SlideShare a Scribd company logo
1 of 89
Download to read offline
CRIME FILE
PROJECT REPORT

Submitted in partial fulfilment of the requirements
for the award of the degree of

Master of Computer Application
[Software Engineering]

Under the Guidance of:

Submitted by:

Ms. Anuradha chug

SOMDEV ARYA

USIT, GGSIPU

05516404509
MCA(S.E.)- 3rd Sem.

University School of
Information Technology
GGS Indraprastha University,
Delhi –6

1
TABLE OF CONTENTS
CONTENTS

PAGE NO.

1.

TITLE OF PROJECT…………………………………………………….……2

2.

ACKNOWLEDGEMENT……………………………………………………...3

3.

CERTIFICATE…………………………………………………………………4

4.

SELF CERTIFICATE………………………………………………………….5

5.

INTRODUCTION……………………………………………………….……...6

6.

TOOLS/PLATFORM, HARDWARE AND SOFTWARE
REQUIREMENT SPECIFICATION…………………...……………………..8

7.

Technology Overview of with VB and MS Access

8.

ANALYSIS (DFDs, ER Diagrams, etc. As per the project requirements)
…………………………………………………………………13

9.

USE CASE DIAGRAM………………………………………………………..26

10.

USE CASES…………………………………………………………………..27

11.

A COMPLETE STRUCTURE OF THE PROGRAM………………..……..41
Number of modules and their description.
.

Data structures for all modules.

.

Process Logic of each module
Report generation.

12.FUTURE ENHANCEMENT…………………………………………………….82
13.

Glossary……………………………………………………………………..

2
CRIME FILE
(USING MS ACCESS 2007
Framework through VB6)

3
Acknowledgement
This is a great opportunity to acknowledge and to thanks all those persons without whose support
and help this project would have been impossible. We would like to add a few heartfelt words for
the people who were part of this project in numerous ways.
I would like to thanks to my project guide “Ms. Anuradha Chug”, for his indefatigable
guidance, valuable suggestion, moral support, constant encouragement and contribution of time
for the successful completion of project work. I am very grateful to him, for providing all the
facilities needed during the project development. At the outset, I sincerely thank all faculty
members of my institution for his extra effort to make our session on line inspire of all ideas.
I thank my Counselors for his indispensable support and encouragement thought the
project. I would like to thank all those who helped me directly or indirectly.
Last but not the least, I would like to acknowledge the ongoing support of my parents and
my family members, whose patience and encouragement during these long days and night have
been paramount in making this project a reality.

Thank you
Student Name: Somdev Arya

4
CERTIFICATE
This is to certify that project entitled “Crime File” done by “Somdev Arya” , roll no.
05516404509

is an authentic work carried out by her at UNIVERSITY SCHOOL OF

INFORMATION TECHNOLOGY under my guidance. The matter embodied in this project has
not been submitted earlier for award of any degree or diploma to the best of my knowledge and
belief.

Signature of the Guide
Ms. Anuradha Chug
USIT, GGSIPU

5
SELF CERTIFICATE

This is to certify that project entitled Crime File is done by me is an authentic work carried out
for the partial fulfillment of the requirements for the award of the degree of Master of
Computer Application under the guidance of “Ms. Anuradha Chug ”. The matter embodied
in this project work has not been submitted earlier for award of any degree or diploma to
the best of my knowledge and belief.

Signature of the Student

6
Introduction of Crime file

The project is aimed to develop a crime file for maintain a computerized records of all the fir
against crime .The system is desktop application that can be access throughout the police
department.
This system can be used as an application for the crime file of the police department to manage
the records of different activity of related to first information report .In such desktop Crime file
system we will manage all such activities (like registration of the complaint updating
information, search of perticularviewing of the respective reports of crimes) that will save time,
manpower.
This system will provide better prospective for the enhancement of organization regarding to
quality and transparency.

7
Objectives of Crime File

The objectives of this system can broadly be listed as follows:
1. Make the Police functioning citizen friendly and more transparent by automating the
functioning of Police Departments.
2. Improve delivery of citizen-centric services through effective usage of ICT.
3. Provide the Investigating Officers of the Civil Police with tools, technology and information to
facilitate investigation of crime and detection of criminals.
4. Improve Police functioning in various other areas such as Law and Order, Traffic
Management etc.
5. Facilitate Interaction and sharing of Information among Police Departments, Districts,
State/UT headquarters and other Police Agencies.
6. Assist senior Police Officers in better management of Police Force
7. Keep track of the progress of Cases, including in Courts
8. Reduce manual and redundant Records keeping

8
TOOLS, PLATFORM & LANGUAGE TO BE USED TOOLS:



FRONT-END

:

Microsoft Visual Basic



BACK-END

:

Microsoft Access

PLATFORM:


WINDOW 7

HARDWARE AND SOFTWARE ENVIRONMENT
HARDWARE ENVIRONMENT:


PROCESSOR

:

Core 2duo



RAM

:

3GB



STORAGE CAPACITY

:

320 GB



DRIVERS

:

52X24X



18X CD/DVD writer
SOFTWARE ENVIRONMENT:



OPERATING SYSTEM

:

WINDOW 7



RDBMS

:

Microsoft Access

9
Technology Overview of my Project
Microsoft Access 2007
Microsoft Access is a relational database management system (RDBMS) that is packaged
with the Microsoft suite of office products to run under the Microsoft Windows operating
system. Microsoft Access is a Visual Basic (VB) based application that allows Structured Query
Language (SQL) statements to be included in associated macros and VB scripts. Microsoft
Access includes a Jet database engine, combined with a graphical interface, to provide ease of
use in building front-end database applications. Microsoft Access is a structured environment,
used by novice programmers, with little or no experience, to handle relatively small database
functions. It is also a useful tool, for advanced developers, to provide rapid application
development.
Though MS Access has been successfully front-ended against databases, including itself,
Microsoft Access does not scale well for large databases or multiple-access, network
environments. The underlying Jet Database is a file-sharing database that performs all processing
at the client level. As such, Microsoft Access is not designed for high volume multi-user
environments that allow multiple clients to read, write and perform other operations on shared
files at the same time.

10
Visual Basic 6.0

Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE)
from Microsoft for its COM programming model. Because of its graphical development features and BASIC heritage, VB is
considered to be relatively easy to learn and use.[1]
Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface
(GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation
of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but
perform differently.
A programmer can put together an application using the components provided with Visual Basic itself. Programs written in
Visual Basic can also use the Windows API, but doing so requires external function declarations.

Like the BASIC programming language, Visual Basic was designed to be easily learned and used by beginner
programmers. The language not only allows programmers to create simple GUI applications, but can also develop
complex applications. Programming in VB is a combination of visually arranging components or controls on a form,
specifying attributes and actions of those components, and writing additional lines of code for more functionality.
Since default attributes and actions are defined for the components, a simple program can be created without the
programmer having to write many lines of code. Performance problems were experienced by earlier versions, but
with faster computers and native code compilation this has become less of an issue.
Although programs can be compiled into native code executables from version 5 onwards, they still require the
presence of runtime libraries of approximately 1 MB in size. This runtime is included by default in Windows
2000 and later, but for earlier versions of Windows like 95/98/NT it must be distributed together with the
executable.
Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g., text boxes, buttons, etc.) on
the form (window). Controls have attributes and event handlers associated with them. Default values are provided
when the control is created, but may be changed by the programmer. Many attribute values can be modified during
run time based on user actions or changes in the environment, providing a dynamic application. For example, code
can be inserted into the form resize event handler to reposition a control so that it remains centered on the form,

11
expands to fill up the form, etc. By inserting code into the event handler for a keypress in a text box, the program
can automatically translate the case of the text being entered, or even prevent certain characters from being inserted.
Visual Basic can create executables (EXE files), ActiveX controls, or DLL files, but is primarily used to develop
Windows applications and to interface database systems. Dialog boxes with less functionality can be used to provide
pop-up capabilities. Controls provide the basic functionality of the application, while programmers can insert
additional logic within the appropriate event handlers. For example, a drop-down combination box will
automatically display its list and allow the user to select any element. An event handler is called when an item is
selected, which can then execute additional code created by the programmer to perform some action based on which
element was selected, such as populating a related list.
Alternatively, a Visual Basic component can have no user interface, and instead provide ActiveX objects to other
programs via Component Object Model (COM). This allows for server-side processing or an add-in module.
The language is garbage collected using reference counting, has a large library of utility objects, and has basic object
oriented support. Since the more common components are included in the default project template, the programmer
seldom needs to specify additional libraries. Unlike many other programming languages, Visual Basic is generally
not case sensitive, although it will transform keywords into a standard case configuration and force the case of
variable names to conform to the case of the entry within the symbol table. String comparisons are case sensitive by
default, but can be made case insensitive if so desired.
The Visual Basic compiler is shared with other Visual Studio languages (C, C++), but restrictions in the IDE do not
allow the creation of some targets (Windows model DLLs) and threading models.

Characteristics
Visual Basic has the following traits which differ from C-derived languages:


Multiple assignment available in C language is not possible. A = B = C does not imply that the values of A,

B and C are equal. The Boolean result of "Is B = C?" is stored in A. The result stored in A would therefore be
either false or true.


Boolean constant True has numeric value −1. This is because the Boolean data type is stored as a 16-bit

signed integer. In this construct −1 evaluates to 16 binary 1s (the Boolean value True), and 0 as 16 0s (the
Boolean value False). This is apparent when performing a Not operation on a 16 bit signed integer value 0
which will return the integer value −1, in other words True = Not False. This inherent functionality becomes
especially useful when performing logical operations on the individual bits of an integer such
as And, Or, Xor and Not.[4] This definition of True is also consistent with BASIC since the early 1970s
Microsoft BASIC implementation and is also related to the characteristics of CPU instructions at the time.

12


Logical and bitwise operators are unified. This is unlike some C-derived languages (such as Perl), which

have separate logical and bitwise operators. This again is a traditional feature of BASIC.


Variable array base. Arrays are declared by specifying the upper and lower bounds in a way similar

to Pascal and Fortran. It is also possible to use the Option Base statement to set the default lower bound. Use of
the Option Base statement can lead to confusion when reading Visual Basic code and is best avoided by always
explicitly specifying the lower bound of the array. This lower bound is not limited to 0 or 1, because it can also
be set by declaration. In this way, both the lower and upper bounds are programmable. In more subscriptlimited languages, the lower bound of the array is not variable. This uncommon trait does exist in Visual
Basic .NET but not in VBScript.

OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in the late
1970s.


Relatively strong integration with the Windows operating system and the Component Object

Model. The native types for strings and arrays are the dedicated COM types, BSTR and SAFEARRAY.


Banker's rounding as the default behavior when converting real numbers to integers with

the Round function.[5] ?


Round(2.5, 0) gives 2, ? Round(3.5, 0) gives 4.

Integers are automatically promoted to reals in expressions involving the normal division operator

(/) so that division of one integer by another produces the intuitively correct result. There is a specific
integer divide operator () which does truncate.


By default, if a variable has not been declared or if no type declaration character is specified, the

variable is of type Variant. However this can be changed with Data type statements such
asDefInt, DefBool, DefVar, DefObj, DefStr. There are 12 Data type statements in total offered by Visual
Basic 6.0. The default type may be overridden for a specific declaration by using a special suffix character
on the variable name (# for Double, ! for Single, & for Long, % for Integer, $ for String, and @ for
Currency) or using the key phrase As (type). VB can also be set in a mode that only explicitly declared
variables can be used with the command Option Explicit.

13
SOFTWARE REQUIREMENTS SPECIFICATION
1. Introduction
1.1 Purpose :
Crime File System is a system used to report crimes. This project is mainly useful for police
Departments. This system will help to manage all the activities in a police Department using
computers. Currently all the works are done manually, by computerizing all the activities inside a
police Department can be managed easily and effectively.
The police Departments in the country are, today, virtually unconnected islands. Thanks to
telephones and wireless, and especially thanks to mobile telephones, there is voice connectivity
between the police Department and senior police officers, but that is about all. There is no
system of data storage, data sharing and accessing data. There is no system under which one
police Department can talk to another directly. There is no record of crimes or criminals that can
be accessed by a Department House Officer, except the manual records relating to that police
Department. The goals of the system are to facilitate collection, storage, retrieval, analysis,

14
transfer and sharing of data and information at the police Department and between the police
Department and the State Headquarters and the Central Police Organizations.

1.2

Scope:

1. The system ‘CRIME FILE’ will be a Reporting application that will be used for
automating the manual process of register different case in police Department .This
system will manage the details of all the crime who register themselves in police
Department. The system provides an interface to store the crime details of criminals or
prisoners and allows the user to search and view records. The system should have a
login. System should support for Data Entry module for Nominal Roll, Case register for
each prisoner entering in the prison

The system will greatly simplify the overall procedure of crime files.
1.3

Objectives:

The proposed system includes the following features:
•

Login for user and admin

•

Complaint registration

•

View complaint status

•

Criminal register management

•

FIR Management

15
•

Case History Details management

•

Managing Postmortem details

•

Prisoners register management

•

Manage list about most wanted criminals

1.4 Abbreviations:

1.5 References:
•

IEEE SRS Format.

1.6 Technologies
•

Development Tool: Visual studio 06

•

Database: Microsoft ACCESS

2. Overall Description
At its core, the system should offer the following basic functionalities:
.
1. The system requests that the administrator to enter his/her name, password.
2. The administrator enters his/her name, password.
3. The system validates the entered name, password, logs the actor into the system.
4. The administrator maintains the record of information of varios fir,crimes and related
objects.

