Crime Management Report
Crime Management Report
On
CRIME REPORT
Submitted by
Suraj Singh-1550813040
Nikita Rai-1550813024
Bachelor Of Technology
IN
INFORMATION TECHNOLOGY
Under the Guidance of
Mr. ANKIT SINGH
Asst. Professor BBDEC IT
Certified that Suraj Singh and Nikita Rai has carried out the Project work presented in this report
entitled Crime Report for the B.Tech. ( Computer Science & Engineering ) Fourth Year (Eight
Semester) from Babu Banarasi Das Engineering College , Lucknow under my supervision. The report
embodies result of original work and studies carried out by Student himself and the contents of the
Project do not form the basis for the award of any other degree to the candidate or to anybody else.
2
ACKNOWLEDGEMENT
I express my profound gratitude to Mrs. Komal Asrani (Head Of Department), Mr. ANKIT SINGH
(Assistant Professor) , Department Of Information Technology for the valuable help and guidance in
the preparation of this report on ”Crime Report”.
I would like to extend my sincere thanks to all lab assistants and all other staff members of B.Tech
Information Technology department.
Finally I would also wish to record my gratefulness to all my friends and classmates for their help.
SURAJ SINGH
(1550813040)
NIKTA RAI
(1550813024)
3
TABLE OF CONTENTS
CHAPTER TITLE PAGE NO
1 Introduction 7
2 Objective 8
3 Need of Identification 9
4 Problem Statement 10
6 Feasibility Study 14
4
8 Module Detail 28
8.1 Login for User and Admin 28
8.2 Complaint Registration 28
8.3 View Complaint Status 28
8.4 Criminal Register Management 28
8.5 FIR Management 28
8.6 Case History Detail Management 28
8.7 Manage List about most wanted criminal 28
ER-Diagram 34
10 Data Structure 35-39
11 Screen Shots 40
11.1 Home Page 40
11.2 Sign In 41
11.3 New User Registration 42
11.4 User Home Page 43
11.5 Lodge FIR 44
11.6 Admin Login 45
11.7 Admin Panel 46
11.8 FIR Status 47
11.9 Thana IN-Charge 48
11.10 FIR Execution 49
11.11 View All FIRs 50
11.12 Criminal Registration 51
12 Source Code 52-71
13 Conclusion 72
5
List Of Figure And Table
ER-Diagram 33
2 Data Structure 34-38
3 Screen Shots 39
3. 1 Home Page 39
3.2 Sign In 40
3.3 New User Registration 41
3.4 User Home Page 42
3.5 Lodge FIR 43
3.6 Admin Login 44
3.7 Admin Panel 45
3.8 FIR Status 46
3.9 Thana IN-Charge 47
3.10 FIR Execution 48
3.11 View All FIRs 49
3.12 Criminal Registration 50
6
CHAPTER 1
INTRODUCTION
Crime Report is a system used to report crimes. It applies to all Police stations across the country
and specifically looks into the subject of Crime Records Management. It is well understood that Crime
Information Management. The efficiency of the police function and the effectiveness with which it tackles
crime depend on what quality of information it can derive from its existing records and how fast it can
have access to it.This system will help to manage all the activities in a police station using computers.
It is proposed to centralize Information Management in Crime for the purposes of fast and efficient
sharing of critical information across all Police Stations across the territory. Initially, the system will be
implemented across Cities and Towns and later on, be interlinked so that a Police detective can access
information across all records in the state thus helping speedy and successful completion to cases. The
System would also be used to generate information for pro-active and preventive measures for fighting
crime.
7
CHAPTER 2
OBJECTIVE
The aim of proposed system is to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system. The system provides proper security and
reduces the manual work. The product provides a framework within which a user can easily work
with. That was out next objective. We know users are of many categories, like users from
whoknow working with computers very well to users who didn’t know about computers. It should
Security of data.
Greater efficiency.
Better service.
8
CHAPTER 3
NEED OF IDENTIFICATION
Security of data.
Greater efficiency.
Better service.
Project Scope
This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic during
testing phase. Any changes made to the requirements in the future will have to go through formal change
approval process.
9
CHAPTER 4
PROBLEM STATEMENT
Existing System-
The existing system contains about all the police stations that are registered as per the jurisdiction of
the system. It also gets integrated with the employees who are working in these stations along with their
designation.
Time consuming.
