupta and A. Bhardawaj, A Review of Recent E-
learning Trends: Implementation & Cognitive Styles”, International Journal
of Information & Computation Technology, Volume 4, Number 3 spl., pp.
215-220, 2014.
[4] S. Goel and A Bhardawaj, A Critical Analysis of Augmented Learning by
Applicability of IT Tools”, International Journal of Information &
Computation Technology, Volume 4, Number 4 spl., pp. 425-430,2014.
[5] J. Govil, Ramifications of cyber crime and suggestive preventive measures.
In Electro/Information Technology, IEEE International Conference on (pp.
610-615). IEEE, 2007.
[6] M. Gupta, B. Chandra, and M. P. Gupta, Crime data mining for Indian
police information system. Proceeding of the 2008 Computer Society of India.
[7] C. H. Ku, and G. Leroy, A decision support system: Automated crime
report analysis and classification for e-government. Government Information
Quarterly, 31(4), 534-544, 2014.
[8] N. Martin, and J. Rice, Cybercrime: Understanding and addressing the
concerns of stakeholders. Computers & Security, 30(8), 803-814, 2011.
[9] J. S. Jadhav, and K. M. Nalawade, Research Aspect of Expert system of
Indian judiciary of crime against women. The International Journal Of
Fig. 13 Track Complaints Engineering And Science, 2(7), 2013.
[10] A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, and S. S. Sarma,
Cyber crime information system for cybernetics awareness. In Cyberworlds,
XI. CONCLUSION 2003. Proceedings. 2003 International Conference on (pp. 46-53). IEEE.