50

Crime File Management

Embed Size (px)

Citation preview

Page 1: Crime File Management
Page 2: Crime File Management

ACKNOWLEDGEMENT

We would like to give our sincere acknowledgement to everybody responsible for the

successful completion of our project titled “CRIME FILE SYSTEM”.

It gives us great pleasure to acknowledgement with thanks the assistance and

contribution of many individual who have been actively involved at various

stages of this project to make it a success.

Firstly we are very grateful to this esteemed institute “SRI BHAGHWAN

MAHAVEER JAIN COLLEGE “ for providing us an opportunity to our degree

course .

We wish to express our whole hearted thanks to our principal DR.EDWIN

CHRISTOPHER for providing the modernized lab facilities in our institute.

Perfection is impossible to achieve, but hard work and dedication can achieve any

goal. I have tried my level best to fulfill the requirements of the project, but I could

not have achieved my goal without the able guidance of Ms. KAVITHA.S, H.O.D.,

Computer Science Department.

We indebted to Ms.KAVITHA.S, for providing us an opportunity to work under

the guidance and for her constant support and encouragement .

Our gratitude towards our guide KAVITHA.S for their keen interest and

boldness encouragement, which is received during the entire period of our

project .

We would also like to thank all our lecturers.

Finally we convey our acknowledgement to all our friends and family members

who directly or indirectly associated with us in the successful completion of the

project.

We thank one and all.

Page 3: Crime File Management
Page 4: Crime File Management

DECLARATION

We, KIRAN KUMAR B.C (10NDS75028), LAVANYA.R (10NDS75029) do

hereby declare that the project work entitled “CRIME FILE SYSTEM”, is a

bonafide work carried out by us under the guidance of MS.KAVITHA.S, lecturer,

and H.O.D of Computer Science department. This project, as presented in this report,

is our original work and has been submitted as a partial fulfillment for the Degree of

Bachelor of Computer Science of Bangalore University.

PLACE: KGF NAME OF THE

STUDENT:

KIRANKUMAR B.C

(10NDS75028)

LAVANYA.R

(10NDS75029)

Page 5: Crime File Management
Page 6: Crime File Management

SYNOPSIS

CRIME FILE SYSTEM

BACKGROUND:

Our project is entitled as "CRIME FILE SYSTEM”. Now a days the crime

rate in the society is accordingly increasing, due to the negligence of people. So it has

become a major drawback for the improvement of the Nation. To overcome this

drawback, we can use this software for reporting crimes in time and maintaining its

records is very helpful to control the crime statistics.

OBJECTIVE:

Crime File System is a system used to report crimes. This project will be done

using VB 6.0 as front end, and MS Access as back end. It can be used to report crime.

This project is mainly useful for police stations. This system will help to manage all

the activities in a police station using computers. Currently all the works are done

manually, by computerizing all the activities inside a police station can be managed

easily and effectively.

PURPOSE & SCOPE:It is important for the Police Department of Defense to store and provide

details to the public in account to provide the better service to them. The documentary

proof may not be efficient to meet the requirements for maintaining the records,

which may result in dissatisfaction among the public about the services provided by

the Department.

APPLICABILITY:

Our project is applicable to report crimes to any Defense services like Police

stations etc, which help to manage all activities using computers, so that records and

details of particular case can be accessed easily.

SOFTWARE CATAEGORY:

Page 7: Crime File Management

This project helps to maintain records of crime and retrieving it back. For

better understanding of our project, we have divided the problems into separate

modules.

The modules involved in this project are:

Login for user

Complaint registration

View complaint status

Criminal register management

FIR Management

Manage list about most wanted criminals

1. LOGIN This includes Administrator and User login. There will be a username and

password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION This module helps to register the details about the crime. This is done by

entering some details, such as incident details, Victim details, crime details etc

3. VIEW COMPLAINT STATUSThis module allows us to view the status of the complaint that you have

registered earlier.

4. CRIMINAL REGISTER MANAGEMENT

Here we can have the facility to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This can be

done by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

Page 8: Crime File Management

This module allows viewing the First Information Report of all the crimes that

took place at recent years. The administrator can enter FIR information and save it in

a database.

