venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Saran front pdf]
venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]
-
Upload
venkateswaran2010-web-designer-and-seo-service -
Category
Entertainment & Humor
-
view
503 -
download
0
description
Transcript of venkateswaran2010,9976316089,m.venkateswaran,m.venkates[Final crime document]
1
ABSTRACT
Crime File System is a system used to report crimes. This project is done using
VB 6.0 as front end, and MS Access as back end. It can used to report crime. This project
is mainly useful for police stations. This system will help to manage all the activities in a
police station using computers. Currently all the works are done manually, by
computerizing all the activities inside a police station can be managed easily and
effectively.
The aim of proposed system is to develop a system of improved facilities. The
proposed system can overcome all the limitations of the existing system. The system
provides proper security and reduces the manual work. The existing system in police
station has several disadvantages and many more difficulties to work well. The proposed
system tries to eliminate or reduce these difficulties up to some extent. The proposed
system helps the police station employees to work user friendly.
The main modules in this project include users and the administrator. The user
can file a complaint, add a criminal report, and view all further updates by other users.
2
1. INTRODUCTION
1.1 OVERVIEW OF THE PROJECT
The modules involved in this project are:
Login for user and admin
Complaint registration
View complaint status
Criminal register management
FIR Management
Case History Details management
Managing Postmortem details
Prisoners register management
Manage list about most wanted criminals
1. LOGIN
Login includes Administrator and User login. There will be a username and
password to login into the system to use all the facilities.
2. COMPLAINT REGISTRATION
Complaint Registration module helps to register the details about the crime. This is
done by entering some details, such as incident details, Victim details, crime details etc.
3. VIEW COMPLAINT STATUS
View Complaint Status module allows us to view the status of the
complaint that you have registered earlier.
3
4. CRIMINAL REGISTER MANAGEMENT
Criminal Register Management is used to view the details of the criminals. The
administrator can add new criminal’s details and save it in a database. This can be done
by entering details such as criminal number, age, occupation, type of crime etc.
5. FIR MANGEMENT
FIR module allows viewing the First Information Report of all the crimes that
took place at recent years. The administrator can enter FIR information and save it in a
database.
6. CASE HISTORY DETAILS MANAGEMENT
Case History Details Management is used to view the details of the case, date of
occurrence, the type of crime and place of occurrence.
7. MANAGING POSTMORTEM DETAILS
It helps to view the post-mortem details of a person. The details such as date of
death cause of death, name of the doctor etc.
8. PRISONER REGISTER MANGEMENT
It helps the administrator as well as the user to store, view and manage the details
of the past and present prisoners.
9. MANAGE THE LIST OF MOST WANTED CRIMINALS
It is an additional feature added to this Software, which helps us to make a quick
search about the most wanted criminals. This helps to always keep track of and identify a
person quickly, who is a most wanted criminal.
4
2. SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing
problems and the information to recommend improvements on the system. It is a problem
solving activity that requires intensive communication between the system users and
system developers. System analysis or study is an important phase of any system
development process. The system is studied to the minutest detail and analyzed. The
system analyst plays the role of the interrogator and dwells deep into the working of the
present system. The system is viewed as a whole and the input to the system are
identified. The outputs from the organizations are traced to the various processes. System
analysis is concerned with becoming aware of the problem, identifying the relevant and
decisional variables, analyzing and synthesizing the various factors and determining an
optimal or at least a satisfactory solution or program of action.
Preliminary study is the process of gathering and interpreting facts, using the
information for further studies on the system. Preliminary study is problem solving
activity that requires intensive communication between the system users and system
developers. It does various feasibility studies. In these studies a rough figure of the
system activities can be obtained, from which the decision about the strategies to be
followed for effective system study and analysis can be taken.
2.1 Existing system
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
5
2.2 Proposed system
The aim of proposed system is to develop a system of improved facilities. The
proposed system can overcome all the limitations of the existing system. The system
provides proper security and reduces the manual work.
