89
CRIME FILE PROJECT REPORT Submitted in partial fulfilment of the requirements for the award of the degree of Master of Computer Application [Software Engineering] University School of Information Technology GGS Indraprastha University, Delhi –6 1 Submitted by: SOMDEV ARYA 05516404509 MCA(S.E.)- 3rd Sem. Under the Guidance of: Ms. Anuradha chug USIT, GGSIPU

Crime file

Embed Size (px)

DESCRIPTION

srs on crime file management

Citation preview

Page 1: Crime file

CRIME FILE PROJECT REPORT

Submitted in partial fulfilment of the requirementsfor the award of the degree of

Master of Computer Application[Software Engineering]

University School of Information Technology

GGS Indraprastha University, Delhi –6

1

Submitted by:

SOMDEV ARYA

05516404509

MCA(S.E.)- 3rd Sem.

Under the Guidance of:

Ms. Anuradha chug

USIT, GGSIPU

Page 2: Crime file

TABLE OF CONTENTS

CONTENTS PAGE NO.

1. TITLE OF PROJECT…………………………………………………….……2

2. ACKNOWLEDGEMENT……………………………………………………...3

3. CERTIFICATE…………………………………………………………………4

4. SELF CERTIFICATE………………………………………………………….5

5. INTRODUCTION……………………………………………………….……...6

6. TOOLS/PLATFORM, HARDWARE AND SOFTWARE

REQUIREMENT SPECIFICATION…………………...……………………..8

7. Technology Overview of with VB and MS Access

8. ANALYSIS (DFDs, ER Diagrams, etc. As per the project requirements)

…………………………………………………………………13

9. USE CASE DIAGRAM………………………………………………………..26

10. USE CASES…………………………………………………………………..27

11. A COMPLETE STRUCTURE OF THE PROGRAM………………..……..41

Number of modules and their description.

. Data structures for all modules.

. Process Logic of each module

Report generation.

12.FUTURE ENHANCEMENT…………………………………………………….82

13. Glossary……………………………………………………………………..

2

Page 3: Crime file

CRIME FILE

(USING MS ACCESS 2007 Framework through VB6)

3

Page 4: Crime file

Acknowledgement

This is a great opportunity to acknowledge and to thanks all those persons without whose support

and help this project would have been impossible. We would like to add a few heartfelt words for

the people who were part of this project in numerous ways.

I would like to thanks to my project guide “Ms. Anuradha Chug”, for his indefatigable

guidance, valuable suggestion, moral support, constant encouragement and contribution of time

for the successful completion of project work. I am very grateful to him, for providing all the

facilities needed during the project development. At the outset, I sincerely thank all faculty

members of my institution for his extra effort to make our session on line inspire of all ideas.

I thank my Counselors for his indispensable support and encouragement thought the

project. I would like to thank all those who helped me directly or indirectly.

Last but not the least, I would like to acknowledge the ongoing support of my parents and

my family members, whose patience and encouragement during these long days and night have

been paramount in making this project a reality.

Thank you

Student Name: Somdev Arya

4

Page 5: Crime file

CERTIFICATE

This is to certify that project entitled “Crime File” done by “Somdev Arya” , roll no.

05516404509 is an authentic work carried out by her at UNIVERSITY SCHOOL OF

INFORMATION TECHNOLOGY under my guidance. The matter embodied in this project has

not been submitted earlier for award of any degree or diploma to the best of my knowledge and

belief.

Signature of the Guide

Ms. Anuradha Chug

USIT, GGSIPU

5

Page 6: Crime file

SELF CERTIFICATE

This is to certify that project entitled Crime File is done by me is an authentic work carried out

for the partial fulfillment of the requirements for the award of the degree of Master of

Computer Application under the guidance of “Ms. Anuradha Chug ”. The matter embodied

in this project work has not been submitted earlier for award of any degree or diploma to

the best of my knowledge and belief.

Signature of the Student

6

Page 7: Crime file

Introduction of Crime file

The project is aimed to develop a crime file for maintain a computerized records of all the fir against crime .The system is desktop application that can be access throughout the police department.

This system can be used as an application for the crime file of the police department to manage the records of different activity of related to first information report .In such desktop Crime file system we will manage all such activities (like registration of the complaint updating information, search of perticularviewing of the respective reports of crimes) that will save time, manpower.

This system will provide better prospective for the enhancement of organization regarding to quality and transparency.

7

Page 8: Crime file

Objectives of Crime File

The objectives of this system can broadly be listed as follows:

1. Make the Police functioning citizen friendly and more transparent by automating the functioning of Police Departments.2. Improve delivery of citizen-centric services through effective usage of ICT.3. Provide the Investigating Officers of the Civil Police with tools, technology and information to facilitate investigation of crime and detection of criminals.4. Improve Police functioning in various other areas such as Law and Order, Traffic Management etc.5. Facilitate Interaction and sharing of Information among Police Departments, Districts, State/UT headquarters and other Police Agencies.6. Assist senior Police Officers in better management of Police Force7. Keep track of the progress of Cases, including in Courts8. Reduce manual and redundant Records keeping

8

Page 9: Crime file

TOOLS, PLATFORM & LANGUAGE TO BE USED TOOLS:

FRONT-END : Microsoft Visual Basic

BACK-END : Microsoft Access

PLATFORM:

WINDOW 7

HARDWARE AND SOFTWARE ENVIRONMENT

HARDWARE ENVIRONMENT:

PROCESSOR : Core 2duo

RAM : 3GB

STORAGE CAPACITY : 320 GB

DRIVERS : 52X24X

18X CD/DVD writer

SOFTWARE ENVIRONMENT:

OPERATING SYSTEM : WINDOW 7

RDBMS : Microsoft Access

9

Page 10: Crime file

Technology Overview of my Project

Microsoft Access 2007

Microsoft Access is a relational database management system (RDBMS) that is packaged

with the Microsoft suite of office products to run under the Microsoft Windows operating

system. Microsoft Access is a Visual Basic (VB) based application that allows Structured Query

Language (SQL) statements to be included in associated macros and VB scripts. Microsoft

Access includes a Jet database engine, combined with a graphical interface, to provide ease of

use in building front-end database applications. Microsoft Access is a structured environment,

used by novice programmers, with little or no experience, to handle relatively small database

functions. It is also a useful tool, for advanced developers, to provide rapid application

development.

Though MS Access has been successfully front-ended against databases, including itself,

Microsoft Access does not scale well for large databases or multiple-access, network

environments. The underlying Jet Database is a file-sharing database that performs all processing

at the client level. As such, Microsoft Access is not designed for high volume multi-user

environments that allow multiple clients to read, write and perform other operations on shared

files at the same time.

10

Page 11: Crime file

Visual Basic 6.0

Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE)

from Microsoft for its COM programming model. Because of its graphical development features and BASIC heritage, VB is

considered to be relatively easy to learn and use.[1]

Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface

(GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation

of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but

perform differently.