16
If in the basic flow, the actor enters an invalid name, password , the system displays an
error message. The actor can return to the beginning of the basic flow

Product perspective:

2.1

CRIME FILE is a system which aims at making the store records of crimes easier. This system
provides an easy way to admin to keep track of record of all the crimes and saves him loads of
manual work. This system makes updation of records easier by both user and admin and provides
updated information about the current crimes status in happening.

2.1.1 SYSTEM INTERFACES
None

Front End Client
Application (with data
entry/ update/ cancel/ view
and reporting facility)

2.1.1

Backend
Database

System interface:

2.1.2 USER INTERFACES
•

There will be a screen to display varios information related to FIR.

•

A login screen for entering username, password will be provided.

17
•

There will be a screen for taking and modifying the information of the related to FIR.

•

Windows based

•

Friendly Navigation

2.1.3 HARDWARE INTERFACE:
•

Keyboard

•

Mouse

•

Screen resolution of at least 1024x768- required for proper and complete viewing of
screens.

2.1.4 SOFTWARE INTERFACES
•

Any Windows based operating system (Microsoft Windows XP or higher).

•

MS Access as the DBMS-for database.

2.1.5 COMMUNICATION INTERFACES
•

None

2.1.6 MEMORY CONSTRAINTS
•

At least 64 MB RAM and 2 GB space on hard disk will be required for running the
application

18
2.1.7 OPERATIONS
•

Viewing

•

Addition( by administrator only)

•

Updation( by administrator only)

•

Deletion ( by administrator only

2.1.8 SITE ADAPTATION REQUIREMENTS
•

The terminals at client site will have to support the hardware and software interfaces
specified in above sections.

2.2

Product Function:
•

Accepting crimes information correctly.

•

Storing the correct records in the database.

•

Displaying correct information on selecting view option.

•

Displaying current status of fir of the all crimes.

•

Accepting the updated information from user and administrator.

•

Storing the updated record in database to make it consistent.

•

Deletion privilege to administrator only .

2.3

User Characteristics:
Operator should be computer literate.

2.4 General Constraints:
•

Any Windows Operating system.

•

Interface is in English.

19
Site Adaption Requirements
Terminals at the client side site will have to support the hardware and software interfaces
specified in above sections.

2.5

Assumptions :
•

User is a related of certain branch of police Department

•

fir information is correct.

•

user can fill the registration form.

3.

Specific Requirements
 Functional Requirement no 1:

•

Introduction : Register for the Criminal or prisoner

•

Input

: criminals personal details viz – Criminal No., Criminal Name, Age, Occupation,

CrimeType,address, MostWanted.

•

Prisoner details: PrisonerNo., Charge Sheet No., NickName, CrimeType, FamilyMem

Identity Mark, Height, Weight, Color

•

Processing : validation checks are performed on the input data by the user/administrator like :

mandatory fields should not be kept blank
prisoner family member should be check
All the entries in database should be correct

20
 Functional Requirement no 2:

•
•

Introduction : FIR

Input : Fir no, COMPLAINT NO., Fir Date, Fir Time , Information Type, Place of crime, Act for
crime, District of FIR, Address of victim, Passport No, Name of Police, Received Time,
Information Received

•

Processing : After inputting data validation checks on various fields is performed . on submission
of the information the record is searched in the stored database o basis of the information
submitted.

•

Output : If the information submitted by the user is valid and found in the database then the
corresponding record is displayed .

 Functional Requirement No 3:

•

Introduction : add or Updation of user or administrator

•

Input : Username,password

•

Processing

:

After entering the required information the various validation checks are

performed on submission of the information the updations are made to the database.

 administrator must enter the correct user name and password
•

Output

: The updated information is reflected in the stored database

 Functional Requirement 4

•

Introduction : Viewing

•

Input : none.

21
•

Processing : on clicking the view button the system search for the specified database stored.

•

Output : if the specified database is stored then the whole database is display in the tabular form.
The data displayed is the updated and current information of the user personal and academic
details . It also displays the status of the prisoner and criminals.

4. Performance requirements
5. Design Constraints
•

Standard compliance such as IEEE for the development of SRS report.

•

Software Engineering by K.K. Aggarwal and Yogesh Singh.

6. Attributes
6.1 Reliability and Recovery:
It is imperative that database should be always up when put into the product. During period of intense
activities like submission and verification and updation of data, back up should be taken. It will help to
minimize downtime in case of failure. Any abnormal operations shall result in the shutting down of the
system.

6.2 Security:
The database should be protected physically by having server located in an enclosed and guarded facility.
Virus scanning software should be installed to protect from viruses. The server should be installed under
firewall so that server only internal users can access it. The system shall be compatible with AIMS
security standards. There should be terms and conditions and a check on the content added by the users.
Duplicate record must be discarded by the administrator.
6.3 Maintenance:
New additional features can be added if required and also the system components i.e. memory, disk,
drives shall be easily serviceable without much alteration in the code.

22
Work Flow of Crime File

23
DATA FLOW DIAGRAM

The data flow diagram enables the software engineer to develop models of the information
domain and functional domain at the same time. As the DFD is defined into greater level of
details, the analyst performs as implicit functional decomposition of the system, thereby
accomplishing the fourth operational analysis principle for functions. At the same time, the DFD
refinement results in a corresponding refinement of data as it moves through the processes that
embody the application

LEVEL 0 DFD

24
Context Level DFD for Crime File

LEVEL 1 DFD

25
LEVEL 2 DFD

26
LEVEL 3 DFD

27
LEVEL 4 DFD

28
Entity-Relationship Diagram

29
30
Use Case Diagram

Login/Logoff
Add/delete user
Add complaint status
Search criminal/prisoner
Administrat
or

Registration
criminal/Prionser/Postmortem/
Mostwanted
Login/logoff
Search Criminal/Prisoners
View Complaint Status
View Reports
FIR/postmortem/mostwanted

User

View Registration for
FIR/ChargeSheet
Case History
Registration
criminal/Prisoner/Postmortem/

Exit

31
Use cases

1. Login
1.1 Brief description
This use case allows the actor to login in system .

1.2 Actors
There is only one actor (user ,administrator) which interacts and participates with this use
case.
1.3 Flow of events
1.3.1 Basic flow
This use case starts when the actor wishes to Login himself for the use os system.
•

The system requests that the user must enter his all valid username and password.

•

Once the user provides the requested information, one of the sub-flows is executed.

•

If the user selected “submit ”, the Login information sub flow is executed.

1.3.1.1 Submit crimefile information
• The system requests the user to enter the information which includes:
Personal Information
a) User Name

32
b) password

•

Once the user provides the requested information, system first validates the
information provided.

•

If the information is valid then the particular information about the user is
recorded in the database

1.3.2 Alternative flow
1.3.2.1 Invalid information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly.
1.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
1.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
1.4 Special Requirements
None
1.5 Pre-Condition
The user must be computer operator in police Department .
1.6 Post-Condition
If the use case was successful, the user information is login in the system. Otherwise , the
system state is unchanged.
1.7 Extension points

33
None

Registration process for criminals
2.1 Brief description
This use case allows the actor to register criminal in database.

2.2 Actors
There is only two actor (user, administrator) which interacts and participates with this use
case.

2.3 Flow of events
2.3.1 Basic flow
This use case starts when the actor wishes to Register criminals for the record in database..
• The system requests that the user must enter all valid personal and academic information
of criminals.

• Once the user provides the requested information, the following sub-flow is executed.
• If the user selected “submit ”, the submit information sub flow is executed.
2.3.1.1 Submit crimefile information
1. The system requests the use to enter the Registration information
which includes:
•

CriminalNo

•

CrimName

•

NickName

34
•

Age

•

Occupation

•

CrimeType

•

Address

•

MostWanted

2. Once the user provides the requested information, system

first validates the

information provided.
3. If the information is valid then the particular information about the criminal is
recorded in the database.

2.3.2 Alternative flow
2.3.2.1 Invalid information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly.
2.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
2.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
2.4 Special Requirements
None
2.5 Pre-Condition
The user must be computer operator in police Department .

35
2.6 Post-Condition
If the use case was successful, the criminal information is added in the crimefile database.
Otherwise , the system state is unchanged.
2.7 Extension points
None
3. Registration process for prisoner
3.1 Brief description
This use case allows the actor to register prisoner in database .

3.2 Actors
There are two actor (user, administrator) which interacts and participates with this use
case.
3.3 Flow of events
3.3.1 Basic flow
This use case starts when the actor Register prisoners of the prison.
•

Once the user provides the requested information, one of the sub-flows is executed.

•

If the user selected “submit ”, the submit crimefile information sub flow is executed.

3.3.1.1 Submit crimefile information
• The system requests the user to
includes:
•

PrisonerNo

•

ChargeSheetNo

•

NickName
36

enter the Registration information which
•
•

FamilyMem

•

IdentMark

•

Height

•

Weight

•
•

CrimeType

Color

Once the user provides the requested information, system first validates the
information provided.

•

If the information is valid then the particular information about the prisoner is
recorded in the database

3.3.2 Alternative flow
3.3.2.1 Invalid information
none.
3.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
3.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
3.4 Special Requirements
None
3.5 Pre-Condition
The user must be computer operator in police Department .

37
3.6 Post-Condition
If the use case was successful, the user information is added in the crime file database.
Otherwise , the system state is unchanged.
3.7 Extension points
None
4. Registration process for postmortem
4.1 Brief description
This use case allows the actor to register postmortem in database .

4.2 Actors
There are two actor (user, administrator) which interacts and participates with this use
case.
4.3 Flow of events
4.3.1 Basic flow
This use case starts when the actor Register postmortem.
.
•

Once the user provides the requested information, one of the sub-flows is
executed.

•

If the user selected “submit ”, the submit postmortem information sub flow is
executed.

4.3.1.1 Submit crimefile information
• The system requests the user to
includes:

38

enter the Registration information which
•
•

FirNo

•

Result

•

Sex

•

DthDate

•

CaseDesc

•

HouseName

•

DoctName

•
•

PMortemNo

PoliceDepartment

Once the user provides the requested information, system first validates the
information provided.

•

If the information is valid then the particular information about the prisoner is
recorded in the database

4.3.2 Alternative flow
4.3.2.1 Invalid information
none.
4.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
4.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
4.4 Special Requirements
None
39
4.5 Pre-Condition
The user must be computer operator in police Department .
4.6 Post-Condition
If the use case was successful, the user information is added in the crimefile database.
Otherwise , the system state is unchanged.
4.7 Extension points
None

5. Registration process for most wanted criminal
5.1 Brief description
This use case allows the actor to register most wanted criminal in database .

5.2 Actors
There are two actor (user, administrator) which interacts and participates with this use
case.
5.3 Flow of events
5.3.1 Basic flow
This use case starts when the actor Register postmortem.
.
Once the user provides the requested information, one of the sub-flows is executed.
If the user selected “submit ”, the submit crimefile information sub flow is executed.
5.3.1.1 Submit crimefile information
40
• The system requests the user to

enter the Registration information which

includes:
•
•

MstName

•

MstNickName

•

Age

•

Sex

•
•

MstID

Desc

Once the user provides the requested information, system first validates the
information provided.

•

If the information is valid then the particular information about the most
wanted criminal is recorded in the database

5.3.2 Alternative flow
1.3.2.1 Invalid information
none.
5.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
5.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
5.4 Special Requirements
None
5.5 Pre-Condition

41
The user must be computer operator in police Department .
5.6 Post-Condition
If the use case was successful, the user information is added in the crimefile database.
Otherwise , the system state is unchanged.
5.7 Extension points

6. Registration process for F.I.R.
6.1 Brief description
This use case allows the actor to register fir in database .

6.2 Actors
There are two actor (user,administrator) which interacts and participates with this use
case.
6.3 Flow of events
6.3.1 Basic flow
This use case starts when the actor Register F.I.R..
.
•

Once the user provides the requested information, one of the sub-flows is executed.

•

If the user selected “submit ”, the submit crimefile information sub flow is executed.

6.3.1.1 Submit crimefile information
• The system requests the user to
includes:

42

enter the Registration information which
•
•

ComplntNo

•

FirDate

•

FirTime

•

InfoType

•

Place

•

ForLoc

•

Act

•

District

•

Address

•

PassportNo

•

PoliceName

•

RecvdTime

•
•

Firno

RecvdInfo

Once the user provides the requested information, system first validates the
information provided.

•

If the information is valid then the particular information about the FIR is
recorded in the database

6.3.2 Alternative flow
6.3.2.1 Invalid information
none.
6.3.2.2 Blank information

43
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
6.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
6.4 Special Requirements
None
6.5 Pre-Condition
The user must be computer operator in police Department .
6.6 Post-Condition
If the use case was successful, the user information is added in the CRIME FILE
database. Otherwise , the system state is unchanged.
6.7 Extension points
None
one

7. Search for Criminal
7.1 Brief description
This use case allows the actor to search for his criminals status.

7.2 Actors
There is two actor (user, administrator) which interacts and participates with this use
case.

7.3 Flow of events

44
7.3.1 Basic flow
This use case starts when the actor wishes to search for the criminals. The system
requests the user to enter the required information in order to search for criminal.
1. On submitting the required information the following sub flow is executed.
7.3.1.1 Search placement information
1. The system requests the user to enter the following information for searching
which includes:
Criminal name

2. Once the user provides the requested information, system

first validates the

information provided.
3. If the information is valid then the placement status of the particular user is
displayed.