Proposed System-
The system after careful analysis has been identified to be presented with the following key
features divided in modules –
Login for user and admin
Complaint registration
FIR Management
10
CHAPTER 5
SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing problems and
the information to recommend improvements on the system. It is a problem solving activity that
requires intensive communication between the system users and system developers. System
analysis or study is an important phase of any system development process. The system is studied
to the minutest detail and analyzed. The system analyst plays the role of the interrogator and
dwells deep into the working of the present system. The system is viewed as a whole and the input
to the system are identified. The outputs from the organizations are traced to the various
processes. System analysis is concerned with becoming aware of the problem, identifying the
relevant and decisional variables, analyzing and synthesizing the various factors and determining
A detailed study of the process must be made by various techniques like interviews,
questionnaires etc. The data collected by these sources must be scrutinized to arrive to a
conclusion. The conclusion is an understanding of how the system functions. This system is called
the existing system. Now the existing system is subjected to close study and problem areas are
identified. The designer now functions as a problem solver and tries to sort out the difficulties that
the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the
existing system analytically and the best one is selected. The proposal is presented to the user for
11
an endorsement by the user. The proposal is reviewed on user request and suitable changes are
made. This is loop that ends as soon as the user is satisfied with proposal.
Business Needs-
Maintaining the information regarding all employees, components and computers at single
To provide an user friendly and multi-user interface for handling the application.
To provide a user authentication and different interface depending upon the type of user logged in
To provide maximum level of security for the data.
To provide the necessary reports to various users in time.
These are the main objectives of the Computer Resource Management System.
Benefits-
A computer based information system is usually needed for the following purposes.
12
Better Accuracy and Improved Consistency:
The computer carries out computing steps including arithmetic accurately and consistently from
which really human is escaped which yields more fatigue and boredom.
Cost Reduction:
Using computerization we can do the required operations with lower cost than any other methods.
Hence by computerization we can reduce the cost drastically.
13
CHAPTER 6
FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study lets the
developer foresee the future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the organization, ability to meet
their user needs and effective use of resources. Thus when a new application is proposed it
normally goes through a feasibility study before it is approved for development. The document
provide the feasibility of the project that is being designed and lists various areas that were
considered very carefully during the feasibility study of this project such as Technical, Economic
A. TECHNICAL FEASIBILITY-
The system must be evaluated from the technical point of view first. The assessment of this
feasibility must be based on an outline design of the system requirement in the terms of input,
output, programs and procedures. Having identified an outline system, the investigation must go
on to suggest the type of equipment, required method developing the system, of running the system
14
The project should be developed such that the necessary functions and performance are
achieved within the constraints. The project is developed within latest technology. Through
the technology may become obsolete after some period of time, due to the fact that never
version of same software supports older versions, the system may still be used. So there are
minimal constraints involved with this project. The system has been developed using Java
B. ECONOMIC FEASIBILITY-
The developing system must be justified by cost and benefit. Criteria to ensure that
effort is concentrated on project, which will give best, return at the earliest. One of the
factors, which affect the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary
investigation:
Since the system is developed as part of project work, there is no manual cost to spend
for the proposed system. Also all the resources are already available, it give an indication
15
C. BEHAVIORAL FEASIBILITY-
The project would be beneficial because it satisfies the objectives when developed and installed. All
behavioral aspects are considered carefully and conclude that the project is behaviorally feasible.
16
CHAPTER 7
The software, Crime Report is designed for management of web sites from a remote location.
Purpose-
The main purpose for preparing this document is to give a general insight into the analysis
and requirements of the existing system or situation and for determining the operating characteristics of
the system.
Scope-
This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic during
testing phase. Any changes made to the requirements in the future will have to go through formal change
approval process.
Developing the system, which meets the SRS and solving all the requirements of the system?
Demonstrating the system and installing the system at client's location after the acceptance testing is
successful.
Submitting the required user manual describing the system interfaces to work on it and also the
documents of the system.
Conducting any user training that might be needed for using the system.
Maintaining the system for a period of one year after installation.
17
Output Design-
Outputs from computer systems are required primarily to communicate the results of processing to
users. They are also used to provides a permanent copy of the results for later consultation. The various
types of outputs in general are:
Output Definition-
It is not always desirable to print or display data as it is held on a computer. It should be decided as
which form of the output is the most suitable.
18
Output Media-
In the next stage it is to be decided that which medium is the most appropriate for the output. The
main considerations when deciding about the output media are:
Keeping in view the above description the project is to have outputs mainly coming under the category
of internal outputs. The main outputs desired according to the requirement specification are:
The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the
screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are
currently being obtained after manual processing. The standard printer is to be used as output media for
hard copies.
