Crime Management & Reporting System
Crime Management & Reporting System
Crime Management & Reporting System
ON
INFORMATION TECHNOLOGY
Of
March 2009
DEPARTMENT OF INFORMATION TECHNOLOGY
CERTIFICATE
Prof. (Dr).V.Job.Kuruvilla
(Head of the institution)
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
ACKNOWLEDGEMENT
T
hanking you,
Sumi Thomas Painumkal
ABSTRACT
The Crime Management and Reporting System apply to Police Stations all across the
country .It specifically looks into the Crime detection and prevention. Conviction of criminals depends on
a highly responsive backbone of Information Management. The efficiency of the police and the
effectiveness with which it tackles crime depend on what quality of information it can derive from its
existing records and how fast it can have access to it.
Different modules of this project are Station module, Crime module, Search module and
Administrators module. Each of the station must first register with the software. For the registration part
each station enter their details like station name, address, phone number, station in charge etc. and get
a User Id from the software. Once the station registers with the software they can avail the existing
records. All these are done in the station module. The Crime module is used for entering all details
about the crime. It consists of the date and time, place, nature of crime, location of the crime, police
station where it is recorded etc.In the search module we can search the crime in station wise, nature of
crime, date and time wise.
TABLE OF CONTENTS
1. INTRODUCTION………………………………………………………………….. 1
2.SYSTEM ANALYSIS……………………………………………………………… 3
2.1 EXISTING SYSTEM…………………………………………………………. 4
2.2 PROPOSED SYSTEM………………………………………………………..5
2.3 FEASIBILITY STUDY…………………………………………………………6
3. SYTEM REQUIREMENT STUDY…………………………………………….….8
3.1 SYSTEM CONFIGURATION…………………………………………...…...9
3.2 ABOUT THE DEVELOPING SYSTEM……………………………………..10
3.3 OPERATING SYSTEM…………………………………………………….…11
3.4GRAPHICAL USER INTERFACE: MS VISUAL STUDIO 2005……….…13
4. SYSTEM DESIGN……………………………………………………………….…14
4.1 LOGICAL SYSTEM DESIGN………………………………………………..15
4.2 PHYSICAL SYSTEM DESIGN……………………………………………....20
5. SYSTEM IMPLEMENTATION………………………………………………….…25
5.1 IMPLEMENTATION DETAILS…………………………………………….…28
5.2 CODING…………………………………………………………………….…..29
6. SYSTEM TESTING…………………………………………………………….…...50
7. FUTURE ENHANCEMENT………………………………………………………...42
8.CONCLUSION…………………………………………………………………….….58
9. BIBLIOGRAPHY……………………………………………………………….……60
Page No:1
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE
:CRIME MANAGEMENT
SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY
AND REPORTING
SYSTEM
The objective of the project is to develop a site in which any citizen can report crimes. If
anybody wants to complaint against crimes he must do it through the police. The Crime Management
and Reporting System make the crime reporting easier. This project will be useful for the Police
Department. The home page is the login page .Only the Administrator and the Station in-charge of
different Police Stations will be able to login to their home pages. The citizen could only report crimes
and knows whether the crime reported by him has been accepted.
The different modules of the project are station module, crime module, administrator’s
module and search module. In the station module, each of the station must first register with the
Software. For the registration part each station enter their details like station name, address, phone no,
station in charge etc. and get a User Id and password from the Software. Once the station registers with
the software they can avail the existing records.
Crime module is used for entering all details about the crime. It contains the date and time, police
station where it is recorded, place, nature of Crime, Location of the Crime etc.All details about the
criminals will be also included in this module.
In the search module we can search the crime in station wise, nature of crime, date and time
wise. Searching of criminals is also possible in this module. The administrator’s module will be protected
by user id and password. Ordinary users of the software will not be permitted to enter into this area of the
software. The module will be focusing on the Master Data Maintenance, Removal of old and outdated
data from the software etc.
Page No:3
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
2. SYSTEM ANALYSIS
System analysis is an important phase of any system development process. The system is
studied to the minute details and analyzed. The system analyst plays the role of an interrogator and
dwells deep in to the working of the present system. In analysis, a detailed study of these operations
performed by a system and their relationships within and outside the system is done. A key question
considered here is, “what must be done to solve the problem?” The system is viewed as a whole and the
inputs to the system are identified. Once analysis is completed the analyst has a firm understanding of
what is to be done.
