INTRODUCTION OF ONLINE CRIME MANAGEMENT SYSTEM

Are you looking for Online crime management system for your final year project? We are here to help you. You can contact us

This system is named as Online Crime Management System. This system is made to keep the records about the prisoners and about the crimes. Jailor can login as a user and can add the details of prisoners like name, age, address, crime and punishment.

Jailor can also add the details about the different guards that are on duty. Jailor can change attributes like time shift duty hours of guards. Jailor can also write the First Information Report and can save it.

FIR’s date, time, number and details can be seen any time if required by the registered user. This system gives unique id to ever FIR as required and the prisoner number will also be unique.

This system has one more user which is admin. Admin can add the user(jailor) and delete the user. All other attributes can only be changed by user.

This system tells about any crime that is done and id any complaint is made to the police or if any fir is done and if the criminal gets caught and we can update the information about the case and one other benefit is that if the complaint is registered online then it can be checked by all the registered users and if there is any update about any complaint then it can be added online.

It increases the efficiency of the police to caught criminals.Crime management system can be implemented in every prison without any problem. This system has the the capability to maintain infinite number of records.

It is very useful as the written papers have a limited time period and can get lost but in crime management system this is not possible as a backup file will be created automatically and also updated automatically when any change is made in any record.

The other important function given is postmortem, if any dead body is found in any case then the postmortem report will also be updated online with the case.

There are two types of users but only limited privileges are given to both the users according to the need. There is no option to delete a prisoners’ record because it may be required later by government to know any details about the person and can help in the tracking of the prisoner.

Admin can verify and add users but cannot see the complaints that are saved by users in the database because these files must be kept secret and only required person could check the files.

Some other features are criminals’ details, checking records, registering user etc. Moving on Further we will see the designing of the system and attributes of it on the principles of which our system does work properly.

MODULES OF ONLINE CRIME MANAGEMENT SYSTEM

Our system has two main interfaces one for Admin panel and other is for User which is jailor. Along with these we have other interfaces which can be discussed as below:

Registration:

Users need to be registered in the clinic management system so as to use the system and add the criminals’ details, add complaints, update closed cases etc.

If the user is not registered in the the prison management system, he/she cannot do any task with it like writing FIRs, adding prisoner crime and punishment details etc.

Login:

After registration one can log in the system as the operator of the system on the behalf of user. After this he has the other useful interfaces available for further actions.

Writing FIR:

First option that is provided in the prison management system is writing FIR. We all know FIR is First Information Report. All FIRs have unique complaint number, date, time and location.

Similar interface is provided for writing FIR in this system. FIR written cannot be lost and fast actions can be taken on the basis of it as it will be uploaded on server and others can see it.

In this system FIR has all the options that are in the old handwritten system but is more secure as no changes can be made once the FIR is submitted and only the authorized users can see it.

Adding Prisoner:

The second option that is given in this is the one of the most important that is adding prisoner.

As soon as the  court declares that the victim is found guilty and tells his or her punishment and in which prison the victim must be kept, the prisoner will be send to the same prison as told by court and all the details of criminal like name, address, age, criminal number, crime and the punishment all can be updated in the prison management system.

Then later these details can be used further and there is no option to delete the prisoners data so once the prisoner is added to the database, no one can delete the data of the criminal and it will be helpful as papers can get lost or can be theft but in this case information cannot be lost and there is no use of theft this data as no changes can be made in the database.

Prisoners data cannot be lost because the backup of the database is there and the backup gets updated as soon as the changes are made into the database.

Adding Postmortem Report:

The third important feature that is provided by this system is adding the details about the postmortem report. If in any case, any dead body is found then the postmortem of the body is done and if the details about the postmortem report can be found with all the other information then it becomes very easy to to found the criminal instead of gathering all the information first.

So, this option is given in the crime management system to reduce the time taken to find the criminals. The other details that can be saved with the postmortem are the name of the doctor who did the postmortem, age of the dead person, blood group and death time and cause etc.

