36
1 ABSTRACT Crime File System is a system used to report crimes. This project is done using VB 6.0 as front end, and MS Access as back end. It can used to report crime. This project is mainly useful for police stations. This system will help to manage all the activities in a police station using computers. Currently all the works are done manually, by computerizing all the activities inside a police station can be managed easily and effectively. The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work. The existing system in police station has several disadvantages and many more difficulties to work well. The proposed system tries to eliminate or reduce these difficulties up to some extent. The proposed system helps the police station employees to work user friendly. The main modules in this project include users and the administrator. The user can file a complaint, add a criminal report, and view all further updates by other users.

venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

Embed Size (px)

DESCRIPTION

venkateswaran2010,9976316089,m.venkateswaran,m.venkates

Citation preview

Page 1: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

1

ABSTRACT

Crime File System is a system used to report crimes. This project is done using

VB 6.0 as front end, and MS Access as back end. It can used to report crime. This project

is mainly useful for police stations. This system will help to manage all the activities in a

police station using computers. Currently all the works are done manually, by

computerizing all the activities inside a police station can be managed easily and

effectively.

The aim of proposed system is to develop a system of improved facilities. The

proposed system can overcome all the limitations of the existing system. The system

provides proper security and reduces the manual work. The existing system in police

station has several disadvantages and many more difficulties to work well. The proposed

system tries to eliminate or reduce these difficulties up to some extent. The proposed

system helps the police station employees to work user friendly.

The main modules in this project include users and the administrator. The user

can file a complaint, add a criminal report, and view all further updates by other users.

Page 2: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

2

1. INTRODUCTION

1.1 OVERVIEW OF THE PROJECT

The modules involved in this project are:

Login for user and admin

Complaint registration

View complaint status

Criminal register management

FIR Management

Case History Details management

Managing Postmortem details

Prisoners register management

Manage list about most wanted criminals

1. LOGIN

Login includes Administrator and User login. There will be a username and

password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION

Complaint Registration module helps to register the details about the crime. This is

done by entering some details, such as incident details, Victim details, crime details etc.

3. VIEW COMPLAINT STATUS

View Complaint Status module allows us to view the status of the

complaint that you have registered earlier.

Page 3: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

3

4. CRIMINAL REGISTER MANAGEMENT

Criminal Register Management is used to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This can be done

by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

FIR module allows viewing the First Information Report of all the crimes that

took place at recent years. The administrator can enter FIR information and save it in a

database.

6. CASE HISTORY DETAILS MANAGEMENT

Case History Details Management is used to view the details of the case, date of

occurrence, the type of crime and place of occurrence.

7. MANAGING POSTMORTEM DETAILS

It helps to view the post-mortem details of a person. The details such as date of

death cause of death, name of the doctor etc.

8. PRISONER REGISTER MANGEMENT

It helps the administrator as well as the user to store, view and manage the details

of the past and present prisoners.

9. MANAGE THE LIST OF MOST WANTED CRIMINALS

It is an additional feature added to this Software, which helps us to make a quick

search about the most wanted criminals. This helps to always keep track of and identify a

person quickly, who is a most wanted criminal.

Page 4: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

4

2. SYSTEM ANALYSIS

System analysis is a process of gathering and interpreting facts, diagnosing

problems and the information to recommend improvements on the system. It is a problem

solving activity that requires intensive communication between the system users and

system developers. System analysis or study is an important phase of any system

development process. The system is studied to the minutest detail and analyzed. The

system analyst plays the role of the interrogator and dwells deep into the working of the

present system. The system is viewed as a whole and the input to the system are

identified. The outputs from the organizations are traced to the various processes. System

analysis is concerned with becoming aware of the problem, identifying the relevant and

decisional variables, analyzing and synthesizing the various factors and determining an

optimal or at least a satisfactory solution or program of action.

Preliminary study is the process of gathering and interpreting facts, using the

information for further studies on the system. Preliminary study is problem solving

activity that requires intensive communication between the system users and system

developers. It does various feasibility studies. In these studies a rough figure of the

system activities can be obtained, from which the decision about the strategies to be

followed for effective system study and analysis can be taken.

2.1 Existing system

Lack of security of data.

More man power.

Time consuming.

Consumes large volume of pare work.

Needs manual calculations.

No direct role for the higher officials.

Page 5: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

5

2.2 Proposed system

The aim of proposed system is to develop a system of improved facilities. The

proposed system can overcome all the limitations of the existing system. The system

provides proper security and reduces the manual work.