The project mainly aims to develop an application for the Police Department to handle their crime
investigation process in an easy way. Often people are reluctant to go to Police stations to report crimes.
This project makes reporting of crimes easier.
If we are doing the system manually, so many minor errors will occur. Error detection in the previous
entries made and data cross verification is another important function. These are done manually, and it
would take time
2.1.1 LIMITATIONS OF EXISTING SYSTEM
The existing system is time consuming and not very user friendly.
Sometimes the complaints may be ignored by the police.
Page No:4
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Even an efficient officer may not be able to handle more than one case at a time.
As we all know, a covered truth, bribery plays an important role in the existing system.
Many cases were pilled up in the corners, due to lack of commitment in the job.
In most of the cases, the innocent are accused in the existing system.
As per our jurisdiction, “Let thousand criminals escape-not a single innocent be punished “. As
a result of this and other factors that influence investigation, such as bribery, the innocent
becomes accused in several situations in the eyes of Justice.
The existing system is criticized for being inefficient, time consuming, poorly managed, and
lacking flexibility.
Because of the large number of serious crimes, minor complaints may be ignored.
Page No:5
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
A feasibility study is a test of system proposal according to its workability, impact on the
organization, ability to meet user needs and effective use of resources.
The objective of feasibility study is not to solve the problem, but to acquire a sense of its scope.
During the study, the problem definition is crystallized and aspects of the problem to be included in the
system are determined, consequently costs and benefits are estimated with greater detail at this stage.
The result of the feasibility study is a system formal proposal. This is simply a form of documenting or
detailing the nature and scope of proposed solutions. The proposal summarizes what is known and what
is going to be done. Three key considerations involved in the feasibility analysis:
Economic feasibility
Technical feasibility
Behavioral feasibility
Economic analysis is the most frequently used method for comparing the cost with the benefit or
income that is expected from developed system.
In the existing system, many people are involved in the process but in the proposed system,
number of persons involved be reduced drastically. So the proposed system is economic.
In the existing system, storage of all these records should be arranged and security should be
provided for the records. In the proposed system, separate security arrangement is not needed
since the software provides security and maintenance is simply and hardly needs one or two
persons to operate the system.
2.3.2 TECHNICAL FEASIBILITY:
The feasibility center on the existing computer system (software, hardware) and to what extend it can
support the proposed addition.
Page No:6
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
In the proposed system, data can be easily stored and managed in database management system
software.
The results for various queries can be generated easily. Therefore, the system is technically
feasible.
PROJECT TITLE
SEMESTER: :CRIME MANAGEMENT
BRANCH: INFORMATION TECHNOLOGY
VIII AND REPORTING
SYSTEM
Page No:8
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROCESSOR -Pentium 4
RAM SIZE -256MB
HARD DISK DRIVE-40GB
CD ROM DRIVE -52X
KEYBOARD -108 keys
MONITOR -SVGA 15 inch
MOUSE -PS/2
3.1.2 SOFTWARE CONFIGURATION
FRONT END -ASP.NET
BACK END -MS SQL SERVER 2000
OPERATING SYSTEM -WINDOWS XP
SCRIPT LANGUAGE -C#
BROWSER -MS INTERNET EXPLORER
Page No:9
Toc H Institute of Science &Technology
Arakkunnam – 682313
WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows programmers to create dynamic
web applications.ASP.NET can be used to create anything from small, personal websites to large,
enterprise-class web applications. ASP.NET is the latest version of Microsoft's Active Server Pages
technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a powerful tool for creating
dynamic and interactive web pages.
ASP: ASP is a server side scripting technology that enables scripts (embedded in web pages) to be
executed by an Internet server ASP is a program that runs inside IIS.IIS stands for Internet Information
Services. IIS comes as a free component with Windows 2000.IIS is also a part of the Windows NT 4.0
Option Pack. The Option Pack can be downloaded from Microsoft.
An ASP file is just the same as an HTML file. An ASP file contains text, HTML, XML and
scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension “.asp”. When
a browser requests an HTML file, the server returns the file. When a browser requests an ASP file, IIS
passes the request to the ASP engine. The ASP engine reads the ASP file, line by line, and executes the
scripts in the file .Finally, the ASP file is returned to the browser as plain HTML.
Uses of ASP:
Dynamically edit, change or add any content of a web page.
Customize a web page to make it more useful for individual users.
Another advantage of ASP is its simplicity and speed.
