Sunteți pe pagina 1din 42

ACKNOWLEDGEMENT

We would like to give our sincere acknowledgement to everybody responsible for the successful completion of our project titled CRIME FILE SYSTEM. It gives us great pleasure to acknowledgement with thanks the assistance and contribution of many individual who have been actively involved at various stages of this project to make it a success. Firstly we are very grateful to this esteemed institute SRI BHAGHWAN MAHAVEER JAIN COLLEGE for providing us an opportunity to our degree course . We wish to express our whole hearted thanks to our principal DR.EDWIN CHRISTOPHER for providing the modernized lab facilities in our institute. Perfection is impossible to achieve, but hard work and dedication can achieve any goal. I have tried my level best to fulfill the requirements of the project, but I could not have achieved my goal without the able guidance of Ms. KAVITHA.S, H.O.D., Computer Science Department. We indebted to Ms.KAVITHA.S, for providing us an opportunity to work under the guidance and for her constant support and encouragement . Our gratitude towards our guide KAVITHA.S for their keen interest and boldness encouragement, which is received during the entire period of our project . We would also like to thank all our lecturers. Finally we convey our acknowledgement to all our friends and family members who directly or indirectly associated with us in the successful completion of the project. We thank one and all.

DECLARATION

We, KIRAN KUMAR B.C (10NDS75028), LAVANYA.R (10NDS75029) do hereby declare that the project work entitled CRIME FILE SYSTEM, is a bonafide work carried out by us under the guidance of MS.KAVITHA.S, lecturer, and H.O.D of Computer Science department. This project, as presented in this report, is our original work and has been submitted as a partial fulfillment for the Degree of Bachelor of Computer Science of Bangalore University.

PLACE: KGF STUDENT:

NAME OF THE

KIRANKUMAR B.C (10NDS75028) LAVANYA.R (10NDS75029)

SYNOPSIS

CRIME FILE SYSTEM


BACKGROUND:
Our project is entitled as "CRIME FILE SYSTEM. Now a days the crime rate in the society is accordingly increasing, due to the negligence of people. So it has become a major drawback for the improvement of the Nation. To overcome this drawback, we can use this software for reporting crimes in time and maintaining its records is very helpful to control the crime statistics.

OBJECTIVE:
Crime File System is a system used to report crimes. This project will be done using VB 6.0 as front end, and MS Access as back end. It can be used to report crime. This project is mainly useful for police stations. This system will help to manage all the activities in a police station using computers. Currently all the works are done manually, by computerizing all the activities inside a police station can be managed easily and effectively.

PURPOSE & SCOPE:


It is important for the Police Department of Defense to store and provide details to the public in account to provide the better service to them. The documentary proof may not be efficient to meet the requirements for maintaining the records, which may result in dissatisfaction among the public about the services provided by the Department.

APPLICABILITY:
Our project is applicable to report crimes to any Defense services like Police stations etc, which help to manage all activities using computers, so that records and details of particular case can be accessed easily.

SOFTWARE CATAEGORY:

This project helps to maintain records of crime and retrieving it back. For better understanding of our project, we have divided the problems into separate modules.

The modules involved in this project are: Login for user Complaint registration View complaint status Criminal register management FIR Management Manage list about most wanted criminals

1. LOGIN
This includes Administrator and User login. There will be a username and password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION
This module helps to register the details about the crime. This is done by entering some details, such as incident details, Victim details, crime details etc

3. VIEW COMPLAINT STATUS


This module allows us to view the status of the complaint that you have registered earlier.

4.

CRIMINAL REGISTER MANAGEMENT


Here we can have the facility to view the details of the criminals. The

administrator can add new criminals details and save it in a database. This can be done by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that took place at recent years. The administrator can enter FIR information and save it in a database.
6. CHARGESHEET

MANAGEMENT

This module allows us to add the other requirements of this software which is very important for other modules, also admin can enter what all actions taken so far by the department and save it in a database.

7. MANAGE THE LIST OF MOST WANTED CRIMINALS


This is an additional feature added to this Software, which helps us to make a quick search about the most wanted criminals. This helps to always keep track of and identify a person quickly, who is a most wanted criminal.