Input Design-
Input design is a part of overall system design. The main objective during the input design is as
given below:
19
Input Stages-
Data recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
Input Types-
It is necessary to determine the various types of inputs. Inputs can be categorized as follows:
Input Media-
At this stage choice has to be made about the input media. To conclude about the
input media consideration has to be given to;
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
20
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it can be said that most
of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the
user, the keyboard can be considered to be the most suitable input device.
Error Avoidance-
At this stage care is to be taken to ensure that input data remains accurate form the stage at which
it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by
means of careful control each time the data is handled.
Error Detection-
Even though every effort is make to avoid the occurrence of errors, still a small proportion of
errors is always likely to occur, these types of errors can be discovered by using validations to check the
input data.
Data Validation-
Procedures are designed to detect errors in data at a lower level of detail. Data validations have
been included in the system in almost every area where there is a possibility for the user to commit errors.
The system will not accept invalid data. Whenever an invalid data is keyed in, the system immediately
prompts the user and the user has to again key in the data and the system will accept the data only if the
data is correct. Validations have been included where necessary.
21
The system is designed to be a user friendly one. In other words the system has been designed to
communicate effectively with the user. The system has been designed with popup menus.
It is essential to consult the system users and discuss their needs while designing the user interface:
1. User initiated interface the user is in charge, controlling the progress of the user/computer dialogue. In
the computer-initiated interface, the computer selects the next stage in the interaction.
2. Computer initiated interfaces
In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or displays further
information.
The design of error messages is an important part of the user interface design. As user is bound to
commit some errors or other while designing a system the system should be designed to be helpful by
providing the user with information regarding the error he/she has committed.
Performance Requirements-
Performance is measured in terms of the output provided by the application .Requirement specification
plays an important part in the analysis of a system. Only when the requirement specifications are properly
given, it is possible to design a system, which will fit into required environment. It rests largely in the part
of the users of the existing system to give the requirement specifications because they are the people who
finally use the system. This is because the requirements have to be known during the initial stages so that
the system can be designed according to those requirements. It is very difficult to change the system once
it has been designed and on the other hand designing a system, which does not cater to the requirements of
the user, is of no use.
22
The requirement specification for any system can be broadly stated as given below:
The existing system is completely dependent on the user to perform all the duties.
FUNCTIONAL REQUIREMENT
Chancellor who will be acting as the controller and he will have all the privileges of administrator.
Faculty members who will be using the above features by accessing the UMS online.
Students who will be using the above features by accessing the UMS online
Faculty members can mark the attendance of students online.
Can view the attendance online.
Can upload marks, assignments, reading materials for students
NON-FUNCTIONAL REQUIREMENT-
23
Project Schedule Plan-
Gantt chart is a project scheduling technique. Progress can be represented easily in Gantt chart, by
coloring each milestone when completed. The project will start in the month of February and end will
end after 4 months at the end May. System Planning is one of the important items to be considered before
actually beginning the project.
24
INPUT AND OUTPUTS-
The major inputs and outputs and major functions of the system are follows:
Inputs:
Administrator enter his user id and password for login to authenticate in this system.
Administrator manages all the records related to complaint and FIR.
While registering for complaint, it will take following information as input-
1. User id
2. User name
3. Password
4. Mobile Number
Date of Birth
Gender
Address
Photo upload
E-mail
Following Inputs are also required to get information about the Chargesheet, FIR, and Complaint etc. as –
Input FIR
Input Complaint
Managing PostMortem Details
Managing Most Wanted Criminal list
Updating records of prisoners and criminals
Etc.
Outputs:
25
HARDWARE SPECIFICATION
Server Side:
Microprocessor Pentium-3 class processor, 450 megahertz (MHz)
Client Side:
Operating System Any
RAM 1 GB
HDD 40 GB
Developer:
Microprocessor 2.27 (GHz)
RAM 2 GB
HDD 80 GB
26
SOFTWARE SPECIFICATION
Server Side:
Browser Any java enable web browser.
Database MySql
OS Any
Client Side:
Operating System Any
Developer:
Browser Any java enable web browser.
Database MySql
Webserver Apache
27
Chapter 8
Modules’ Details
Complaint registration-
This module helps to register the details about the crime. This is done by entering some details,
such as incident details, Victim details, crime details etc
FIR Management-
This module allows viewing the First Information Report of all the crimes that took place at
recent years. The administrator can enter FIR information and save it in a database.