Provide security since your ASP code cannot be viewed from the browser.
Clever ASP programming can minimize the network traffic.
Page No:10
Toc H Institute of Science &Technology
Arakkunnam – 682313
Windows has graphical based multitasking windowing environment that allows programs
written specifically for windows to have a consistent appearance and command structure. This capability
makes even new programs easier to master.
Windows provides several built in routines that allow easy implementation of pull down menus,
scrollbars and dialogue box icons and many other features of a user friendly graphical interface. Starting
with Windows 3.0 through Windows XP, programs can take advantage of new dialog control, menu types
and owner draw control. Our application uses Windows XP Platform.
Characteristics:
Input/Output
Input and Output is essential to the operation of any computer. Input-Output allows the computer to
store and receive data on disks or tapes, to interact with the users terminals and to print the output on
Page No:11
Toc H Institute of Science &Technology
Arakkunnam – 682313
Time Sharing
Time-Sharing is a way of allowing several people to run programs on different terminals
concurrently. This introduces the facility of enabling a group of people to simultaneously approach a
problem on different levels or at the same level, when the need arises.
Communication
Communication refers to the ability of one computer to communicate with other computer and
terminals, to transfer programs and/or data.
Security
The OS invokes security that protects one user from another and the OS from all users. Its main
function is to make sure that only authorized users gain access to the computer and its data and those
users do only things that they are authorized to do. As time sharing is available in the OS, a large degree
of security is provided.
Modularity
The design of the OS is modular which allows new capabilities to be added as required.
Reliability
Applications are run in their own memory and are unable to corrupt other applications or the system.
System errors are logged.
Portability
Allows Windows XP to run on various platforms.
Page No:12
Toc H Institute of Science &Technology
Arakkunnam – 682313
Microsoft Visual Studio is the main integrated Development Environment (IDE) from Microsoft. It can be
used to develop console and Graphical User Interface applications. Visual studio supports languages by
means of language services, which allow any programming language to be supported (to varying
degrees) by the code editor and debugger, provided a language specific service has been authored.
Page No:13
Toc H Institute of Science &Technology
Arakkunnam – 682313
Page No:15
Toc H Institute of Science &Technology
Arakkunnam – 682313
The citizen can report crimes. He will enter all details about the crime. It contains the date, time,
spot, nature of crime, location of crime etc.He can view all crimes accepted and closed by the
administrator. Thus he can see whether the crime reported by him has been accepted or not.
The Administrator will accept the complaints if it is genuine. He can create a new police station,
view complaints from the citizens, crime details, criminal details, and victim details, witness details etc.He
can create a new investigation team and assign them to the investigation of a crime. Removal of old and
outdated crime details will be done by him.
Page No:16
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
The Station in-charge can also view the complaints reported by the citizen. Then he will prepare the
FIR and send the FIR to the administrator. The Administrator will assign a team for the investigation. After
investigation all details are entered into the software and the Administrator will close the Crime File. The
station in-charge can search the crime in station wise, nature of crime, date and time wise.
4.1.2 DATAFLOW DIAGRAM
Dataflow diagram is used to define the flow of the system and their resources .It is the way of
expressing system requirements in a graphical manner. It is one of the most ingenious tools used for
structured analysis. It is the starting point of design phase.
Citizen side
The citizen can report complaints using this website. He should provide the complaint
details. He can also view the status of his complaint.
Page No:17
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Administrator side
login
login
validation check uname
Administrator
pwd register new
station station master
Login
station details
station reg
teamdetails
memberreg team master
team member
complaints
complaintview
close data
Page No:18
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
The Administrator has to login to the website. The username and password is checked with those in the
database. If they matches with the given username and password, he can access the software. The
administrator will register a new Police Station with this software. The administrator will create a new
investigation team and will decide which all members should be in that team. He can view all the reported
complaints, and close the complaint file after the completion of the investigation.
Station in-charge side
Page No:19
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
The station in-charge has to login to the website using the username and password. The
username and password is checked. If it is correct he can enter into his home page. He can enter the
crime details .He can also perform searches. Similarly, he can enter criminal details also. The station in-
charge can send the FIR to the administrator. He can also set the status, whether the investigation is
progressing or if it is closed. He will also enter the victim’s details.
Page No:20
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Page No:21
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Page No:22
Toc H Institute of Science &Technology
Arakkunnam – 682313
5.1 CODING:
The goal of coding phase is to translate the design of the system in to code in a particular
programming language. For a given design, then aim of coding is to implement the design in the best
possible manner.