A programmer can put together an application using the components provided with Visual Basic itself. Programs written in

Visual Basic can also use the Windows API, but doing so requires external function declarations.

Like the BASIC programming language, Visual Basic was designed to be easily learned and used by beginner

programmers. The language not only allows programmers to create simple GUI applications, but can also develop

complex applications. Programming in VB is a combination of visually arranging components or controls on a form,

specifying attributes and actions of those components, and writing additional lines of code for more functionality.

Since default attributes and actions are defined for the components, a simple program can be created without the

programmer having to write many lines of code. Performance problems were experienced by earlier versions, but

with faster computers and native code compilation this has become less of an issue.

Although programs can be compiled into native code executables from version 5 onwards, they still require the

presence of runtime libraries of approximately 1 MB in size. This runtime is included by default in Windows

2000 and later, but for earlier versions of Windows like 95/98/NT it must be distributed together with the

executable.

Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g., text boxes, buttons, etc.) on

the form (window). Controls have attributes and event handlers associated with them. Default values are provided

when the control is created, but may be changed by the programmer. Many attribute values can be modified during

run time based on user actions or changes in the environment, providing a dynamic application. For example, code

can be inserted into the form resize event handler to reposition a control so that it remains centered on the form,

11

Page 12: Crime file

expands to fill up the form, etc. By inserting code into the event handler for a keypress in a text box, the program

can automatically translate the case of the text being entered, or even prevent certain characters from being inserted.

Visual Basic can create executables (EXE files), ActiveX controls, or DLL files, but is primarily used to develop

Windows applications and to interface database systems. Dialog boxes with less functionality can be used to provide

pop-up capabilities. Controls provide the basic functionality of the application, while programmers can insert

additional logic within the appropriate event handlers. For example, a drop-down combination box will

automatically display its list and allow the user to select any element. An event handler is called when an item is

selected, which can then execute additional code created by the programmer to perform some action based on which

element was selected, such as populating a related list.

Alternatively, a Visual Basic component can have no user interface, and instead provide ActiveX objects to other

programs via Component Object Model (COM). This allows for server-side processing or an add-in module.

The language is garbage collected using reference counting, has a large library of utility objects, and has basic object

oriented support. Since the more common components are included in the default project template, the programmer

seldom needs to specify additional libraries. Unlike many other programming languages, Visual Basic is generally

not case sensitive, although it will transform keywords into a standard case configuration and force the case of

variable names to conform to the case of the entry within the symbol table. String comparisons are case sensitive by

default, but can be made case insensitive if so desired.

The Visual Basic compiler is shared with other Visual Studio languages (C, C++), but restrictions in the IDE do not

allow the creation of some targets (Windows model DLLs) and threading models.

Characteristics

Visual Basic has the following traits which differ from C-derived languages:

Multiple assignment available in C language is not possible. A = B = C does not imply that the values of A,

B and C are equal. The Boolean result of "Is B = C?" is stored in A. The result stored in A would therefore be

either false or true.

Boolean constant True has numeric value −1. This is because the Boolean data type is stored as a 16-bit

signed integer. In this construct −1 evaluates to 16 binary 1s (the Boolean value True), and 0 as 16 0s (the

Boolean value False). This is apparent when performing a Not operation on a 16 bit signed integer value 0

which will return the integer value −1, in other words True = Not False. This inherent functionality becomes

especially useful when performing logical operations on the individual bits of an integer such

as And, Or, Xor and Not.[4] This definition of True is also consistent with BASIC since the early 1970s

Microsoft BASIC implementation and is also related to the characteristics of CPU instructions at the time.

12

Page 13: Crime file

Logical and bitwise operators are unified. This is unlike some C-derived languages (such as Perl), which

have separate logical and bitwise operators. This again is a traditional feature of BASIC.

Variable array base. Arrays are declared by specifying the upper and lower bounds in a way similar

to Pascal and Fortran. It is also possible to use the Option Base statement to set the default lower bound. Use of

the Option Base statement can lead to confusion when reading Visual Basic code and is best avoided by always

explicitly specifying the lower bound of the array. This lower bound is not limited to 0 or 1, because it can also

be set by declaration. In this way, both the lower and upper bounds are programmable. In more subscript-

limited languages, the lower bound of the array is not variable. This uncommon trait does exist in Visual

Basic .NET but not in VBScript.

OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in the late

1970s.

Relatively strong integration with the Windows operating system and the Component Object

Model. The native types for strings and arrays are the dedicated COM types, BSTR and SAFEARRAY.

Banker's rounding as the default behavior when converting real numbers to integers with

the Round function.[5] ? Round(2.5, 0) gives 2, ? Round(3.5, 0) gives 4.

Integers are automatically promoted to reals in expressions involving the normal division operator

(/) so that division of one integer by another produces the intuitively correct result. There is a specific

integer divide operator (\) which does truncate.

By default, if a variable has not been declared or if no type declaration character is specified, the

variable is of type Variant. However this can be changed with Data type statements such

asDefInt, DefBool, DefVar, DefObj, DefStr. There are 12 Data type statements in total offered by Visual

Basic 6.0. The default type may be overridden for a specific declaration by using a special suffix character

on the variable name (# for Double, ! for Single, & for Long, % for Integer, $ for String, and @ for

Currency) or using the key phrase As (type). VB can also be set in a mode that only explicitly declared

variables can be used with the command Option Explicit.

13

Page 14: Crime file

SOFTWARE REQUIREMENTS SPECIFICATION

1. Introduction

1.1 Purpose :

Crime File System is a system used to report crimes. This project is mainly useful for police

Departments. This system will help to manage all the activities in a police Department using

computers. Currently all the works are done manually, by computerizing all the activities inside a

police Department can be managed easily and effectively.

The police Departments in the country are, today, virtually unconnected islands. Thanks to

telephones and wireless, and especially thanks to mobile telephones, there is voice connectivity

between the police Department and senior police officers, but that is about all. There is no

system of data storage, data sharing and accessing data. There is no system under which one

police Department can talk to another directly. There is no record of crimes or criminals that can

be accessed by a Department House Officer, except the manual records relating to that police

Department. The goals of the system are to facilitate collection, storage, retrieval, analysis,

14

Page 15: Crime file

transfer and sharing of data and information at the police Department and between the police

Department and the State Headquarters and the Central Police Organizations.

1.2 Scope:

1. The system ‘CRIME FILE’ will be a Reporting application that will be used for automating the manual process of register different case in police Department .This system will manage the details of all the crime who register themselves in police Department. The system provides an interface to store the crime details of criminals or prisoners and allows the user to search and view records. The system should have a

login. System should support for Data Entry module for Nominal Roll, Case register for each prisoner entering in the prison

The system will greatly simplify the overall procedure of crime files.

1.3 Objectives:

The proposed system includes the following features:

• Login for user and admin

• Complaint registration

• View complaint status

• Criminal register management

• FIR Management

15

Page 16: Crime file

• Case History Details management

• Managing Postmortem details

• Prisoners register management

• Manage list about most wanted criminals

1.4 Abbreviations:

1.5 References:

• IEEE SRS Format.

