0% found this document useful (0 votes)
96 views

Crime Management Report

This document provides an overview of a project report on a Crime Report system. It includes sections on the introduction, objectives, need for identification, problem statement, system analysis, feasibility study, system requirements specification, data flow diagrams, entity relationship diagram, data structures, screen shots, source code, and conclusion. The project aims to develop an improved system for managing crime records and reports across police stations to enhance security, accuracy, control, efficiency and reduce manual work.

Uploaded by

SHREYANSH THAKUR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views

Crime Management Report

This document provides an overview of a project report on a Crime Report system. It includes sections on the introduction, objectives, need for identification, problem statement, system analysis, feasibility study, system requirements specification, data flow diagrams, entity relationship diagram, data structures, screen shots, source code, and conclusion. The project aims to develop an improved system for managing crime records and reports across police stations to enhance security, accuracy, control, efficiency and reduce manual work.

Uploaded by

SHREYANSH THAKUR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 71

A Project Report

On
CRIME REPORT
Submitted by
Suraj Singh-1550813040
Nikita Rai-1550813024

In partial fulfillment for the award of the


Degree of

Bachelor Of Technology
IN

INFORMATION TECHNOLOGY
Under the Guidance of
Mr. ANKIT SINGH
Asst. Professor BBDEC IT

BABU BANARASI DAS ENGINEERING COLLEGE


LUCKNOW
Department of Information Technology
2018-19
1
CERTIFICATE

Certified that Suraj Singh and Nikita Rai has carried out the Project work presented in this report
entitled Crime Report for the B.Tech. ( Computer Science & Engineering ) Fourth Year (Eight
Semester) from Babu Banarasi Das Engineering College , Lucknow under my supervision. The report
embodies result of original work and studies carried out by Student himself and the contents of the
Project do not form the basis for the award of any other degree to the candidate or to anybody else.

Mr. Ankit Singh


(Assistant Professor Dept. of IT, BBDEC)

2
ACKNOWLEDGEMENT

I express my profound gratitude to Mrs. Komal Asrani (Head Of Department), Mr. ANKIT SINGH
(Assistant Professor) , Department Of Information Technology for the valuable help and guidance in
the preparation of this report on ”Crime Report”.

I would like to extend my sincere thanks to all lab assistants and all other staff members of B.Tech
Information Technology department.

Finally I would also wish to record my gratefulness to all my friends and classmates for their help.

SURAJ SINGH
(1550813040)
NIKTA RAI
(1550813024)

3
TABLE OF CONTENTS
CHAPTER TITLE PAGE NO

1 Introduction 7

2 Objective 8

3 Need of Identification 9

4 Problem Statement 10

5 System Analysis 11-13

6 Feasibility Study 14

6.1 Technical Feasibility 14


6.2 Economic Feasibility 15
6.3 Behavioral Feasibility 16
7 System Requirement Specification 17
7.1 Purpose 17
7.2 Scope 17
7.3 Output Design 17
7.3.1 Output Definition 19
7.3.2 Output Media 19
7.4 Input Design 19
7.4.1 Input Stages 20
7.4.2 Input Types 20
7.4.3 Input Media 20
7.5 Error Avoidence 21
7.6 Error Detection 21
7.7 Data Validation 21
7.8 User Interface Design 22
22
7.9 Error Message Design
22
7.10 Performance Requirement
23
7.101 Functional Requirement
23
7.102 Non Functional Requirement
23
7.11 Project Schedule Plan
24
7.12 Input and Outputs 25
7.13 Hardware Specification 26
7.14 Software Specification 27

4
8 Module Detail 28
8.1 Login for User and Admin 28
8.2 Complaint Registration 28
8.3 View Complaint Status 28
8.4 Criminal Register Management 28
8.5 FIR Management 28
8.6 Case History Detail Management 28
8.7 Manage List about most wanted criminal 28

9 Data Flow Diagram (DFD) 29


9.1 0-Level DFD 29
9.2 1-Level DFD 30
9.3 2-Level DFD 31-33

ER-Diagram 34
10 Data Structure 35-39

11 Screen Shots 40
11.1 Home Page 40
11.2 Sign In 41
11.3 New User Registration 42
11.4 User Home Page 43
11.5 Lodge FIR 44
11.6 Admin Login 45
11.7 Admin Panel 46
11.8 FIR Status 47
11.9 Thana IN-Charge 48
11.10 FIR Execution 49
11.11 View All FIRs 50
11.12 Criminal Registration 51
12 Source Code 52-71