SYSTEM DESIGN OF ONLINE CRIME MANAGEMENT SYSTEM:

Now this prison management system is designed in such a way that it takes as less resources to work properly. It has its own sort of minimum requirements that we need to take care of :

System needs a minimum of 2 GB of ram to run all the features smooth and sudden.

It needs a minimum 1.3 GHz processor to rum smooth as less than that may create problems.

The system needs to be operated by some authorized person as wrong hands can make it irresponsible.

Rest is all up to the user’s usage will care for hardware

For security Antivirus is recommended.

System is made properly and all the testing is done as per the requirements. So the rest of the things depend upon the the user and no one can harm the data or the software if the proper care is done.

ER DIAGRAM OF ONLINE CRIME MANAGEMENT SYSTEM:

ERD OF ONLINE CRIME MANAGEMENT SYSTEM:

 

Entity User:

Every Users details need to be stored in proper manner with very needed attributed. As all the other tasks can be performed only if the the user is authenticated. After the user has registered and is verified by the admin then the user can perform all the tasks on it. Some of the features of user are as follows:

Primary key User_id:

User id is system generated and unique,which can be referenced in any other entity.This mostly for recognizing it in unique way anywhere in the program.

User name:

User name is taken form the user and fed into this it is properly validated so that no mistake happens.

Number:

The phone number is taken here to keep the member updated and for the confirmation of the event is also managed through this method.

Email:

Email is taken to make member aware of new offers an new events and for future references it is also relevant.

Password:

The password is required to login into the system and the password must contain a special character, a numeric character and an upper case letter.

Entity Admin:

Admin is only a single user which can verify the user who is tring to register on this prison management system. If the admin verifies the user then only the user can see the details and can make changes according to the given privileges. No other user can register as admin as there is only one account for admin.

Entity Prisoner:

Prisoner is the criminal who is found guilty and is in the prison for his crime. Prisoner cannot do any change in this software as there is no privileges given to them and there information can only be seen only by the authentic user. It has following attributes :

Primary key prisoner_id:

As we all know that all the prisoners in prison have a unique criminal number so that is used here as a primary key.

Address:

As the prisoner is a criminal so for record there must be prisoners address so that if the criminal is required after completing his punishment period in prison then he or she can be found on the address.

Name:

Name of the prisoner is important as it is easy to found a person in case it is required.

Crime:

The user must know that which prisoner is there and for which crime. So the user can check it in the database whenever he wants and about whoever he wants.

Punishment:

As the user must know about the crime he or she must also know about the punishment period and the type of the punishment of the prisoner. So an entity punishment is provided to know about the punishment of the prisoners.

Entity Postmortem:

The third important feature that is provided by this system is adding the details about the postmortem report. If in any case, any dead body is found then the postmortem of the body is done and if the details about the postmortem report can be found with all the other information then it becomes very easy to to found the criminal instead of gathering all the information first.

Other attributes of entity guard are as follows:

Name:

User must know the names of the guards who are on duty in the same prison.

Address:

If a guard gets hurt on the duty and in case his family needs to be known about that then the guard’s address and the phone number is required.

Death cause:

The postmortem of the body is done to know what are things that were done when the person was alive and how the person died.

USE CASE DIAGRAM OF ONLINE CRIME MANAGEMENT SYSTEM:

 

USE CASE DIAGRAM OF ONLINE CRIME MANAGEMENT SYSTEM:

In this use case as you can see we have our system as box and the users who use our system are of kind of outside the box but related to the system. There are two kinds of user one is admin and the other is user type.

Users :

There are two types of user that are present here in this system. One is admin and the other is user. After the admin verifies the user only then he is eligible to use the the system and after that it has all the privileges.
Attributes given to the user are:

Writing FIR:

The user can write FIR and can save it. The saved FIR can be seen only by the valid users.

Prisoner:

In this attribute or column, user can add the details about the prisoners and there is no option to delete prisoner data once it is added to the prison management system.

