Crime File Management
-
Author
jayanth-jay -
Category
Documents
-
view
282 -
download
10
Embed Size (px)
Transcript of Crime File Management


ACKNOWLEDGEMENT
We would like to give our sincere acknowledgement to everybody responsible for the
successful completion of our project titled “CRIME FILE SYSTEM”.
It gives us great pleasure to acknowledgement with thanks the assistance and
contribution of many individual who have been actively involved at various
stages of this project to make it a success.
Firstly we are very grateful to this esteemed institute “SRI BHAGHWAN
MAHAVEER JAIN COLLEGE “ for providing us an opportunity to our degree
course .
We wish to express our whole hearted thanks to our principal DR.EDWIN
CHRISTOPHER for providing the modernized lab facilities in our institute.
Perfection is impossible to achieve, but hard work and dedication can achieve any
goal. I have tried my level best to fulfill the requirements of the project, but I could
not have achieved my goal without the able guidance of Ms. KAVITHA.S, H.O.D.,
Computer Science Department.
We indebted to Ms.KAVITHA.S, for providing us an opportunity to work under
the guidance and for her constant support and encouragement .
Our gratitude towards our guide KAVITHA.S for their keen interest and
boldness encouragement, which is received during the entire period of our
project .
We would also like to thank all our lecturers.
Finally we convey our acknowledgement to all our friends and family members
who directly or indirectly associated with us in the successful completion of the
project.
We thank one and all.


DECLARATION
We, KIRAN KUMAR B.C (10NDS75028), LAVANYA.R (10NDS75029) do
hereby declare that the project work entitled “CRIME FILE SYSTEM”, is a
bonafide work carried out by us under the guidance of MS.KAVITHA.S, lecturer,
and H.O.D of Computer Science department. This project, as presented in this report,
is our original work and has been submitted as a partial fulfillment for the Degree of
Bachelor of Computer Science of Bangalore University.
PLACE: KGF NAME OF THE
STUDENT:
KIRANKUMAR B.C
(10NDS75028)
LAVANYA.R
(10NDS75029)


SYNOPSIS
CRIME FILE SYSTEM
BACKGROUND:
Our project is entitled as "CRIME FILE SYSTEM”. Now a days the crime
rate in the society is accordingly increasing, due to the negligence of people. So it has
become a major drawback for the improvement of the Nation. To overcome this
drawback, we can use this software for reporting crimes in time and maintaining its
records is very helpful to control the crime statistics.
OBJECTIVE:
Crime File System is a system used to report crimes. This project will be done
using VB 6.0 as front end, and MS Access as back end. It can be used to report crime.
This project is mainly useful for police stations. This system will help to manage all
the activities in a police station using computers. Currently all the works are done
manually, by computerizing all the activities inside a police station can be managed
easily and effectively.
PURPOSE & SCOPE:It is important for the Police Department of Defense to store and provide
details to the public in account to provide the better service to them. The documentary
proof may not be efficient to meet the requirements for maintaining the records,
which may result in dissatisfaction among the public about the services provided by
the Department.
APPLICABILITY:
Our project is applicable to report crimes to any Defense services like Police
stations etc, which help to manage all activities using computers, so that records and
details of particular case can be accessed easily.
SOFTWARE CATAEGORY:

This project helps to maintain records of crime and retrieving it back. For
better understanding of our project, we have divided the problems into separate
modules.
The modules involved in this project are:
Login for user
Complaint registration
View complaint status
Criminal register management
FIR Management
Manage list about most wanted criminals
1. LOGIN This includes Administrator and User login. There will be a username and
password to login into the system to use all the facilities.
2. COMPLAINT REGISTRATION This module helps to register the details about the crime. This is done by
entering some details, such as incident details, Victim details, crime details etc
3. VIEW COMPLAINT STATUSThis module allows us to view the status of the complaint that you have
registered earlier.
4. CRIMINAL REGISTER MANAGEMENT
Here we can have the facility to view the details of the criminals. The
administrator can add new criminal’s details and save it in a database. This can be
done by entering details such as criminal number, age, occupation, type of crime etc.
5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that
took place at recent years. The administrator can enter FIR information and save it in
a database.
6. CHARGESHEET MANAGEMENTThis module allows us to add the other requirements of this software which is
very important for other modules, also admin can enter what all actions taken so far
by the department and save it in a database.
7. MANAGE THE LIST OF MOST WANTED CRIMINALSThis is an additional feature added to this Software, which helps us to make
a quick search about the most wanted criminals. This helps to always keep track of
and identify a person quickly, who is a most wanted criminal.
LIST OF TABLES