13 Conclusion 72

5
List Of Figure And Table

S.No Title Page No


1 Data Flow Diagram 28
1.1 0-Level DFD 28
1.2 1-Level DFD 29
1.3 2-Level DFD 30-32

ER-Diagram 33
2 Data Structure 34-38
3 Screen Shots 39
3. 1 Home Page 39
3.2 Sign In 40
3.3 New User Registration 41
3.4 User Home Page 42
3.5 Lodge FIR 43
3.6 Admin Login 44
3.7 Admin Panel 45
3.8 FIR Status 46
3.9 Thana IN-Charge 47
3.10 FIR Execution 48
3.11 View All FIRs 49
3.12 Criminal Registration 50

6
CHAPTER 1
INTRODUCTION

Crime Report is a system used to report crimes. It applies to all Police stations across the country

and specifically looks into the subject of Crime Records Management. It is well understood that Crime

Prevention, Detection and Conviction of criminals depend on a highly responsive backbone of

Information Management. The efficiency of the police function and the effectiveness with which it tackles

crime depend on what quality of information it can derive from its existing records and how fast it can

have access to it.This system will help to manage all the activities in a police station using computers.

It is proposed to centralize Information Management in Crime for the purposes of fast and efficient

sharing of critical information across all Police Stations across the territory. Initially, the system will be

implemented across Cities and Towns and later on, be interlinked so that a Police detective can access

information across all records in the state thus helping speedy and successful completion to cases. The

System would also be used to generate information for pro-active and preventive measures for fighting

crime.

7
CHAPTER 2

OBJECTIVE

The aim of proposed system is to develop a system of improved facilities. The proposed system

can overcome all the limitations of the existing system. The system provides proper security and

reduces the manual work. The product provides a framework within which a user can easily work

with. That was out next objective. We know users are of many categories, like users from

whoknow working with computers very well to users who didn’t know about computers. It should

be user friendly. Important features are:

 Security of data.

 Ensure data accuracy’s.

 Proper control of the higher officials.

 Minimize manual data entry.

 Minimum time needed for the various processing.

 Greater efficiency.

 Better service.

 User friendliness and interactive.

8
CHAPTER 3
NEED OF IDENTIFICATION

The aim of system is to develop a system of improved facilities. The system

provides proper security and reduces the manual work.

 Security of data.

 Ensure data accuracy’s.

 Proper control of the higher officials.

 Minimize manual data entry.

 Minimum time needed for the various processing.

 Greater efficiency.

 Better service.

 User friendliness and interactive.

 Minimum time required.

Project Scope

This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic during
testing phase. Any changes made to the requirements in the future will have to go through formal change
approval process.

9
CHAPTER 4
PROBLEM STATEMENT

Existing System-
The existing system contains about all the police stations that are registered as per the jurisdiction of
the system. It also gets integrated with the employees who are working in these stations along with their
designation.

 Lack of security of data.

 More man power.

 Time consuming.

 Consumes large volume of pare work.

 Needs manual calculations.

 No direct role for the higher officials.

Proposed System-

The system after careful analysis has been identified to be presented with the following key
features divided in modules –
 Login for user and admin

 Complaint registration

 View complaint status

 Criminal register management

 FIR Management

 Case History Details management

 Managing Postmortem details

 Prisoners register management

 Manage list about most wanted criminals

10
CHAPTER 5

SYSTEM ANALYSIS

Introduction to System Analysis

System analysis is a process of gathering and interpreting facts, diagnosing problems and

the information to recommend improvements on the system. It is a problem solving activity that

requires intensive communication between the system users and system developers. System

analysis or study is an important phase of any system development process. The system is studied

to the minutest detail and analyzed. The system analyst plays the role of the interrogator and

dwells deep into the working of the present system. The system is viewed as a whole and the input

to the system are identified. The outputs from the organizations are traced to the various

processes. System analysis is concerned with becoming aware of the problem, identifying the

relevant and decisional variables, analyzing and synthesizing the various factors and determining

an optimal or at least a satisfactory solution or program of action.

A detailed study of the process must be made by various techniques like interviews,

questionnaires etc. The data collected by these sources must be scrutinized to arrive to a

conclusion. The conclusion is an understanding of how the system functions. This system is called

the existing system. Now the existing system is subjected to close study and problem areas are

identified. The designer now functions as a problem solver and tries to sort out the difficulties that

the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the

existing system analytically and the best one is selected. The proposal is presented to the user for

11
an endorsement by the user. The proposal is reviewed on user request and suitable changes are

made. This is loop that ends as soon as the user is satisfied with proposal.

Business Needs-

Maintaining the information regarding all employees, components and computers at single

or multiple locations give raise to many problems like:

 Difficulty in retrieval of data in desired manner.