1.6 Technologies

• Development Tool: Visual studio 06

• Database: Microsoft ACCESS

2. Overall Description

At its core, the system should offer the following basic functionalities:

.

1. The system requests that the administrator to enter his/her name, password.

2. The administrator enters his/her name, password.

3. The system validates the entered name, password, logs the actor into the system.

4. The administrator maintains the record of information of varios fir,crimes and related

objects.

16

Page 17: Crime file

If in the basic flow, the actor enters an invalid name, password , the system displays an

error message. The actor can return to the beginning of the basic flow

2.1 Product perspective:

CRIME FILE is a system which aims at making the store records of crimes easier. This system

provides an easy way to admin to keep track of record of all the crimes and saves him loads of

manual work. This system makes updation of records easier by both user and admin and provides

updated information about the current crimes status in happening.

2.1.1 SYSTEM INTERFACESNone

2.1.1 System interface:

2.1.2 USER INTERFACES

• There will be a screen to display varios information related to FIR.

• A login screen for entering username, password will be provided.

Front End Client Application (with data entry/ update/ cancel/ view and reporting facility)

Backend Database

17

Page 18: Crime file

• There will be a screen for taking and modifying the information of the related to FIR.

• Windows based

• Friendly Navigation

2.1.3 HARDWARE INTERFACE:

• Keyboard

• Mouse

• Screen resolution of at least 1024x768- required for proper and complete viewing of

screens.

2.1.4 SOFTWARE INTERFACES

• Any Windows based operating system (Microsoft Windows XP or higher).

• MS Access as the DBMS-for database.

2.1.5 COMMUNICATION INTERFACES

• None

2.1.6 MEMORY CONSTRAINTS

• At least 64 MB RAM and 2 GB space on hard disk will be required for running the

application

18

Page 19: Crime file

2.1.7 OPERATIONS

• Viewing

• Addition( by administrator only)

• Updation( by administrator only)

• Deletion ( by administrator only

2.1.8 SITE ADAPTATION REQUIREMENTS

• The terminals at client site will have to support the hardware and software interfaces

specified in above sections.

2.2 Product Function:

• Accepting crimes information correctly.

• Storing the correct records in the database.

• Displaying correct information on selecting view option.

• Displaying current status of fir of the all crimes.

• Accepting the updated information from user and administrator.

• Storing the updated record in database to make it consistent.

• Deletion privilege to administrator only .

2.3 User Characteristics:

Operator should be computer literate.

2.4 General Constraints:

• Any Windows Operating system.

• Interface is in English.

19

Page 20: Crime file

Site Adaption Requirements

Terminals at the client side site will have to support the hardware and software interfaces

specified in above sections.

2.5 Assumptions :

• User is a related of certain branch of police Department

• fir information is correct.

• user can fill the registration form.

3. Specific Requirements

Functional Requirement no 1:

• Introduction : Register for the Criminal or prisoner

• Input : criminals personal details viz – Criminal No., Criminal Name, Age, Occupation,

CrimeType,address, MostWanted.

• Prisoner details : PrisonerNo., Charge Sheet No., NickName, CrimeType, FamilyMem

Identity Mark, Height, Weight, Color

• Processing : validation checks are performed on the input data by the user/administrator like :

mandatory fields should not be kept blank

prisoner family member should be check

All the entries in database should be correct

20

Page 21: Crime file

Functional Requirement no 2:

• Introduction : FIR

• Input : Fir no, COMPLAINT NO., Fir Date, Fir Time , Information Type, Place of crime, Act for

crime, District of FIR, Address of victim, Passport No, Name of Police, Received Time,

Information Received

• Processing : After inputting data validation checks on various fields is performed . on submission

of the information the record is searched in the stored database o basis of the information

submitted.

• Output : If the information submitted by the user is valid and found in the database then the

corresponding record is displayed .

Functional Requirement No 3:

• Introduction : add or Updation of user or administrator

• Input : Username,password

• Processing : After entering the required information the various validation checks are

performed on submission of the information the updations are made to the database.

administrator must enter the correct user name and password

• Output : The updated information is reflected in the stored database

Functional Requirement 4

• Introduction : Viewing

• Input : none.

21

Page 22: Crime file

• Processing : on clicking the view button the system search for the specified database stored.

• Output : if the specified database is stored then the whole database is display in the tabular form.

The data displayed is the updated and current information of the user personal and academic

details . It also displays the status of the prisoner and criminals.

4. Performance requirements

5. Design Constraints

• Standard compliance such as IEEE for the development of SRS report.

• Software Engineering by K.K. Aggarwal and Yogesh Singh.

6. Attributes

6.1 Reliability and Recovery:

It is imperative that database should be always up when put into the product. During period of intense

activities like submission and verification and updation of data, back up should be taken. It will help to

minimize downtime in case of failure. Any abnormal operations shall result in the shutting down of the

system.

6.2 Security:

The database should be protected physically by having server located in an enclosed and guarded facility.

Virus scanning software should be installed to protect from viruses. The server should be installed under

firewall so that server only internal users can access it. The system shall be compatible with AIMS

security standards. There should be terms and conditions and a check on the content added by the users.

Duplicate record must be discarded by the administrator.

6.3 Maintenance:

New additional features can be added if required and also the system components i.e. memory, disk,

drives shall be easily serviceable without much alteration in the code.

22

Page 23: Crime file

Work Flow of Crime File

23

Page 24: Crime file

DATA FLOW DIAGRAM

The data flow diagram enables the software engineer to develop models of the information

domain and functional domain at the same time. As the DFD is defined into greater level of

details, the analyst performs as implicit functional decomposition of the system, thereby

accomplishing the fourth operational analysis principle for functions. At the same time, the DFD

refinement results in a corresponding refinement of data as it moves through the processes that

embody the application

LEVEL 0 DFD

24

Page 25: Crime file

Context Level DFD for Crime File

LEVEL 1 DFD

25

Page 26: Crime file

LEVEL 2 DFD

26

Page 27: Crime file

LEVEL 3 DFD

27

Page 28: Crime file

LEVEL 4 DFD

28

Page 29: Crime file

Entity-Relationship Diagram

29

Page 30: Crime file

30

Page 31: Crime file

Administrator

User

Login/Logoff

L

Add/delete user

A

Add complaint status

A

Search criminal/prisoner

S

Registration criminal/Prionser/Postmortem/

Mostwanted

M

Login/logoff

L

Search Criminal/Prisoners

S

View Complaint Status

V

View Reports FIR/postmortem/mostwanted

View Registration for FIR/ChargeSheet

Case History

C

Registration criminal/Prisoner/Postmortem/

Exit

Use Case Diagram

31

Page 32: Crime file

Use cases

1. Login

1.1 Brief description

This use case allows the actor to login in system .

1.2 Actors

There is only one actor (user ,administrator) which interacts and participates with this use

case.