Security of data.
Ensure data accuracy’s.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Advantages:
User can use very easily.
It is user friendly.
It reduces the program time.
6
2.3 SYSTEM CONFIGURATION
2.3.1 HARDWARE SPECIFICATION
Processor : Intel Pentium IV.
Ram : 512 MB.
Hard Disk : 20GB.
Monitor : 14’’Color Monitor.
Keyboard : 108 Keys Amico Keyboard.
Floppy Drive : 1.44 MB.
Mouse : Logitech Mouse.
2.3.2 SOFTWARE SPECIFICATION
Operating System : Windows xp.
Front – End : Visual Basic 6.0.
7
2.3.3 ABOUT THE SOFTWARE
VISUAL BASIC 6.0
Visual Basic (VB) is a third-generation event-driven programming language
and integrated development environment (IDE) from Microsoft for its COM
programming model first released in 1991. Visual Basic is designed to be relatively
easy to learn and use. Visual Basic was derived from BASIC and enables the rapid
application development (RAD) of graphical user interface (GUI) applications,
access to databases using Data Access Objects, Remote Data Objects, or ActiveX
Data Objects, and creation of ActiveX controls and objects. Scripting languages such
as VB and VBScript are syntactically similar to Visual Basic, but perform differently.
A programmer can put together an application using the components provided
with Visual Basic itself. Programs written in Visual Basic can also use the Windows
API, but doing so requires external function declarations. Though the program has
received criticism for its perceived faults, from version 3 Visual Basic was a runaway
commercial success, and many companies offered third party controls greatly
extending its functionality.
The final release was version 6 in 1998. Microsoft's extended support ended in
March 2008 and the designated successor was Visual Basic .NET (now known
simply as Visual Basic).
8
MS ACCESS 2003
Microsoft Office Access, previously known as Microsoft Access, is a database
management system from Microsoft that combines the relational Microsoft Jet
Database Engine with a graphical user interface and software-development tools. It is
a member of the Microsoft Office suite of applications, included in the Professional
and higher editions or sold separately. On May 12, 2010, the current version of
Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft Office
Access 2007 was the prior version.
MS Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other applications and
databases.
Software developers and data architects can use Microsoft Access to develop
application software, and "power users" can use it to build software applications. Like
other Office applications, Access is supported by Visual Basic for Applications, an
object-oriented programming language that can reference a variety of objects
including DAO (Data Access Objects), ActiveX Data Objects, and many other
ActiveX components. Visual objects used in forms and reports expose their methods
and properties in the VBA programming environment, and VBA code modules may
declare and call Windows operating-system functions.
9
3. SYSTEM SPECIFICATION
3.1 DESIGN NOTATION
The diagrammatic representation of the project is described under this section.
The notations of representation in the form of Data Flow Diagram, System Flow Diagram
and Entity - Relationship Diagram. Data (record) transferring between the tuples is
denoted in Data Flow Diagram. System Flow Diagram provides entire view (structure) of
the project. (i.e.), the master database handled in the project, transaction process done
under the project and the reports produced by the system. E - R Diagram gives a link
between the entities (tables). The relations may be one to many, one to one and many too
many.
3.1.1 DATA FLOW DIAGRAM
1. LEVEL 0 DFD
10
1. LEVEL 1 DFD
2. LEVEL 2 DFD
11
3. LEVEL 3 DFD
12
4. LEVEL 4 DFD
13
3.2 DESIGN PROCESS
3.2.1 INPUT DESIGN
The code design should be less amount of coding so, it can achieve more results.
The speed of the system will be more coding is less? Whether the data in the system is
usable and readable by the system is depending on the coding to design the source
document, the analyst must decide what data must be captured. Then the analyst can
develop a layout of the document, showing what items are included and where they will
be placed.