LIST OF TABLES

TABLE NUMBER 1 2 3 4 5 6

TABLE NAME

COMPLAINT REGISTRATION CHARGESHEET FIRST INFORMATION REPORT (FIR) COMPLAINT STATUS CRIMINAL REGISTRATION MOST WANTED DETAILS

LIST OF DIAGRAMS

FIGURE NO 1 2 3

NAME OF DIAGRAM PERT CHART DATA FLOW DIAGRAM E-R DIAGRAM

CONTENTS

1. INTRODUCTION
Objective and Scope of the Project Theoretical Background 1- 3 4 10

2. SYSTEM STUDY & ANALYSIS


Introduction Existing System Proposed System Hardware & Software Requirements 11 11 12 12 12 - 12 13 - 13

3. SYSTEM DESIGN
Pert Chart Data Flow Diagram Sample Report Sample Coding Testing Form Designs 14 -14 15 -15 16 -18 19 - 36 37 - 38

4. CONCLUSION

39 - 39

5. BIBLIOGRAPHY

40 - 40

OBJECTIVE AND SCOPE OF PROJECT

Crime File System is a system used to report crimes. It can used to report crime. This project is mainly useful for police stations. This system will help to manage all the activities in a police station using computers. Currently all the works are done manually, by computerizing all the activities inside a police station can be managed easily and effectively. It is important for the Police Department of Defense to store and provide details to the public in account to provide the better service to them. The documentary proof may not be efficient to meet the requirements for maintaining the records, which may result in dissatisfaction among the public about the services provided by the Department. Our project deals with the CRIME FILE SYSTEM, which includes many modules required to perform the activities inside Police stations and it also provides easy way of accessing these data in efficient manner. For better understanding of our project, we have divided the problems into separate modules. The modules involved in this project are: Login for user Complaint registration View complaint status Criminal register management FIR Management Manage list about most wanted criminals

MODULES INCLUDED
1. LOGIN This includes Administrator and User login. There will be a username and password to login into the system to use all the facilities.

2. COMPLAINT REGISTRATION This module helps to register the details about the crime. This is done by entering some details, such as incident details, Victim details, crime details etc. 3. VIEW COMPLAINT STATUS This module allows us to view the status of the complaint that you have registered earlier. 4. CRIMINAL REGISTER MANAGEMENT Here we can have the facility to view the details of the criminals. The administrator can add new criminals details and save it in a database. This can be done by entering details such as criminal number, age, occupation, type of crime etc. 5. FIR MANGEMENT This module allows viewing the First Information Report of all the crimes that took place at recent years. The administrator can enter FIR information and save it in a database. 6. CHARGESHEET MANAGEMENT This module allows us to add the other requirements of this software which is very important for other modules, also admin can enter what all actions taken so far by the department and save it in a database.

7. MANAGE THE LIST OF MOST WANTED CRIMINALS This is an additional feature added to this Software, which helps us to make a quick search about the most wanted criminals. This helps to always keep track of and identify a person quickly, who is a most wanted criminal.

FUTURE ENHANCEMENT

We can update this system as online application The main advantage of online application is that, a person can report the crime anytime from anywhere. Users can view the progress of their complaint online. By the future technology user can view the case details and progress of the complaints on their mobile phones Face recognition technology can apply. User or witness of the crime can give the physical information of the thief.

THEORETICAL BACKGROUND

VISUAL BASIC

Visual Basic is also called Event Driven program. It means operations need not have to follow a sequence and can be interrupted, suspended and abandoned at any instance. This is a programming language which contains number of windows. What is VB? It is a tool that allows you to develop windows (Graphical User InterfaceGUI) Application. It was developed from BASIC programming language. In 1970s Microsoft got it started by developing ROM-based interpreted BASIC for the entry microprocessor based computers. It is an Event Driven; meaning code written for a particular object may remain idle until called upon to respond to some event (Event may include operations such as button pressing, menu selector) an event processor governs Visual Basic.

Some of the features of VB: It includes a full set of objects. Using each objects the user can draw or develop the applications. It also includes lot of icons and pictures for your use. It includes events for responses to mouse and keyboard actions, this can be useful in trapping interrupts to divert or suspend operations. It includes a full set of mathematical string handling and graphics functions; this makes the process of developing and performing operations very easy. Visual Basic also has facilities to handle fixed and dynamic variables and control arrays. It also includes facilities sequential and random access file support, this makes storing and accessing data very easy. VB has certain powerful database access tools, thus interfering with different a type of backend software becomes very easy. It also includes facilities for using ActiveX support; this allows the user to create our own type of objects.

VB HISTORY (VB3, VB$ & VB5):

Starting with VB5, Visual Basic became an exclusively 32-bit programming language, suitable for programming only on Win9x or NT system. If you must program for Win2.x, then you have to drop back to either VB3 or VB4. VB4 had the dual ability to support Win3.x as well as Win9x/NT systems.