1.3 Flow of events

1.3.1 Basic flow

This use case starts when the actor wishes to Login himself for the use os system.

• The system requests that the user must enter his all valid username and password.

• Once the user provides the requested information, one of the sub-flows is executed.

• If the user selected “submit ”, the Login information sub flow is executed.

1.3.1.1 Submit crimefile information • The system requests the user to enter the information which includes:

Personal Information

a) User Name

32

Page 33: Crime file

b) password

• Once the user provides the requested information, system first validates the

information provided.

• If the information is valid then the particular information about the user is

recorded in the database

1.3.2 Alternative flow

1.3.2.1 Invalid information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly.

1.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

1.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

1.4 Special Requirements

None

1.5 Pre-Condition

The user must be computer operator in police Department .

1.6 Post-Condition

If the use case was successful, the user information is login in the system. Otherwise , the

system state is unchanged.

1.7 Extension points

33

Page 34: Crime file

None

Registration process for criminals

2.1 Brief description

This use case allows the actor to register criminal in database.

2.2 Actors

There is only two actor (user, administrator) which interacts and participates with this use

case.

2.3 Flow of events

2.3.1 Basic flow

This use case starts when the actor wishes to Register criminals for the record in database..

• The system requests that the user must enter all valid personal and academic information

of criminals.

• Once the user provides the requested information, the following sub-flow is executed.

• If the user selected “submit ”, the submit information sub flow is executed.

2.3.1.1 Submit crimefile information 1. The system requests the use to enter the Registration information

which includes:

• CriminalNo

• CrimName

• NickName

34

Page 35: Crime file

• Age

• Occupation

• CrimeType

• Address

• MostWanted

2. Once the user provides the requested information, system first validates the

information provided.

3. If the information is valid then the particular information about the criminal is

recorded in the database.

2.3.2 Alternative flow

2.3.2.1 Invalid information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly.

2.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

2.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

2.4 Special Requirements

None

2.5 Pre-Condition

The user must be computer operator in police Department .

35

Page 36: Crime file

2.6 Post-Condition

If the use case was successful, the criminal information is added in the crimefile database.

Otherwise , the system state is unchanged.

2.7 Extension points

None

3. Registration process for prisoner

3.1 Brief description

This use case allows the actor to register prisoner in database .

3.2 Actors

There are two actor (user, administrator) which interacts and participates with this use

case.

3.3 Flow of events

3.3.1 Basic flow

This use case starts when the actor Register prisoners of the prison.

• Once the user provides the requested information, one of the sub-flows is executed.

• If the user selected “submit ”, the submit crimefile information sub flow is executed.

3.3.1.1 Submit crimefile information • The system requests the user to enter the Registration information which

includes:

• PrisonerNo

• ChargeSheetNo

• NickName

36

Page 37: Crime file

• CrimeType

• FamilyMem

• IdentMark

• Height

• Weight

• Color

• Once the user provides the requested information, system first validates the

information provided.

• If the information is valid then the particular information about the prisoner is

recorded in the database

3.3.2 Alternative flow

3.3.2.1 Invalid information

none.

3.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

3.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

3.4 Special Requirements

None

3.5 Pre-Condition

The user must be computer operator in police Department .

37

Page 38: Crime file

3.6 Post-Condition

If the use case was successful, the user information is added in the crime file database.

Otherwise , the system state is unchanged.

3.7 Extension points

None

4. Registration process for postmortem

4.1 Brief description

This use case allows the actor to register postmortem in database .

4.2 Actors

There are two actor (user, administrator) which interacts and participates with this use

case.

4.3 Flow of events

4.3.1 Basic flow

This use case starts when the actor Register postmortem.

.

• Once the user provides the requested information, one of the sub-flows is

executed.

• If the user selected “submit ”, the submit postmortem information sub flow is

executed.

4.3.1.1 Submit crimefile information • The system requests the user to enter the Registration information which

includes:

38

Page 39: Crime file

• PMortemNo

• FirNo

• Result

• Sex

• DthDate

• CaseDesc

• HouseName

• DoctName

• PoliceDepartment

• Once the user provides the requested information, system first validates the

information provided.

• If the information is valid then the particular information about the prisoner is

recorded in the database

4.3.2 Alternative flow

4.3.2.1 Invalid information

none.

4.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

4.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

4.4 Special Requirements

None

39

Page 40: Crime file

4.5 Pre-Condition

The user must be computer operator in police Department .

4.6 Post-Condition

If the use case was successful, the user information is added in the crimefile database.

Otherwise , the system state is unchanged.

4.7 Extension points

None

5. Registration process for most wanted criminal

5.1 Brief description

This use case allows the actor to register most wanted criminal in database .

5.2 Actors

There are two actor (user, administrator) which interacts and participates with this use

case.

5.3 Flow of events

5.3.1 Basic flow

This use case starts when the actor Register postmortem.

.

Once the user provides the requested information, one of the sub-flows is executed.

If the user selected “submit ”, the submit crimefile information sub flow is executed.

5.3.1.1 Submit crimefile information

40

Page 41: Crime file

• The system requests the user to enter the Registration information which

includes:

• MstID

• MstName

• MstNickName

• Age

• Sex

• Desc

• Once the user provides the requested information, system first validates the

information provided.

• If the information is valid then the particular information about the most

wanted criminal is recorded in the database

5.3.2 Alternative flow

1.3.2.1 Invalid information

none.

5.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

5.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

5.4 Special Requirements

None

5.5 Pre-Condition

41

Page 42: Crime file

The user must be computer operator in police Department .

5.6 Post-Condition

If the use case was successful, the user information is added in the crimefile database.

Otherwise , the system state is unchanged.

5.7 Extension points

6. Registration process for F.I.R.

6.1 Brief description

This use case allows the actor to register fir in database .

6.2 Actors

There are two actor (user,administrator) which interacts and participates with this use

case.

6.3 Flow of events

6.3.1 Basic flow

This use case starts when the actor Register F.I.R..

.

• Once the user provides the requested information, one of the sub-flows is executed.

• If the user selected “submit ”, the submit crimefile information sub flow is executed.

6.3.1.1 Submit crimefile information • The system requests the user to enter the Registration information which

includes:

42

Page 43: Crime file

• Firno

• ComplntNo

• FirDate

• FirTime

• InfoType

• Place

• ForLoc

• Act

• District

• Address

• PassportNo

• PoliceName

• RecvdTime

• RecvdInfo

• Once the user provides the requested information, system first validates the

information provided.

• If the information is valid then the particular information about the FIR is

recorded in the database

6.3.2 Alternative flow

6.3.2.1 Invalid information

none.

6.3.2.2 Blank information

43

Page 44: Crime file

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

6.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

6.4 Special Requirements

None

6.5 Pre-Condition

The user must be computer operator in police Department .

6.6 Post-Condition

If the use case was successful, the user information is added in the CRIME FILE

database. Otherwise , the system state is unchanged.