 Checking the uniqueness wherever it is required.
 Availability of information in this manner is subjected to damage.
 Providing security is also difficult.
One way to overcome all these difficulties is to store all the information into computer system. The
computerization helps the users a lot. The user can get information in desired manner. Data retrieval is
also easy and fast. This also restricts the users to enter invalid data and reduces the burden on the user.

 To provide an user friendly and multi-user interface for handling the application.
 To provide a user authentication and different interface depending upon the type of user logged in
 To provide maximum level of security for the data.
 To provide the necessary reports to various users in time.

These are the main objectives of the Computer Resource Management System.

Benefits-
A computer based information system is usually needed for the following purposes.

 Greater Processing Speed:


Using computers inherent ability to calculate, sort, retrieve data with greater speed than that of the
human doing we can get results in less time. Visual Basic guaranties for the faster query processing thus
we are satisfied with Visual Basic itself supporting in this direction.

12
 Better Accuracy and Improved Consistency:
The computer carries out computing steps including arithmetic accurately and consistently from
which really human is escaped which yields more fatigue and boredom.

 Cost Reduction:
Using computerization we can do the required operations with lower cost than any other methods.
Hence by computerization we can reduce the cost drastically.

13
CHAPTER 6

FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will serve the purpose of the

organization for the amount of work, effort and the time that spend on it. Feasibility study lets the

developer foresee the future of the project and the usefulness. A feasibility study of a system

proposal is according to its workability, which is the impact on the organization, ability to meet

their user needs and effective use of resources. Thus when a new application is proposed it

normally goes through a feasibility study before it is approved for development. The document

provide the feasibility of the project that is being designed and lists various areas that were

considered very carefully during the feasibility study of this project such as Technical, Economic

and Operational feasibilities. The following are its features:

A. TECHNICAL FEASIBILITY-

The system must be evaluated from the technical point of view first. The assessment of this

feasibility must be based on an outline design of the system requirement in the terms of input,

output, programs and procedures. Having identified an outline system, the investigation must go

on to suggest the type of equipment, required method developing the system, of running the system

once it has been designed.

Technical issues raised during the investigation are:

 Does the existing technology sufficient for the suggested one?

 Can the system expand if developed?

14
The project should be developed such that the necessary functions and performance are

achieved within the constraints. The project is developed within latest technology. Through

the technology may become obsolete after some period of time, due to the fact that never

version of same software supports older versions, the system may still be used. So there are

minimal constraints involved with this project. The system has been developed using Java

the project is technically feasible for development.

B. ECONOMIC FEASIBILITY-

The developing system must be justified by cost and benefit. Criteria to ensure that

effort is concentrated on project, which will give best, return at the earliest. One of the

factors, which affect the development of a new system, is the cost it would require.

The following are some of the important financial questions asked during preliminary

investigation:

 The costs conduct a full system investigation.

 The cost of the hardware and software.

 The benefits in the form of reduced costs or fewer costly errors.

Since the system is developed as part of project work, there is no manual cost to spend

for the proposed system. Also all the resources are already available, it give an indication

of the system is economically possible for development.

15
C. BEHAVIORAL FEASIBILITY-

This includes the following questions:

 Is there sufficient support for the users?

 Will the proposed system cause harm?

The project would be beneficial because it satisfies the objectives when developed and installed. All
behavioral aspects are considered carefully and conclude that the project is behaviorally feasible.

16
CHAPTER 7

SYSTEM REQUIREMENT SPECIFICATION

The software, Crime Report is designed for management of web sites from a remote location.

Purpose-

The main purpose for preparing this document is to give a general insight into the analysis
and requirements of the existing system or situation and for determining the operating characteristics of
the system.

Scope-

This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic during
testing phase. Any changes made to the requirements in the future will have to go through formal change
approval process.

Developers Responsibilities Overview-

The developer is responsible for:

 Developing the system, which meets the SRS and solving all the requirements of the system?
 Demonstrating the system and installing the system at client's location after the acceptance testing is
successful.
 Submitting the required user manual describing the system interfaces to work on it and also the
documents of the system.
 Conducting any user training that might be needed for using the system.
 Maintaining the system for a period of one year after installation.

17
Output Design-

Outputs from computer systems are required primarily to communicate the results of processing to
users. They are also used to provides a permanent copy of the results for later consultation. The various
types of outputs in general are:

 External Outputs, whose destination is outside the organization.


 Internal Outputs whose destination is within organization and they are the
 User’s main interface with the computer.
 Operational outputs whose use is purely within the computer department.
 Interface outputs, which involve the user in communicating directly.