6. CHARGESHEET MANAGEMENTThis module allows us to add the other requirements of this software which is

very important for other modules, also admin can enter what all actions taken so far

by the department and save it in a database.

7. MANAGE THE LIST OF MOST WANTED CRIMINALSThis is an additional feature added to this Software, which helps us to make

a quick search about the most wanted criminals. This helps to always keep track of

and identify a person quickly, who is a most wanted criminal.

LIST OF TABLES

Page 9: Crime File Management

TABLE

NUMBER

TABLE NAME

1 COMPLAINT REGISTRATION

2 CHARGESHEET

3 FIRST INFORMATION REPORT (FIR)

4 COMPLAINT STATUS

5 CRIMINAL REGISTRATION

6 MOST WANTED DETAILS

LIST OF DIAGRAMS

FIGURE NO NAME OF DIAGRAM

1 PERT CHART

2 DATA FLOW DIAGRAM

3 E-R DIAGRAM

Page 10: Crime File Management
Page 11: Crime File Management

CONTENTS

1. INTRODUCTION Objective and Scope of the Project 1 - 3

Theoretical Background 4 – 10

2. SYSTEM STUDY & ANALYSIS Introduction 11 – 11

Existing System 12 – 12

Proposed System 12 - 12

Hardware & Software Requirements 13 - 13

3. SYSTEM DESIGN Pert Chart 14 -14

Data Flow Diagram 15 -15

Sample Report 16 -18

Sample Coding 19 - 36

Testing 37 - 38

Form Designs

4. CONCLUSION 39 - 39

5. BIBLIOGRAPHY 40 - 40

Page 12: Crime File Management
Page 13: Crime File Management

OBJECTIVE

AND SCOPE OF PROJECT

Crime File System is a system used to report crimes. It can used to report

crime. This project is mainly useful for police stations. This system will help to

manage all the activities in a police station using computers. Currently all the works

are done manually, by computerizing all the activities inside a police station can be

managed easily and effectively.

It is important for the Police Department of Defense to store and provide

details to the public in account to provide the better service to them. The documentary

proof may not be efficient to meet the requirements for maintaining the records,

which may result in dissatisfaction among the public about the services provided by

the Department.

Our project deals with the “CRIME FILE SYSTEM”, which includes many

modules required to perform the activities inside Police stations and it also provides

easy way of accessing these data in efficient manner.

For better understanding of our project, we have divided the problems into

separate modules.

The modules involved in this project are:

Login for user

Complaint registration

View complaint status

Criminal register management

FIR Management

Manage list about most wanted criminals

Page 14: Crime File Management

MODULES INCLUDED

1. LOGIN

This includes Administrator and User login. There will be a username and

password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION

This module helps to register the details about the crime. This is done by

entering some details, such as incident details, Victim details, crime details etc.

3. VIEW COMPLAINT STATUS

This module allows us to view the status of the complaint that you have

registered earlier.

4. CRIMINAL REGISTER MANAGEMENT

Here we can have the facility to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This can be

done by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that

took place at recent years. The administrator can enter FIR information and save

it in a database.

6. CHARGESHEET MANAGEMENT

This module allows us to add the other requirements of this software which is

very important for other modules, also admin can enter what all actions taken so far

by the department and save it in a database.

7. MANAGE THE LIST OF MOST WANTED CRIMINALS

This is an additional feature added to this Software, which helps us to make

a quick search about the most wanted criminals. This helps to always keep track of

and identify a person quickly, who is a most wanted criminal.

Page 15: Crime File Management

FUTURE ENHANCEMENT

We can update this system as online application

The main advantage of online application is that, a person can report

the crime anytime from anywhere.

Users can view the progress of their complaint online.

By the future technology user can view the case details and progress

of the complaints on their mobile phones

Face recognition technology can apply. User or witness of the crime

can give the physical information of the thief.

Page 16: Crime File Management

THEORETICAL BACKGROUND

VISUAL BASIC

Visual Basic is also called Event Driven program. It means operations need

not have to follow a sequence and can be interrupted, suspended and

abandoned at any instance. This is a programming language which contains

number of windows.

What is VB?