7.3.2 Alternative flow
7.3.2.1 Invalid information
If the user entered the invalid information then the system will generate an error message
to again fill the information properly.
7.3.2.2 Blank information
If the user left blank the text boxes that are mandatory to be filled by him then the
system will generate error message.
7.3.2.3 No information found
If the information entered by the user is not found in database then the system will not
display the name of the organization.

45
7.3.2.3 On cancel
If the user chooses the cancel then the use case ends and the basic flow begins.
7.4 Special requirements
None
7.5 Pre-condition
The user must be computer operator in police Department .
7.6 Post-condition
If the use case was successful, the criminal status of the particular user is displayed.
Otherwise, the system state is unchanged.
7.7 Extension points
None

46
DATABASE MODULE
For creation of database Microsoft Access a popular relational database management system is
used. The database is connected visual basic which have inbuilt functions to connect to database,
enter information to database and extract data.
The project database has following tables.
Login –admin login

Login –user login

Criminal registration

Prisoner registration
47
Postmortem

Most wanted

48
FIR

Charge sheet

Complaint status

49
Complaint registration

50
CODING AND SCREEN SHOTS

Start

51
Login form

Coding:Login form
Private Sub cmdAdminLog_Click()
Set rs = con.Execute("Select * from AdminLogin where Username='" + txtUname.Text + "' and
Password='" + txtPass.Text + "'")
If (Not rs.EOF) Then
MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled = True
frmMDI.mnuAdminAddU.Enabled = True
frmMDI.mnuAdminDelU.Enabled = True
frmMDI.mnuActiv.Enabled = True
frmMDI.mnuLogin.Enabled = False
frmMDI.mnuAdminAddComSt.Enabled = True
frmMDI.mnuActivReg.Enabled = True
frmMDI.mnuActivComp.Enabled = True
frmMDI.mnuActivRpt.Enabled = True
frmMDI.mnusearch.Enabled = True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
Unload Me
End Sub
Private Sub cmdCancel_Click()
Unload Me
52
End Sub
Private Sub cmdUserLog_Click()
Set rs = con.Execute("Select * from UserLogin where Username='" + txtUname.Text + "' and
Password='" + txtPass.Text + "'")
If (Not rs.EOF) Then
MsgBox "Login Success", vbInformation, "Crime File System"
frmMDI.mnuLogoff.Enabled = True
frmMDI.mnuLogin.Enabled = False
frmMDI.mnuActiv.Enabled = True
frmMDI.mnuActivReg.Enabled = True
frmMDI.mnuActivComp.Enabled = True
frmMDI.mnuActivRpt.Enabled = True
frmMDI.mnusearch.Enabled = True
Unload Me
Else
MsgBox "Failure", vbCritical, "Crime File System"
End If
'rs.Close
End Sub
Private Sub Form_Load()
connectdb
End Sub
Private Sub Form_Unload(Cancel As Integer)
con.Close
End Sub

53
Main form

Coding: Main form
Private Sub MDIForm_Load()
mnuLogoff.Enabled = False
mnuAdminAddU.Enabled = False
mnuAdminDelU.Enabled = False
mnuActiv.Enabled = False
mnuAdminAddComSt.Enabled = False
mnuActivReg.Enabled = False
mnuActivComp.Enabled = False
mnuActivRpt.Enabled = False
mnusearch.Enabled = False

54
DataEnvironment1.Connection1.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=" & App.Path & "crimefile.mdb;Persist Security Info=False"
End Sub
Private Sub mnuActivChrgSht_Click()
Load frmChargeSheet
frmChargeSheet.Show
End Sub
Private Sub mnuActivCompReg_Click()
Load frmCompltReg
frmCompltReg.Show
End Sub
Private Sub mnuActivCompStat_Click()
Load frmCompStatus
frmCompStatus.Show
End Sub
Private Sub mnuActivCsHist_Click()
Load frmHistSheet
frmHistSheet.Show
End Sub
Private Sub mnuActivFir_Click()
Load frmFIR
frmFIR.Show
End Sub
Private Sub mnuActivRegCrim_Click()
Load frmCriminalRegister
frmCriminalRegister.Show
End Sub
Private Sub mnuActivRegPost_Click()
Load frmPostmortem
frmPostmortem.Show
End Sub
Private Sub mnuActivRegPris_Click()
Load frmPrisonerReg
frmPrisonerReg.Show
End Sub
Private Sub mnuActivRptCrim_Click()
Load DataReportCrimeRpt
DataReportCrimeRpt.Show
End Sub
Private Sub mnuActivRptMst_Click()
Load DataReportMostWanted
DataReportMostWanted.Show
End Sub
Private Sub mnuActRegMst_Click()
Load frmMostWanted
frmMostWanted.Show

55
End Sub
Private Sub mnuAdminAddComSt_Click()
Load frmAddCompltStatus
frmAddCompltStatus.Show
End Sub
Private Sub mnuAdminAddU_Click()
Load frmAddUser
frmAddUser.Show
End Sub
Private Sub mnuAdminDelU_Click()
Load frmDeleteUser
frmDeleteUser.Show
End Sub
Private Sub mnucriminal_Click()
Load searchCriminal
searchCriminal.Show
End Sub
Private Sub mnuexit_Click()
Unload Me
End Sub
Private Sub mnuLogin_Click()
Load frmLogin
frmLogin.Show
End Sub
Private Sub mnuLogoff_Click()
mnuLogoff.Enabled = False
mnuAdminAddU.Enabled = False
mnuAdminDelU.Enabled = False
mnuActiv.Enabled = False
mnuLogin.Enabled = True
mnuAdminAddComSt.Enabled = False
mnuActivReg.Enabled = False
mnuActivComp.Enabled = False
mnuActivRpt.Enabled = False
mnusearch.Enabled = False
End Sub
Private Sub mnuprisioner_Click()
Load SearchPrisoner
SearchPrisoner.Show
End Sub
Private Sub mnuRptFIR_Click()
Load frmFIRrpt
frmFIRrpt.Show
End Sub
Private Sub mnuRptMortem_Click()
Load frmPMortemRpt

56
frmPMortemRpt.Show
End Sub

Add New user

Coding: Add New user
Private Sub Form_Load()
connectdb
End Sub
Private Sub cmdAdd_Click()
Set rs = con.Execute("select * from UserLogin where Username='" + txtUsername.Text + "' and
Password='" + txtPassword.Text + "'")
If (Not rs.EOF) Then
MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime File System"
txtPassword.Text = ""
txtUsername.Text = ""
txtUsername.SetFocus
Else
57
con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" + txtPassword.Text +
"')")
MsgBox "User added sucessfully", vbInformation, "Crime File System"
txtPassword.Text = ""
txtUsername.Text = ""
txtUsername.SetFocus
End If
End Sub
Private Sub cmdCancel_Click()
Unload Me
End Sub
Delete user

Coding: Delete user
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdDelete_Click()
con.Execute ("delete from UserLogin where Username='" + cmbUsername.Text + "'")
MsgBox "User deleted sucessfully!!", vbInformation, "CFS"
cmbUsername.Text = ""
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select * from UserLogin")
58
While (Not rs.EOF)
cmbUsername.AddItem rs(0)
rs.MoveNext
Wend
End Sub

Add complaint status

Coding: Add complaint status
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdViewStat_Click()
Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text
+ "")
If (Not rs.EOF) Then

59
txtDetails.Text = rs(1)
End If
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select distinct(ComplntNo) from ComplntStatus")
While (Not rs.EOF)
cmbComplntNo.AddItem rs(0)
rs.MoveNext
Wend
rs.Close
End Sub
Criminal registration

Coding: Criminal registration
Private Sub cmdCancel_Click()
Unload Me
60
End Sub
Private Sub cmdSave_Click()
If (optyes.Value = True) Then
x = "Yes"
Else
x = "No"
End If
If (txtAddress.Text = "" Or txtAge.Text = "" Or txtCrimeType.Text = "" Or txtName.Text = ""
Or txtNickName.Text = "" Or txtOccupation.Text = "") Then
MsgBox "Missing Fields!!,Please fill up all", vbInformation, "Crime File System"
ElseIf (Not IsNumeric(txtAge.Text)) Then
MsgBox "Age should be numeric"
Else
con.Execute ("insert into CriminalReg values(" + txtCriminalNo.Text + _
",'" + txtName.Text + "','" + txtNickName.Text + "'," + txtAge.Text + _
",'" + txtOccupation.Text + "','" + txtCrimeType.Text + "','" + txtAddress.Text + _
"','" + x + "')")
MsgBox "Record Added successfully", vbInformation, "Crime File System"
txtCriminalNo.Text = txtCriminalNo.Text + 1
txtAddress.Text = ""
txtAge.Text = ""
txtCrimeType.Text = ""
txtName.Text = ""
txtNickName.Text = ""
txtOccupation.Text = ""
txtName.SetFocus
End If
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select max(CriminalNo) from CriminalReg")
If (Not rs.EOF) Then
cnt = rs(0)
If (cnt = 0) Then
cnt = 1
Else
cnt = cnt + 1
End If
txtCriminalNo.Text = cnt
End If
End Sub

61
Prisoner registration

Coding: Prisoner registration
Private Sub Command1_Click()
If (txtChgrNo.Text = "" Or txtColor.Text = "" Or txtCrmType.Text = "" Or txtFamMem.Text =
"" Or txtHt.Text = "" Or txtIdenMark.Text = "" Or txtNikName.Text = "" Or txtPrisNo.Text = ""
Or txtWt.Text = "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File System"
Else

62
If ((Not IsNumeric(txtChgrNo.Text)) Or (Not IsNumeric(txtHt.Text)) Or (Not
IsNumeric(txtWt.Text))) Then
MsgBox "Some of the values entered are not matching, Please check numbers are entered
correctly", vbCritical, "Crime File System"
Else
Set rs = con.Execute("select * from PrisonersReg where ChargeSheetNo=" +
txtChgrNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Charge Sheet Number Already Exist, Please try another number", vbCritical,
"Crime File System"
txtChgrNo.Text = ""
txtChgrNo.SetFocus
Else
con.Execute ("insert into PrisonersReg values(" + txtPrisNo.Text + "," + txtChgrNo.Text + ",'"
+ txtNikName.Text + _
"','" + txtCrmType.Text + "','" + txtFamMem.Text + "','" + txtIdenMark.Text + "'," +
txtHt.Text + _
"," + txtWt.Text + ",'" + txtColor.Text + "')")
con.Execute ("insert into prisonersTemp values(" + txtPrisNo.Text + ",'No')")
MsgBox "Record Added Sucessfully", vbInformation, "CFS"
txtPrisNo.Text = txtPrisNo.Text + 1
txtChgrNo.Text = ""
txtColor.Text = ""
txtCrmType.Text = ""
txtFamMem.Text = ""
txtHt.Text = ""
txtIdenMark.Text = ""
txtNikName.Text = ""
txtWt.Text = ""
txtChgrNo.SetFocus
End If
End If
End If
End Sub
Private Sub Command2_Click()
Unload Me
End Sub

63
Post mortem

Coding: Post mortem
Private Sub cmdSave_Click()
If (txtDate.Text = "" Or txtDesc.Text = "" Or txtDoctName.Text = "" Or cmbFirrNo.Text = "" Or
txtHouseName.Text = "" Or txtPoliceSt.Text = "" Or txtPostNo.Text = "" Or txtRslt.Text = "")
Then
MsgBox "Missing Fields!! Please Fill Up all", vbInformation, "Crime File System"

64
Else
Set rs = con.Execute("select * from Postmortem where FirNo=" + cmbFirrNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Duplication is not allowded, Please try another FIR number", vbCritical, "Crime
File System"
cmbFirrNo.SetFocus
Else
con.Execute ("insert into postmortem values(" + txtPostNo.Text + "," + cmbFirrNo.Text +
",'" + txtRslt.Text + _
"','" + cmbSex.Text + "','" + txtDate.Text + "','" + txtDesc.Text + _
"','" + txtHouseName.Text + "','" + txtDoctName.Text + "','" + txtPoliceSt.Text + "')")
MsgBox "Record Added Sucessfully", vbInformation, "Crime File System"
txtPostNo.Text = txtPostNo + 1
txtDate.Text = ""
txtDesc.Text = ""
txtDoctName.Text = ""
txtHouseName.Text = ""
txtPoliceSt.Text = ""
txtRslt.Text = ""
End If
End If
End Sub
Private Sub Form_Load()
connectdb
cmbSex.Text = "Male"
Set rs = con.Execute("select max(PMortemNo) from Postmortem")
If (Not rs.EOF) Then
cnt = rs(0)
If (cnt = 0) Then
cnt = 1
Else
cnt = cnt + 1
End If
txtPostNo.Text = cnt
End If
rs.Close
Set rs = con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbFirrNo.AddItem rs(0)
rs.MoveNext
Wend
rs.Close
End Sub

65
POST MORTEM REPORT:

CODING:
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand3.State = 1) Then

66
DataEnvironment1.rsCommand3.Close
Else
DataEnvironment1.Command3 (x)
Load DataReportmortem
DataReportmortem.Show
End If
End Sub
Private Sub Command1_Click()
Unload Me
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select PMortemNo from Postmortem")
While (Not rs.EOF)
cmbMno.AddItem rs(0)
rs.MoveNext
Wend
End Sub