Output Definition-

The outputs should be defined in terms of the following points:

 Type of the output


 Content of the output
 Format of the output
 Location of the output
 Frequency of the output
 Volume of the output
 Sequence of the output

It is not always desirable to print or display data as it is held on a computer. It should be decided as
which form of the output is the most suitable.

18
Output Media-

In the next stage it is to be decided that which medium is the most appropriate for the output. The
main considerations when deciding about the output media are:

 The suitability for the device to the particular application.


 The need for a hard copy.
 The response time required.
 The location of the users
 The software and hardware available.

Keeping in view the above description the project is to have outputs mainly coming under the category
of internal outputs. The main outputs desired according to the requirement specification are:

The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the
screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are
currently being obtained after manual processing. The standard printer is to be used as output media for
hard copies.

Input Design-

Input design is a part of overall system design. The main objective during the input design is as
given below:

 To produce a cost-effective method of input.


 To achieve the highest possible level of accuracy.
 To ensure that the input is acceptable and understood by the user.

19
Input Stages-

The main input stages can be listed as below:

 Data recording
 Data transcription

 Data conversion
 Data verification
 Data control
 Data transmission
 Data validation
 Data correction

Input Types-

It is necessary to determine the various types of inputs. Inputs can be categorized as follows:

 External inputs, which are prime inputs for the system.


 Internal inputs, which are user communications with the system.
 Operational, which are computer department’s communications to the system?
 Interactive, which are inputs entered during a dialogue.

Input Media-

At this stage choice has to be made about the input media. To conclude about the
input media consideration has to be given to;

 Type of input
 Flexibility of format
 Speed
 Accuracy
 Verification methods

20
 Rejection rates
 Ease of correction
 Storage and handling requirements
 Security
 Easy to use
 Portability

Keeping in view the above description of the input types and input media, it can be said that most
of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the
user, the keyboard can be considered to be the most suitable input device.

Error Avoidance-

At this stage care is to be taken to ensure that input data remains accurate form the stage at which
it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by
means of careful control each time the data is handled.

Error Detection-

Even though every effort is make to avoid the occurrence of errors, still a small proportion of
errors is always likely to occur, these types of errors can be discovered by using validations to check the
input data.

Data Validation-

Procedures are designed to detect errors in data at a lower level of detail. Data validations have
been included in the system in almost every area where there is a possibility for the user to commit errors.
The system will not accept invalid data. Whenever an invalid data is keyed in, the system immediately
prompts the user and the user has to again key in the data and the system will accept the data only if the
data is correct. Validations have been included where necessary.
21
The system is designed to be a user friendly one. In other words the system has been designed to
communicate effectively with the user. The system has been designed with popup menus.

User Interface Design-

It is essential to consult the system users and discuss their needs while designing the user interface:

User Interface Systems can be broadly classified as-

1. User initiated interface the user is in charge, controlling the progress of the user/computer dialogue. In
the computer-initiated interface, the computer selects the next stage in the interaction.
2. Computer initiated interfaces

In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or displays further
information.

Error Message Design:

The design of error messages is an important part of the user interface design. As user is bound to
commit some errors or other while designing a system the system should be designed to be helpful by
providing the user with information regarding the error he/she has committed.

Performance Requirements-

Performance is measured in terms of the output provided by the application .Requirement specification
plays an important part in the analysis of a system. Only when the requirement specifications are properly
given, it is possible to design a system, which will fit into required environment. It rests largely in the part
of the users of the existing system to give the requirement specifications because they are the people who
finally use the system. This is because the requirements have to be known during the initial stages so that
the system can be designed according to those requirements. It is very difficult to change the system once
it has been designed and on the other hand designing a system, which does not cater to the requirements of
the user, is of no use.

22
The requirement specification for any system can be broadly stated as given below:

 The system should be able to interface with the existing system.


 The system should be accurate.
 The system should be better than the existing system

The existing system is completely dependent on the user to perform all the duties.

FUNCTIONAL REQUIREMENT
 Chancellor who will be acting as the controller and he will have all the privileges of administrator.
 Faculty members who will be using the above features by accessing the UMS online.
 Students who will be using the above features by accessing the UMS online
 Faculty members can mark the attendance of students online.
 Can view the attendance online.
 Can upload marks, assignments, reading materials for students

NON-FUNCTIONAL REQUIREMENT-

They define the properties or qualities of a product including-


 Usability
 Efficiency
 Performance
 Reliability
 Portability

23
Project Schedule Plan-

Gantt chart is a project scheduling technique. Progress can be represented easily in Gantt chart, by
coloring each milestone when completed. The project will start in the month of February and end will
end after 4 months at the end May. System Planning is one of the important items to be considered before
actually beginning the project.