TABLE
NUMBER
TABLE NAME
1 COMPLAINT REGISTRATION
2 CHARGESHEET
3 FIRST INFORMATION REPORT (FIR)
4 COMPLAINT STATUS
5 CRIMINAL REGISTRATION
6 MOST WANTED DETAILS
LIST OF DIAGRAMS
FIGURE NO NAME OF DIAGRAM
1 PERT CHART
2 DATA FLOW DIAGRAM
3 E-R DIAGRAM


CONTENTS
1. INTRODUCTION Objective and Scope of the Project 1 - 3
Theoretical Background 4 – 10
2. SYSTEM STUDY & ANALYSIS Introduction 11 – 11
Existing System 12 – 12
Proposed System 12 - 12
Hardware & Software Requirements 13 - 13
3. SYSTEM DESIGN Pert Chart 14 -14
Data Flow Diagram 15 -15
Sample Report 16 -18
Sample Coding 19 - 36
Testing 37 - 38
Form Designs
4. CONCLUSION 39 - 39
5. BIBLIOGRAPHY 40 - 40


OBJECTIVE
AND SCOPE OF PROJECT
Crime File System is a system used to report crimes. It can used to report
crime. This project is mainly useful for police stations. This system will help to
manage all the activities in a police station using computers. Currently all the works
are done manually, by computerizing all the activities inside a police station can be
managed easily and effectively.
It is important for the Police Department of Defense to store and provide
details to the public in account to provide the better service to them. The documentary
proof may not be efficient to meet the requirements for maintaining the records,
which may result in dissatisfaction among the public about the services provided by
the Department.
Our project deals with the “CRIME FILE SYSTEM”, which includes many
modules required to perform the activities inside Police stations and it also provides
easy way of accessing these data in efficient manner.
For better understanding of our project, we have divided the problems into
separate modules.
The modules involved in this project are:
Login for user
Complaint registration
View complaint status
Criminal register management
FIR Management
Manage list about most wanted criminals

MODULES INCLUDED
1. LOGIN
This includes Administrator and User login. There will be a username and
password to login into the system to use all the facilities.
2. COMPLAINT REGISTRATION
This module helps to register the details about the crime. This is done by
entering some details, such as incident details, Victim details, crime details etc.
3. VIEW COMPLAINT STATUS
This module allows us to view the status of the complaint that you have
registered earlier.
4. CRIMINAL REGISTER MANAGEMENT
Here we can have the facility to view the details of the criminals. The
administrator can add new criminal’s details and save it in a database. This can be
done by entering details such as criminal number, age, occupation, type of crime etc.
5. FIR MANGEMENT
This module allows viewing the First Information Report of all the crimes that
took place at recent years. The administrator can enter FIR information and save
it in a database.
6. CHARGESHEET MANAGEMENT
This module allows us to add the other requirements of this software which is
very important for other modules, also admin can enter what all actions taken so far
by the department and save it in a database.
7. MANAGE THE LIST OF MOST WANTED CRIMINALS
This is an additional feature added to this Software, which helps us to make
a quick search about the most wanted criminals. This helps to always keep track of
and identify a person quickly, who is a most wanted criminal.