3.2.2. OUTPUT DESIGN
The output design was done so that the result of processing could be
communication to the users. The output defined with reference to the following. The
frequency of the output, whether it was needed daily, weekly or monthly was
defined. The accuracy requirements of the data were also defined. The system
provides the following list of reports.
3.2.3. TABLE DESIGN
Information must be collected, accumulated, edited and should directly be
retrieved. The table should be properly designed and planned. The tables are important
for the successful performance of the system.
Table: Admin Login
Primary Key: Username
14
Table: Charge Sheet
Primary Key: ChrgShtNo
Table: Complaint Reg
Primary Key:CName
Table: Complaint
Primary Key:ComplntNo
15
Table: Criminal reg
Primary Key:CriminalNo
Table: Most Wanted
Table: History
Primary Key:PrisonerNo
16
Table: Prisoners Reg
Primary Key:PrisonerNo
Table: Prisoners Temp
Primary Key: PrisonerNo
Table: Post Mortem
Primary Key: PMortemNo
17
Table: FIR
Primary Key:Firno
18
4. TESTING AND IMPLEMENTATION
4.1. INTRODUCTION
Testing is a series of different tests that whose primary purpose is to fully
exercise the computer based system. Although each test has a different purpose, all
work should verify that asll system element have been properly integrated and
performed allocated function. Testing is the process of checking whether the
developed system works according to the actual requirement and objective of the
system.
4.2. SYSTEM TESTING
The designed new system is tested with the sample data final outputs are
verified with the actual manual reports. If these reports are satisfied then system is
put to process with online data entry.
Computer program testing is performed to verify that the computer based
business system has met its design objective. The system includes the computer
components as one of major elements. The user is responsible for supplying the input
data and for participating in the evaluation of the system test results. System test
reports are prepared to validate system performance.
Testing is vital for the success of the system. System testing makes a logical
assumption that if all the paths are correct, the goal will be successfully achieved.
System testing is the utility as user-oriented vehicle before implementation.
A test plan entails the following activities,
• Prepare test plan
• Specify condition for user acceptance testing
• Prepare test data for program testing
• Plan user training
19
TESTING METHODOLOGIES
A series of testing is performed for the proposed system. The system is ready
for user acceptance.
The Steps of Testing
Unit testing
Integration testing
Validation testing
Output testing
User acceptance testing
Unit Testing
In unit testing, each program unit is tested individually. Unit testing focuses
verification effort on the smallest unit of software design, the field. This is known as
field-testing. This testing is carried out during the programming itself.
Integration testing
In this stage, the individual modules are integrated in to a single entire system
and are tested for its proper integration. Their functionality is testing with the test
data. The validity of the system achieves its main objective.
Validation testing
Validation testing can be defined in many ways, but a simple definition is
that, validation succeeds when the software functions in a manner that can be
reasonably expected by the user.
20
Output testing
Once all the procedures of a subsystem have tested individually output of one
procedure is fed to the other and the results at the procedures are matched with the
original results.
User acceptance testing
The developer does all the above tests. After these tests, team of employee
from the organization executes the system for validation and their feedbacks are
received. The corrections were made to the system wherever necessary.
4.3. SYSTEM IMPLEMENTATION
Implementation refers to the process of converting a new or a revised system
design into an operational one.
The major activities in the implementation phase are:
1. Preparation of implementation plan
2. Assessing equipment
3. User or personal training
4. Change over plans
Preparation of implementation
The implementation plan begins with preparing a plan for the implementation
of the system. This plan was made regarding the equipment, resources available and
how to test the activities. Thus a clear plan was prepared for all the activities.
21
1. Assessing Equipment
In order to implement the proposed system the need of equipment has been
assessed.
2. User Training
It has been suggested that a person involved in the organization has to be
selected for the implementation of the proposed system and the selected people
should be trained before the implementation plan.
3. Change Over
The following suggestions were made during the changeover plan,
1. Changeover has to be made carefully so as to minimize the problems that
may arise from human errors and machine malfunctions.
