Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BACHELOR OF ENGINEERING
IN
INFORMATION SCIENCE AND ENGINEERING
FOR
Certified that the project work entitled Crime report management system carried out by
rd
Mr. PAVAN KUMAR S, bearing USN 1NH19IS404, a bonafide student of 4 semester in
partial fulfillment for the award of Bachelor of Engineering in Information Science &
Engineering of the Visveswaraiah Technological University, Belagavi during the year 2019-
20. It is certified that all corrections / suggestions indicated for Internal Assessment have
been incorporated. The project report has been approved as it satisfies the academic
requirements in respect of Mini Project work prescribed for the said Degree.
Name & Signature of Guide Name & Signature of HOD Name & Signature of Principal
Mr. Gangadhar Immadi Dr. R J Anandhi Dr. Manjunatha
Examiners:
Name Signature
1. …………………………………………………. …………………………….
2. ……………………………………………….. ……………………………
Crime report
ORIGINALITY REPORT
2 %
SIMILARITY INDEX
%
INTERNET SOURCES
2%
PUBLICATIONS
%
STUDENT PAPERS
PRIMARY SOURCES
1
Nirav Thosani. "Diagnostic yield of third eye
retroscope on adenoma detection during
1%
colonoscopy: A systematic review and meta-
analysis", World Journal of Meta-Analysis, 2014
Publication
2
Mansour Ayouni. "Chapter 4 Outputs of Ring",
Springer Science and Business Media LLC,
1%
2020
Publication
Nowadays, much of the crimes committed were unreported to the authorities. Given
this fact, the study presents the development of a Crime Management and Reporting
System through online and even offline and at the same time is the active participation
of the citizens. The idea draws its motivation from the inconvenience of going to the
police station and personal belief of the weak investigative capabilities of the authorities
to resolve petty crimes and limited spreading of crime information to the community.
The project specifically looks into the crime detection and prevention. This study aims to
provide an overview of the investigative process and, in doing so, identify effective and
efficient approaches to the investigation and detection of the volume of crimes. The
review is particularly aimed to highlight the research evidence those investigative
practices and actions that are likely to lead to a positive outcome. The development of
software includes the process of brainstorming and planning, requirements analysis,
system analysis and designs, implementation and testing, deployment, and
maintenance.
ACKNOWLEDGEMENT
I am grateful to Dr. R J Anandhi, Professor and Head of Department of ISE, New Horizon
College of Engineering, Bengaluru for her strong enforcement on perfection and quality
during the course of my project work.
I would like to express my thanks to the guide Mr. Gangadhar Immadi, Senior Assistant
Professor, Department of ISE, New Horizon College of Engineering, Bengaluru who has
always guided me in detailed technical aspects throughout my project.
I would like to mention special thanks to all the Teaching and Non-Teaching staff
members of Information Science and Engineering Department, New Horizon College of
Engineering, Bengaluru for their invaluable support and guidance.
PAVAN KUMAR S
TABLE OF CONTENTS
CHAPTER 1.......................................................................................................................1
Introduction..............................................................................................................1
Problem Definition...................................................................................................1
Motivation................................................................................................................1
Objectives…………................................................................................................2
CHAPTER 2.......................................................................................................................3
Modules………………………...............................................................................3
Technologies Used...................................................................................................4
System Specification................................................................................................4
Hardware requirements............................................................................................4
CHAPTER 3.......................................................................................................................6
Software Model.......................................................................................................6
Advantages…..........................................................................................................8
Disadvantages..........................................................................................................8
CHAPTER 4.......................................................................................................................9
Analysis document...................................................................................................9
Level 0 DFD............................................................................................................9
CHAPTER 5.....................................................................................................................10
ER Diagram...........................................................................................................10
Functional Requirements...........................................................................10
Use Case Diagram......................................................................................11
CHAPTER 6.....................................................................................................................12
Testing...................................................................................................................12
Testing principles...................................................................................................12
White box testing...................................................................................................12
Black box testing...................................................................................................13
CHAPTER 7.....................................................................................................................14
Source code............................................................................................................14
Admin login...........................................................................................................19
Station Admin login...............................................................................................20
Employee login......................................................................................................22
Citizen login...........................................................................................................24
Station admin forgot pwd………………………………………..………………25
Station officer forgot pwd………………………………………..………………27
Citizen forgot pwd.................................................................................................29
CHAPTER 8.....................................................................................................................31
I/O Screenshots.....................................................................................................31
Home page ...........................................................................................................31
Police login...............................................................................................32
Citizen login.............................................................................................34
CHAPTER 9.....................................................................................................................36
Conclusion.............................................................................................................36
CHAPTER 1
INTRODUCTON:
Crime Report could be a records management and crime analysis system. The aim of
the project is to develop a coverage and management system that is well accessible to
the subject, local department and therefore the body department. this is often
accustomed record crime info updated by administrator, station admin and policeman.