FUTURE ENHANCEMENT
We can update this system as online application
The main advantage of online application is that, a person can report
the crime anytime from anywhere.
Users can view the progress of their complaint online.
By the future technology user can view the case details and progress
of the complaints on their mobile phones
Face recognition technology can apply. User or witness of the crime
can give the physical information of the thief.

THEORETICAL BACKGROUND
VISUAL BASIC
Visual Basic is also called Event Driven program. It means operations need
not have to follow a sequence and can be interrupted, suspended and
abandoned at any instance. This is a programming language which contains
number of windows.
What is VB?
It is a tool that allows you to develop windows (Graphical User Interface-
GUI) Application. It was developed from BASIC programming language. In
1970s Microsoft got it started by developing ROM-based interpreted BASIC
for the entry microprocessor based computers.
It is an Event Driven; meaning code written for a particular object may remain
idle until called upon to respond to some event (Event may include operations
such as button pressing, menu selector…) an event processor governs Visual
Basic.
Some of the features of VB:
It includes a full set of objects. Using each objects the user can draw or
develop the applications. It also includes lot of icons and pictures for your use.
It includes events for responses to mouse and keyboard actions, this can be
useful in trapping interrupts to divert or suspend operations. It includes a full
set of mathematical string handling and graphics functions; this makes the
process of developing and performing operations very easy.
Visual Basic also has facilities to handle fixed and dynamic variables and
control arrays. It also includes facilities sequential and random access file
support, this makes storing and accessing data very easy.

VB has certain powerful database access tools, thus interfering with different a
type of backend software becomes very easy. It also includes facilities for
using ActiveX support; this allows the user to create our own type of objects.
VB HISTORY (VB3, VB$ & VB5):
Starting with VB5, Visual Basic became an exclusively 32-bit programming
language, suitable for programming only on Win9x or NT system. If you must
program for Win2.x, then you have to drop back to either VB3 or VB4. VB4
had the dual ability to support Win3.x as well as Win9x/NT systems.
Visual Basic 6.0 comes in 3 different editions. They are:
1) The Visual Basic 6.0 Academic edition
2) The Visual Basic 6.0 Professional Edition
3) The Visual Basic 6.0 Enterprise Edition
Visual Basic 6.0 Academic Edition is the introductory edition which allows us
to create windows application easily. It includes all the tools to perform this
operation efficiently.
Visual Basic 6.0 Professional Edition is for computer professionals. It is
includes all the advanced features such as tools to develop ActiveX and
Internet controls.
Visual Basic 6.0 Enterprise Edition is the most advanced edition. It is for
professional programmer who can develop distributed application. It is most
sited for those who function in a team environment.

APPLICATIONS of VB:
Every application or project in visual Basic is made up of seven applications.
That is:
Form
Controls
Properties
Methods
Procedure
Modules
Project

MS ACCESS
Microsoft Access is a relational database management system for Microsoft
Windows. It is designed to give you unparalleled access to data, combined with ease
of use made possible with windows.
Features of MS-ACCESS:
Microsoft Access joins other Microsoft products, such as MS-Word for
Windows and MS-EXCEL, by indicating toolbars. We can modify to fit our
needs, more around in the MS-ACCESS windows, and hide or show
individually. We can create our own custom toolbars, attach them to forms
and reports in our database.
When you want to define an expression in MS-ACCESS we can use the
expression Builder even includes a list of common expressions already
written for us to choose from.
We can use input masks to define patterns that data must follow when it is
entered in forms and data sheets, making data entry faster and more
accurate. It is very easy to define an input mask using Input Mask Property.
For quick sorting of records in tables, queries and forms you can click the
sort Ascending and sort Descending buttons on the toolbar or choose quick
sort from the records menu and then choose ascending or descending.
Using the print definition command on the file menu, you can print detailed
information about the design of any object in our database. To print
information about more than one object, choose Add-Insert from the file
menu and then choose database documents.
Functions Performed By MS-ACCESS:

Storage of data
Creation and maintenance of data structure
Provision of efficient indexing mechanism
Management of very large database
Enforcement of security and privacy
Here is the Hierarchy that Microsoft Access uses in breaking down a database.
Field:
Fields are the different categories within a Table. Tables usually contain multiple fields.
Data types:
Data types are the properties of each field. A field only has 1 data type.
Example: (Fieldname) Student Last Name; (Data type) Text.
DATABASE
A Database is an organized mechanism that has the capability of
storing information through which a user can retrieve stored information in an

effective and efficient manner. The data is the purpose of any database and
must be protected. Here in comes the role of Database Management System
(DBMS) that helps in systematic organization of information. The information
in a database should be organized in such a way that it is easy to update. And
only then, it can quickly provide information.
Any stored information or a database, whether electronic of manual
helps you by keeping track of your inventories, payroll invoice or anything
else that you consider important.
There are 2 types of database; they are RDBMS [Relational Data Base
Management System] and DBMS [Data Base Management System].
RDBMS:
It is defined as a method of viewing information from several, separate
database that relate to one another through keywords or values. The main
advantage of RDBMS is that you can simultaneously use more than one
database to see information stored in them.
Microsoft Access is a window-based program created by Microsoft. It
helps you store and manage a large collection of information. A systematically
arranged database helps you manage the stored information in an efficient way
so that it can access quickly whenever needed. Microsoft Access is based on
RDBMS. Therefore to have a better understanding of working in Access, you
should be familiar with 4 basic objects of RDBMS as described below.
Tables:
It is a collection of information on a specific topic. In a table the
information stored in rows and columns. You can store different types of data
in different tables. Let us now get to know more about the components that
makes up a table. They are:
Columns
Rows
Domain

Primary Key
Relationship
Queries:
Queries are systematic ways of retrieving information from a database.
Access’s query feature can look for the information that meets the criterion or
condition you specify and displays the information on the screen.
Forms:
It presents the information stored in a database in an easy to use
format. Through forms, you can view, enter or update information in a
database. If you wish to view records in your database, from present one
record at a time on the screen.
DBMS:
It is a tool for managing information, stored in the database. It includes
the following functions:
Database Creation
Modifying a Database
Adding Records in Database
Deleting Records in Database
Selecting Records in Database

Introduction to System AnalysisSystem analysis is a process of gathering and interpreting facts,
diagnosing problems and the information to recommend improvements on the
system. It is a problem solving activity that requires intensive communication
between the system users and system developers. System analysis or study is
an important phase of any system development process. The system is studied
to the minutest detail and analyzed. The system analyst plays the role of the
interrogator and dwells deep into the working of the present system. The
system is viewed as a whole and the input to the system are identified. The
outputs from the organizations are traced to the various processes. System

analysis is concerned with becoming aware of the problem, identifying the
relevant and decisional variables, analyzing and synthesizing the various
factors and determining an optimal or at least a satisfactory solution or
program of action.
A detailed study of the process must be made by various techniques
like interviews, questionnaires etc. The data collected by these sources must
be scrutinized to arrive to a conclusion. The conclusion is an understanding of
how the system functions. This system is called the Existing system. Now the
existing system is subjected to close study and problem areas are identified.
The designer now functions as a problem solver and tries to sort out the
difficulties that the enterprise faces. The solutions are given as proposals. The
proposal is then weighed with the existing system analytically and the best one
is selected. The proposal is presented to the user for an endorsement by the
user. The proposal is reviewed on user request and suitable changes are made.
This is loop that ends as soon as the user is satisfied with proposal.
Preliminary study is the process of gathering and interpreting facts,
using the information for further studies on the system. Preliminary study is
problem solving activity that requires intensive communication between the
system users and system developers. It does various feasibility studies. In
these studies a rough figure of the system activities can be obtained, from
which the decision about the strategies to be followed for effective system
study and analysis can be taken.
Existing System:
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.