24
INPUT AND OUTPUTS-

The major inputs and outputs and major functions of the system are follows:

Inputs:

 Administrator enter his user id and password for login to authenticate in this system.
 Administrator manages all the records related to complaint and FIR.
While registering for complaint, it will take following information as input-

1. User id
2. User name
3. Password
4. Mobile Number
 Date of Birth
 Gender
 Address
 Photo upload
 E-mail
Following Inputs are also required to get information about the Chargesheet, FIR, and Complaint etc. as –
 Input FIR
 Input Complaint
 Managing PostMortem Details
 Managing Most Wanted Criminal list
 Updating records of prisoners and criminals
 Etc.

Outputs:

 Administrator (Thana Incharge) can have his own home page.


 Administrator can view all the complaint and FIR.
 User can view complaint and FIR status.
 Administrator can view Post Mortem Details.
 Etc.

25
HARDWARE SPECIFICATION

It is recommended that the minimum configuration for clients is as appended below:-

Server Side:
Microprocessor Pentium-3 class processor, 450 megahertz (MHz)

RAM 512 MB of RAM

Hard Disk 20 Giga Bytes (GB)

Client Side:
Operating System Any

RAM 1 GB

HDD 40 GB

Display 1024x768 High color.

Developer:
Microprocessor 2.27 (GHz)

RAM 2 GB

HDD 80 GB

Display 1024x768 High color.

26
SOFTWARE SPECIFICATION

Server Side:
Browser Any java enable web browser.

Database MySql

Web server Apache

OS Any

Client Side:
Operating System Any

Browser Any java enable web browser.

Developer:
Browser Any java enable web browser.

IDE NetBeans 8.0

Database MySql

Operating System Any

Webserver Apache

Technology PHP 5.0

27
Chapter 8

Modules’ Details

Login for user and admin-


This includes Administrator and User login. There will be a username and password to
login into the system to use all the facilities.

Complaint registration-
This module helps to register the details about the crime. This is done by entering some details,
such as incident details, Victim details, crime details etc

View complaint status-


This module allows us to view the status of the complaint that you have registered earlier.

Criminal register management-


Here we can have the facility to view the details of the criminals. The administrator can
add new criminal’s details and save it in a database. This can be done by entering details such as criminal
number, age, occupation, type of crime etc.

FIR Management-
This module allows viewing the First Information Report of all the crimes that took place at
recent years. The administrator can enter FIR information and save it in a database.

Case History Details management-


Here we can view the details of the case, date of occurrence, the type of crime and place of
occurrence etc…

Manage list about most wanted criminals-


This is an additional feature added to this Software, which helps us to make a quick search
about the most wanted criminals. This helps to always keep track of and identify a person quickly, who is
a most wanted criminal.

28
CHAPTER 9

DATA FLOW DIAGRAM

HIGH LEVEL DESIGN

0 Level DFD

Fig.1

29
1 Level DFD

Fig.2

30
2-LEVEL DFD

Fig.3

31
Fig.4

32
Fig.5

33
ER-Diagram

User
m Crime m Name
Report Password

nationa 1 1 1 User
lity UserId User Type
act
Name
Occup Dist
User ation Admin FIR date
Police st
Registration age 1 name
FIRno
Sex FIR type
Complaint
FIR FIR Details no

CharDate
Criminal
No
Criminal
CName Nick
Type
Name
Charge Sheet PoliceSt
Occup
Name age
CharSh
No sex
Dist Criminal
1 Criminal
Registrat has
FIRno ion
Details
Nick
name
MstNo
Mst
Name Most Wanted
Desc

Fig.6

34
CHAPTER 10

Data Structures

Table Name: Admin Login

This table store details of Admin, how control all system It contains following fields

Column Name Data Type Allow Null Constraint

Id Int(11) NO Primary Key

Did Varchar(40) NO

Password Varchar(40) NO

Table Name: Registration

Column Name Data Type Allow Null Constraint

Id Int(7) NO Primary Key

Name Varchar(40) NO

MobileNo bigInt NO

Address Varchar(50) Yes

Dob Date NO

35
Gender Varchar(10) NO

Email Varchar(30) Yes

Details Varchar(200) Yes

Table Name: Charge Sheet

36
Table Name: Complaint

Table Name: Criminal Registration

37
Table Name: Most Wanted

Table Name: FIR

SCREEN SHOTS

38
SCREEN SHOTS

Home Page

Fig-7

39
Sign In

Fig-8

40
New User Registration

Fig-9

41
User Home Page

Fig-10

42
Lodge FIR

Fig-11

43
Admin Login

Fig-12

44
Admin Panel

Fig-13

45
FIR Status

Fig-14

46
Thana In charge

Fig-15

47
FIR Execution

Fig-16

48
View All FIRs

Fig-17

49
Criminal Registration

Fig-18

50
SOURCE CODE
About.Php

<?php require("includes/header.php");?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