67
Most wanted

Coding: Mostwanted
Dim x As Integer
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (txtAge.Text = "" Or txtDesc.Text = "" Or txtName.Text = "" Or txtNickName.Text = "")
Then
MsgBox "Missing fields!!, Please fill up all", vbInformation, "Crime File System"
Else
68
Set rs = con.Execute("select count(*) from MostWanted")
If (Not rs.EOF) Then
x = rs(0)
If (x = 0) Then
x=1
Else
x=x+1
End If
txthd.Text = x
End If
If (Not IsNumeric(txtAge.Text)) Then
MsgBox "Age should be number", vbInformation, "Crime File Syatem"
txtAge.Text = ""
txtAge.SetFocus
Else
con.Execute ("insert into MostWanted values(" + txthd.Text + ",'" + txtName.Text + _
"','" + txtNickName.Text + "'," + txtAge.Text + ",'" + cmbSex.Text + "','" +
txtDesc.Text + "')")
MsgBox "Record Added Successfully", vbInformation, "Crime File system"
txtName.Text = ""
txtAge.Text = ""
txtDesc.Text = ""
txtNickName.Text = ""
txtName.SetFocus
End If
End If
End Sub
Private Sub Form_Load()
connectdb
End Sub

69
MOST WANTED REPORT

70
FIR

Coding: FIR
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdSave_Click()
If (txtDate.Text = "" Or txtDistrict.Text = "" Or txtFirNo.Text = "" Or txtInfoAdd.Text = "" Or
txtInfoRcd.Text = "" Or _

71
txtPassNo.Text = "" Or txtPlaceOcc.Text = "" Or txtPolice.Text = "" Or txtRcdTime.Text = ""
Or txtTime.Text = "" Or _
txtTypInfo.Text = "" Or cmbComplantno.Text = "") Then
MsgBox "Missing Fields!!", vbInformation, "Crime File System"
Else
Set rs = con.Execute("select * from FIR where FirNo=" + txtFirNo.Text + " or ComplntNo="
+ cmbComplantno.Text + "")
If (Not rs.EOF) Then
MsgBox "Sorry!! FIR Or Complaint Number already exists. Try another number",
vbCritical, "CFS"
txtFirNo.Text = ""
txtFirNo.SetFocus
Else
Dim t1, t2, t3 As String
t1 = txtTime.Text + cmbT1.Text
't2 = txtTime2.Text + cmbT2.Text
t3 = txtRcdTime.Text + cmbT3.Text
If ((Not IsNumeric(txtPassNo.Text)) Or (Not IsNumeric(txtFirNo.Text))) Then
MsgBox "Please check the number fields", vbInformation, "Crime File System"
'txtPassNo.Text = ""
'txtPassNo.SetFocus
Else
con.Execute ("insert into FIR values(" + txtFirNo.Text + "," + cmbComplantno.Text + _
",'" + txtDate.Text + "','" + t1 + "','" + txtTypInfo.Text + _
"','" + txtPlaceOcc.Text + "','" + cmbForLoc.Text + "','" + cmbAct.Text + _
"','" + txtDistrict.Text + "','" + txtInfoAdd.Text + "'," + txtPassNo.Text + ",'" +
txtPolice.Text + _
"','" + t3 + "','" + txtInfoRcd.Text + "')")
con.Execute ("UPDATE ComplntTemp set Status='Yes' where ComplntNo=" +
cmbComplantno.Text + "")
MsgBox "Record Added", vbInformation, "Crime File system"
txtDate.Text = ""
txtDistrict.Text = ""
txtFirNo.Text = ""
txtInfoAdd.Text = ""
txtInfoRcd.Text = ""
txtPassNo.Text = ""
txtPlaceOcc.Text = ""
txtPolice.Text = ""
txtRcdTime.Text = ""
txtTime.Text = ""
txtTypInfo.Text = ""
txtFirNo.SetFocus
End If
End If
End If

72
End Sub
Private Sub Form_Load()
cmbT1.Text = "AM"
cmbT3.Text = "AM"
cmbAct.Text = "Murder"
cmbForLoc.Text = "Foreign"
connectdb
Set rs = con.Execute("Select ComplntNo from ComplntTemp where Status='No'")
While (Not rs.EOF)
cmbComplantno.AddItem rs(0)
rs.MoveNext
Wend
End Sub

73
FIR REPORT

CODING:
Dim x As Integer
Private Sub cmdShRpt_Click()
x = cmbMno.Text
If (DataEnvironment1.rsCommand4.State = 1) Then
DataEnvironment1.rsCommand4.Close

74
Else
DataEnvironment1.Command4 (x)
Load DataReportFIR
DataReportFIR.Show
End If
End Sub
Private Sub Command1_Click()
Unload Me
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbMno.AddItem rs(0)
rs.MoveNext
Wend
End Sub
Charge sheet

75
Coding:chargeSheet
Dim cnt As Integer
Dim x As Control
Private Sub cmdBack_Click()
Frame4.Visible = False
Frame3.Visible = True
End Sub
Private Sub cmdBack2_Click()
Frame2.Visible = False
Frame1.Visible = True
End Sub
Private Sub cmdBack3_Click()
Frame3.Visible = False
Frame2.Visible = True

76
End Sub
Private Sub cmdFinish_Click()
If (txtWitnAdd.Text = "" Or txtWitnName.Text = "" Or txtWitnOcc.Text = "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"
Else
Set rs = con.Execute("select * from ChargeSheet where FirNo=" + cmbFirNo.Text + "")
If (Not rs.EOF) Then
MsgBox "Dupplication is not allowed, Please try another fir number", vbCritical, "Crime
File system"
Frame4.Visible = False
Frame1.Visible = True
cmbFirNo.SetFocus
Else
con.Execute ("insert into ChargeSheet values(" + txtChrgNo.Text + ",'" +
txtPstatName.Text + "','" + txtDate.Text + _
"'," + cmbFirNo.Text + ",'" + txtDist.Text + "','" + txtInfoName.Text + _
"','" + txtInfoAdd.Text + "','" + txtInfoOcc.Text + "','" + txtInfoPart.Text + _
"','" + txtAccuName.Text + "','" + txtAccuAdd.Text + "','" + cmbAccuSex.Text + _
"'," + txtAccuAge.Text + ",'" + txtAccuOcc.Text + "','" + cmbAccuStat.Text + _
"','" + txtAccuAct.Text + "','" + txtWitnName.Text + "','" + txtWitnAdd.Text + _
"','" + txtWitnOcc.Text + "')")
MsgBox "Record Added Successfully!!", vbInformation, "Crime File system"
Frame4.Visible = False
Frame1.Visible = True
txtChrgNo.Text = txtChrgNo.Text + 1
' For Each x In Me.Controls
' If (x = TextBox) Then
'
x.Text = ""
' End If
'Next
End If
End If
End Sub
Private Sub cmdNext1_Click()
If (txtChrgNo.Text = "" Or txtPstatName.Text = "" Or txtDate.Text = "" Or cmbFirNo.Text = ""
Or txtDist.Text = "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"
Else
Frame1.Visible = False
Frame2.Visible = True
End If
End Sub
Private Sub cmdNext2_Click()

77
If (txtInfoAdd.Text = "" Or txtInfoName.Text = "" Or txtInfoOcc.Text = "" Or txtInfoPart.Text =
"") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"
Else
Frame2.Visible = False
Frame3.Visible = True
End If
End Sub
Private Sub cmdNext3_Click()
If (txtAccuAct.Text = "" Or txtAccuAdd.Text = "" Or txtAccuAge.Text = "" Or
txtAccuName.Text = "" Or txtAccuOcc.Text = "") Then
MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system"
Else
Frame3.Visible = False
Frame4.Visible = True
End If
End Sub
Private Sub Form_Load()
Frame1.Visible = True
Frame2.Visible = False
Frame3.Visible = False
Frame4.Visible = False
connectdb
Set rs = con.Execute("select max(ChrgShtNo) from ChargeSheet")
If (Not rs.EOF) Then
cnt = rs(0)
If (cnt = 0) Then
cnt = 1
Else
cnt = cnt + 1
End If
txtChrgNo.Text = cnt
End If
rs.Close
Set rs = con.Execute("select Firno from FIR")
While (Not rs.EOF)
cmbFirNo.AddItem rs(0)
rs.MoveNext
Wend
rs.Close
End Sub

Complaint status

78
Coding: Complaint status
Private Sub cmdCancel_Click()
Unload Me
End Sub
Private Sub cmdViewStat_Click()
Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text
+ "")
If (Not rs.EOF) Then
txtDetails.Text = rs(1)
End If
End Sub
Private Sub Form_Load()
connectdb
Set rs = con.Execute("select distinct(ComplntNo) from ComplntStatus")
While (Not rs.EOF)
cmbComplntNo.AddItem rs(0)
rs.MoveNext
Wend
rs.Close
End Sub

79
Search criminal

80
Coding: Complaint status
Dim con As ADODB.Connection
Dim rec As ADODB.Recordset
Private Sub Command1_Click()
Dim strcon As String
Dim strcom As String
strcon
=
"Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=D:CrimeFileCrimeFileCrimeFileCrime File Systemcrimefile.mdb;Persist Security
Info=False"
Set con = New ADODB.Connection
con.Open strcon
Set rec = New ADODB.Recordset
strcom = "select * from CriminalReg where CrimName='" & Text1.Text & "'"
rec.Open strcom, con, adCmdText
If rec.EOF Then
MsgBox "record not present"
Else: MsgBox "record is present"
Text2.Text = rec.Fields(0)
Text3.Text = rec.Fields(1)
Text4.Text = rec.Fields(2)
Text5.Text = rec.Fields(3)
Text6.Text = rec.Fields(4)
Text7.Text = rec.Fields(5)
Text8.Text = rec.Fields(6)
Text9.Text = rec.Fields(7)
End If
End Sub
Private Sub exit_Click()
Unload Me
End Sub

81
Search prisoner

Coding: Search prisoner
Dim con As ADODB.Connection
Dim rec As ADODB.Recordset
Private Sub Command1_Click()
Dim strcon As String
Dim strcom As String
strcon
=
"Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=D:CrimeFileCrimeFileCrimeFileCrime File Systemcrimefile.mdb;Persist Security
Info=False"
82
Set con = New ADODB.Connection
con.Open strcon
Set rec = New ADODB.Recordset
strcom = "select * from PrisonersReg where PrisonerNo=" & Combo1.Text
If Combo1.Text = "" Then
MsgBox "record not present"
Else
rec.Open strcom, con, adCmdText
If rec.EOF Then
MsgBox "record not present"
Else
MsgBox "record is present"
Text1.Text = rec.Fields(0)
Text2.Text = rec.Fields(1)
Text3.Text = rec.Fields(2)
Text4.Text = rec.Fields(3)
Text5.Text = rec.Fields(4)
Text6.Text = rec.Fields(5)
Text7.Text = rec.Fields(6)
Text8.Text = rec.Fields(7)
Text9.Text = rec.Fields(8)
End If
End If
End Sub
Private Sub exit_Click()
Unload Me
End Sub

83
The modules involved in this project are:
•

Login for user and admin

•

Complaint registration

•

View complaint status

•

Criminal register management

•

FIR Management

•

Case History Details management

•

Managing Postmortem details

•

Prisoners register management

•

Manage list about most wanted criminals

LOGIN

This includes Administrator and User login. There will be a username and
password to login into the system to use all the facilities.
1.

COMPLAINT REGISTRATION

This module helps to register the details about the crime. This is done by
entering some details, such as incident details, Victim details, crime details etc
3. VIEW COMPLAINT STATUS

This module allows us to view the status of the complaint that you have
registered earlier.

84
4. CRIMINAL REGISTER MANAGEMENT

Here we can have the facility to view the details of the criminals.

The

administrator can add new criminal’s details and save it in a database. This can be done
by entering details such as criminal number, age, occupation, type of crime etc.
5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that
took place at recent years. The administrator can enter FIR information and save it in a
database.
6.CASE HISTORY DETAILS MANAGEMENT

Here we can view the details of the case, date of occurrence, the type of crime
and place of occurrence etc…
7. MANAGING POSTMORTEM DETAILS

This module helps to view the postmortem details of a person. The details such
as date of death cause of death, name of the doctor etc.
8. PRISONER REGISTER MANGEMENT
This module helps the administrator as well as the user to store, view and manage the
details of the past and present prisoners.
9.

MANAGE THE LIST OF MOST WANTED CRIMINALS

85
This is an additional feature added to this Software, which helps us to make a quick
search about the most wanted criminals. This helps to always keep track of and identify a person
quickly, who is a most wanted criminal.

TEST CASES
Test cases used in this project are:
Test case 1:

Purpose: The main purpose of this test case to inform the administrator if he did not write the
correct username or password.
Pre condition and inputs: The precondition for this test case is if the administrator write the
correct username and password, then only user will be able to access the application.
Results: if username and password is not correct, then an error mess will be displayed for
incorrect password/ username.

Test case 2:

Purpose: The main purpose of this test case to inform the administrator if any exception occurs
while updating information on the application. The format should be correct while entering the
details for the criminal or prisoner name or fir information.
Precondition and inputs: The precondition of this test case is there are validations given in the
form which indicates the correct format of the data .The user has to fill the all required field ..

86
Results: lf data format entered is not correct or any field is blank, then no account will be
generated.

FUTURE ENHANCEMENT

•

We can update this system as online application

•

The main advantage of online application is that, a person can report the

crime any time from anywhere.
•

Users can view the progress of their complaint online.

•

By the future technology user can view the case details and progress of

the complaints on their mobile phones
•

Face recognition technology can apply. User or witness of the crime can

give the physical information of the thief.

87
CONCLUSION

CRIME FILE MANAGEMENT SYSTEM initiates the objective of providing
the user with customized and powerful complaint registration and process management
system side software.