2. It is suggested to run parallel (both the existing and proposed system) as the
methods of change over, here data from manual system are run on the system.
After the results are obtained from the manual system, these results are
compared with the proposed computerized system.
4.4. SYSTEM SECURITY
Every system should possess the property of security in order to secure and
safeguard the system from unauthorized users. Even through the system functions
efficiently according to the need user and produces correct output, the system will not
be a complete one if it does not includes measures to safeguard the system and
protect it from the third parties.
22
In this system security is provided through password. No one can enter the
system without knowing the password. And also the admin user has the unique
password to update their master information. The password will be given only to the
user of the system and hence no unauthorized entry can make into the system.
4.5. SYSTEM MAINTENANCE
The definition of the maintenance of the system can be given by describing
four activities that are undertaken after program is released for use.
The first maintenance activities occur since it is unreasonable to assume that
testing will uncover all errors in this large system. The process of including the
diagnosis and correction of one or more errors is called corrective maintenance. The
second activity that contributes to a definition of maintenance occurs due to repaid
changes encountered in every aspect of computing. Therefore adaptive maintenance
modifies software to properly interface with a changing environment. The third
activity involves recommendation for new capabilities to the existing functions and
generation’s enhancements when the system is used. To satisfy requests perfect
maintenance is performed. The fourth maintenance activity occurs when system is
change to improve the future maintainability or reliability this is called a preventive
maintenance.
23
5. CONCLUSION
CRIME FILE SYSTEM initiates the objective of providing the user
with customized and powerful complaint registration and process management
system side software. The software is built with all options such as complaint
registration, prisoner’s registration, and post-mortem report generation etc…All
the requirements specified during the analysis and design phase are fully met,
thus resulting in the formation of good software. The interface provided is very
user friendly and flexible for all times.
This project made user friendly by the wide use of VB enabling the user
to interest easily with the database. This project might be easier for the staff to
maintain the system effectively.
24
6. FUTURE ENHANCEMENT
• We can update this system as online application
• The main advantage of online application is that, a person can report
the crime anytime from anywhere.
• Users can view the progress of their complaint online.
• By the future technology user can view the case details and progress
of the complaints on their mobile phones
• Face recognition technology can apply. User or witness of the crime
can give the physical information of the thief.
25
7. BIBLIOGRAPHY
BOOKS:
Elias M.Award, “System Analysis and Design”, Second edition, Galgotial
Publications(P) Ltd, 2000.
Jeffery L.Whitten, Lonnie D.Dentely, “System Analysis and Design Methods”,
Fourth Edition. Irwin McGraw Hill. A division of Mc Graw-Hill Companies.
Ian sommerville and A.d.Mc Getric. “Software Engineering”, Sixth Edition,
Person Education, 2002.
MS Office 2003 Complete Edition, BPB Publications, 2004.
Visual Basic 6.0 Complete Edition, Noel Jerke, Sixth edition, Tata McGrew-Hill
Publishing Company Limited.