</head>

<body>

<!--header-->

<!--wrapper-->

<div id="wrapper">

<div id="lowerbanner">

<h1>About Us</h1>

</div>

<div id="lside">

<ul>

<li><a href="aboutus.php">About</a></li><br/>

<li><a href="crimeup.php">Crime Scene in


UP</a></li><br/>

<li><a href="onlinefir.php">Online Fir</a></li><br/>

51
<li><a href="ouraim.php">Our Aim</a></li><br/>

<li><a href="ourservices.php">Our Services</a></li><br/>

</ul>

</div>

<div id="contentarea">

<h1>About</h1>

<p class="restrict">The project title<a href="index.php">"Online


Crime Management"</a>has been evolved as a result of the well thoughtout process on the
subjects of crimes criminal investigation and bringing justices to the needy people and masses in
search of the justice against the criminal activities of which they are the part and looking out for
justice for a longer duration of time but not been able to get in the manner they wouldlike to get in
the manner they would like to get. This project has came out as the result of abunch of enthusiastic
intern as the work of their final year internship topic in graduation and postgraduation discipline<p
class="restrict">

The main idea behind carrying out this project is not for the mere
completion of the degree and getting marks but to serve the society and our environment as well
and to help them in their fight against offensive persons of the society and to work as the safeguard
for those who are the victims of any type of criminal offences committed by criminal minded
people on them or their family members directly or indirectly.

</p>

<p class="restrict">

With the help of this project the general masses of people and
citizens can lookup to the much awaited justice and fir complaints against the bad elements of the
society.</p>

</div>s.</p>

52
<div id="rside">

<center>

<br/>

<img src="images/content area/img1.jpg" border="3px solid


black"/>

<br/>

<br/>

<img src="images/content area/img2.jpg" border="3px solid


black"/>

<br/>

<br/>

<img src="images/content area/img3.jpg" border="3px solid


black"/>

<br/>

</center>

</div>

</div>

<!--footer-->

<?php require("includes/footer.php");?>

53
Benefits.php

<?php require("includes/header.php");?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

</head>

<body>

<!--header-->

<!--wrapper-->

<div id="wrapper">

<div id="lowerbanner">

<h1>About Us</h1>

</div>

<div id="lside">

<ul>

<li><a href="aboutus.php">About Us</a></li><br/>

<li><a href="whoweare.php">Who We Are</a></li><br/>

<li><a href="whatwedo.php">What We Do</a></li><br/>

<li><a href="crimes.php">Crimes</a></li><br/>

54
<li><a href="crimeup.php">Crime Scene in
UP</a></li><br/>

<li><a href="onlinefir.php">Online Fir</a></li><br/>

<li><a href="quickresponse.php">Quick
Response</a></li><br/>

<li><a href="ouraim.php">Our Aim</a></li><br/>

<li><a href="ourservices.php">Our Services</a></li><br/>

<li><a href="benefits.php">Benefits</a></li><br/>

<li><a href="emergencies.php">Emergencies</a></li><br/>

</ul>

</div>

<div id="contentarea">

<h1>Benefits Of Using Online System</h1>

<p class="restrict">The project title<a href="index.php">"Online


Crime Management"</a>has been evolved as a result of the well thoughtout process on the
subjects of crimes criminal investigation and bringing justices to the needy people and masses in
search of the justice against the criminal activities of which they are the part and looking out for
justice for a longer duration of time but not been able to get in the manner they wouldlike to get in
the manner they would like to get. This project has came out as the result of abunch of enthusiastic
intern as the work of their final year internship topic in graduation and postgraduation
disciplines.</p>

<p class="restrict">

The main idea behind carrying out this project is not for the mere
completion of the degree and getting marks but to serve the society and our environment as well
and to help them in their fight against offensive persons of the society and to work as the safeguard
for those who are the victims of any type of criminal offences committed by criminal minded
people on them or their family members directly or indirectly.