Code snippets:
ClassLibrary
using System;
using System.Collections.Generic;
using System.Text;
using System.Data;
using System.Data.SqlClient;
namespace ClassLibrary1
{
public class Class1
{
SqlConnection con = new
SqlConnection("server=.;uid=sa;database=toch");
SqlCommand cmd = new SqlCommand();
public void opencon()
{
if (con.State == ConnectionState.Open)
{
con.Close();
}
con.Open();
cmd.Connection = con;
}
public SqlConnection getcon
{
get
{
return con;
}
}
Page No:42
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
public SqlCommand getcommand
{
get
{
return cmd;
}
}}}
Class2.cs
using System;
using System.Collections.Generic;
using System.Text;
using System.Data;
using System.Data.SqlClient;
namespace ClassLibrary1
{
public class Class2
{
Class1 c1 = new Class1();
DataSet ds = new DataSet();
public void insert(string complaintid,string name ,string
address,string gender,string phonenumber,string place,string complaint,string
complintfile )
{
c1.opencon();
c1.getcommand.CommandText = "insert into complaints values('"+
complaintid +"','" + name + "','" + address + "','" + gender + "','" +
phonenumber + "','" + place + "','" + complaint + "','" + complintfile + "')
";
c1.getcommand.ExecuteNonQuery();
}
public void insertcriminal(string criminalid,string crimeid,string stationid,
string crimename, string criminalname, string housename, string place,
string age, string gender,string nickname,string criminaltype,string
mop,string comment)
{
c1.opencon();
c1.getcommand.CommandText = "insert into criminaldetails
values('"+criminalid+"','" + crimeid + "','" + stationid + "','" + crimename
+ "','" + criminalname + "','" + housename + "','"+place +"','" + age + "','"
+ gender + "','" + nickname + "','" + criminaltype + "','" + mop + "','" +
comment + "') ";
c1.getcommand.ExecuteNonQuery();
}
Page No:43
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
public void insertteam(string teamname,string stationname)
{
c1.opencon();
c1.getcommand.CommandText = "insert into team values('" +
teamname + "','" + stationname + "') ";
c1.getcommand.ExecuteNonQuery();
}
public void insertmembers(string teamname, string membername, string address,
string place, string city, string phone, string age, string gender)
{
c1.opencon();
c1.getcommand.CommandText = "insert into teammemeber values('" +
teamname + "','" + membername + "','" + address + "','" + place + "','" +
city + "','" + phone + "','" + age + "','" + gender + "') ";
c1.getcommand.ExecuteNonQuery();
}
public void insertvictim(string crimename, string victimname, string age,
string gender, string address, string dob, string ms, string comp, string ht,
string wt, string im, string cb)
{
c1.opencon();
c1.getcommand.CommandText = "insert into victimdetails values('"
+ crimename + "','" + victimname + "','" + age + "','" + gender + "','" +
address + "','" + dob + "','" + ms + "','" +comp + "','" + ht + "','" +
wt + "','" + im + "','" + cb + "') ";
}
public void delete(string complaintid)
{
c1.opencon();
c1.getcommand.CommandText = "delete complaints where complaintid =
'"+complaintid +"'";
c1.getcommand.ExecuteNonQuery();
}
public void deletestation(int id)
{
c1.opencon();
c1.getcommand.CommandText = "delete stationreg where stationid =
" + id + "";
Page No:44
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
c1.getcommand.ExecuteNonQuery();
}
public void insertstation(string stationid,string stationmame, string place,
string phone, string stationincharge, string userid, string password )
{
c1.opencon();
c1.getcommand.CommandText = "insert into stationreg
values('"+stationid+"','" + stationmame + "','" +place + "','" + phone +
"','" +stationincharge + "','" +userid + "','" +password + "') ";
c1.getcommand.ExecuteNonQuery();
}
public DataSet view()
{
SqlDataAdapter adp = new SqlDataAdapter("select * from
complaints",c1.getcon);
adp.Fill(ds);
return ds;
}
public DataSet viewcrime()
{
SqlDataAdapter adp = new SqlDataAdapter("select * from
crimedetails", c1.getcon);
adp.Fill(ds);
return ds;
}
Page No:45
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
adp.Fill(ds);
return ds;
}
public DataSet viewstation()
{
adp.Fill(ds);
return ds;
}
public DataSet viewvictim()
{
adp.Fill(ds);
return ds;
}
public string getstationid()
{
c1.opencon();
c1.getcommand.CommandText = " select isnull(max(stationid)+1,1)
from stationreg";
string i;
i = c1.getcommand.ExecuteScalar().ToString();
return i;
}
Page No:46
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
}
public DataSet readteam()
{
SqlDataAdapter adp = new SqlDataAdapter("select teamname from
team ",c1.getcon );
adp.Fill(ds);
return ds;
}}}
Crime details
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
Page No:47
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
Complaints
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