28
CHAPTER 9
0 Level DFD
Fig.1
29
1 Level DFD
Fig.2
30
2-LEVEL DFD
Fig.3
31
Fig.4
32
Fig.5
33
ER-Diagram
User
m Crime m Name
Report Password
nationa 1 1 1 User
lity UserId User Type
act
Name
Occup Dist
User ation Admin FIR date
Police st
Registration age 1 name
FIRno
Sex FIR type
Complaint
FIR FIR Details no
CharDate
Criminal
No
Criminal
CName Nick
Type
Name
Charge Sheet PoliceSt
Occup
Name age
CharSh
No sex
Dist Criminal
1 Criminal
Registrat has
FIRno ion
Details
Nick
name
MstNo
Mst
Name Most Wanted
Desc
Fig.6
34
CHAPTER 10
Data Structures
This table store details of Admin, how control all system It contains following fields
Did Varchar(40) NO
Password Varchar(40) NO
Name Varchar(40) NO
MobileNo bigInt NO
Dob Date NO
35
Gender Varchar(10) NO
36
Table Name: Complaint
37
Table Name: Most Wanted
SCREEN SHOTS
38
SCREEN SHOTS
Home Page
Fig-7
39
Sign In
Fig-8
40
New User Registration
Fig-9
41
User Home Page
Fig-10
42
Lodge FIR
Fig-11
43
Admin Login
Fig-12
44
Admin Panel
Fig-13
45
FIR Status
Fig-14
46
Thana In charge
Fig-15
47
FIR Execution
Fig-16
48
View All FIRs
Fig-17
49
Criminal Registration
Fig-18
50
SOURCE CODE
About.Php
<?php require("includes/header.php");?>
<!Doctype html>
<head>
<title></title>
</head>
<body>
<!--header-->
<!--wrapper-->
<div id="wrapper">
<div id="lowerbanner">
<h1>About Us</h1>
</div>
<div id="lside">
<ul>
<li><a href="aboutus.php">About</a></li><br/>
51
<li><a href="ouraim.php">Our Aim</a></li><br/>
</ul>
</div>
<div id="contentarea">
<h1>About</h1>
The main idea behind carrying out this project is not for the mere
completion of the degree and getting marks but to serve the society and our environment as well
and to help them in their fight against offensive persons of the society and to work as the safeguard
for those who are the victims of any type of criminal offences committed by criminal minded
people on them or their family members directly or indirectly.
</p>
<p class="restrict">
With the help of this project the general masses of people and
citizens can lookup to the much awaited justice and fir complaints against the bad elements of the
society.</p>
</div>s.</p>
52
<div id="rside">
<center>
<br/>
<br/>
<br/>
<br/>
<br/>
<br/>
</center>
</div>
</div>
<!--footer-->
<?php require("includes/footer.php");?>
53
Benefits.php
<?php require("includes/header.php");?>
<!Doctype html>
<head>
<title></title>
</head>
<body>
<!--header-->
<!--wrapper-->
<div id="wrapper">
<div id="lowerbanner">
<h1>About Us</h1>
</div>
<div id="lside">
<ul>
<li><a href="crimes.php">Crimes</a></li><br/>
54
<li><a href="crimeup.php">Crime Scene in
UP</a></li><br/>
<li><a href="quickresponse.php">Quick
Response</a></li><br/>
<li><a href="benefits.php">Benefits</a></li><br/>
<li><a href="emergencies.php">Emergencies</a></li><br/>
</ul>
</div>
<div id="contentarea">
<p class="restrict">
The main idea behind carrying out this project is not for the mere
completion of the degree and getting marks but to serve the society and our environment as well
and to help them in their fight against offensive persons of the society and to work as the safeguard
for those who are the victims of any type of criminal offences committed by criminal minded
people on them or their family members directly or indirectly.