The software is built with all options such as complaint

registration, prisoner’s registration, and postmortem report generation etc…All the
requirements specified during the analysis and design phase are fully met, thus resulting
in the formation of good software. The interface provided is very user friendly and
flexible for all times.

88
References

4.

1. http://office.microsoft.com/en-us/access-help/what-s-new-in-microsoft-officeaccess-2007-HA010024185.aspx
2. http://ncrb.nic.in/cctns.htm
3. http://en.wikipedia.org/wiki/VB6
A Complete Visual Basic 6 Training Course: How to Programme: Package

89

More Related Content

What's hot

ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting pptShirinAkhtar5
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system pptYOGESH SHARMA
 
Ems final project mca 6th
Ems final project mca 6thEms final project mca 6th
Ems final project mca 6thNarender Anu
 
Android based crime managements syetem final year pdf
Android based crime managements syetem final year pdfAndroid based crime managements syetem final year pdf
Android based crime managements syetem final year pdfBeresa Abebe
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Applicationsatvirsandhu9
 
Project documentation on Mango Shop Management System
Project documentation on Mango Shop Management SystemProject documentation on Mango Shop Management System
Project documentation on Mango Shop Management SystemHrushikesh Patil
 
Online doctor appointment and emr system
Online doctor appointment and emr systemOnline doctor appointment and emr system
Online doctor appointment and emr systemAnjelika Parasar
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPTuhin Ray
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeDhrumil Panchal
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointmentAmna Nawazish
 
COFFEE SHOP MANAGEMENT SYSTEM.pptx
COFFEE SHOP MANAGEMENT SYSTEM.pptxCOFFEE SHOP MANAGEMENT SYSTEM.pptx
COFFEE SHOP MANAGEMENT SYSTEM.pptxSMS Hasan
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation SystemMegha Sahu
 
Student Attendance
Student AttendanceStudent Attendance
Student AttendanceBUBT
 

What's hot (20)

ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting ppt
 
Crime record
Crime recordCrime record
Crime record
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
 
Crime
CrimeCrime
Crime
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system ppt
 
Ppt
PptPpt
Ppt
 
Ems final project mca 6th
Ems final project mca 6thEms final project mca 6th
Ems final project mca 6th
 
Android based crime managements syetem final year pdf
Android based crime managements syetem final year pdfAndroid based crime managements syetem final year pdf
Android based crime managements syetem final year pdf
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
 
Project documentation on Mango Shop Management System
Project documentation on Mango Shop Management SystemProject documentation on Mango Shop Management System
Project documentation on Mango Shop Management System
 
Online doctor appointment and emr system
Online doctor appointment and emr systemOnline doctor appointment and emr system
Online doctor appointment and emr system
 
Online FIR System
Online FIR SystemOnline FIR System
Online FIR System
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointment
 
COFFEE SHOP MANAGEMENT SYSTEM.pptx
COFFEE SHOP MANAGEMENT SYSTEM.pptxCOFFEE SHOP MANAGEMENT SYSTEM.pptx
COFFEE SHOP MANAGEMENT SYSTEM.pptx
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation System
 
Student Attendance
Student AttendanceStudent Attendance
Student Attendance
 

Similar to Crime file

Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemZainabNoorGul
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management SystemRIDDHICHOUHAN2
 
Property dealing , A .net project
Property dealing , A .net projectProperty dealing , A .net project
Property dealing , A .net projectAnjali Kamboj
 
Minor Project Report On Intranet database
Minor Project Report On Intranet databaseMinor Project Report On Intranet database
Minor Project Report On Intranet databaseAnjeet Kumar
 
Online bus pass registration
Online bus pass registrationOnline bus pass registration
Online bus pass registrationYesu Raj
 
Online advertising management system
Online advertising management systemOnline advertising management system
Online advertising management systemYesu Raj
 
Online advertising management system
Online advertising management systemOnline advertising management system
Online advertising management systemYesu Raj
 
Software Evaluation
Software EvaluationSoftware Evaluation
Software EvaluationLori Gilbert
 
IRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET Journal
 
Automatic answer checker
Automatic answer checkerAutomatic answer checker
Automatic answer checkerYesu Raj
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharingKhagendra Chapre
 

Similar to Crime file (20)

Onine exam 1
Onine exam 1Onine exam 1
Onine exam 1
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation System
 
124157075 gb
124157075 gb124157075 gb
124157075 gb
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management System
 
Bright copy
Bright   copyBright   copy
Bright copy
 
Property dealing , A .net project
Property dealing , A .net projectProperty dealing , A .net project
Property dealing , A .net project
 
Bright
BrightBright
Bright
 
Minor Project Report On Intranet database
Minor Project Report On Intranet databaseMinor Project Report On Intranet database
Minor Project Report On Intranet database
 
student supervision system
student supervision systemstudent supervision system
student supervision system
 
Online bus pass registration
Online bus pass registrationOnline bus pass registration
Online bus pass registration
 
Online advertising management system
Online advertising management systemOnline advertising management system
Online advertising management system
 
Online advertising management system
Online advertising management systemOnline advertising management system
Online advertising management system
 
Software Evaluation
Software EvaluationSoftware Evaluation
Software Evaluation
 
SurajResume
SurajResumeSurajResume
SurajResume
 
IRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile Application
 
IP PROJECT FILE
IP PROJECT FILEIP PROJECT FILE
IP PROJECT FILE
 
Automatic answer checker
Automatic answer checkerAutomatic answer checker
Automatic answer checker
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 

Recently uploaded

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Recently uploaded (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Crime file

