Sei sulla pagina 1di 28

Abstract

Identity crime is well known, prevalent, and costly; and credit application
fraud is a specific case of identity crime.
Credit applications are Internet or paper-based forms with written requests
by potential customers for credit cards, mortgage loans, and personal loans.
Credit application fraud is a specific case of identity crime, involving
synthetic identity fraud and real identity theft.
As in identity crime, credit application fraud has reached a critical mass of
fraudsters who are highly experienced, organized, and sophisticated.
The existing multi-layered detection system complemented with additional
layer Communal Detection. CD finds real social relationships to reduce the
suspicion score, and is tamper-resistant to synthetic social relationships.
The proposed system can overcome all the limitations of the existing
system. The project should be developed such that the necessary functions
and performance are achieved within the constraints.
The project is developed within latest technology.

Introduction

Crime File System is a system used to report crimes. It can used to


report Crime. This project is mainly useful for police stations.
This system will help to manage all the activities in a police
station using computers.
Currently all the works are done manually, by computerizing all the
activities inside a police station can be managed easily and effectively.
Now the existing system is subjected to close study and problem
areas are identified. The designer now functions as a problem
solver and tries to sort out the difficulties that the enterprise
faces.
The solutions are given as proposals. The proposal is then weighed
with the existing system analytically and the best one is selected.
The proposal is presented to the user for an endorsement by the
user. The proposal is reviewed on user request and suitable changes are
made.

Existing System

Identity crime has become prominent because there is so much real identity
data available on the Web, and confidential data accessible through unsecured
mailboxes.
It has also become easy for perpetrators to hide their true identities. This can
happen in a myriad of insurance, credit, and telecommunications fraud, as well
as other more serious crimes.
There are two types of duplicates: exact (or identical) duplicates have the all
same values; near (or approximate) duplicates have some same values (or
characters), some similar values with slightly altered spellings, or both.
In existing System are based on white-listing and detecting spikes of similar
applications. White-listing uses real social relationships on a fixed set of
attributes.
Here they can use communal detection algorithm. To account for legal
behaviour and data errors, Communal Detection (CD) is the whitelist-oriented
approach on a fixed set of attributes.
The whitelist, a list of communal and self relationships between applications, is
crucial because it reduces the scores of these legal behaviours and false
positives.

Disadvantages

Lack of security of data.


More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.

Proposed System
The aim of proposed system is to develop a system of
improved facilities.
The proposed system can overcome all the limitations of
the existing system.
The system provides pro per security and reduces the manual
work.
The project should be developed such that the necessary
functions and performance are achieved within the constraints.
The project is developed within latest technology.
Through the techno logy may become obsolete after some
period of time, due to the fact that never version of same
software supports older versions, the system may still be used.
So there are minimal constraints involved with this project.

Advantages

Security of data.
Ensure data accuracys.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.

Modules

Login for user and admin


Complaint registration
View complaint status
Criminal register management
FIR Management
Case History Details management
Managing Postmortem details
Prisoners register management
Manage list about most wanted criminals

Login for user and admin


This includes Administrator and User login. There will be a
username and password to login into the system to use all the
facilities.
Complaint Registration
This module helps to register the details about the crime. This is
done by entering some details, such as incident details, Victim
details, crime details etc

View Complaint Status


This module allows us to view the status of the complaint that you
have registered earlier.
Criminal Register Management
Here we can have the facility to view the details of the
criminals.
The administrator can add new criminals details and
save it in a database. This can be done by entering details such as
criminal number, age, occupation, type of crime etc.

FIR Mangement
This module allows viewing the First Information Report of all the
crimes that took place at recent years. The administrator can enter
FIR information and save it in a database.
Case History Details Management
Here we can view the details of the case, date of occurrence, the
type of crime and place of occurrence etc

Managing Postmortem Details


This module helps to view the postmortem details of a person. The
details such as date of death cause of death, name of the doctor etc.
Prisoner Register Management

This module helps the administrator as well as the user to


store, view and manage the details of the past and present
prisoners.
Manage the List of Most Wanted Criminals

This is an additional feature added to this Software, which


helps us to make a quick search about the most wanted
criminals. This helps to always keep track of and identify a
person quickly, who is a most wanted criminal

Hardware Specification

Processor
RAM
Hard disk
FDD
Monitor
Mouse
CD Drive
Keyboard

:
:
:
:
:
:
:
:

Pentium III/AMD Athlone XP


128 MB
20 GB
1.44MB
14 inch
3 Button scroll
52 X
108 keys

Software Specification

Operating System : Windows 2000/xp


Languages
: java 2(EJB2.0, JDBC, JSP, Servlet, Java Mail)
Front End
: HTML, JavaScript
Platform
: J2EE
Web Servers
: Web Logic8.1/Tomcat 5.0
Backend
: My SQL
Browser Program : Internet explorer/Mozilla Fireworks

Screen Shots

User Register

Login Page

User Home page

Compliant Report

Crime Report

Missing Person

View Missing Details

Admin Home Page

Criminal Report

All Compliant Report

View and Delete most unwanted


Person

Conclusion

The project has been completed successfully with the maximum


satisfaction of the organization.
The constraints are met and overcome successfully. The system
is designed as like it was decided in the design phase.
The project gives good idea on developing a full-fledged
application satisfying the user requirements.
The system is very flexible and versatile.
This software has a user-friendly screen that enables the user to
use without any inconvenience. Validation checks induced have
greatly reduced errors. Provisions have been made to upgrade the
software.
The application has been tested with live data and has provided a
successful result. Hence the software has proved to work
efficiently.

Future Work
In future we can use Image recognization instead of using
hetrogenious database more over
High speed, accuracy and non-redundant data are the main
advantages of the proposed system.
In the proposed system the user is provided with a choice of data
screen, which are similar in formats to the source documents.
Data entry errors can be minimized through validity checks.
After the verification only the data are placed the permanent
database.

Potrebbero piacerti anche