Security of data.

Ensure data accuracy’s.

Proper control of the higher officials.

Minimize manual data entry.

Minimum time needed for the various processing.

Greater efficiency.

Better service.

User friendliness and interactive.

Advantages:

User can use very easily.

It is user friendly.

It reduces the program time.

Page 6: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

6

2.3 SYSTEM CONFIGURATION

2.3.1 HARDWARE SPECIFICATION

Processor : Intel Pentium IV.

Ram : 512 MB.

Hard Disk : 20GB.

Monitor : 14’’Color Monitor.

Keyboard : 108 Keys Amico Keyboard.

Floppy Drive : 1.44 MB.

Mouse : Logitech Mouse.

2.3.2 SOFTWARE SPECIFICATION

Operating System : Windows xp.

Front – End : Visual Basic 6.0.

Page 7: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

7

2.3.3 ABOUT THE SOFTWARE

VISUAL BASIC 6.0

Visual Basic (VB) is a third-generation event-driven programming language

and integrated development environment (IDE) from Microsoft for its COM

programming model first released in 1991. Visual Basic is designed to be relatively

easy to learn and use. Visual Basic was derived from BASIC and enables the rapid

application development (RAD) of graphical user interface (GUI) applications,

access to databases using Data Access Objects, Remote Data Objects, or ActiveX

Data Objects, and creation of ActiveX controls and objects. Scripting languages such

as VB and VBScript are syntactically similar to Visual Basic, but perform differently.

A programmer can put together an application using the components provided

with Visual Basic itself. Programs written in Visual Basic can also use the Windows

API, but doing so requires external function declarations. Though the program has

received criticism for its perceived faults, from version 3 Visual Basic was a runaway

commercial success, and many companies offered third party controls greatly

extending its functionality.

The final release was version 6 in 1998. Microsoft's extended support ended in

March 2008 and the designated successor was Visual Basic .NET (now known

simply as Visual Basic).

Page 8: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

8

MS ACCESS 2003

Microsoft Office Access, previously known as Microsoft Access, is a database

management system from Microsoft that combines the relational Microsoft Jet

Database Engine with a graphical user interface and software-development tools. It is

a member of the Microsoft Office suite of applications, included in the Professional

and higher editions or sold separately. On May 12, 2010, the current version of

Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft Office

Access 2007 was the prior version.

MS Access stores data in its own format based on the Access Jet Database

Engine. It can also import or link directly to data stored in other applications and

databases.

Software developers and data architects can use Microsoft Access to develop

application software, and "power users" can use it to build software applications. Like

other Office applications, Access is supported by Visual Basic for Applications, an

object-oriented programming language that can reference a variety of objects

including DAO (Data Access Objects), ActiveX Data Objects, and many other

ActiveX components. Visual objects used in forms and reports expose their methods

and properties in the VBA programming environment, and VBA code modules may

declare and call Windows operating-system functions.

Page 9: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

9

3. SYSTEM SPECIFICATION

3.1 DESIGN NOTATION

The diagrammatic representation of the project is described under this section.

The notations of representation in the form of Data Flow Diagram, System Flow Diagram

and Entity - Relationship Diagram. Data (record) transferring between the tuples is

denoted in Data Flow Diagram. System Flow Diagram provides entire view (structure) of

the project. (i.e.), the master database handled in the project, transaction process done

under the project and the reports produced by the system. E - R Diagram gives a link

between the entities (tables). The relations may be one to many, one to one and many too

many.

3.1.1 DATA FLOW DIAGRAM

1. LEVEL 0 DFD

Page 10: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

10

1. LEVEL 1 DFD

2. LEVEL 2 DFD

Page 11: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

11

3. LEVEL 3 DFD

Page 12: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

12

4. LEVEL 4 DFD

Page 13: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

13

3.2 DESIGN PROCESS

3.2.1 INPUT DESIGN

The code design should be less amount of coding so, it can achieve more results.

The speed of the system will be more coding is less? Whether the data in the system is

usable and readable by the system is depending on the coding to design the source

document, the analyst must decide what data must be captured. Then the analyst can

develop a layout of the document, showing what items are included and where they will

be placed.

3.2.2. OUTPUT DESIGN

The output design was done so that the result of processing could be

communication to the users. The output defined with reference to the following. The

frequency of the output, whether it was needed daily, weekly or monthly was

defined. The accuracy requirements of the data were also defined. The system

provides the following list of reports.