Proposed System:
The aim of proposed system is to develop a system of improved
facilities. The proposed system can overcome all the limitations of the
existing system. The system provides proper security and reduces the
manual work.
Security of data.
Ensure data accuracy’s.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
SYSTEM CONFIGURATION
HARDWARE REQUIREMENTS:
Processor : X86 Compatible processor
With 1.7 GHz Clock speed
RAM : 512 MB or more

Hard disk : 20 GB or more
Monitor : VGA/SVGA
Keyboard : 104 Keys
Mouse : 2 buttons/ 3 buttons
SOFTWARE REQUIREMENTS:
Operating System : Windows 2000/XP
Front end : Visual Basic 6.0
Back end : MS ACCESS


PERT CHART
Jan 10 Jan 23 Jan 23 Feb 20
Jan 5 Jan 10
Jan 10 Jan 30
Feb 21 Mar 12
Feb 27 Mar 12
Specification
Design database partCode for database part
Design Graphical User
Interface part
Code for graphical user interface
Interacts and testing
Write user manual
Finish


DFD [DATA FLOW DIAGRAM]
Crime File System
Login
FIR Complaint Registration
General
Criminal RegistrationCharge sheet
Add Complaint Status
View Complaint Status
Most Wanted Details



DATA REPORT 1: CRIMINAL REPORT
DATA REPORT 2: FIRST INFORMATION REPORT [FIR]

DATA REPORT 3: MOST WANTED DETAILS



METHODOLOGY USED FOR TESTING
The extent of testing is controlled by many factors, such as the risks involved,
limitations on resources, and deadlines. In light of these issues, we must deploy a
testing strategy that does the best jopb of finding defects in a product within the given
constraints. There are many testing strategies, but most testing uses a combination of
these:
Black Box testing
White Box Testing
However, no strategy or combination of strategies truly can prove the correctness of a
system; it can stabilize only its capability.
BLACK BOX TESTING:
The concept of the Black box is used to represent a system whose inside
workings are not available for inspection. In a black box, the test item is treated as
“black”, since its logic is unknown; all that is known is what goes in and what comes
out, or the input and output.
In black box testing you try various inputs and examine the resulting output;
you can learn what the box does but nothing about how this conversion is
implemented. Black box testing works very nicely in testing objects in an object-
oriented environment. The black box texting technique also can be used for scenario-
based tests, where the system inside may not be available for inspection but the input
and output are defined through use cases or other analysis information.
WHITE BOX TESTING:
White box testing assumes that the specific logic is important and must be
tested to guarantee the systems proper functioning. The main use of the white box is
in error-based resting, when you already have tested all objects of an application and
all external or public methods of an object that you believe to be of greater

importance. In white box testing, you are looking for bugs that have a low probability
of executing, have been carelessly implements, or were over looked previously.
One form of while box testing, called path testing, makes certain that each
path in an object’s method is executed at least once during testing. Two types of path
testing are statement testing coverage and branch testing coverage.
STATEMENT OF TESTING
The main idea of statement testing coverage is to test every statement in the
object’s method by executing it at least once. However, realistically it is impossible to
test a program on every single input, so you never can be sure that a program will not
fail on some input.
BRANCH TESTING COVERAGE
The main idea behind branch testing coverage tests to ensure that every branch
alternative has been executed at least once under some test. As in statement testing
coverage, it is unfeasible to fully test any program of considerable size.
Most debugging tools are excellent in statement and branch testing coverage. White
box testing is useful for error-based testing.


CONCLUSION
CRIME FILE MANAGEMENT SYSTEM initiates the objective of
providing the user with customized and powerful complaint registration and
process management system side software. The software is built with all
options such as complaint registration, prisoner’s registration, and
postmortem report generation etc…All the requirements specified during the
analysis and design phase are fully met, thus resulting in the formation of
good software. The interface provided is very user friendly and flexible for all
times.


BIBLIOGRAPHY
Books
A Complete Guide to Programming in Visual Basic 6.0
Visual Basic 6.0 Complete
Special Edition using VB 6.0 – Brian Siler of Jeff spots
Programming - Gray Cornell
Site Address
www.associatedcontent.com