  • 1. CRIME FILE PROJECT REPORT Submitted in partial fulfilment of the requirements for the award of the degree of Master of Computer Application [Software Engineering] Under the Guidance of: Submitted by: Ms. Anuradha chug SOMDEV ARYA USIT, GGSIPU 05516404509 MCA(S.E.)- 3rd Sem. University School of Information Technology GGS Indraprastha University, Delhi –6 1
  • 2. TABLE OF CONTENTS CONTENTS PAGE NO. 1. TITLE OF PROJECT…………………………………………………….……2 2. ACKNOWLEDGEMENT……………………………………………………...3 3. CERTIFICATE…………………………………………………………………4 4. SELF CERTIFICATE………………………………………………………….5 5. INTRODUCTION……………………………………………………….……...6 6. TOOLS/PLATFORM, HARDWARE AND SOFTWARE REQUIREMENT SPECIFICATION…………………...……………………..8 7. Technology Overview of with VB and MS Access 8. ANALYSIS (DFDs, ER Diagrams, etc. As per the project requirements) …………………………………………………………………13 9. USE CASE DIAGRAM………………………………………………………..26 10. USE CASES…………………………………………………………………..27 11. A COMPLETE STRUCTURE OF THE PROGRAM………………..……..41 Number of modules and their description. . Data structures for all modules. . Process Logic of each module Report generation. 12.FUTURE ENHANCEMENT…………………………………………………….82 13. Glossary…………………………………………………………………….. 2
  • 3. CRIME FILE (USING MS ACCESS 2007 Framework through VB6) 3
  • 4. Acknowledgement This is a great opportunity to acknowledge and to thanks all those persons without whose support and help this project would have been impossible. We would like to add a few heartfelt words for the people who were part of this project in numerous ways. I would like to thanks to my project guide “Ms. Anuradha Chug”, for his indefatigable guidance, valuable suggestion, moral support, constant encouragement and contribution of time for the successful completion of project work. I am very grateful to him, for providing all the facilities needed during the project development. At the outset, I sincerely thank all faculty members of my institution for his extra effort to make our session on line inspire of all ideas. I thank my Counselors for his indispensable support and encouragement thought the project. I would like to thank all those who helped me directly or indirectly. Last but not the least, I would like to acknowledge the ongoing support of my parents and my family members, whose patience and encouragement during these long days and night have been paramount in making this project a reality. Thank you Student Name: Somdev Arya 4
  • 5. CERTIFICATE This is to certify that project entitled “Crime File” done by “Somdev Arya” , roll no. 05516404509 is an authentic work carried out by her at UNIVERSITY SCHOOL OF INFORMATION TECHNOLOGY under my guidance. The matter embodied in this project has not been submitted earlier for award of any degree or diploma to the best of my knowledge and belief. Signature of the Guide Ms. Anuradha Chug USIT, GGSIPU 5
  • 6. SELF CERTIFICATE This is to certify that project entitled Crime File is done by me is an authentic work carried out for the partial fulfillment of the requirements for the award of the degree of Master of Computer Application under the guidance of “Ms. Anuradha Chug ”. The matter embodied in this project work has not been submitted earlier for award of any degree or diploma to the best of my knowledge and belief. Signature of the Student 6
  • 7. Introduction of Crime file The project is aimed to develop a crime file for maintain a computerized records of all the fir against crime .The system is desktop application that can be access throughout the police department. This system can be used as an application for the crime file of the police department to manage the records of different activity of related to first information report .In such desktop Crime file system we will manage all such activities (like registration of the complaint updating information, search of perticularviewing of the respective reports of crimes) that will save time, manpower. This system will provide better prospective for the enhancement of organization regarding to quality and transparency. 7
  • 8. Objectives of Crime File The objectives of this system can broadly be listed as follows: 1. Make the Police functioning citizen friendly and more transparent by automating the functioning of Police Departments. 2. Improve delivery of citizen-centric services through effective usage of ICT. 3. Provide the Investigating Officers of the Civil Police with tools, technology and information to facilitate investigation of crime and detection of criminals. 4. Improve Police functioning in various other areas such as Law and Order, Traffic Management etc. 5. Facilitate Interaction and sharing of Information among Police Departments, Districts, State/UT headquarters and other Police Agencies. 6. Assist senior Police Officers in better management of Police Force 7. Keep track of the progress of Cases, including in Courts 8. Reduce manual and redundant Records keeping 8
  • 9. TOOLS, PLATFORM & LANGUAGE TO BE USED TOOLS:  FRONT-END : Microsoft Visual Basic  BACK-END : Microsoft Access PLATFORM:  WINDOW 7 HARDWARE AND SOFTWARE ENVIRONMENT HARDWARE ENVIRONMENT:  PROCESSOR : Core 2duo  RAM : 3GB  STORAGE CAPACITY : 320 GB  DRIVERS : 52X24X  18X CD/DVD writer SOFTWARE ENVIRONMENT:  OPERATING SYSTEM : WINDOW 7  RDBMS : Microsoft Access 9
  • 10. Technology Overview of my Project Microsoft Access 2007 Microsoft Access is a relational database management system (RDBMS) that is packaged with the Microsoft suite of office products to run under the Microsoft Windows operating system. Microsoft Access is a Visual Basic (VB) based application that allows Structured Query Language (SQL) statements to be included in associated macros and VB scripts. Microsoft Access includes a Jet database engine, combined with a graphical interface, to provide ease of use in building front-end database applications. Microsoft Access is a structured environment, used by novice programmers, with little or no experience, to handle relatively small database functions. It is also a useful tool, for advanced developers, to provide rapid application development. Though MS Access has been successfully front-ended against databases, including itself, Microsoft Access does not scale well for large databases or multiple-access, network environments. The underlying Jet Database is a file-sharing database that performs all processing at the client level. As such, Microsoft Access is not designed for high volume multi-user environments that allow multiple clients to read, write and perform other operations on shared files at the same time. 10
  • 11. Visual Basic 6.0 Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Because of its graphical development features and BASIC heritage, VB is considered to be relatively easy to learn and use.[1] Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Like the BASIC programming language, Visual Basic was designed to be easily learned and used by beginner programmers. The language not only allows programmers to create simple GUI applications, but can also develop complex applications. Programming in VB is a combination of visually arranging components or controls on a form, specifying attributes and actions of those components, and writing additional lines of code for more functionality. Since default attributes and actions are defined for the components, a simple program can be created without the programmer having to write many lines of code. Performance problems were experienced by earlier versions, but with faster computers and native code compilation this has become less of an issue. Although programs can be compiled into native code executables from version 5 onwards, they still require the presence of runtime libraries of approximately 1 MB in size. This runtime is included by default in Windows 2000 and later, but for earlier versions of Windows like 95/98/NT it must be distributed together with the executable. Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g., text boxes, buttons, etc.) on the form (window). Controls have attributes and event handlers associated with them. Default values are provided when the control is created, but may be changed by the programmer. Many attribute values can be modified during run time based on user actions or changes in the environment, providing a dynamic application. For example, code can be inserted into the form resize event handler to reposition a control so that it remains centered on the form, 11
  • 12. expands to fill up the form, etc. By inserting code into the event handler for a keypress in a text box, the program can automatically translate the case of the text being entered, or even prevent certain characters from being inserted. Visual Basic can create executables (EXE files), ActiveX controls, or DLL files, but is primarily used to develop Windows applications and to interface database systems. Dialog boxes with less functionality can be used to provide pop-up capabilities. Controls provide the basic functionality of the application, while programmers can insert additional logic within the appropriate event handlers. For example, a drop-down combination box will automatically display its list and allow the user to select any element. An event handler is called when an item is selected, which can then execute additional code created by the programmer to perform some action based on which element was selected, such as populating a related list. Alternatively, a Visual Basic component can have no user interface, and instead provide ActiveX objects to other programs via Component Object Model (COM). This allows for server-side processing or an add-in module. The language is garbage collected using reference counting, has a large library of utility objects, and has basic object oriented support. Since the more common components are included in the default project template, the programmer seldom needs to specify additional libraries. Unlike many other programming languages, Visual Basic is generally not case sensitive, although it will transform keywords into a standard case configuration and force the case of variable names to conform to the case of the entry within the symbol table. String comparisons are case sensitive by default, but can be made case insensitive if so desired. The Visual Basic compiler is shared with other Visual Studio languages (C, C++), but restrictions in the IDE do not allow the creation of some targets (Windows model DLLs) and threading models. Characteristics Visual Basic has the following traits which differ from C-derived languages:  Multiple assignment available in C language is not possible. A = B = C does not imply that the values of A, B and C are equal. The Boolean result of "Is B = C?" is stored in A. The result stored in A would therefore be either false or true.  Boolean constant True has numeric value −1. This is because the Boolean data type is stored as a 16-bit signed integer. In this construct −1 evaluates to 16 binary 1s (the Boolean value True), and 0 as 16 0s (the Boolean value False). This is apparent when performing a Not operation on a 16 bit signed integer value 0 which will return the integer value −1, in other words True = Not False. This inherent functionality becomes especially useful when performing logical operations on the individual bits of an integer such as And, Or, Xor and Not.[4] This definition of True is also consistent with BASIC since the early 1970s Microsoft BASIC implementation and is also related to the characteristics of CPU instructions at the time. 12
  • 13.  Logical and bitwise operators are unified. This is unlike some C-derived languages (such as Perl), which have separate logical and bitwise operators. This again is a traditional feature of BASIC.  Variable array base. Arrays are declared by specifying the upper and lower bounds in a way similar to Pascal and Fortran. It is also possible to use the Option Base statement to set the default lower bound. Use of the Option Base statement can lead to confusion when reading Visual Basic code and is best avoided by always explicitly specifying the lower bound of the array. This lower bound is not limited to 0 or 1, because it can also be set by declaration. In this way, both the lower and upper bounds are programmable. In more subscriptlimited languages, the lower bound of the array is not variable. This uncommon trait does exist in Visual Basic .NET but not in VBScript. OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in the late 1970s.  Relatively strong integration with the Windows operating system and the Component Object Model. The native types for strings and arrays are the dedicated COM types, BSTR and SAFEARRAY.  Banker's rounding as the default behavior when converting real numbers to integers with the Round function.[5] ?  Round(2.5, 0) gives 2, ? Round(3.5, 0) gives 4. Integers are automatically promoted to reals in expressions involving the normal division operator (/) so that division of one integer by another produces the intuitively correct result. There is a specific integer divide operator () which does truncate.  By default, if a variable has not been declared or if no type declaration character is specified, the variable is of type Variant. However this can be changed with Data type statements such asDefInt, DefBool, DefVar, DefObj, DefStr. There are 12 Data type statements in total offered by Visual Basic 6.0. The default type may be overridden for a specific declaration by using a special suffix character on the variable name (# for Double, ! for Single, & for Long, % for Integer, $ for String, and @ for Currency) or using the key phrase As (type). VB can also be set in a mode that only explicitly declared variables can be used with the command Option Explicit. 13
  • 14. SOFTWARE REQUIREMENTS SPECIFICATION 1. Introduction 1.1 Purpose : Crime File System is a system used to report crimes. This project is mainly useful for police Departments. This system will help to manage all the activities in a police Department using computers. Currently all the works are done manually, by computerizing all the activities inside a police Department can be managed easily and effectively. The police Departments in the country are, today, virtually unconnected islands. Thanks to telephones and wireless, and especially thanks to mobile telephones, there is voice connectivity between the police Department and senior police officers, but that is about all. There is no system of data storage, data sharing and accessing data. There is no system under which one police Department can talk to another directly. There is no record of crimes or criminals that can be accessed by a Department House Officer, except the manual records relating to that police Department. The goals of the system are to facilitate collection, storage, retrieval, analysis, 14
  • 15. transfer and sharing of data and information at the police Department and between the police Department and the State Headquarters and the Central Police Organizations. 1.2 Scope: 1. The system ‘CRIME FILE’ will be a Reporting application that will be used for automating the manual process of register different case in police Department .This system will manage the details of all the crime who register themselves in police Department. The system provides an interface to store the crime details of criminals or prisoners and allows the user to search and view records. The system should have a login. System should support for Data Entry module for Nominal Roll, Case register for each prisoner entering in the prison The system will greatly simplify the overall procedure of crime files. 1.3 Objectives: The proposed system includes the following features: • Login for user and admin • Complaint registration • View complaint status • Criminal register management • FIR Management 15
  • 16. • Case History Details management • Managing Postmortem details • Prisoners register management • Manage list about most wanted criminals 1.4 Abbreviations: 1.5 References: • IEEE SRS Format. 1.6 Technologies • Development Tool: Visual studio 06 • Database: Microsoft ACCESS 2. Overall Description At its core, the system should offer the following basic functionalities: . 1. The system requests that the administrator to enter his/her name, password. 2. The administrator enters his/her name, password. 3. The system validates the entered name, password, logs the actor into the system. 4. The administrator maintains the record of information of varios fir,crimes and related objects. 16
  • 17. If in the basic flow, the actor enters an invalid name, password , the system displays an error message. The actor can return to the beginning of the basic flow Product perspective: 2.1 CRIME FILE is a system which aims at making the store records of crimes easier. This system provides an easy way to admin to keep track of record of all the crimes and saves him loads of manual work. This system makes updation of records easier by both user and admin and provides updated information about the current crimes status in happening. 2.1.1 SYSTEM INTERFACES None Front End Client Application (with data entry/ update/ cancel/ view and reporting facility) 2.1.1 Backend Database System interface: 2.1.2 USER INTERFACES • There will be a screen to display varios information related to FIR. • A login screen for entering username, password will be provided. 17