6.7 Extension points

None

one

7. Search for Criminal

7.1 Brief description

This use case allows the actor to search for his criminals status.

7.2 Actors

There is two actor (user, administrator) which interacts and participates with this use

case.

7.3 Flow of events

44

Page 45: Crime file

7.3.1 Basic flow

This use case starts when the actor wishes to search for the criminals. The system

requests the user to enter the required information in order to search for criminal.

1. On submitting the required information the following sub flow is executed.

7.3.1.1 Search placement information 1. The system requests the user to enter the following information for searching

which includes:

Criminal name

2. Once the user provides the requested information, system first validates the

information provided.

3. If the information is valid then the placement status of the particular user is

displayed.

7.3.2 Alternative flow

7.3.2.1 Invalid information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly.

7.3.2.2 Blank information

If the user left blank the text boxes that are mandatory to be filled by him then the

system will generate error message.

7.3.2.3 No information found

If the information entered by the user is not found in database then the system will not

display the name of the organization.

45

Page 46: Crime file

7.3.2.3 On cancel

If the user chooses the cancel then the use case ends and the basic flow begins.

7.4 Special requirements

None

7.5 Pre-condition

The user must be computer operator in police Department .

7.6 Post-condition

If the use case was successful, the criminal status of the particular user is displayed.

Otherwise, the system state is unchanged.

7.7 Extension points

None

46

Page 47: Crime file

DATABASE MODULE

For creation of database Microsoft Access a popular relational database management system is used. The database is connected visual basic which have inbuilt functions to connect to database, enter information to database and extract data.

The project database has following tables.

Login –admin login

Login –user login

Criminal registration

Prisoner registration

47

Page 48: Crime file

Postmortem

Most wanted

48

Page 49: Crime file

FIR

Charge sheet

Complaint status

49

Page 50: Crime file

Complaint registration

50

Page 51: Crime file

CODING AND SCREEN SHOTS

Start

51

Page 52: Crime file

Login form

Coding:Login formPrivate Sub cmdAdminLog_Click()Set rs = con.Execute("Select * from AdminLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuAdminAddU.Enabled = True frmMDI.mnuAdminDelU.Enabled = True frmMDI.mnuActiv.Enabled = True frmMDI.mnuLogin.Enabled = False frmMDI.mnuAdminAddComSt.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True frmMDI.mnusearch.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.CloseUnload MeEnd Sub

Private Sub cmdCancel_Click()Unload Me

52

Page 53: Crime file

End Sub

Private Sub cmdUserLog_Click()Set rs = con.Execute("Select * from UserLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuLogin.Enabled = False frmMDI.mnuActiv.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True frmMDI.mnusearch.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.Close

End Sub

Private Sub Form_Load()connectdbEnd Sub

Private Sub Form_Unload(Cancel As Integer)con.CloseEnd Sub

53

Page 54: Crime file

Main form

Coding: Main formPrivate Sub MDIForm_Load()mnuLogoff.Enabled = FalsemnuAdminAddU.Enabled = FalsemnuAdminDelU.Enabled = FalsemnuActiv.Enabled = FalsemnuAdminAddComSt.Enabled = FalsemnuActivReg.Enabled = FalsemnuActivComp.Enabled = FalsemnuActivRpt.Enabled = Falsemnusearch.Enabled = False

54

Page 55: Crime file

DataEnvironment1.Connection1.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path & "\crimefile.mdb;Persist Security Info=False"End SubPrivate Sub mnuActivChrgSht_Click()Load frmChargeSheetfrmChargeSheet.ShowEnd SubPrivate Sub mnuActivCompReg_Click()Load frmCompltRegfrmCompltReg.ShowEnd SubPrivate Sub mnuActivCompStat_Click()Load frmCompStatusfrmCompStatus.ShowEnd SubPrivate Sub mnuActivCsHist_Click()Load frmHistSheetfrmHistSheet.ShowEnd SubPrivate Sub mnuActivFir_Click()Load frmFIRfrmFIR.ShowEnd SubPrivate Sub mnuActivRegCrim_Click()Load frmCriminalRegisterfrmCriminalRegister.ShowEnd SubPrivate Sub mnuActivRegPost_Click()Load frmPostmortemfrmPostmortem.ShowEnd SubPrivate Sub mnuActivRegPris_Click()Load frmPrisonerRegfrmPrisonerReg.ShowEnd SubPrivate Sub mnuActivRptCrim_Click()Load DataReportCrimeRptDataReportCrimeRpt.ShowEnd SubPrivate Sub mnuActivRptMst_Click()Load DataReportMostWantedDataReportMostWanted.ShowEnd SubPrivate Sub mnuActRegMst_Click()Load frmMostWantedfrmMostWanted.Show

55

Page 56: Crime file

End SubPrivate Sub mnuAdminAddComSt_Click()Load frmAddCompltStatusfrmAddCompltStatus.ShowEnd SubPrivate Sub mnuAdminAddU_Click()Load frmAddUserfrmAddUser.ShowEnd SubPrivate Sub mnuAdminDelU_Click()Load frmDeleteUserfrmDeleteUser.ShowEnd SubPrivate Sub mnucriminal_Click()Load searchCriminalsearchCriminal.ShowEnd SubPrivate Sub mnuexit_Click()Unload MeEnd SubPrivate Sub mnuLogin_Click()Load frmLoginfrmLogin.ShowEnd SubPrivate Sub mnuLogoff_Click()mnuLogoff.Enabled = FalsemnuAdminAddU.Enabled = FalsemnuAdminDelU.Enabled = FalsemnuActiv.Enabled = FalsemnuLogin.Enabled = TruemnuAdminAddComSt.Enabled = FalsemnuActivReg.Enabled = FalsemnuActivComp.Enabled = FalsemnuActivRpt.Enabled = Falsemnusearch.Enabled = FalseEnd SubPrivate Sub mnuprisioner_Click()Load SearchPrisonerSearchPrisoner.ShowEnd SubPrivate Sub mnuRptFIR_Click()Load frmFIRrptfrmFIRrpt.ShowEnd SubPrivate Sub mnuRptMortem_Click()Load frmPMortemRpt

56

Page 57: Crime file

frmPMortemRpt.ShowEnd Sub

Add New user

Coding: Add New userPrivate Sub Form_Load()connectdbEnd SubPrivate Sub cmdAdd_Click()Set rs = con.Execute("select * from UserLogin where Username='" + txtUsername.Text + "' and Password='" + txtPassword.Text + "'")If (Not rs.EOF) Then MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusElse

57

Page 58: Crime file

con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" + txtPassword.Text + "')") MsgBox "User added sucessfully", vbInformation, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusEnd IfEnd Sub

Private Sub cmdCancel_Click()Unload MeEnd Sub

Delete user

Coding: Delete userPrivate Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdDelete_Click()con.Execute ("delete from UserLogin where Username='" + cmbUsername.Text + "'")MsgBox "User deleted sucessfully!!", vbInformation, "CFS"cmbUsername.Text = ""End Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select * from UserLogin")