</p>
55
<p class="restrict">

The following project has been carried out and maintained inorder to
take care of the society and our nearby political and apolitical environment and to provide services
to the prople who are fighting their battels against asocial elemnts of the society in the following
described manner and ways:

<ul>

<li class="manage">Interacting the people on online basis to


spreadout the awarness about the crimes and their purposes among the people</li><br/>

<li class="manage">Helping the needy people out to get


awarness about the lodging their fir online as it is not possible for people to lodge fir physically in
their respective police stations.</li><br/>

<li class="manage">This project has been divided among


various modules to help people to register their complaints in the greatest and efficient manner
whatsoever</li><br/>

<li class="manage">This project has tried its best to work as


a bridge between the police officers, justice and the people need and in search of the
justice</li><br/>

<li class="manage">This website helps to scrutinize the


lkevel and effect of crime in the particulat area so that the effective steps can be taken up by the
local authorities. </li>

</ul>

</p>

<p class="restrict">

With the help of this project the general masses of people and
citizens can lookup to the much awaited justice and fir complaints against the bad elements of the
society.</p>

</div>

<div id="rside">

56
<center>

<br/>

<img src="images/content area/img1.jpg" border="3px solid


black"/>

<br/>

<br/>

<img src="images/content area/img2.jpg" border="3px solid


black"/>

<br/>

<br/>

<img src="images/content area/img3.jpg" border="3px solid


black"/>

<br/>

</center>

</div>

</div>

<!--footer-->

<?php require("includes/footer.php");?>

57
Captch.Php

<?php

error_reporting(0);

session_start();

header('content-type:image/png');

$dir='font/';

$txt='';

for($i=0; $i<=2; $i++)

$txt.=chr(rand(97,130));

$_SESSION['code']=$txt;

$image=imagecreate(150,150);

$x=imagecolorallocate($image,25,10,200);

$y=imagecolorallocate($image,25,10,90);

imagefilledrectangle($image,0,0,160,160,$y);

imagettftext($image,30,45,60,80,$x,$dir.'roughage.ttf',$_SESSION['code']);

imagepng($image);

?>

58
Case-details.php

<?php

session_start();

require("includes/admin-header.php");

include("db.php");

$cid = $_REQUEST['cid'];

?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

</head>

<body>

<!--header-->

<!--wrapper-->

<div id="wrapper">

<div id="lowerbanner">

<h1>VIEW LODGED FIR DETAILS</h1>

<center>

<table border="1" cellpadding="0" cellspacing="0" width="99%">

<?php

$query = mysql_query("select * from lodgefir where firid='$cid'");


59
$result = mysql_fetch_assoc($query);

?>

<tr height="40">

<th width="5%"> C.ID. </th>

<th><?php echo $result['firid'] ?></th>

</tr>

<tr height="40">

<th width="15%"> NAME </th>

<th><?php echo $result['name'] ?></th>

</tr>

<tr height="40">

<th width="40%"> USER-ID </th>

<th><?php echo $result['userid'] ?></th>

</tr>

<tr height="40">

<th width="15%">MOBILE-NO </th>

<th><?php echo $result['mobileno'] ?></th>

</tr>

<tr height="40">

<th width="5%"> GENDER </th>

<th><?php echo $result['sex'] ?></th>

</tr>

<tr height="40">

<th width="40%">THANA</th>

60
<th><?php echo $result['thana'] ?></th>

</tr>

<tr height="40">

<th width="40%">THANA INCHARGE</th>

<th><?php

$qry = mysql_query("SELECT * FROM thanaincharge WHERE


address='$result[thana]'");

$td = mysql_fetch_assoc($qry);

echo $td['name']

?></th>

</tr>

<tr height="40">

<th width="40%">ALLOTTED POLICE OFFICER</th>

<th><?php

$q = mysql_query("SELECT * FROM fir_action WHERE cid='$cid'");

$t = mysql_fetch_assoc($q);

echo $t['apo']

?></th>

</tr>

<tr height="40">

<th width="40%">ALLOTTED OFFICER MOBILE</th>

<th><?php

echo $t['mobileno']

?></th>

61
</tr>

<tr height="40">

<th width="40%">ALLOTTED OFFICER GENDER</th>

<th><?php

echo $t['gender']

?></th>

</tr>

<tr height="40">

<th width="40%">ALLOTTED OFFICER EMAIL</th>

<th><?php

echo $t['email']

?></th>

</tr>

<tr height="40">

<th width="15%">ADDRESS</th>

<th><?php echo $result['address'] ?></th>

</tr>

<tr height="40">

<th width="40%">TOPIC</th>

<th><?php echo $result['topic'] ?></th>

</tr>

<tr height="40">

<th width="40%">DATE</th>

<th><?php echo $result['date'] ?></th>

62
</tr>

<tr height="40">

<th width="20%" height="">DETAILS</th>

<th><?php echo $result['description'] ?></th>

</tr>

<tr height="40">

<th width="20%" height="">STATUS</th>

<th><?php

$que = mysql_query("select * from fir_action where cid='$cid]'");