3.2.3. TABLE DESIGN

Information must be collected, accumulated, edited and should directly be

retrieved. The table should be properly designed and planned. The tables are important

for the successful performance of the system.

Table: Admin Login

Primary Key: Username

Page 14: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

14

Table: Charge Sheet

Primary Key: ChrgShtNo

Table: Complaint Reg

Primary Key:CName

Table: Complaint

Primary Key:ComplntNo

Page 15: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

15

Table: Criminal reg

Primary Key:CriminalNo

Table: Most Wanted

Table: History

Primary Key:PrisonerNo

Page 16: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

16

Table: Prisoners Reg

Primary Key:PrisonerNo

Table: Prisoners Temp

Primary Key: PrisonerNo

Table: Post Mortem

Primary Key: PMortemNo

Page 17: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

17

Table: FIR

Primary Key:Firno

Page 18: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

18

4. TESTING AND IMPLEMENTATION

4.1. INTRODUCTION

Testing is a series of different tests that whose primary purpose is to fully

exercise the computer based system. Although each test has a different purpose, all

work should verify that asll system element have been properly integrated and

performed allocated function. Testing is the process of checking whether the

developed system works according to the actual requirement and objective of the

system.

4.2. SYSTEM TESTING

The designed new system is tested with the sample data final outputs are

verified with the actual manual reports. If these reports are satisfied then system is

put to process with online data entry.

Computer program testing is performed to verify that the computer based

business system has met its design objective. The system includes the computer

components as one of major elements. The user is responsible for supplying the input

data and for participating in the evaluation of the system test results. System test

reports are prepared to validate system performance.

Testing is vital for the success of the system. System testing makes a logical

assumption that if all the paths are correct, the goal will be successfully achieved.

System testing is the utility as user-oriented vehicle before implementation.

A test plan entails the following activities,

• Prepare test plan

• Specify condition for user acceptance testing

• Prepare test data for program testing

• Plan user training

Page 19: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

19

TESTING METHODOLOGIES

A series of testing is performed for the proposed system. The system is ready

for user acceptance.

The Steps of Testing

Unit testing

Integration testing

Validation testing

Output testing

User acceptance testing

Unit Testing

In unit testing, each program unit is tested individually. Unit testing focuses

verification effort on the smallest unit of software design, the field. This is known as

field-testing. This testing is carried out during the programming itself.

Integration testing

In this stage, the individual modules are integrated in to a single entire system

and are tested for its proper integration. Their functionality is testing with the test

data. The validity of the system achieves its main objective.

Validation testing

Validation testing can be defined in many ways, but a simple definition is

that, validation succeeds when the software functions in a manner that can be

reasonably expected by the user.

Page 20: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

20

Output testing

Once all the procedures of a subsystem have tested individually output of one

procedure is fed to the other and the results at the procedures are matched with the

original results.

User acceptance testing

The developer does all the above tests. After these tests, team of employee

from the organization executes the system for validation and their feedbacks are

received. The corrections were made to the system wherever necessary.

4.3. SYSTEM IMPLEMENTATION

Implementation refers to the process of converting a new or a revised system

design into an operational one.

The major activities in the implementation phase are:

1. Preparation of implementation plan

2. Assessing equipment

3. User or personal training

4. Change over plans

Preparation of implementation

The implementation plan begins with preparing a plan for the implementation

of the system. This plan was made regarding the equipment, resources available and

how to test the activities. Thus a clear plan was prepared for all the activities.

Page 21: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

21

1. Assessing Equipment

In order to implement the proposed system the need of equipment has been

assessed.

2. User Training

It has been suggested that a person involved in the organization has to be

selected for the implementation of the proposed system and the selected people

should be trained before the implementation plan.

3. Change Over

The following suggestions were made during the changeover plan,

1. Changeover has to be made carefully so as to minimize the problems that

may arise from human errors and machine malfunctions.

2. It is suggested to run parallel (both the existing and proposed system) as the

methods of change over, here data from manual system are run on the system.

After the results are obtained from the manual system, these results are

compared with the proposed computerized system.

4.4. SYSTEM SECURITY

Every system should possess the property of security in order to secure and

safeguard the system from unauthorized users. Even through the system functions

efficiently according to the need user and produces correct output, the system will not

be a complete one if it does not includes measures to safeguard the system and

protect it from the third parties.