58

Page 59: Crime file

While (Not rs.EOF) cmbUsername.AddItem rs(0) rs.MoveNextWendEnd Sub

Add complaint status

Coding: Add complaint statusPrivate Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdViewStat_Click()Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text + "")If (Not rs.EOF) Then

59

Page 60: Crime file

txtDetails.Text = rs(1)End If

End Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select distinct(ComplntNo) from ComplntStatus")While (Not rs.EOF) cmbComplntNo.AddItem rs(0) rs.MoveNextWendrs.CloseEnd Sub

Criminal registration

Coding: Criminal registration

Private Sub cmdCancel_Click()Unload Me

60

Page 61: Crime file

End Sub

Private Sub cmdSave_Click()If (optyes.Value = True) Then x = "Yes"Else x = "No"End IfIf (txtAddress.Text = "" Or txtAge.Text = "" Or txtCrimeType.Text = "" Or txtName.Text = "" Or txtNickName.Text = "" Or txtOccupation.Text = "") Then MsgBox "Missing Fields!!,Please fill up all", vbInformation, "Crime File System"ElseIf (Not IsNumeric(txtAge.Text)) Then MsgBox "Age should be numeric"Else con.Execute ("insert into CriminalReg values(" + txtCriminalNo.Text + _ ",'" + txtName.Text + "','" + txtNickName.Text + "'," + txtAge.Text + _ ",'" + txtOccupation.Text + "','" + txtCrimeType.Text + "','" + txtAddress.Text + _ "','" + x + "')") MsgBox "Record Added successfully", vbInformation, "Crime File System" txtCriminalNo.Text = txtCriminalNo.Text + 1 txtAddress.Text = "" txtAge.Text = "" txtCrimeType.Text = "" txtName.Text = "" txtNickName.Text = "" txtOccupation.Text = "" txtName.SetFocusEnd IfEnd Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select max(CriminalNo) from CriminalReg")If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtCriminalNo.Text = cntEnd IfEnd Sub

61

Page 62: Crime file

Prisoner registration

Coding: Prisoner registration

Private Sub Command1_Click()If (txtChgrNo.Text = "" Or txtColor.Text = "" Or txtCrmType.Text = "" Or txtFamMem.Text = "" Or txtHt.Text = "" Or txtIdenMark.Text = "" Or txtNikName.Text = "" Or txtPrisNo.Text = "" Or txtWt.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File System"Else

62

Page 63: Crime file

If ((Not IsNumeric(txtChgrNo.Text)) Or (Not IsNumeric(txtHt.Text)) Or (Not IsNumeric(txtWt.Text))) Then MsgBox "Some of the values entered are not matching, Please check numbers are entered correctly", vbCritical, "Crime File System" Else Set rs = con.Execute("select * from PrisonersReg where ChargeSheetNo=" + txtChgrNo.Text + "") If (Not rs.EOF) Then MsgBox "Charge Sheet Number Already Exist, Please try another number", vbCritical, "Crime File System" txtChgrNo.Text = "" txtChgrNo.SetFocus Else con.Execute ("insert into PrisonersReg values(" + txtPrisNo.Text + "," + txtChgrNo.Text + ",'" + txtNikName.Text + _ "','" + txtCrmType.Text + "','" + txtFamMem.Text + "','" + txtIdenMark.Text + "'," + txtHt.Text + _ "," + txtWt.Text + ",'" + txtColor.Text + "')") con.Execute ("insert into prisonersTemp values(" + txtPrisNo.Text + ",'No')") MsgBox "Record Added Sucessfully", vbInformation, "CFS" txtPrisNo.Text = txtPrisNo.Text + 1 txtChgrNo.Text = "" txtColor.Text = "" txtCrmType.Text = "" txtFamMem.Text = "" txtHt.Text = "" txtIdenMark.Text = "" txtNikName.Text = "" txtWt.Text = "" txtChgrNo.SetFocus End If End IfEnd IfEnd Sub

Private Sub Command2_Click()Unload MeEnd Sub

63

Page 64: Crime file

Post mortem

Coding: Post mortem

Private Sub cmdSave_Click()If (txtDate.Text = "" Or txtDesc.Text = "" Or txtDoctName.Text = "" Or cmbFirrNo.Text = "" Or txtHouseName.Text = "" Or txtPoliceSt.Text = "" Or txtPostNo.Text = "" Or txtRslt.Text = "") Then MsgBox "Missing Fields!! Please Fill Up all", vbInformation, "Crime File System"

64

Page 65: Crime file

Else Set rs = con.Execute("select * from Postmortem where FirNo=" + cmbFirrNo.Text + "") If (Not rs.EOF) Then MsgBox "Duplication is not allowded, Please try another FIR number", vbCritical, "Crime File System" cmbFirrNo.SetFocus Else con.Execute ("insert into postmortem values(" + txtPostNo.Text + "," + cmbFirrNo.Text + ",'" + txtRslt.Text + _ "','" + cmbSex.Text + "','" + txtDate.Text + "','" + txtDesc.Text + _ "','" + txtHouseName.Text + "','" + txtDoctName.Text + "','" + txtPoliceSt.Text + "')") MsgBox "Record Added Sucessfully", vbInformation, "Crime File System" txtPostNo.Text = txtPostNo + 1 txtDate.Text = "" txtDesc.Text = "" txtDoctName.Text = "" txtHouseName.Text = "" txtPoliceSt.Text = "" txtRslt.Text = "" End IfEnd IfEnd Sub

Private Sub Form_Load()connectdbcmbSex.Text = "Male"Set rs = con.Execute("select max(PMortemNo) from Postmortem")If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtPostNo.Text = cntEnd Ifrs.CloseSet rs = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbFirrNo.AddItem rs(0) rs.MoveNextWendrs.CloseEnd Sub

65

Page 66: Crime file

POST MORTEM REPORT:

CODING:

Dim x As IntegerPrivate Sub cmdShRpt_Click() x = cmbMno.Text If (DataEnvironment1.rsCommand3.State = 1) Then

66

Page 67: Crime file

DataEnvironment1.rsCommand3.Close Else DataEnvironment1.Command3 (x) Load DataReportmortem DataReportmortem.Show End If End SubPrivate Sub Command1_Click()Unload MeEnd SubPrivate Sub Form_Load()connectdbSet rs = con.Execute("select PMortemNo from Postmortem")While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNextWendEnd Sub

67

Page 68: Crime file

Most wanted

Coding: Mostwanted

Dim x As IntegerPrivate Sub cmdCancel_Click()Unload MeEnd SubPrivate Sub cmdSave_Click()If (txtAge.Text = "" Or txtDesc.Text = "" Or txtName.Text = "" Or txtNickName.Text = "") Then MsgBox "Missing fields!!, Please fill up all", vbInformation, "Crime File System"Else