$res = mysql_fetch_assoc($que);

if (mysql_num_rows($que)) {

if ($res['status'] == 0) {

?>

<span style="color:green;font-weight:bolder;">Processing</span>

<?php } else { ?>

<span style="color:green;font-weight: bolder;">Closed</span>

<?php

} else {

echo '<span style="color:red;font-weight:bolder;">Pending</span>';

?></th>

</tr>

63
</table>

</center>

</div>

</div>

<!--footer-->

<?php require("includes/admin-footer.php"); ?>

Contact us.php

<?php require("includes/header.php"); ?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

<body>

<!--header-->

<!--wrapper-->

<div id="wrapper">

<div class="col-md-12 alert alert-danger">

<h1>Contact Us</h1>

</div>

<div class="col-md-6 alert alert-info">

<table id="contact_info" class="table table bordered">

64
<tr class="success">

<td style="font-weight:bolder;"></td>

</tr>

<tr class="danger">

<td></td>

</tr>

<tr style="background:#FFCCCC" class="abc">

<td></td>

</tr>

<tr class="warning">

<td></td>

</tr>

</table>

</div>

<div class="col-md-6 alert alert-info">

<table id="contact_in" class="table table bordered">

<tr class="success">

<td style="font-weight:bolder;"></td>

</tr>

<tr class="danger">

<td></td>

</tr>

<tr class="abc" style="background:#FFCCCC">

<td></td>

65
</tr>

<tr class="warning">

<td></td>

</tr>

</table>

</div>

<div class="col-md-6 alert alert-info">

<table id="contact_second" class="table table bordered">

<tr class="success">

<td style="font-weight:bolder;"></td>

</tr>

<tr class="danger">

<td></td>

</tr>

<tr class="abc" style="background:#FFCCCC">

<td></td>

</tr>

<tr class="warning">

<td></td>

</tr>

</table>

</div>

</div>

<!--footer-->

66
<?php require("includes/footer.php"); ?>

crimejudgement.php

<?php

require("includes/thana-header.php");

include("db.php");

$id = $_REQUEST['m'];

?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

</head>

<body>

<!--header-->

<!--wrapper-->

<div id="wrapper">

<div id="lowerbanner">

<h1>JUDGEMENT</h1>

<center>

<table border="1" cellpadding="0" cellspacing="0" width="90%">

<tr height="40" bgcolor="teal">

67
<th> SR.NO </th><th> CASE-ID </th><th> NAME </th> <th>POLICE OFFICER
MOBILE-NO </th> <th> ALLOTED POLICE OFFICER </th> <th>JUDGEMENT
DETAILS</th>

</tr>

<?php

$query = "select * from fir_action WHERE id='$id'";

$result = mysql_query($query);

while ($row = mysql_fetch_array($result, MYSQL_BOTH)) {

?>

<tr height="40">

<td align="center"><?php echo $row[0]; ?></td>

<td align="center"> <?php echo $row[1]; ?></td>

<td align="center"> <?php echo $row[2]; ?></td>

<td align="center"> <?php echo $row[3]; ?></td>

<td align="center"> <?php echo $row[4]; ?></td>

<td align="center">In Process</td>

</tr>

<?php } ?>

</table>

</center>

</div>
68
</div>

<!--footer-->

<?php require("includes/thana-footer.php"); ?>

criminal-delete.php

<?php

session_start();

require("db.php");

$id = $_REQUEST['id'];

mysql_query("DELETE FROM crmlist WHERE id='$id'");

header('Location: criminallist.php');

?>

criminaldetails.php

<?php require("includes/header.php");

?>

<!Doctype html>

<head>

<title></title>

<link rel="stylesheet" href="css/site.css"/>

</head>

<body>

<!--header-->
69
<!--wrapper-->

<div id="wrapper">

<div id="lowerbanner">

<h1>CRIMINAL'S DETAILS</h1>

<center>

<P><?php

$i=$_REQUEST['id'];

echo $i;

?>

<P>

</center>

</div>

</div>

<!--footer-->

<?php require("includes/footer.php");?>

70
Conclusion

Crime Report System initiates the objective of providing the user with customized and powerful
complaint registration and process management system side software. The software is built with
all options such as complaint registration, prisoner’s registration, and postmortem report
generation etc…All the requirements specified during the analysis and design phase are fully met,
thus resulting in the formation of good software. The interface provided is very user friendly and
flexible for all times.

71

You might also like