</p>
55
<p class="restrict">
The following project has been carried out and maintained inorder to
take care of the society and our nearby political and apolitical environment and to provide services
to the prople who are fighting their battels against asocial elemnts of the society in the following
described manner and ways:
<ul>
</ul>
</p>
<p class="restrict">
With the help of this project the general masses of people and
citizens can lookup to the much awaited justice and fir complaints against the bad elements of the
society.</p>
</div>
<div id="rside">
56
<center>
<br/>
<br/>
<br/>
<br/>
<br/>
<br/>
</center>
</div>
</div>
<!--footer-->
<?php require("includes/footer.php");?>
57
Captch.Php
<?php
error_reporting(0);
session_start();
header('content-type:image/png');
$dir='font/';
$txt='';
$txt.=chr(rand(97,130));
$_SESSION['code']=$txt;
$image=imagecreate(150,150);
$x=imagecolorallocate($image,25,10,200);
$y=imagecolorallocate($image,25,10,90);
imagefilledrectangle($image,0,0,160,160,$y);
imagettftext($image,30,45,60,80,$x,$dir.'roughage.ttf',$_SESSION['code']);
imagepng($image);
?>
58
Case-details.php
<?php
session_start();
require("includes/admin-header.php");
include("db.php");
$cid = $_REQUEST['cid'];
?>
<!Doctype html>
<head>
<title></title>
</head>
<body>
<!--header-->
<!--wrapper-->
<div id="wrapper">
<div id="lowerbanner">
<center>
<?php
?>
<tr height="40">
</tr>
<tr height="40">
</tr>
<tr height="40">
</tr>
<tr height="40">
</tr>
<tr height="40">
</tr>
<tr height="40">
<th width="40%">THANA</th>
60
<th><?php echo $result['thana'] ?></th>
</tr>
<tr height="40">
<th><?php
$td = mysql_fetch_assoc($qry);
echo $td['name']
?></th>
</tr>
<tr height="40">
<th><?php
$t = mysql_fetch_assoc($q);
echo $t['apo']
?></th>
</tr>
<tr height="40">
<th><?php
echo $t['mobileno']
?></th>
61
</tr>
<tr height="40">
<th><?php
echo $t['gender']
?></th>
</tr>
<tr height="40">
<th><?php
echo $t['email']
?></th>
</tr>
<tr height="40">
<th width="15%">ADDRESS</th>
</tr>
<tr height="40">
<th width="40%">TOPIC</th>
</tr>
<tr height="40">
<th width="40%">DATE</th>
62
</tr>
<tr height="40">
</tr>
<tr height="40">
<th><?php
$res = mysql_fetch_assoc($que);
if (mysql_num_rows($que)) {
if ($res['status'] == 0) {
?>
<span style="color:green;font-weight:bolder;">Processing</span>
<?php
} else {
?></th>
</tr>
63
</table>
</center>
</div>
</div>
<!--footer-->
Contact us.php
<!Doctype html>
<head>
<title></title>
<body>
<!--header-->
<!--wrapper-->
<div id="wrapper">
<h1>Contact Us</h1>
</div>
64
<tr class="success">
<td style="font-weight:bolder;"></td>
</tr>
<tr class="danger">
<td></td>
</tr>
<td></td>
</tr>
<tr class="warning">
<td></td>
</tr>
</table>
</div>
<tr class="success">
<td style="font-weight:bolder;"></td>
</tr>
<tr class="danger">
<td></td>
</tr>
<td></td>
65
</tr>
<tr class="warning">
<td></td>
</tr>
</table>
</div>
<tr class="success">
<td style="font-weight:bolder;"></td>
</tr>
<tr class="danger">
<td></td>
</tr>
<td></td>
</tr>
<tr class="warning">
<td></td>
</tr>
</table>
</div>
</div>
<!--footer-->
66
<?php require("includes/footer.php"); ?>
crimejudgement.php
<?php
require("includes/thana-header.php");
include("db.php");
$id = $_REQUEST['m'];
?>
<!Doctype html>
<head>
<title></title>
</head>
<body>
<!--header-->
<!--wrapper-->
<div id="wrapper">
<div id="lowerbanner">
<h1>JUDGEMENT</h1>
<center>
67
<th> SR.NO </th><th> CASE-ID </th><th> NAME </th> <th>POLICE OFFICER
MOBILE-NO </th> <th> ALLOTED POLICE OFFICER </th> <th>JUDGEMENT
DETAILS</th>
</tr>
<?php
$result = mysql_query($query);
?>
<tr height="40">
</tr>
<?php } ?>
</table>
</center>
</div>
68
</div>
<!--footer-->
criminal-delete.php
<?php
session_start();
require("db.php");
$id = $_REQUEST['id'];
header('Location: criminallist.php');
?>
criminaldetails.php
<?php require("includes/header.php");
?>
<!Doctype html>
<head>
<title></title>
</head>
<body>
<!--header-->
69
<!--wrapper-->
<div id="wrapper">
<div id="lowerbanner">
<h1>CRIMINAL'S DETAILS</h1>
<center>
<P><?php
$i=$_REQUEST['id'];
echo $i;
?>
<P>
</center>
</div>
</div>
<!--footer-->
<?php require("includes/footer.php");?>
70
Conclusion
Crime Report System initiates the objective of providing the user with customized and powerful
complaint registration and process management system side software. The software is built with
all options such as complaint registration, prisoner’s registration, and postmortem report
generation etc…All the requirements specified during the analysis and design phase are fully met,
thus resulting in the formation of good software. The interface provided is very user friendly and
flexible for all times.
71