  • 18. • There will be a screen for taking and modifying the information of the related to FIR. • Windows based • Friendly Navigation 2.1.3 HARDWARE INTERFACE: • Keyboard • Mouse • Screen resolution of at least 1024x768- required for proper and complete viewing of screens. 2.1.4 SOFTWARE INTERFACES • Any Windows based operating system (Microsoft Windows XP or higher). • MS Access as the DBMS-for database. 2.1.5 COMMUNICATION INTERFACES • None 2.1.6 MEMORY CONSTRAINTS • At least 64 MB RAM and 2 GB space on hard disk will be required for running the application 18
  • 19. 2.1.7 OPERATIONS • Viewing • Addition( by administrator only) • Updation( by administrator only) • Deletion ( by administrator only 2.1.8 SITE ADAPTATION REQUIREMENTS • The terminals at client site will have to support the hardware and software interfaces specified in above sections. 2.2 Product Function: • Accepting crimes information correctly. • Storing the correct records in the database. • Displaying correct information on selecting view option. • Displaying current status of fir of the all crimes. • Accepting the updated information from user and administrator. • Storing the updated record in database to make it consistent. • Deletion privilege to administrator only . 2.3 User Characteristics: Operator should be computer literate. 2.4 General Constraints: • Any Windows Operating system. • Interface is in English. 19
  • 20. Site Adaption Requirements Terminals at the client side site will have to support the hardware and software interfaces specified in above sections. 2.5 Assumptions : • User is a related of certain branch of police Department • fir information is correct. • user can fill the registration form. 3. Specific Requirements  Functional Requirement no 1: • Introduction : Register for the Criminal or prisoner • Input : criminals personal details viz – Criminal No., Criminal Name, Age, Occupation, CrimeType,address, MostWanted. • Prisoner details: PrisonerNo., Charge Sheet No., NickName, CrimeType, FamilyMem Identity Mark, Height, Weight, Color • Processing : validation checks are performed on the input data by the user/administrator like : mandatory fields should not be kept blank prisoner family member should be check All the entries in database should be correct 20
  • 21.  Functional Requirement no 2: • • Introduction : FIR Input : Fir no, COMPLAINT NO., Fir Date, Fir Time , Information Type, Place of crime, Act for crime, District of FIR, Address of victim, Passport No, Name of Police, Received Time, Information Received • Processing : After inputting data validation checks on various fields is performed . on submission of the information the record is searched in the stored database o basis of the information submitted. • Output : If the information submitted by the user is valid and found in the database then the corresponding record is displayed .  Functional Requirement No 3: • Introduction : add or Updation of user or administrator • Input : Username,password • Processing : After entering the required information the various validation checks are performed on submission of the information the updations are made to the database.  administrator must enter the correct user name and password • Output : The updated information is reflected in the stored database  Functional Requirement 4 • Introduction : Viewing • Input : none. 21
  • 22. • Processing : on clicking the view button the system search for the specified database stored. • Output : if the specified database is stored then the whole database is display in the tabular form. The data displayed is the updated and current information of the user personal and academic details . It also displays the status of the prisoner and criminals. 4. Performance requirements 5. Design Constraints • Standard compliance such as IEEE for the development of SRS report. • Software Engineering by K.K. Aggarwal and Yogesh Singh. 6. Attributes 6.1 Reliability and Recovery: It is imperative that database should be always up when put into the product. During period of intense activities like submission and verification and updation of data, back up should be taken. It will help to minimize downtime in case of failure. Any abnormal operations shall result in the shutting down of the system. 6.2 Security: The database should be protected physically by having server located in an enclosed and guarded facility. Virus scanning software should be installed to protect from viruses. The server should be installed under firewall so that server only internal users can access it. The system shall be compatible with AIMS security standards. There should be terms and conditions and a check on the content added by the users. Duplicate record must be discarded by the administrator. 6.3 Maintenance: New additional features can be added if required and also the system components i.e. memory, disk, drives shall be easily serviceable without much alteration in the code. 22
  • 23. Work Flow of Crime File 23
  • 24. DATA FLOW DIAGRAM The data flow diagram enables the software engineer to develop models of the information domain and functional domain at the same time. As the DFD is defined into greater level of details, the analyst performs as implicit functional decomposition of the system, thereby accomplishing the fourth operational analysis principle for functions. At the same time, the DFD refinement results in a corresponding refinement of data as it moves through the processes that embody the application LEVEL 0 DFD 24
  • 25. Context Level DFD for Crime File LEVEL 1 DFD 25
  • 30. 30
  • 31. Use Case Diagram Login/Logoff Add/delete user Add complaint status Search criminal/prisoner Administrat or Registration criminal/Prionser/Postmortem/ Mostwanted Login/logoff Search Criminal/Prisoners View Complaint Status View Reports FIR/postmortem/mostwanted User View Registration for FIR/ChargeSheet Case History Registration criminal/Prisoner/Postmortem/ Exit 31
  • 32. Use cases 1. Login 1.1 Brief description This use case allows the actor to login in system . 1.2 Actors There is only one actor (user ,administrator) which interacts and participates with this use case. 1.3 Flow of events 1.3.1 Basic flow This use case starts when the actor wishes to Login himself for the use os system. • The system requests that the user must enter his all valid username and password. • Once the user provides the requested information, one of the sub-flows is executed. • If the user selected “submit ”, the Login information sub flow is executed. 1.3.1.1 Submit crimefile information • The system requests the user to enter the information which includes: Personal Information a) User Name 32
  • 33. b) password • Once the user provides the requested information, system first validates the information provided. • If the information is valid then the particular information about the user is recorded in the database 1.3.2 Alternative flow 1.3.2.1 Invalid information If the user entered the invalid information then the system will generate an error message to again fill the information properly. 1.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 1.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 1.4 Special Requirements None 1.5 Pre-Condition The user must be computer operator in police Department . 1.6 Post-Condition If the use case was successful, the user information is login in the system. Otherwise , the system state is unchanged. 1.7 Extension points 33
  • 34. None Registration process for criminals 2.1 Brief description This use case allows the actor to register criminal in database. 2.2 Actors There is only two actor (user, administrator) which interacts and participates with this use case. 2.3 Flow of events 2.3.1 Basic flow This use case starts when the actor wishes to Register criminals for the record in database.. • The system requests that the user must enter all valid personal and academic information of criminals. • Once the user provides the requested information, the following sub-flow is executed. • If the user selected “submit ”, the submit information sub flow is executed. 2.3.1.1 Submit crimefile information 1. The system requests the use to enter the Registration information which includes: • CriminalNo • CrimName • NickName 34
  • 35. • Age • Occupation • CrimeType • Address • MostWanted 2. Once the user provides the requested information, system first validates the information provided. 3. If the information is valid then the particular information about the criminal is recorded in the database. 2.3.2 Alternative flow 2.3.2.1 Invalid information If the user entered the invalid information then the system will generate an error message to again fill the information properly. 2.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 2.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 2.4 Special Requirements None 2.5 Pre-Condition The user must be computer operator in police Department . 35
  • 36. 2.6 Post-Condition If the use case was successful, the criminal information is added in the crimefile database. Otherwise , the system state is unchanged. 2.7 Extension points None 3. Registration process for prisoner 3.1 Brief description This use case allows the actor to register prisoner in database . 3.2 Actors There are two actor (user, administrator) which interacts and participates with this use case. 3.3 Flow of events 3.3.1 Basic flow This use case starts when the actor Register prisoners of the prison. • Once the user provides the requested information, one of the sub-flows is executed. • If the user selected “submit ”, the submit crimefile information sub flow is executed. 3.3.1.1 Submit crimefile information • The system requests the user to includes: • PrisonerNo • ChargeSheetNo • NickName 36 enter the Registration information which
  • 37. • • FamilyMem • IdentMark • Height • Weight • • CrimeType Color Once the user provides the requested information, system first validates the information provided. • If the information is valid then the particular information about the prisoner is recorded in the database 3.3.2 Alternative flow 3.3.2.1 Invalid information none. 3.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 3.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 3.4 Special Requirements None 3.5 Pre-Condition The user must be computer operator in police Department . 37
  • 38. 3.6 Post-Condition If the use case was successful, the user information is added in the crime file database. Otherwise , the system state is unchanged. 3.7 Extension points None 4. Registration process for postmortem 4.1 Brief description This use case allows the actor to register postmortem in database . 4.2 Actors There are two actor (user, administrator) which interacts and participates with this use case. 4.3 Flow of events 4.3.1 Basic flow This use case starts when the actor Register postmortem. . • Once the user provides the requested information, one of the sub-flows is executed. • If the user selected “submit ”, the submit postmortem information sub flow is executed. 4.3.1.1 Submit crimefile information • The system requests the user to includes: 38 enter the Registration information which
  • 39. • • FirNo • Result • Sex • DthDate • CaseDesc • HouseName • DoctName • • PMortemNo PoliceDepartment Once the user provides the requested information, system first validates the information provided. • If the information is valid then the particular information about the prisoner is recorded in the database 4.3.2 Alternative flow 4.3.2.1 Invalid information none. 4.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 4.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 4.4 Special Requirements None 39
  • 40. 4.5 Pre-Condition The user must be computer operator in police Department . 4.6 Post-Condition If the use case was successful, the user information is added in the crimefile database. Otherwise , the system state is unchanged. 4.7 Extension points None 5. Registration process for most wanted criminal 5.1 Brief description This use case allows the actor to register most wanted criminal in database . 5.2 Actors There are two actor (user, administrator) which interacts and participates with this use case. 5.3 Flow of events 5.3.1 Basic flow This use case starts when the actor Register postmortem. . Once the user provides the requested information, one of the sub-flows is executed. If the user selected “submit ”, the submit crimefile information sub flow is executed. 5.3.1.1 Submit crimefile information 40
  • 41. • The system requests the user to enter the Registration information which includes: • • MstName • MstNickName • Age • Sex • • MstID Desc Once the user provides the requested information, system first validates the information provided. • If the information is valid then the particular information about the most wanted criminal is recorded in the database 5.3.2 Alternative flow 1.3.2.1 Invalid information none. 5.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 5.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 5.4 Special Requirements None 5.5 Pre-Condition 41
  • 42. The user must be computer operator in police Department . 5.6 Post-Condition If the use case was successful, the user information is added in the crimefile database. Otherwise , the system state is unchanged. 5.7 Extension points 6. Registration process for F.I.R. 6.1 Brief description This use case allows the actor to register fir in database . 6.2 Actors There are two actor (user,administrator) which interacts and participates with this use case. 6.3 Flow of events 6.3.1 Basic flow This use case starts when the actor Register F.I.R.. . • Once the user provides the requested information, one of the sub-flows is executed. • If the user selected “submit ”, the submit crimefile information sub flow is executed. 6.3.1.1 Submit crimefile information • The system requests the user to includes: 42 enter the Registration information which
  • 43. • • ComplntNo • FirDate • FirTime • InfoType • Place • ForLoc • Act • District • Address • PassportNo • PoliceName • RecvdTime • • Firno RecvdInfo Once the user provides the requested information, system first validates the information provided. • If the information is valid then the particular information about the FIR is recorded in the database 6.3.2 Alternative flow 6.3.2.1 Invalid information none. 6.3.2.2 Blank information 43
  • 44. If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 6.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 6.4 Special Requirements None 6.5 Pre-Condition The user must be computer operator in police Department . 6.6 Post-Condition If the use case was successful, the user information is added in the CRIME FILE database. Otherwise , the system state is unchanged. 6.7 Extension points None one 7. Search for Criminal 7.1 Brief description This use case allows the actor to search for his criminals status. 7.2 Actors There is two actor (user, administrator) which interacts and participates with this use case. 7.3 Flow of events 44
  • 45. 7.3.1 Basic flow This use case starts when the actor wishes to search for the criminals. The system requests the user to enter the required information in order to search for criminal. 1. On submitting the required information the following sub flow is executed. 7.3.1.1 Search placement information 1. The system requests the user to enter the following information for searching which includes: Criminal name 2. Once the user provides the requested information, system first validates the information provided. 3. If the information is valid then the placement status of the particular user is displayed. 7.3.2 Alternative flow 7.3.2.1 Invalid information If the user entered the invalid information then the system will generate an error message to again fill the information properly. 7.3.2.2 Blank information If the user left blank the text boxes that are mandatory to be filled by him then the system will generate error message. 7.3.2.3 No information found If the information entered by the user is not found in database then the system will not display the name of the organization. 45
  • 46. 7.3.2.3 On cancel If the user chooses the cancel then the use case ends and the basic flow begins. 7.4 Special requirements None 7.5 Pre-condition The user must be computer operator in police Department . 7.6 Post-condition If the use case was successful, the criminal status of the particular user is displayed. Otherwise, the system state is unchanged. 7.7 Extension points None 46
  • 47. DATABASE MODULE For creation of database Microsoft Access a popular relational database management system is used. The database is connected visual basic which have inbuilt functions to connect to database, enter information to database and extract data. The project database has following tables. Login –admin login Login –user login Criminal registration Prisoner registration 47
  • 51. CODING AND SCREEN SHOTS Start 51
  • 52. Login form Coding:Login form Private Sub cmdAdminLog_Click() Set rs = con.Execute("Select * from AdminLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'") If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuAdminAddU.Enabled = True frmMDI.mnuAdminDelU.Enabled = True frmMDI.mnuActiv.Enabled = True frmMDI.mnuLogin.Enabled = False frmMDI.mnuAdminAddComSt.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True frmMDI.mnusearch.Enabled = True Unload Me Else MsgBox "Failure", vbCritical, "Crime File System" End If 'rs.Close Unload Me End Sub Private Sub cmdCancel_Click() Unload Me 52
  • 53. End Sub Private Sub cmdUserLog_Click() Set rs = con.Execute("Select * from UserLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'") If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuLogin.Enabled = False frmMDI.mnuActiv.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True frmMDI.mnusearch.Enabled = True Unload Me Else MsgBox "Failure", vbCritical, "Crime File System" End If 'rs.Close End Sub Private Sub Form_Load() connectdb End Sub Private Sub Form_Unload(Cancel As Integer) con.Close End Sub 53