public partial class sendcomplaints : System.Web.UI.Page
{
ClassLibrary1.Class2 obj = new ClassLibrary1.Class2();
protected void Page_Load(object sender, EventArgs e)
{
}
protected void Button1_Click(object sender, EventArgs e)
Page No:48
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
{
string s;
if (RadioButton1.Checked == true)
{
s = RadioButton1.Text;
}
else
{ s = RadioButton2.Text; }
obj.insert(TextBox1 .Text ,TextBox2.Text, TextBox3.Text, s,
DropDownList1.SelectedItem.Text, TextBox6.Text, TextBox7.Text,
FileUpload1.FileName);
}
protected void Button2_Click(object sender, EventArgs e)
{
}
}
Page No:49
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Page No:50
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Testing is the process of executing the program to find if there are any errors. It is the final
verification and validation activity .In testing phase we have tried to affirm the quality of the product. We
have also tried to eliminate errors in the previous stages.
UNIT TESTING:
ADMINISTRATOR MODULE
Page No:51
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER:
BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
VIII
REPORTING SYSTEM
Select all
Click the records
5. View crimes link ‘view from the All crimes success
crimes’ table displayed
‘crimes’ in gridview
and display
it in
gridview
Page No:52
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
CITIZEN MODULE
Select all
records
Click the from the All crimes
View crimes
1. link ‘view table displayed success
crimes’ ‘crimes’ in gridview
and display
it in
gridview
Page No:53
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Insert into
Inserted
5. Close Crime name,team
table
into table success
crimes ’ arrest’
name,start
in the
date,end
database
date,close history
Page No:54
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH: INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
INTEGRATION TESTING:
Serial
No. Unit Input Expected Output status remedies
output obtained
Complaint
1. Citizen module complaints Insert inserted and success
complaints. station in-
charge could
view it.
Page No:55
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Page No:56
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Nothing can be ended in a single step. It is the fact that nothing is permanent in this world. So this
project also has some future enhancements in the evergreen and booming IT industry. Change is
inevitable. The project entitled “Crime Management and Reporting System” was successfully designed
developed and tested. The system and the architecture is a compatible one, so addition of new modules
can be done without much difficulty. Since this module has its unique properties it can extend further to
make this system a complete one.
The various Future Enhancement which shall include in this software are:
We look forward to working with the Government in implementing the recommendations and
seeing an improvement in the effectiveness of the Police Department.
The method of video conferencing can be added to make the project livelier.
An intercom facility will add a little more flexible communication between the Administrator,
Station in-charge and investigation team members.
Not withstanding this drive and progress, the Panel believes that more fundamental changes are
needed. It hopes that the recommendation made in this report will assist in changing the culture
around partnership.
Page No:57
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Page No:58
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
The project entitled ‘Crime Management and Reporting System’ is very useful for the Police
Department. The project was designed, implemented and tested successfully. The Software developed is
found to be working efficiently and effectively. It undertakes regular and timely action against the crimes
reported. It can be observed that the information can be obtained easily and accurately.
The project provides much security. The simplicity and friendliness are the advantages
of this project. The Software is made user friendly to the maximum so that any one can run the software
provided he could access to the system via the login password.
This project manages all details without any risk. All the objectives were met with
satisfaction. The performance of the system is found to be satisfactory.
Page No:59
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
Page No:60
Toc H Institute of Science &Technology
Arakkunnam – 682313
PROJECT TITLE :CRIME
SEMESTER: VIII BRANCH:INFORMATION TECHNOLOGY MANAGEMENT AND
REPORTING SYSTEM
BOOKS REFERED :
ONLINE HELP :
www.csharpcorner.com
• www.microsoft.com/sql
• www.databasejournal.com/features/mssql
• www.microsoft.com/vcsharp
Page No:61
Toc H Institute of Science &Technology
Arakkunnam – 682313