68

Page 69: Crime file

Set rs = con.Execute("select count(*) from MostWanted") If (Not rs.EOF) Then x = rs(0) If (x = 0) Then x = 1 Else x = x + 1 End If txthd.Text = x End If If (Not IsNumeric(txtAge.Text)) Then MsgBox "Age should be number", vbInformation, "Crime File Syatem" txtAge.Text = "" txtAge.SetFocus Else con.Execute ("insert into MostWanted values(" + txthd.Text + ",'" + txtName.Text + _ "','" + txtNickName.Text + "'," + txtAge.Text + ",'" + cmbSex.Text + "','" + txtDesc.Text + "')") MsgBox "Record Added Successfully", vbInformation, "Crime File system" txtName.Text = "" txtAge.Text = "" txtDesc.Text = "" txtNickName.Text = "" txtName.SetFocus End IfEnd IfEnd SubPrivate Sub Form_Load()connectdbEnd Sub

69

Page 70: Crime file

MOST WANTED REPORT

70

Page 71: Crime file

FIR

Coding: FIR

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdSave_Click()If (txtDate.Text = "" Or txtDistrict.Text = "" Or txtFirNo.Text = "" Or txtInfoAdd.Text = "" Or txtInfoRcd.Text = "" Or _

71

Page 72: Crime file

txtPassNo.Text = "" Or txtPlaceOcc.Text = "" Or txtPolice.Text = "" Or txtRcdTime.Text = "" Or txtTime.Text = "" Or _txtTypInfo.Text = "" Or cmbComplantno.Text = "") Then MsgBox "Missing Fields!!", vbInformation, "Crime File System" Else Set rs = con.Execute("select * from FIR where FirNo=" + txtFirNo.Text + " or ComplntNo=" + cmbComplantno.Text + "") If (Not rs.EOF) Then MsgBox "Sorry!! FIR Or Complaint Number already exists. Try another number", vbCritical, "CFS" txtFirNo.Text = "" txtFirNo.SetFocus Else Dim t1, t2, t3 As String t1 = txtTime.Text + cmbT1.Text 't2 = txtTime2.Text + cmbT2.Text t3 = txtRcdTime.Text + cmbT3.Text If ((Not IsNumeric(txtPassNo.Text)) Or (Not IsNumeric(txtFirNo.Text))) Then MsgBox "Please check the number fields", vbInformation, "Crime File System" 'txtPassNo.Text = "" 'txtPassNo.SetFocus Else con.Execute ("insert into FIR values(" + txtFirNo.Text + "," + cmbComplantno.Text + _ ",'" + txtDate.Text + "','" + t1 + "','" + txtTypInfo.Text + _ "','" + txtPlaceOcc.Text + "','" + cmbForLoc.Text + "','" + cmbAct.Text + _ "','" + txtDistrict.Text + "','" + txtInfoAdd.Text + "'," + txtPassNo.Text + ",'" + txtPolice.Text + _ "','" + t3 + "','" + txtInfoRcd.Text + "')") con.Execute ("UPDATE ComplntTemp set Status='Yes' where ComplntNo=" + cmbComplantno.Text + "") MsgBox "Record Added", vbInformation, "Crime File system" txtDate.Text = "" txtDistrict.Text = "" txtFirNo.Text = "" txtInfoAdd.Text = "" txtInfoRcd.Text = "" txtPassNo.Text = "" txtPlaceOcc.Text = "" txtPolice.Text = "" txtRcdTime.Text = "" txtTime.Text = "" txtTypInfo.Text = "" txtFirNo.SetFocus End If End If End If

72

Page 73: Crime file

End SubPrivate Sub Form_Load()cmbT1.Text = "AM"cmbT3.Text = "AM"cmbAct.Text = "Murder"cmbForLoc.Text = "Foreign"connectdbSet rs = con.Execute("Select ComplntNo from ComplntTemp where Status='No'")While (Not rs.EOF) cmbComplantno.AddItem rs(0) rs.MoveNextWendEnd Sub

73

Page 74: Crime file

FIR REPORT

CODING:

Dim x As IntegerPrivate Sub cmdShRpt_Click()x = cmbMno.Text If (DataEnvironment1.rsCommand4.State = 1) Then DataEnvironment1.rsCommand4.Close

74

Page 75: Crime file

Else DataEnvironment1.Command4 (x) Load DataReportFIR DataReportFIR.Show End IfEnd SubPrivate Sub Command1_Click()Unload MeEnd SubPrivate Sub Form_Load()connectdbSet rs = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNextWendEnd Sub

Charge sheet

75

Page 76: Crime file

Coding:chargeSheetDim cnt As IntegerDim x As Control

Private Sub cmdBack_Click()Frame4.Visible = FalseFrame3.Visible = TrueEnd Sub

Private Sub cmdBack2_Click()Frame2.Visible = FalseFrame1.Visible = TrueEnd Sub

Private Sub cmdBack3_Click()Frame3.Visible = FalseFrame2.Visible = True

76

Page 77: Crime file

End Sub

Private Sub cmdFinish_Click()If (txtWitnAdd.Text = "" Or txtWitnName.Text = "" Or txtWitnOcc.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Set rs = con.Execute("select * from ChargeSheet where FirNo=" + cmbFirNo.Text + "") If (Not rs.EOF) Then MsgBox "Dupplication is not allowed, Please try another fir number", vbCritical, "Crime File system" Frame4.Visible = False Frame1.Visible = True cmbFirNo.SetFocus Else con.Execute ("insert into ChargeSheet values(" + txtChrgNo.Text + ",'" + txtPstatName.Text + "','" + txtDate.Text + _ "'," + cmbFirNo.Text + ",'" + txtDist.Text + "','" + txtInfoName.Text + _ "','" + txtInfoAdd.Text + "','" + txtInfoOcc.Text + "','" + txtInfoPart.Text + _ "','" + txtAccuName.Text + "','" + txtAccuAdd.Text + "','" + cmbAccuSex.Text + _ "'," + txtAccuAge.Text + ",'" + txtAccuOcc.Text + "','" + cmbAccuStat.Text + _ "','" + txtAccuAct.Text + "','" + txtWitnName.Text + "','" + txtWitnAdd.Text + _ "','" + txtWitnOcc.Text + "')") MsgBox "Record Added Successfully!!", vbInformation, "Crime File system" Frame4.Visible = False Frame1.Visible = True txtChrgNo.Text = txtChrgNo.Text + 1 ' For Each x In Me.Controls ' If (x = TextBox) Then ' x.Text = "" ' End If 'Next End IfEnd IfEnd Sub

Private Sub cmdNext1_Click()If (txtChrgNo.Text = "" Or txtPstatName.Text = "" Or txtDate.Text = "" Or cmbFirNo.Text = "" Or txtDist.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame1.Visible = False Frame2.Visible = TrueEnd IfEnd Sub

Private Sub cmdNext2_Click()

77

Page 78: Crime file

If (txtInfoAdd.Text = "" Or txtInfoName.Text = "" Or txtInfoOcc.Text = "" Or txtInfoPart.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame2.Visible = False Frame3.Visible = TrueEnd IfEnd Sub