This software system is useful for enforcement and subject safety agencies. It includes
all of the tools office must properly record, store, and retrieve record info from the
software system.
Our objective is to supply a web site referred to as – Crime Report that is enforced
mistreatment utterly new software system platforms to administer record
management, crime analyzing, state-of-the art technology and raised potency.
Administrator is provided varied facilities to manage record and build user.Generally
several crimes seen by the subject won't reach to the police because of many reasons
like worry, Lack of your time, Ignorance. although some cases are registered they're
not investigated properly because of lack of evidences and Cooperation of the subject.
This software system helps the subject to report concerning the crimes to the police
with none worry in correct time. this is often additionally useful for higher authorities
of police to own an summary concerning the progress of the investigation. This
provides graphical reports for months and individual areas.
Crime Report could be a records management and crime analysis system. The aim of
the project is to develop a coverage and management system that is well accessible to
the subject, local department and therefore the body department. this is often
accustomed record crime info updated by administrator, station admin and policeman.
This software system is useful for enforcement and subject safety agencies. It includes
all of the tools office must properly record, store, and retrieve record info from the
software system.
1.2 Objectives.
Our objective is to supply a web site referred to as – Crime Report, that is enforced
mistreatment utterly new software system platforms to administer record
management, crime analyzing, state-of-the art technology and raised potency.
Administrator is provided varied facilities to manage record and build user.Generally
several crimes seen by the subject won't reach to the police because of many reasons
like worry, Lack of your time, Ignorance. although some cases are registered they're
not investigated properly because of lack of evidences and Cooperation of the subject.
This software system helps the subject to report concerning the crimes to the police
with none worry in correct time. this is often additionally useful for higher authorities
of police to own an summary concerning the progress of the investigation. This
provides graphical reports for months and individual areas.
CHAPTER 2
2.1 Modules
1. Administrator (Higher Officers)
In this module Administrator creates new stations and supply, user ID & arcanum.
The Administrator has all the rights to look at the criticism standing and officer status
of each station house that are below his town management.
2. Station Admin
The user has got to register before giving a web criticism. Once the registration is
finished he will apply for the criticism when that criticism Id are going to be sent to
his mobile variety through which he can read the standing of his complaint.
heir complaints
System Specification:
Hardware Requirements:
Hardware space
Software Requirements:
Computer Network
Working Domain:
CHAPTER 3
The body of water model is that the common version of the systems development
life cycle model for a code engineering.
typically take into account the classic approach to the systems development life
cycle, the body of water model describes a development methodology that's linear
and serial. A body of water development has distinct goals for every section of
development.
A schedule are often set with deadlines for every stage of development and
merchandise will proceed through the event method sort of a automobile in carwash,
and on paper, be delivered on time.
this is often the foremost common and classic of life cycle models, conjointly noted
as a linear-sequential life cycle model. it's terribly easy to know and use. in an
exceedingly body of water model, every section should be completed in its
completeness before subsequent phase will begin. At the tip of every section, a
review takes place to work out if the project is on the proper path and whether or
not or to not continue or discard the project. Phases don't overlap in an exceedingly
body of water model.
ADVANTAGES:
Works well for smaller comes wherever needs are fine understood.
DISADVANTAGES:
CHAPTER 4
Analysis Document
LEVEL 0 DFD
Admin
Officers
CAWP Station
Admin
0
End User
(Citizen)
CHAPTER 5
ER DIAGRAM
Name Station_id
Area
Ht/wt
Emp_id pwd
Statio ID Pwd
Contact no
n_id Joining_date status Position
Station
_id
Emp_d
Gives Station
Login has etail
admin
Name_Arres Name
Age tee
Ar_date
Station_id
Gender
Rank Ht/wt
Emp_id
Files
pwd
Officer Authe
Station_id
Status
Emp_id
has Complai
nt_date
ID
Complain
Citizen View
t
Address
Pwd Name
Compla
Status_Id
Contact
int_Id
Complaint
Status
_Reg
Complain
t_details
Updated by Station
_id
Case
Progress
Up_date
Complai Complain
nt_by t_psw
Dept ofCase_Ref
ISE,NHCE Page 10
Case_update
Crime Report 2019-20
USECASE
Admin Citizen
Station Admin
Station Officer
CHAPTER 6
Testing
6.1 Testing principles
Before using methods to design valid test cases, a software engineer must
understand the basics of software testing: All tests should be adhered to customer
requirements Long-term screening should be scheduled before the exam 80% of all
errors open during the test will be followed in 20% t of all program items. The
problem, then, is to separate the structures of the suspects and test them
completely.