Admin panel :

There can be only one account of admin. Admin can add the users. When a user tries to register on prison management system then the request goes to admin and if the admin verifies only then user can register itself on it. Other privileges that admin has are explained below :

He can Login through his id and password. The password is made very secure so that no person can guess and make it difficult for hackers to crack.

He has access to the profile of his own and he can search detail of other Users and can see the detail of him.

This admin is responsible for creating and uploading the Menu card to every User in the Interface.

He can add a user to that account and give access to for handling the prison on their own.

He can manipulate the data of any user.In this, we are showing here the interaction of the users with our system through our use case diagram.

FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS OF ONLINE CRIME MANAGEMENT SYSTEM

The functional requirement of online crime management system this is that it does what it is meant for. A functional requirement describes what a software system should do, while non-functional requirements place constraints on how the system will do so.

Functional requirements specifies a function that a system or system component must be able to perform. It can be documented in various ways. The most common ones are written descriptions in documents, and use cases.

Few of its functional requirements are as given below:-

User data should be fed into the system:

This system is doing that properly in user entity.

User can add the prisoners:

Users are able to add prisoners, which is they are doing with this system.

Writing FIR:

The user can write the FIR and other complaint reports that the user came to know about.

Able to add and delete complaints: User can add the complaints and their details and if required he or she can also delete the details of the complaint.

Non-Functional of online crime management system:-

Non-functional necessities square measure the other demand than practical necessities. This square measure the necessities that specifies criteria which will be wont to choose the operation of a system, instead of specific behaviors.

Non-functional necessities square measure within the style of “system shall be “, associate degree overall property of the system as a full or of a specific facet and not a particular operate. The system’s overall properties remarkably mark the distinction between whether or not the event project has succeeded or unsuccessful.

Non-functional of online crime management system necessities – are often divided into 2 main categories:

Execution qualities, like security and usefulness, that square measure evident at run time.

Evolution qualities, like liabilities, maintainability, flexibility and quantifiable, that square measure embodied within the static structure of the code.

Non-functional necessities place restrictions on the merchandise being developed, the event method, and specify external constraints that the merchandise should meet

Our project qualifies all the criteria of functional and not functional accordingly and system is up to mark performance vise.Here we need to take care of few more things before heading towards the system.

The most important feature of online crime management system application world is that application’s ease of usage .application will easy to use if made while keeping in mind that user need not to think twice about searching any feature.

Everything should be made distinctive by using the colour combination such that everything needed most frequently highlighted with focus colours. We can use simple layouts like card and grid layout etc.

By varying color and other UI combination many good intuitive interfaces can be made. Which ultimately make interface easy to use for a long time.

Unlike ancient style wherever the goal is to form the thing or application physically enticing, the goal of interface style is to form the user’s interaction expertise as straightforward and intuitive as attainable – what’s typically known as user-centered style.

Where smart graphic/industrial style is daring and eye catching, smart interface style is commonly delicate and invisible.

Keep things simple and consistent:-Simple and Harmonic way making UI is very intuitive and needs to followed

Make good use of typography:-The typography is taken care very strictly as the need of the system.

Use color and contrast properly:-Color combo of lite and dark is good way emphasis and done well in this system

Consider feedback messages:-feedback form is a very good way taking feedback of forms and improving the system.

Simplified forms:-form is made simple to fill with the clean user interface.

CRIME MANAGEMENT SYSTEM PROJECT DOCUMENTATION

CONCLUSION OF ONLINE CRIME MANAGEMENT SYSTEM

So the outcome of all the the hard work done for prison management system is here. It is a software which helps the user to work with the prisons and crimes easily.

This software reduces the amount of manual data entry and gives greater efficiency. The User Interface of it is very friendly and can be easily used by anyone. It also decreases the amount of time taken to write FIR details and other modules.

All the details about any complaint, postmortem or any other criminal can be checked and can be saved. This Crime Management System is a solution to all the problems related to the crime reports, postmortems, criminals details, their crime , their punishment and others etc.

At the end, we can say that this software is performing all the tasks accurately and is doing the work for which it is made.