Page 22: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

22

In this system security is provided through password. No one can enter the

system without knowing the password. And also the admin user has the unique

password to update their master information. The password will be given only to the

user of the system and hence no unauthorized entry can make into the system.

4.5. SYSTEM MAINTENANCE

The definition of the maintenance of the system can be given by describing

four activities that are undertaken after program is released for use.

The first maintenance activities occur since it is unreasonable to assume that

testing will uncover all errors in this large system. The process of including the

diagnosis and correction of one or more errors is called corrective maintenance. The

second activity that contributes to a definition of maintenance occurs due to repaid

changes encountered in every aspect of computing. Therefore adaptive maintenance

modifies software to properly interface with a changing environment. The third

activity involves recommendation for new capabilities to the existing functions and

generation’s enhancements when the system is used. To satisfy requests perfect

maintenance is performed. The fourth maintenance activity occurs when system is

change to improve the future maintainability or reliability this is called a preventive

maintenance.

Page 23: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

23

5. CONCLUSION

CRIME FILE SYSTEM initiates the objective of providing the user

with customized and powerful complaint registration and process management

system side software. The software is built with all options such as complaint

registration, prisoner’s registration, and post-mortem report generation etc…All

the requirements specified during the analysis and design phase are fully met,

thus resulting in the formation of good software. The interface provided is very

user friendly and flexible for all times.

This project made user friendly by the wide use of VB enabling the user

to interest easily with the database. This project might be easier for the staff to

maintain the system effectively.

Page 24: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

24

6. FUTURE ENHANCEMENT

• We can update this system as online application

• The main advantage of online application is that, a person can report

the crime anytime from anywhere.

• Users can view the progress of their complaint online.

• By the future technology user can view the case details and progress

of the complaints on their mobile phones

• Face recognition technology can apply. User or witness of the crime

can give the physical information of the thief.

Page 25: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

25

7. BIBLIOGRAPHY

BOOKS:

Elias M.Award, “System Analysis and Design”, Second edition, Galgotial

Publications(P) Ltd, 2000.

Jeffery L.Whitten, Lonnie D.Dentely, “System Analysis and Design Methods”,

Fourth Edition. Irwin McGraw Hill. A division of Mc Graw-Hill Companies.

Ian sommerville and A.d.Mc Getric. “Software Engineering”, Sixth Edition,

Person Education, 2002.

MS Office 2003 Complete Edition, BPB Publications, 2004.

Visual Basic 6.0 Complete Edition, Noel Jerke, Sixth edition, Tata McGrew-Hill

Publishing Company Limited.

WEBSITES:

http://www.vbcode.com

http://www.vbreferences.com

www.example-code.com

www.functionx.com

Page 26: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

26

APPENDIX

SAMPLE CODING

Add Complaint

Private Sub cmdAdd_Click()

If (cmbComplntNo.Text = "" Or txtStatus.Text = "") Then

MsgBox "Missing Fields", vbInformation, "CFS"

Else

con.Execute ("insert into ComplntStatus values(" + cmbComplntNo.Text + ",'" +

txtStatus.Text + "')")

MsgBox "Status Added Successfully", vbInformation, "Crime File System"

txtDetails.Text = ""

txtStatus.Text = ""

cmbComplntNo.SetFocus

End If

End Sub

Private Sub cmdCancel_Click()

Unload Me

End Sub

Private Sub cmdDetails_Click()

Set rs = con.Execute("select Details from ComplaintReg where ComplntNo=" +

cmbComplntNo.Text + "")

If (Not rs.EOF) Then

txtDetails.Text = rs(0)

txtStatus.SetFocus

End If

Page 27: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

27

End Sub

Private Sub Form_Load()

connectdb

Set rs = con.Execute("select ComplntNo from ComplaintReg")

While (Not rs.EOF)

cmbComplntNo.AddItem rs(0)

rs.MoveNext

Wend

rs.Close

End Sub

Add user

Private Sub Form_Load()

connectdb

End Sub

Private Sub cmdAdd_Click()

Set rs = con.Execute("select * from UserLogin where Username='" +

txtUsername.Text + "' and Password='" + txtPassword.Text + "'")

If (Not rs.EOF) Then

MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime

File System"

txtPassword.Text = ""

txtUsername.Text = ""

txtUsername.SetFocus

Else

con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" +

txtPassword.Text + "')")