WEBSITES:
http://www.vbcode.com
http://www.vbreferences.com
www.example-code.com
www.functionx.com
26
APPENDIX
SAMPLE CODING
Add Complaint
Private Sub cmdAdd_Click()
If (cmbComplntNo.Text = "" Or txtStatus.Text = "") Then
MsgBox "Missing Fields", vbInformation, "CFS"
Else
con.Execute ("insert into ComplntStatus values(" + cmbComplntNo.Text + ",'" +
txtStatus.Text + "')")
MsgBox "Status Added Successfully", vbInformation, "Crime File System"
txtDetails.Text = ""
txtStatus.Text = ""
cmbComplntNo.SetFocus
End If
End Sub
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdDetails_Click()
Set rs = con.Execute("select Details from ComplaintReg where ComplntNo=" +
cmbComplntNo.Text + "")
If (Not rs.EOF) Then
txtDetails.Text = rs(0)
txtStatus.SetFocus
End If
27
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select ComplntNo from ComplaintReg")
While (Not rs.EOF)
cmbComplntNo.AddItem rs(0)
rs.MoveNext
Wend
rs.Close
End Sub
Add user
Private Sub Form_Load()
connectdb
End Sub
Private Sub cmdAdd_Click()
Set rs = con.Execute("select * from UserLogin where Username='" +
txtUsername.Text + "' and Password='" + txtPassword.Text + "'")
If (Not rs.EOF) Then
MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime
File System"
txtPassword.Text = ""
txtUsername.Text = ""
txtUsername.SetFocus
Else
con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" +
txtPassword.Text + "')")
MsgBox "User added sucessfully", vbInformation, "Crime File System"
28
txtPassword.Text = ""
txtUsername.Text = ""
txtUsername.SetFocus
End If
End Sub
Private Sub cmdCancel_Click()
Unload Me
FIR Report
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand4.State = 1) Then
DataEnvironment1.rsCommand4.Close
Else
DataEnvironment1.Command4 (x)
Load DataReportFIR
DataReportFIR.Show
End If
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbMno.AddItem rs(0)
rs.MoveNext
Wend
End Sub
29
Login
Private Sub cmdAdminLog_Click()
Set rs = con.Execute("Select * from AdminLogin where Username='" +
txtUname.Text + "' and Password='" + txtPass.Text + "'")
If (Not rs.EOF) Then
MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled = True
frmMDI.mnuAdminAddU.Enabled = True
frmMDI.mnuAdminDelU.Enabled = True
frmMDI.mnuActiv.Enabled = True
frmMDI.mnuLogin.Enabled = False
frmMDI.mnuAdminAddComSt.Enabled = True
frmMDI.mnuActivReg.Enabled = True
frmMDI.mnuActivComp.Enabled = True
frmMDI.mnuActivRpt.Enabled = True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
Unload Me
End Sub
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdUserLog_Click()
30
Set rs = con.Execute("Select * from UserLogin where Username='" +
txtUname.Text + "' and Password='" + txtPass.Text + "'")
If (Not rs.EOF) Then
MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled = True
frmMDI.mnuLogin.Enabled = False
frmMDI.mnuActiv.Enabled = True
frmMDI.mnuActivReg.Enabled = True
frmMDI.mnuActivComp.Enabled = True
frmMDI.mnuActivRpt.Enabled = True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
End Sub
Private Sub Form_Load()
connectdb
End Sub
Private Sub Form_Unload(Cancel As Integer)
con.Close
End Sub
31
Post Mortem Report
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand3.State = 1) Then
DataEnvironment1.rsCommand3.Close
Else
DataEnvironment1.Command3 (x)
Load DataReportmortem
DataReportmortem.Show
End If
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select PMortemNo from Postmortem")
While (Not rs.EOF)
cmbMno.AddItem rs(0)
rs.MoveNext
end
End Sub
Splash
Dim i As Integer
Dim x As Integer
Option Explicit
Private Sub Form_Load()
File1.FileName = App.Path
x = File1.ListCount
32
End Sub
Private Sub Form_MouseDown(Button As Integer, Shift As Integer, x As Single, Y
As Single)
Unload Me
End Sub
Private Sub Form_Unload(Cancel As Integer)
Load frmMDI
frmMDI.Show
End Sub
Private Sub Frame1_MouseDown(Button As Integer, Shift As Integer, x As Single,
Y As Single)
Unload Me
End Sub
Private Sub Timer1_Timer()
If (Image1.Left <= 6480) Then
Image1.Left = Image1.Left + 100
Else
Image1.Left = 0
End If
If (i <= x) Then
Label2.Caption = File1.List(i)
i = i + 1
Else
Load frmMDI
frmMDI.Show
Unload Me
End If
End Sub
33
SAMPLE SCREENS
Login
Add New User
34
Admin Complaint Status
Criminal Register
35
Delete User
Post mortem
36
Post mortem report