It is a tool that allows you to develop windows (Graphical User Interface-

GUI) Application. It was developed from BASIC programming language. In

1970s Microsoft got it started by developing ROM-based interpreted BASIC

for the entry microprocessor based computers.

It is an Event Driven; meaning code written for a particular object may remain

idle until called upon to respond to some event (Event may include operations

such as button pressing, menu selector…) an event processor governs Visual

Basic.

Some of the features of VB:

It includes a full set of objects. Using each objects the user can draw or

develop the applications. It also includes lot of icons and pictures for your use.

It includes events for responses to mouse and keyboard actions, this can be

useful in trapping interrupts to divert or suspend operations. It includes a full

set of mathematical string handling and graphics functions; this makes the

process of developing and performing operations very easy.

Visual Basic also has facilities to handle fixed and dynamic variables and

control arrays. It also includes facilities sequential and random access file

support, this makes storing and accessing data very easy.

Page 17: Crime File Management

VB has certain powerful database access tools, thus interfering with different a

type of backend software becomes very easy. It also includes facilities for

using ActiveX support; this allows the user to create our own type of objects.

VB HISTORY (VB3, VB$ & VB5):

Starting with VB5, Visual Basic became an exclusively 32-bit programming

language, suitable for programming only on Win9x or NT system. If you must

program for Win2.x, then you have to drop back to either VB3 or VB4. VB4

had the dual ability to support Win3.x as well as Win9x/NT systems.

Visual Basic 6.0 comes in 3 different editions. They are:

1) The Visual Basic 6.0 Academic edition

2) The Visual Basic 6.0 Professional Edition

3) The Visual Basic 6.0 Enterprise Edition

Visual Basic 6.0 Academic Edition is the introductory edition which allows us

to create windows application easily. It includes all the tools to perform this

operation efficiently.

Visual Basic 6.0 Professional Edition is for computer professionals. It is

includes all the advanced features such as tools to develop ActiveX and

Internet controls.

Visual Basic 6.0 Enterprise Edition is the most advanced edition. It is for

professional programmer who can develop distributed application. It is most

sited for those who function in a team environment.

Page 18: Crime File Management

APPLICATIONS of VB:

Every application or project in visual Basic is made up of seven applications.

That is:

Form

Controls

Properties

Methods

Procedure

Modules

Project

Page 19: Crime File Management

MS ACCESS

Microsoft Access is a relational database management system for Microsoft

Windows. It is designed to give you unparalleled access to data, combined with ease

of use made possible with windows.

Features of MS-ACCESS:

Microsoft Access joins other Microsoft products, such as MS-Word for

Windows and MS-EXCEL, by indicating toolbars. We can modify to fit our

needs, more around in the MS-ACCESS windows, and hide or show

individually. We can create our own custom toolbars, attach them to forms

and reports in our database.

When you want to define an expression in MS-ACCESS we can use the

expression Builder even includes a list of common expressions already

written for us to choose from.

We can use input masks to define patterns that data must follow when it is

entered in forms and data sheets, making data entry faster and more

accurate. It is very easy to define an input mask using Input Mask Property.

For quick sorting of records in tables, queries and forms you can click the

sort Ascending and sort Descending buttons on the toolbar or choose quick

sort from the records menu and then choose ascending or descending.

Using the print definition command on the file menu, you can print detailed

information about the design of any object in our database. To print

information about more than one object, choose Add-Insert from the file

menu and then choose database documents.

Functions Performed By MS-ACCESS:

Page 20: Crime File Management

Storage of data

Creation and maintenance of data structure

Provision of efficient indexing mechanism

Management of very large database

Enforcement of security and privacy

Here is the Hierarchy that Microsoft Access uses in breaking down a database.

Field:

Fields are the different categories within a Table. Tables usually contain multiple fields.

Data types:

Data types are the properties of each field. A field only has 1 data type.

Example: (Fieldname) Student Last Name; (Data type) Text.

DATABASE

A Database is an organized mechanism that has the capability of

storing information through which a user can retrieve stored information in an

Page 21: Crime File Management

effective and efficient manner. The data is the purpose of any database and

must be protected. Here in comes the role of Database Management System

(DBMS) that helps in systematic organization of information. The information

in a database should be organized in such a way that it is easy to update. And

only then, it can quickly provide information.