Visual Basic 6.0 comes in 3 different editions. They are: 1) The Visual Basic 6.0 Academic edition 2) The Visual Basic 6.0 Professional Edition 3) The Visual Basic 6.0 Enterprise Edition Visual Basic 6.0 Academic Edition is the introductory edition which allows us to create windows application easily. It includes all the tools to perform this operation efficiently. Visual Basic 6.0 Professional Edition is for computer professionals. It is includes all the advanced features such as tools to develop ActiveX and Internet controls. Visual Basic 6.0 Enterprise Edition is the most advanced edition. It is for professional programmer who can develop distributed application. It is most sited for those who function in a team environment.

APPLICATIONS of VB: Every application or project in visual Basic is made up of seven applications. That is: Form Controls

Properties Methods Procedure Modules Project

MS ACCESS
Microsoft Access is a relational database management system for Microsoft Windows. It is designed to give you unparalleled access to data, combined with ease of use made possible with windows.

Features of MS-ACCESS:

Microsoft Access joins other Microsoft products, such as MS-Word for Windows and MS-EXCEL, by indicating toolbars. We can modify to fit our needs, more around in the MS-ACCESS windows, and hide or show individually. We can create our own custom toolbars, attach them to forms and reports in our database. When you want to define an expression in MS-ACCESS we can use the expression Builder even includes a list of common expressions already written for us to choose from. We can use input masks to define patterns that data must follow when it is entered in forms and data sheets, making data entry faster and more accurate. It is very easy to define an input mask using Input Mask Property. For quick sorting of records in tables, queries and forms you can click the sort Ascending and sort Descending buttons on the toolbar or choose quick sort from the records menu and then choose ascending or descending. Using the print definition command on the file menu, you can print detailed information about the design of any object in our database. To print information about more than one object, choose Add-Insert from the file menu and then choose database documents.

Functions Performed By MS-ACCESS:

Storage of data Creation and maintenance of data structure Provision of efficient indexing mechanism Management of very large database Enforcement of security and privacy

Here is the Hierarchy that Microsoft Access uses in breaking down a database.

Field:
Fields are the different categories within a Table. Tables usually contain multiple fields.

Data types:
Data types are the properties of each field. A field only has 1 data type. Example: (Fieldname) Student Last Name; (Data type) Text.

DATABASE
A Database is an organized mechanism that has the capability of storing information through which a user can retrieve stored information in an

effective and efficient manner. The data is the purpose of any database and must be protected. Here in comes the role of Database Management System (DBMS) that helps in systematic organization of information. The information in a database should be organized in such a way that it is easy to update. And only then, it can quickly provide information. Any stored information or a database, whether electronic of manual helps you by keeping track of your inventories, payroll invoice or anything else that you consider important. There are 2 types of database; they are RDBMS [Relational Data Base Management System] and DBMS [Data Base Management System].

RDBMS:

It is defined as a method of viewing information from several, separate database that relate to one another through keywords or values. The main advantage of RDBMS is that you can simultaneously use more than one database to see information stored in them.

Microsoft Access is a window-based program created by Microsoft. It helps you store and manage a large collection of information. A systematically arranged database helps you manage the stored information in an efficient way so that it can access quickly whenever needed. Microsoft Access is based on RDBMS. Therefore to have a better understanding of working in Access, you should be familiar with 4 basic objects of RDBMS as described below.

Tables: It is a collection of information on a specific topic. In a table the information stored in rows and columns. You can store different types of data in different tables. Let us now get to know more about the components that makes up a table. They are: Columns Rows Domain

Primary Key Relationship

Queries: Queries are systematic ways of retrieving information from a database. Accesss query feature can look for the information that meets the criterion or condition you specify and displays the information on the screen.

Forms: It presents the information stored in a database in an easy to use format. Through forms, you can view, enter or update information in a database. If you wish to view records in your database, from present one record at a time on the screen.

DBMS:

It is a tool for managing information, stored in the database. It includes the following functions: Database Creation Modifying a Database Adding Records in Database Deleting Records in Database Selecting Records in Database

Introduction to System Analysis


System analysis is a process of gathering and interpreting facts, diagnosing problems and the information to recommend improvements on the system. It is a problem solving activity that requires intensive communication between the system users and system developers. System analysis or study is an important phase of any system development process. The system is studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator and dwells deep into the working of the present system. The system is viewed as a whole and the input to the system are identified. The

outputs from the organizations are traced to the various processes. System analysis is concerned with becoming aware of the problem, identifying the relevant and decisional variables, analyzing and synthesizing the various factors and determining an optimal or at least a satisfactory solution or program of action.