MsgBox "User added sucessfully", vbInformation, "Crime File System"

Page 28: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

28

txtPassword.Text = ""

txtUsername.Text = ""

txtUsername.SetFocus

End If

End Sub

Private Sub cmdCancel_Click()

Unload Me

FIR Report

Dim x As Integer

Private Sub cmdShRpt_Click()

x = cmbMno.Text

If (DataEnvironment1.rsCommand4.State = 1) Then

DataEnvironment1.rsCommand4.Close

Else

DataEnvironment1.Command4 (x)

Load DataReportFIR

DataReportFIR.Show

End If

End Sub

Private Sub Form_Load()

connectdb

Set rs = con.Execute("select Firno from FIR")

While (Not rs.EOF)

cmbMno.AddItem rs(0)

rs.MoveNext

Wend

End Sub

Page 29: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

29

Login

Private Sub cmdAdminLog_Click()

Set rs = con.Execute("Select * from AdminLogin where Username='" +

txtUname.Text + "' and Password='" + txtPass.Text + "'")

If (Not rs.EOF) Then

MsgBox "Login Success", vbInformation, "Crime File System"

frmMDI.mnuLogoff.Enabled = True

frmMDI.mnuAdminAddU.Enabled = True

frmMDI.mnuAdminDelU.Enabled = True

frmMDI.mnuActiv.Enabled = True

frmMDI.mnuLogin.Enabled = False

frmMDI.mnuAdminAddComSt.Enabled = True

frmMDI.mnuActivReg.Enabled = True

frmMDI.mnuActivComp.Enabled = True

frmMDI.mnuActivRpt.Enabled = True

Unload Me

Else

MsgBox "Failure", vbCritical, "Crime File System"

End If

'rs.Close

Unload Me

End Sub

Private Sub cmdCancel_Click()

Unload Me

End Sub

Private Sub cmdUserLog_Click()

Page 30: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

30

Set rs = con.Execute("Select * from UserLogin where Username='" +

txtUname.Text + "' and Password='" + txtPass.Text + "'")

If (Not rs.EOF) Then

MsgBox "Login Success", vbInformation, "Crime File System"

frmMDI.mnuLogoff.Enabled = True

frmMDI.mnuLogin.Enabled = False

frmMDI.mnuActiv.Enabled = True

frmMDI.mnuActivReg.Enabled = True

frmMDI.mnuActivComp.Enabled = True

frmMDI.mnuActivRpt.Enabled = True

Unload Me

Else

MsgBox "Failure", vbCritical, "Crime File System"

End If

'rs.Close

End Sub

Private Sub Form_Load()

connectdb

End Sub

Private Sub Form_Unload(Cancel As Integer)

con.Close

End Sub

Page 31: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

31

Post Mortem Report

Dim x As Integer

Private Sub cmdShRpt_Click()

x = cmbMno.Text

If (DataEnvironment1.rsCommand3.State = 1) Then

DataEnvironment1.rsCommand3.Close

Else

DataEnvironment1.Command3 (x)

Load DataReportmortem

DataReportmortem.Show

End If

End Sub

Private Sub Form_Load()

connectdb

Set rs = con.Execute("select PMortemNo from Postmortem")

While (Not rs.EOF)

cmbMno.AddItem rs(0)

rs.MoveNext

end

End Sub

Splash

Dim i As Integer

Dim x As Integer

Option Explicit

Private Sub Form_Load()

File1.FileName = App.Path

x = File1.ListCount

Page 32: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

32

End Sub

Private Sub Form_MouseDown(Button As Integer, Shift As Integer, x As Single, Y

As Single)

Unload Me

End Sub

Private Sub Form_Unload(Cancel As Integer)

Load frmMDI

frmMDI.Show

End Sub

Private Sub Frame1_MouseDown(Button As Integer, Shift As Integer, x As Single,

Y As Single)

Unload Me

End Sub

Private Sub Timer1_Timer()

If (Image1.Left <= 6480) Then

Image1.Left = Image1.Left + 100

Else

Image1.Left = 0

End If

If (i <= x) Then

Label2.Caption = File1.List(i)

i = i + 1

Else

Load frmMDI

frmMDI.Show

Unload Me

End If

End Sub

Page 33: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

33

SAMPLE SCREENS

Login

Add New User

Page 34: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

34

Admin Complaint Status

Criminal Register

Page 35: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

35

Delete User

Post mortem

Page 36: venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]

36

Post mortem report