Any stored information or a database, whether electronic of manual

helps you by keeping track of your inventories, payroll invoice or anything

else that you consider important.

There are 2 types of database; they are RDBMS [Relational Data Base

Management System] and DBMS [Data Base Management System].

RDBMS:

It is defined as a method of viewing information from several, separate

database that relate to one another through keywords or values. The main

advantage of RDBMS is that you can simultaneously use more than one

database to see information stored in them.

Microsoft Access is a window-based program created by Microsoft. It

helps you store and manage a large collection of information. A systematically

arranged database helps you manage the stored information in an efficient way

so that it can access quickly whenever needed. Microsoft Access is based on

RDBMS. Therefore to have a better understanding of working in Access, you

should be familiar with 4 basic objects of RDBMS as described below.

Tables:

It is a collection of information on a specific topic. In a table the

information stored in rows and columns. You can store different types of data

in different tables. Let us now get to know more about the components that

makes up a table. They are:

Columns

Rows

Domain

Page 22: Crime File Management

Primary Key

Relationship

Queries:

Queries are systematic ways of retrieving information from a database.

Access’s query feature can look for the information that meets the criterion or

condition you specify and displays the information on the screen.

Forms:

It presents the information stored in a database in an easy to use

format. Through forms, you can view, enter or update information in a

database. If you wish to view records in your database, from present one

record at a time on the screen.

DBMS:

It is a tool for managing information, stored in the database. It includes

the following functions:

Database Creation

Modifying a Database

Adding Records in Database

Deleting Records in Database

Selecting Records in Database

Page 23: Crime File Management

Introduction to System AnalysisSystem analysis is a process of gathering and interpreting facts,

diagnosing problems and the information to recommend improvements on the

system. It is a problem solving activity that requires intensive communication

between the system users and system developers. System analysis or study is

an important phase of any system development process. The system is studied

to the minutest detail and analyzed. The system analyst plays the role of the

interrogator and dwells deep into the working of the present system. The

system is viewed as a whole and the input to the system are identified. The

outputs from the organizations are traced to the various processes. System

Page 24: Crime File Management

analysis is concerned with becoming aware of the problem, identifying the

relevant and decisional variables, analyzing and synthesizing the various

factors and determining an optimal or at least a satisfactory solution or

program of action.

A detailed study of the process must be made by various techniques

like interviews, questionnaires etc. The data collected by these sources must

be scrutinized to arrive to a conclusion. The conclusion is an understanding of

how the system functions. This system is called the Existing system. Now the

existing system is subjected to close study and problem areas are identified.

The designer now functions as a problem solver and tries to sort out the

difficulties that the enterprise faces. The solutions are given as proposals. The

proposal is then weighed with the existing system analytically and the best one

is selected. The proposal is presented to the user for an endorsement by the

user. The proposal is reviewed on user request and suitable changes are made.

This is loop that ends as soon as the user is satisfied with proposal.

  Preliminary study is the process of gathering and interpreting facts,

using the information for further studies on the system. Preliminary study is

problem solving activity that requires intensive communication between the

system users and system developers. It does various feasibility studies. In

these studies a rough figure of the system activities can be obtained, from

which the decision about the strategies to be followed for effective system

study and analysis can be taken. 

Existing System:

Lack of security of data.

More man power.

Time consuming.

Consumes large volume of pare work.

Needs manual calculations.

No direct role for the higher officials.

Page 25: Crime File Management

Proposed System:

The aim of proposed system is to develop a system of improved

facilities. The proposed system can overcome all the limitations of the

existing system. The system provides proper security and reduces the

manual work.

Security of data.

Ensure data accuracy’s.

Proper control of the higher officials.

Minimize manual data entry.

Minimum time needed for the various processing.

Greater efficiency.

Better service.

User friendliness and interactive.

Minimum time required.

SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:

Processor : X86 Compatible processor

With 1.7 GHz Clock speed

RAM : 512 MB or more

Page 26: Crime File Management

Hard disk : 20 GB or more

Monitor : VGA/SVGA

Keyboard : 104 Keys

Mouse : 2 buttons/ 3 buttons

SOFTWARE REQUIREMENTS:

Operating System : Windows 2000/XP

Front end : Visual Basic 6.0

Back end : MS ACCESS

Page 27: Crime File Management
Page 28: Crime File Management

PERT CHART

Jan 10 Jan 23 Jan 23 Feb 20

Jan 5 Jan 10

Jan 10 Jan 30

Feb 21 Mar 12

Feb 27 Mar 12

Specification

Design database partCode for database part

Design Graphical User

Interface part

Code for graphical user interface

Interacts and testing

Write user manual

Finish

Page 29: Crime File Management
Page 30: Crime File Management

DFD [DATA FLOW DIAGRAM]

Crime File System

Login

FIR Complaint Registration

General

Criminal RegistrationCharge sheet

Add Complaint Status

View Complaint Status

Most Wanted Details

Page 31: Crime File Management
Page 32: Crime File Management
Page 33: Crime File Management

DATA REPORT 1: CRIMINAL REPORT

DATA REPORT 2: FIRST INFORMATION REPORT [FIR]

Page 34: Crime File Management

DATA REPORT 3: MOST WANTED DETAILS

Page 35: Crime File Management
Page 36: Crime File Management
Page 37: Crime File Management

METHODOLOGY USED FOR TESTING

The extent of testing is controlled by many factors, such as the risks involved,

limitations on resources, and deadlines. In light of these issues, we must deploy a

testing strategy that does the best jopb of finding defects in a product within the given

constraints. There are many testing strategies, but most testing uses a combination of

these:

Black Box testing

White Box Testing

However, no strategy or combination of strategies truly can prove the correctness of a

system; it can stabilize only its capability.

BLACK BOX TESTING:

The concept of the Black box is used to represent a system whose inside

workings are not available for inspection. In a black box, the test item is treated as

“black”, since its logic is unknown; all that is known is what goes in and what comes

out, or the input and output.

In black box testing you try various inputs and examine the resulting output;

you can learn what the box does but nothing about how this conversion is

implemented. Black box testing works very nicely in testing objects in an object-

oriented environment. The black box texting technique also can be used for scenario-

based tests, where the system inside may not be available for inspection but the input

and output are defined through use cases or other analysis information.

WHITE BOX TESTING:

White box testing assumes that the specific logic is important and must be

tested to guarantee the systems proper functioning. The main use of the white box is

in error-based resting, when you already have tested all objects of an application and

all external or public methods of an object that you believe to be of greater

Page 38: Crime File Management

importance. In white box testing, you are looking for bugs that have a low probability

of executing, have been carelessly implements, or were over looked previously.

One form of while box testing, called path testing, makes certain that each

path in an object’s method is executed at least once during testing. Two types of path

testing are statement testing coverage and branch testing coverage.

STATEMENT OF TESTING

The main idea of statement testing coverage is to test every statement in the

object’s method by executing it at least once. However, realistically it is impossible to

test a program on every single input, so you never can be sure that a program will not

fail on some input.

BRANCH TESTING COVERAGE

The main idea behind branch testing coverage tests to ensure that every branch

alternative has been executed at least once under some test. As in statement testing

coverage, it is unfeasible to fully test any program of considerable size.

Most debugging tools are excellent in statement and branch testing coverage. White

box testing is useful for error-based testing.

Page 39: Crime File Management
Page 40: Crime File Management

CONCLUSION

CRIME FILE MANAGEMENT SYSTEM initiates the objective of

providing the user with customized and powerful complaint registration and

process management system side software. The software is built with all

options such as complaint registration, prisoner’s registration, and

postmortem report generation etc…All the requirements specified during the

analysis and design phase are fully met, thus resulting in the formation of

good software. The interface provided is very user friendly and flexible for all

times.

Page 41: Crime File Management
Page 42: Crime File Management

BIBLIOGRAPHY

Books

A Complete Guide to Programming in Visual Basic 6.0

Visual Basic 6.0 Complete

Special Edition using VB 6.0 – Brian Siler of Jeff spots

Programming - Gray Cornell

Site Address

www.associatedcontent.com