A detailed study of the process must be made by various techniques like interviews, questionnaires etc. The data collected by these sources must be scrutinized to arrive to a conclusion. The conclusion is an understanding of how the system functions. This system is called the Existing system. Now the existing system is subjected to close study and problem areas are identified. The designer now functions as a problem solver and tries to sort out the difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the existing system analytically and the best one is selected. The proposal is presented to the user for an endorsement by the user. The proposal is reviewed on user request and suitable changes are made. This is loop that ends as soon as the user is satisfied with proposal. Preliminary study is the process of gathering and interpreting facts, using the information for further studies on the system. Preliminary study is problem solving activity that requires intensive communication between the system users and system developers. It does various feasibility studies. In these studies a rough figure of the system activities can be obtained, from which the decision about the strategies to be followed for effective system study and analysis can be taken.

Existing System:
Lack of security of data. More man power. Time consuming. Consumes large volume of pare work. Needs manual calculations.

No direct role for the higher officials.

Proposed System:
The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work. Security of data. Ensure data accuracys. Proper control of the higher officials. Minimize manual data entry. Minimum time needed for the various processing. Greater efficiency. Better service. User friendliness and interactive. Minimum time required.

SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:
Processor : X86 Compatible processor With 1.7 GHz Clock speed

RAM

512 MB or more

Hard disk

20 GB or more

Monitor

VGA/SVGA

Keyboard

104 Keys

Mouse

2 buttons/ 3 buttons

SOFTWARE REQUIREMENTS:
Operating System Front end Back end : : : Windows 2000/XP Visual Basic 6.0 MS ACCESS

PERT CHART

Jan 10 Jan 5 Jan 10

Jan 23

Design database part Jan 10 Jan 30

Jan 23 Feb 20 Code for database part

Specification

Design Graphical User Interface part i Feb 21 Mar 12

Code for graphical user interface

Interacts and testing Interface Feb 27 Mar 12 Write user manual Finish

DFD [DATA FLOW DIAGRAM]

Crime File System

Login

General

Complaint Registration

FIR

Charge sheet

Criminal Registration

Add Complaint Status

Most Wanted Details

View Complaint Status

DATA REPORT 1: CRIMINAL REPORT

DATA REPORT 2: FIRST INFORMATION REPORT [FIR]

DATA REPORT 3: MOST WANTED DETAILS

METHODOLOGY USED FOR TESTING


The extent of testing is controlled by many factors, such as the risks involved, limitations on resources, and deadlines. In light of these issues, we must deploy a testing strategy that does the best jopb of finding defects in a product within the given constraints. There are many testing strategies, but most testing uses a combination of these: Black Box testing White Box Testing

However, no strategy or combination of strategies truly can prove the correctness of a system; it can stabilize only its capability.

BLACK BOX TESTING:


The concept of the Black box is used to represent a system whose inside workings are not available for inspection. In a black box, the test item is treated as black, since its logic is unknown; all that is known is what goes in and what comes out, or the input and output. In black box testing you try various inputs and examine the resulting output; you can learn what the box does but nothing about how this conversion is implemented. Black box testing works very nicely in testing objects in an objectoriented environment. The black box texting technique also can be used for scenariobased tests, where the system inside may not be available for inspection but the input and output are defined through use cases or other analysis information.

WHITE BOX TESTING:


White box testing assumes that the specific logic is important and must be tested to guarantee the systems proper functioning. The main use of the white box is in error-based resting, when you already have tested all objects of an application and all external or public methods of an object that you believe to be of greater

importance. In white box testing, you are looking for bugs that have a low probability of executing, have been carelessly implements, or were over looked previously. One form of while box testing, called path testing, makes certain that each path in an objects method is executed at least once during testing. Two types of path testing are statement testing coverage and branch testing coverage.

STATEMENT OF TESTING
The main idea of statement testing coverage is to test every statement in the objects method by executing it at least once. However, realistically it is impossible to test a program on every single input, so you never can be sure that a program will not fail on some input.

BRANCH TESTING COVERAGE


The main idea behind branch testing coverage tests to ensure that every branch alternative has been executed at least once under some test. As in statement testing coverage, it is unfeasible to fully test any program of considerable size. Most debugging tools are excellent in statement and branch testing coverage. White box testing is useful for error-based testing.

CONCLUSION
CRIME FILE MANAGEMENT SYSTEM initiates the objective of providing the user with customized and powerful complaint registration and process management system side software. The software is built with all options such as complaint registration, prisoners registration, and postmortem report generation etcAll the requirements specified during the analysis and design phase are fully met, thus resulting in the formation of good software. The interface provided is very user friendly and flexible for all times.

BIBLIOGRAPHY

Books A Complete Guide to Programming in Visual Basic 6.0 Visual Basic 6.0 Complete Special Edition using VB 6.0 Brian Siler of Jeff spots Programming - Gray Cornell

Site Address www.associatedcontent.com

S-ar putea să vă placă și