The test should be "small" and advanced to the "big" test. Screening is impossible
Many of the richness of test case design methods already works with software. These
methods provide the formula with systematic evaluation. Most importantly, the
systems provide a device that can help ensure the integrity of the tests and provide a
high probability of detecting errors in the software.
In this program, the system is evaluated mathematically in the given data to give the
correct result or not. If incorrect data is provided then what makes the error or
receives it.
Also called behavioral testing focuses on software service requirements. That is,
testing a black box allows a software engineer to find a set of installation conditions
that will fully meet all application requirements.
2. Interface-errors,
CHAPTER 7
SOURCE CODE
<!DOCTYPE html>
<html lang="en">
<head>
<title>Crime Report</title>
<meta charset="utf-8">
</script>
<style>
width: 70%;
margin: auto;
Body
background-image:url('images/court.jpg');
background-size:cover;
</style>
Dept of ISE,NHCE Page 14
Crime Report 2019-20
</head>
<body>
<b>Crime Report</b></a>
</div>
<li class="dropdown">
<ul class="dropdown-menu">
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
</ul>
</li>
<li>
<a href="about.php">About</a>
</li>
<li>
</li>
<li>
</li>
</ul>
</div>
</div>
</nav>
<br>
<div class="container">
<br>
<li data-Target="#myCarousel”</li>
</ol>
</div>
<div class="item">
</div>
<div class="item">
</div>
<div class="item">
</div>
</div>
<span class="sr_only">Next</span>
</a>
</div>
</div>
<div class="modal-dialog">
</div>
</div>
</div>
</form>
</div>
</div>
7.2StationAdmin Login
<div class="modal-dialog">
</div>
<div class="modal-body">
<?php
include_once('db.php');
$res = mysqli_query($con,$qry);
while($result=mysqli_fetch_array($res))
echo"<option value='".$result[0]."'>".$result[0]."</option>";
?>
</select>
</div>
</div>
</form>
</div>
</div>
<div class="modal-dialog">
<?php
include_once('db.php');
$res = mysqli_query($con,$qry);
while($result=mysqli_fetch_array($res))
Dept of ISE,NHCE Page 22
Crime Report 2019-20
echo"<option value='".$result[0]."'>".$result[0]."</option>";
?>
</select>
</div>
</form>
</div>
</div>
<div class="modal-dialog">
</div>
</div>
</form>
</div>
</div>
<div class="modal-dialog">
<div class="modal-body">
<?php
include_once('db.php');
$res = mysqli_query($con,$qry);
while($result=mysqli_fetch_array($res))
echo"<option value='".$result[0]."'>".$result[0]."</option>";
}
Dept of ISE,NHCE Page 25
Crime Report 2019-20
?>
</select>
</div>
</div>
</form>
</div>
</div>
<div class="modal-dialog">
</div>
<div class="modal-body">
<?php
include_once('db.php');
$res = mysqli_query($con,$qry);
while($result=mysqli_fetch_array($res))
echo"<option value='".$result[0]."'>".$result[0]."</option>";
?>
</select>
</div>
</div>
</form>
</div>
</div>
<div class="modal-dialog">
</div>
<div class="modal-body">
</div>
<div class="modal-footer">
</div>
</div>
</form>
</div>
</div>
<script>
$('.carousel').carousel
interval: 5000
</script>
</body>
</html>
CHAPTER 8
Input/Output Screens
Screenshots
Home Page
About
Police Login
Add police
Complaint details
View Complaints
CITIZEN PAGE
Citizen Registration
Citizen Login
Citizen Page
CHAPTER 9
Conclusion
Proposed system makes easier the user task, instead of going to the police station they
can register the complaints through online and view the status of it. With people are
more secure and help in curbing the crime in the areas. With this system crime can be
analyzed, which will help in taking correct decisions for police officers.
CHAPTER 10
BIBLIOGRAPHY
Reference:
Web Sites
www.geeksforgeks.com
www.stackoverflow.com
www.w3schools.com
www.sitepoint.com
www.wikipaedia.com
www.researchgate.com
www.slideshare.net