Private Sub cmdNext3_Click()If (txtAccuAct.Text = "" Or txtAccuAdd.Text = "" Or txtAccuAge.Text = "" Or txtAccuName.Text = "" Or txtAccuOcc.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"Else Frame3.Visible = False Frame4.Visible = TrueEnd IfEnd SubPrivate Sub Form_Load()Frame1.Visible = TrueFrame2.Visible = FalseFrame3.Visible = FalseFrame4.Visible = FalseconnectdbSet rs = con.Execute("select max(ChrgShtNo) from ChargeSheet")If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtChrgNo.Text = cntEnd Ifrs.CloseSet rs = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbFirNo.AddItem rs(0) rs.MoveNextWendrs.CloseEnd Sub

Complaint status

78

Page 79: Crime file

Coding: Complaint status

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdViewStat_Click()Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text + "")If (Not rs.EOF) Then txtDetails.Text = rs(1)End IfEnd SubPrivate Sub Form_Load()connectdbSet rs = con.Execute("select distinct(ComplntNo) from ComplntStatus")While (Not rs.EOF) cmbComplntNo.AddItem rs(0) rs.MoveNextWendrs.CloseEnd Sub

79

Page 80: Crime file

Search criminal

80

Page 81: Crime file

Coding: Complaint status

Dim con As ADODB.ConnectionDim rec As ADODB.Recordset

Private Sub Command1_Click() Dim strcon As String Dim strcom As String strcon = "Provider=Microsoft.ACE.OLEDB.12.0;Data Source=D:\CrimeFile\CrimeFile\CrimeFile\Crime File System\crimefile.mdb;Persist Security Info=False" Set con = New ADODB.Connection con.Open strcon Set rec = New ADODB.Recordset strcom = "select * from CriminalReg where CrimName='" & Text1.Text & "'" rec.Open strcom, con, adCmdText If rec.EOF Then MsgBox "record not present" Else: MsgBox "record is present" Text2.Text = rec.Fields(0) Text3.Text = rec.Fields(1) Text4.Text = rec.Fields(2) Text5.Text = rec.Fields(3) Text6.Text = rec.Fields(4) Text7.Text = rec.Fields(5) Text8.Text = rec.Fields(6) Text9.Text = rec.Fields(7) End IfEnd Sub

Private Sub exit_Click()Unload Me

End Sub

81

Page 82: Crime file

Search prisoner

Coding: Search prisoner

Dim con As ADODB.ConnectionDim rec As ADODB.RecordsetPrivate Sub Command1_Click() Dim strcon As String Dim strcom As String strcon = "Provider=Microsoft.ACE.OLEDB.12.0;Data Source=D:\CrimeFile\CrimeFile\CrimeFile\Crime File System\crimefile.mdb;Persist Security Info=False"

82

Page 83: Crime file

Set con = New ADODB.Connection con.Open strcon Set rec = New ADODB.Recordset strcom = "select * from PrisonersReg where PrisonerNo=" & Combo1.Text If Combo1.Text = "" Then MsgBox "record not present" Else rec.Open strcom, con, adCmdText If rec.EOF Then MsgBox "record not present" Else MsgBox "record is present" Text1.Text = rec.Fields(0) Text2.Text = rec.Fields(1) Text3.Text = rec.Fields(2) Text4.Text = rec.Fields(3) Text5.Text = rec.Fields(4) Text6.Text = rec.Fields(5) Text7.Text = rec.Fields(6) Text8.Text = rec.Fields(7) Text9.Text = rec.Fields(8) End If End IfEnd Sub

Private Sub exit_Click()Unload MeEnd Sub

83

Page 84: Crime file

The modules involved in this project are:

• Login for user and admin

• Complaint registration

• View complaint status

• Criminal register management

• FIR Management

• Case History Details management

• Managing Postmortem details

• Prisoners register management

• Manage list about most wanted criminals

LOGIN

This includes Administrator and User login. There will be a username and

password to login into the system to use all the facilities.

1. COMPLAINT REGISTRATION

This module helps to register the details about the crime. This is done by

entering some details, such as incident details, Victim details, crime details etc

3. VIEW COMPLAINT STATUS

This module allows us to view the status of the complaint that you have

registered earlier.

84

Page 85: Crime file

4. CRIMINAL REGISTER MANAGEMENT

Here we can have the facility to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This can be done

by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that

took place at recent years. The administrator can enter FIR information and save it in a

database.

6.CASE HISTORY DETAILS MANAGEMENT

Here we can view the details of the case, date of occurrence, the type of crime

and place of occurrence etc…

7. MANAGING POSTMORTEM DETAILS

This module helps to view the postmortem details of a person. The details such

as date of death cause of death, name of the doctor etc.

8. PRISONER REGISTER MANGEMENT

This module helps the administrator as well as the user to store, view and manage the

details of the past and present prisoners.

9. MANAGE THE LIST OF MOST WANTED CRIMINALS

85

Page 86: Crime file

This is an additional feature added to this Software, which helps us to make a quick

search about the most wanted criminals. This helps to always keep track of and identify a person

quickly, who is a most wanted criminal.

TEST CASES

Test cases used in this project are:

Test case 1:

Purpose: The main purpose of this test case to inform the administrator if he did not write the

correct username or password.

Pre condition and inputs: The precondition for this test case is if the administrator write the

correct username and password, then only user will be able to access the application.

Results: if username and password is not correct, then an error mess will be displayed for

incorrect password/ username.

Test case 2:

Purpose: The main purpose of this test case to inform the administrator if any exception occurs

while updating information on the application. The format should be correct while entering the

details for the criminal or prisoner name or fir information.

Precondition and inputs: The precondition of this test case is there are validations given in the

form which indicates the correct format of the data .The user has to fill the all required field ..

86

Page 87: Crime file

Results: lf data format entered is not correct or any field is blank, then no account will be

generated.

FUTURE ENHANCEMENT

• We can update this system as online application

• The main advantage of online application is that, a person can report the

crime any time from anywhere.

• Users can view the progress of their complaint online.

• By the future technology user can view the case details and progress of

the complaints on their mobile phones

• Face recognition technology can apply. User or witness of the crime can

give the physical information of the thief.

87

Page 88: Crime file

CONCLUSION

CRIME FILE MANAGEMENT SYSTEM initiates the objective of providing

the user with customized and powerful complaint registration and process management

system side software. The software is built with all options such as complaint

registration, prisoner’s registration, and postmortem report generation etc…All the

requirements specified during the analysis and design phase are fully met, thus resulting

in the formation of good software. The interface provided is very user friendly and

flexible for all times.

88

Page 89: Crime file

References

1. http://office.microsoft.com/en-us/access-help/what-s-new-in-microsoft-office- access-2007-HA010024185.aspx

2. http://ncrb.nic.in/cctns.htm 3. http://en.wikipedia.org/wiki/VB6

4. A Complete Visual Basic 6 Training Course: How to Programme: Package

89