  • 54. Main form Coding: Main form Private Sub MDIForm_Load() mnuLogoff.Enabled = False mnuAdminAddU.Enabled = False mnuAdminDelU.Enabled = False mnuActiv.Enabled = False mnuAdminAddComSt.Enabled = False mnuActivReg.Enabled = False mnuActivComp.Enabled = False mnuActivRpt.Enabled = False mnusearch.Enabled = False 54
  • 55. DataEnvironment1.Connection1.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & App.Path & "crimefile.mdb;Persist Security Info=False" End Sub Private Sub mnuActivChrgSht_Click() Load frmChargeSheet frmChargeSheet.Show End Sub Private Sub mnuActivCompReg_Click() Load frmCompltReg frmCompltReg.Show End Sub Private Sub mnuActivCompStat_Click() Load frmCompStatus frmCompStatus.Show End Sub Private Sub mnuActivCsHist_Click() Load frmHistSheet frmHistSheet.Show End Sub Private Sub mnuActivFir_Click() Load frmFIR frmFIR.Show End Sub Private Sub mnuActivRegCrim_Click() Load frmCriminalRegister frmCriminalRegister.Show End Sub Private Sub mnuActivRegPost_Click() Load frmPostmortem frmPostmortem.Show End Sub Private Sub mnuActivRegPris_Click() Load frmPrisonerReg frmPrisonerReg.Show End Sub Private Sub mnuActivRptCrim_Click() Load DataReportCrimeRpt DataReportCrimeRpt.Show End Sub Private Sub mnuActivRptMst_Click() Load DataReportMostWanted DataReportMostWanted.Show End Sub Private Sub mnuActRegMst_Click() Load frmMostWanted frmMostWanted.Show 55
  • 56. End Sub Private Sub mnuAdminAddComSt_Click() Load frmAddCompltStatus frmAddCompltStatus.Show End Sub Private Sub mnuAdminAddU_Click() Load frmAddUser frmAddUser.Show End Sub Private Sub mnuAdminDelU_Click() Load frmDeleteUser frmDeleteUser.Show End Sub Private Sub mnucriminal_Click() Load searchCriminal searchCriminal.Show End Sub Private Sub mnuexit_Click() Unload Me End Sub Private Sub mnuLogin_Click() Load frmLogin frmLogin.Show End Sub Private Sub mnuLogoff_Click() mnuLogoff.Enabled = False mnuAdminAddU.Enabled = False mnuAdminDelU.Enabled = False mnuActiv.Enabled = False mnuLogin.Enabled = True mnuAdminAddComSt.Enabled = False mnuActivReg.Enabled = False mnuActivComp.Enabled = False mnuActivRpt.Enabled = False mnusearch.Enabled = False End Sub Private Sub mnuprisioner_Click() Load SearchPrisoner SearchPrisoner.Show End Sub Private Sub mnuRptFIR_Click() Load frmFIRrpt frmFIRrpt.Show End Sub Private Sub mnuRptMortem_Click() Load frmPMortemRpt 56
  • 57. frmPMortemRpt.Show End Sub Add New user Coding: Add New user Private Sub Form_Load() connectdb End Sub Private Sub cmdAdd_Click() Set rs = con.Execute("select * from UserLogin where Username='" + txtUsername.Text + "' and Password='" + txtPassword.Text + "'") If (Not rs.EOF) Then MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocus Else 57
  • 58. con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" + txtPassword.Text + "')") MsgBox "User added sucessfully", vbInformation, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocus End If End Sub Private Sub cmdCancel_Click() Unload Me End Sub Delete user Coding: Delete user Private Sub cmdCancel_Click() Unload Me End Sub Private Sub cmdDelete_Click() con.Execute ("delete from UserLogin where Username='" + cmbUsername.Text + "'") MsgBox "User deleted sucessfully!!", vbInformation, "CFS" cmbUsername.Text = "" End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select * from UserLogin") 58
  • 59. While (Not rs.EOF) cmbUsername.AddItem rs(0) rs.MoveNext Wend End Sub Add complaint status Coding: Add complaint status Private Sub cmdCancel_Click() Unload Me End Sub Private Sub cmdViewStat_Click() Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text + "") If (Not rs.EOF) Then 59
  • 60. txtDetails.Text = rs(1) End If End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select distinct(ComplntNo) from ComplntStatus") While (Not rs.EOF) cmbComplntNo.AddItem rs(0) rs.MoveNext Wend rs.Close End Sub Criminal registration Coding: Criminal registration Private Sub cmdCancel_Click() Unload Me 60
  • 61. End Sub Private Sub cmdSave_Click() If (optyes.Value = True) Then x = "Yes" Else x = "No" End If If (txtAddress.Text = "" Or txtAge.Text = "" Or txtCrimeType.Text = "" Or txtName.Text = "" Or txtNickName.Text = "" Or txtOccupation.Text = "") Then MsgBox "Missing Fields!!,Please fill up all", vbInformation, "Crime File System" ElseIf (Not IsNumeric(txtAge.Text)) Then MsgBox "Age should be numeric" Else con.Execute ("insert into CriminalReg values(" + txtCriminalNo.Text + _ ",'" + txtName.Text + "','" + txtNickName.Text + "'," + txtAge.Text + _ ",'" + txtOccupation.Text + "','" + txtCrimeType.Text + "','" + txtAddress.Text + _ "','" + x + "')") MsgBox "Record Added successfully", vbInformation, "Crime File System" txtCriminalNo.Text = txtCriminalNo.Text + 1 txtAddress.Text = "" txtAge.Text = "" txtCrimeType.Text = "" txtName.Text = "" txtNickName.Text = "" txtOccupation.Text = "" txtName.SetFocus End If End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select max(CriminalNo) from CriminalReg") If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtCriminalNo.Text = cnt End If End Sub 61
  • 62. Prisoner registration Coding: Prisoner registration Private Sub Command1_Click() If (txtChgrNo.Text = "" Or txtColor.Text = "" Or txtCrmType.Text = "" Or txtFamMem.Text = "" Or txtHt.Text = "" Or txtIdenMark.Text = "" Or txtNikName.Text = "" Or txtPrisNo.Text = "" Or txtWt.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File System" Else 62
  • 63. If ((Not IsNumeric(txtChgrNo.Text)) Or (Not IsNumeric(txtHt.Text)) Or (Not IsNumeric(txtWt.Text))) Then MsgBox "Some of the values entered are not matching, Please check numbers are entered correctly", vbCritical, "Crime File System" Else Set rs = con.Execute("select * from PrisonersReg where ChargeSheetNo=" + txtChgrNo.Text + "") If (Not rs.EOF) Then MsgBox "Charge Sheet Number Already Exist, Please try another number", vbCritical, "Crime File System" txtChgrNo.Text = "" txtChgrNo.SetFocus Else con.Execute ("insert into PrisonersReg values(" + txtPrisNo.Text + "," + txtChgrNo.Text + ",'" + txtNikName.Text + _ "','" + txtCrmType.Text + "','" + txtFamMem.Text + "','" + txtIdenMark.Text + "'," + txtHt.Text + _ "," + txtWt.Text + ",'" + txtColor.Text + "')") con.Execute ("insert into prisonersTemp values(" + txtPrisNo.Text + ",'No')") MsgBox "Record Added Sucessfully", vbInformation, "CFS" txtPrisNo.Text = txtPrisNo.Text + 1 txtChgrNo.Text = "" txtColor.Text = "" txtCrmType.Text = "" txtFamMem.Text = "" txtHt.Text = "" txtIdenMark.Text = "" txtNikName.Text = "" txtWt.Text = "" txtChgrNo.SetFocus End If End If End If End Sub Private Sub Command2_Click() Unload Me End Sub 63
  • 64. Post mortem Coding: Post mortem Private Sub cmdSave_Click() If (txtDate.Text = "" Or txtDesc.Text = "" Or txtDoctName.Text = "" Or cmbFirrNo.Text = "" Or txtHouseName.Text = "" Or txtPoliceSt.Text = "" Or txtPostNo.Text = "" Or txtRslt.Text = "") Then MsgBox "Missing Fields!! Please Fill Up all", vbInformation, "Crime File System" 64
  • 65. Else Set rs = con.Execute("select * from Postmortem where FirNo=" + cmbFirrNo.Text + "") If (Not rs.EOF) Then MsgBox "Duplication is not allowded, Please try another FIR number", vbCritical, "Crime File System" cmbFirrNo.SetFocus Else con.Execute ("insert into postmortem values(" + txtPostNo.Text + "," + cmbFirrNo.Text + ",'" + txtRslt.Text + _ "','" + cmbSex.Text + "','" + txtDate.Text + "','" + txtDesc.Text + _ "','" + txtHouseName.Text + "','" + txtDoctName.Text + "','" + txtPoliceSt.Text + "')") MsgBox "Record Added Sucessfully", vbInformation, "Crime File System" txtPostNo.Text = txtPostNo + 1 txtDate.Text = "" txtDesc.Text = "" txtDoctName.Text = "" txtHouseName.Text = "" txtPoliceSt.Text = "" txtRslt.Text = "" End If End If End Sub Private Sub Form_Load() connectdb cmbSex.Text = "Male" Set rs = con.Execute("select max(PMortemNo) from Postmortem") If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtPostNo.Text = cnt End If rs.Close Set rs = con.Execute("select Firno from FIR") While (Not rs.EOF) cmbFirrNo.AddItem rs(0) rs.MoveNext Wend rs.Close End Sub 65
  • 66. POST MORTEM REPORT: CODING: Dim x As Integer Private Sub cmdShRpt_Click() x = cmbMno.Text If (DataEnvironment1.rsCommand3.State = 1) Then 66
  • 67. DataEnvironment1.rsCommand3.Close Else DataEnvironment1.Command3 (x) Load DataReportmortem DataReportmortem.Show End If End Sub Private Sub Command1_Click() Unload Me End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select PMortemNo from Postmortem") While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNext Wend End Sub 67
  • 68. Most wanted Coding: Mostwanted Dim x As Integer Private Sub cmdCancel_Click() Unload Me End Sub Private Sub cmdSave_Click() If (txtAge.Text = "" Or txtDesc.Text = "" Or txtName.Text = "" Or txtNickName.Text = "") Then MsgBox "Missing fields!!, Please fill up all", vbInformation, "Crime File System" Else 68
  • 69. Set rs = con.Execute("select count(*) from MostWanted") If (Not rs.EOF) Then x = rs(0) If (x = 0) Then x=1 Else x=x+1 End If txthd.Text = x End If If (Not IsNumeric(txtAge.Text)) Then MsgBox "Age should be number", vbInformation, "Crime File Syatem" txtAge.Text = "" txtAge.SetFocus Else con.Execute ("insert into MostWanted values(" + txthd.Text + ",'" + txtName.Text + _ "','" + txtNickName.Text + "'," + txtAge.Text + ",'" + cmbSex.Text + "','" + txtDesc.Text + "')") MsgBox "Record Added Successfully", vbInformation, "Crime File system" txtName.Text = "" txtAge.Text = "" txtDesc.Text = "" txtNickName.Text = "" txtName.SetFocus End If End If End Sub Private Sub Form_Load() connectdb End Sub 69
  • 71. FIR Coding: FIR Private Sub cmdCancel_Click() Unload Me End Sub Private Sub cmdSave_Click() If (txtDate.Text = "" Or txtDistrict.Text = "" Or txtFirNo.Text = "" Or txtInfoAdd.Text = "" Or txtInfoRcd.Text = "" Or _ 71
  • 72. txtPassNo.Text = "" Or txtPlaceOcc.Text = "" Or txtPolice.Text = "" Or txtRcdTime.Text = "" Or txtTime.Text = "" Or _ txtTypInfo.Text = "" Or cmbComplantno.Text = "") Then MsgBox "Missing Fields!!", vbInformation, "Crime File System" Else Set rs = con.Execute("select * from FIR where FirNo=" + txtFirNo.Text + " or ComplntNo=" + cmbComplantno.Text + "") If (Not rs.EOF) Then MsgBox "Sorry!! FIR Or Complaint Number already exists. Try another number", vbCritical, "CFS" txtFirNo.Text = "" txtFirNo.SetFocus Else Dim t1, t2, t3 As String t1 = txtTime.Text + cmbT1.Text 't2 = txtTime2.Text + cmbT2.Text t3 = txtRcdTime.Text + cmbT3.Text If ((Not IsNumeric(txtPassNo.Text)) Or (Not IsNumeric(txtFirNo.Text))) Then MsgBox "Please check the number fields", vbInformation, "Crime File System" 'txtPassNo.Text = "" 'txtPassNo.SetFocus Else con.Execute ("insert into FIR values(" + txtFirNo.Text + "," + cmbComplantno.Text + _ ",'" + txtDate.Text + "','" + t1 + "','" + txtTypInfo.Text + _ "','" + txtPlaceOcc.Text + "','" + cmbForLoc.Text + "','" + cmbAct.Text + _ "','" + txtDistrict.Text + "','" + txtInfoAdd.Text + "'," + txtPassNo.Text + ",'" + txtPolice.Text + _ "','" + t3 + "','" + txtInfoRcd.Text + "')") con.Execute ("UPDATE ComplntTemp set Status='Yes' where ComplntNo=" + cmbComplantno.Text + "") MsgBox "Record Added", vbInformation, "Crime File system" txtDate.Text = "" txtDistrict.Text = "" txtFirNo.Text = "" txtInfoAdd.Text = "" txtInfoRcd.Text = "" txtPassNo.Text = "" txtPlaceOcc.Text = "" txtPolice.Text = "" txtRcdTime.Text = "" txtTime.Text = "" txtTypInfo.Text = "" txtFirNo.SetFocus End If End If End If 72
  • 73. End Sub Private Sub Form_Load() cmbT1.Text = "AM" cmbT3.Text = "AM" cmbAct.Text = "Murder" cmbForLoc.Text = "Foreign" connectdb Set rs = con.Execute("Select ComplntNo from ComplntTemp where Status='No'") While (Not rs.EOF) cmbComplantno.AddItem rs(0) rs.MoveNext Wend End Sub 73
  • 74. FIR REPORT CODING: Dim x As Integer Private Sub cmdShRpt_Click() x = cmbMno.Text If (DataEnvironment1.rsCommand4.State = 1) Then DataEnvironment1.rsCommand4.Close 74
  • 75. Else DataEnvironment1.Command4 (x) Load DataReportFIR DataReportFIR.Show End If End Sub Private Sub Command1_Click() Unload Me End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select Firno from FIR") While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNext Wend End Sub Charge sheet 75
  • 76. Coding:chargeSheet Dim cnt As Integer Dim x As Control Private Sub cmdBack_Click() Frame4.Visible = False Frame3.Visible = True End Sub Private Sub cmdBack2_Click() Frame2.Visible = False Frame1.Visible = True End Sub Private Sub cmdBack3_Click() Frame3.Visible = False Frame2.Visible = True 76
  • 77. End Sub Private Sub cmdFinish_Click() If (txtWitnAdd.Text = "" Or txtWitnName.Text = "" Or txtWitnOcc.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system" Else Set rs = con.Execute("select * from ChargeSheet where FirNo=" + cmbFirNo.Text + "") If (Not rs.EOF) Then MsgBox "Dupplication is not allowed, Please try another fir number", vbCritical, "Crime File system" Frame4.Visible = False Frame1.Visible = True cmbFirNo.SetFocus Else con.Execute ("insert into ChargeSheet values(" + txtChrgNo.Text + ",'" + txtPstatName.Text + "','" + txtDate.Text + _ "'," + cmbFirNo.Text + ",'" + txtDist.Text + "','" + txtInfoName.Text + _ "','" + txtInfoAdd.Text + "','" + txtInfoOcc.Text + "','" + txtInfoPart.Text + _ "','" + txtAccuName.Text + "','" + txtAccuAdd.Text + "','" + cmbAccuSex.Text + _ "'," + txtAccuAge.Text + ",'" + txtAccuOcc.Text + "','" + cmbAccuStat.Text + _ "','" + txtAccuAct.Text + "','" + txtWitnName.Text + "','" + txtWitnAdd.Text + _ "','" + txtWitnOcc.Text + "')") MsgBox "Record Added Successfully!!", vbInformation, "Crime File system" Frame4.Visible = False Frame1.Visible = True txtChrgNo.Text = txtChrgNo.Text + 1 ' For Each x In Me.Controls ' If (x = TextBox) Then ' x.Text = "" ' End If 'Next End If End If End Sub Private Sub cmdNext1_Click() If (txtChrgNo.Text = "" Or txtPstatName.Text = "" Or txtDate.Text = "" Or cmbFirNo.Text = "" Or txtDist.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system" Else Frame1.Visible = False Frame2.Visible = True End If End Sub Private Sub cmdNext2_Click() 77
  • 78. If (txtInfoAdd.Text = "" Or txtInfoName.Text = "" Or txtInfoOcc.Text = "" Or txtInfoPart.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system" Else Frame2.Visible = False Frame3.Visible = True End If End Sub Private Sub cmdNext3_Click() If (txtAccuAct.Text = "" Or txtAccuAdd.Text = "" Or txtAccuAge.Text = "" Or txtAccuName.Text = "" Or txtAccuOcc.Text = "") Then MsgBox "Missing Fields!!, Please fill up all", vbInformation, "Crime File system" Else Frame3.Visible = False Frame4.Visible = True End If End Sub Private Sub Form_Load() Frame1.Visible = True Frame2.Visible = False Frame3.Visible = False Frame4.Visible = False connectdb Set rs = con.Execute("select max(ChrgShtNo) from ChargeSheet") If (Not rs.EOF) Then cnt = rs(0) If (cnt = 0) Then cnt = 1 Else cnt = cnt + 1 End If txtChrgNo.Text = cnt End If rs.Close Set rs = con.Execute("select Firno from FIR") While (Not rs.EOF) cmbFirNo.AddItem rs(0) rs.MoveNext Wend rs.Close End Sub Complaint status 78
  • 79. Coding: Complaint status Private Sub cmdCancel_Click() Unload Me End Sub Private Sub cmdViewStat_Click() Set rs = con.Execute("select * from ComplntStatus where ComplntNo=" + cmbComplntNo.Text + "") If (Not rs.EOF) Then txtDetails.Text = rs(1) End If End Sub Private Sub Form_Load() connectdb Set rs = con.Execute("select distinct(ComplntNo) from ComplntStatus") While (Not rs.EOF) cmbComplntNo.AddItem rs(0) rs.MoveNext Wend rs.Close End Sub 79
  • 81. Coding: Complaint status Dim con As ADODB.Connection Dim rec As ADODB.Recordset Private Sub Command1_Click() Dim strcon As String Dim strcom As String strcon = "Provider=Microsoft.ACE.OLEDB.12.0;Data Source=D:CrimeFileCrimeFileCrimeFileCrime File Systemcrimefile.mdb;Persist Security Info=False" Set con = New ADODB.Connection con.Open strcon Set rec = New ADODB.Recordset strcom = "select * from CriminalReg where CrimName='" & Text1.Text & "'" rec.Open strcom, con, adCmdText If rec.EOF Then MsgBox "record not present" Else: MsgBox "record is present" Text2.Text = rec.Fields(0) Text3.Text = rec.Fields(1) Text4.Text = rec.Fields(2) Text5.Text = rec.Fields(3) Text6.Text = rec.Fields(4) Text7.Text = rec.Fields(5) Text8.Text = rec.Fields(6) Text9.Text = rec.Fields(7) End If End Sub Private Sub exit_Click() Unload Me End Sub 81
  • 82. Search prisoner Coding: Search prisoner Dim con As ADODB.Connection Dim rec As ADODB.Recordset Private Sub Command1_Click() Dim strcon As String Dim strcom As String strcon = "Provider=Microsoft.ACE.OLEDB.12.0;Data Source=D:CrimeFileCrimeFileCrimeFileCrime File Systemcrimefile.mdb;Persist Security Info=False" 82
  • 83. Set con = New ADODB.Connection con.Open strcon Set rec = New ADODB.Recordset strcom = "select * from PrisonersReg where PrisonerNo=" & Combo1.Text If Combo1.Text = "" Then MsgBox "record not present" Else rec.Open strcom, con, adCmdText If rec.EOF Then MsgBox "record not present" Else MsgBox "record is present" Text1.Text = rec.Fields(0) Text2.Text = rec.Fields(1) Text3.Text = rec.Fields(2) Text4.Text = rec.Fields(3) Text5.Text = rec.Fields(4) Text6.Text = rec.Fields(5) Text7.Text = rec.Fields(6) Text8.Text = rec.Fields(7) Text9.Text = rec.Fields(8) End If End If End Sub Private Sub exit_Click() Unload Me End Sub 83
  • 84. The modules involved in this project are: • Login for user and admin • Complaint registration • View complaint status • Criminal register management • FIR Management • Case History Details management • Managing Postmortem details • Prisoners register management • Manage list about most wanted criminals LOGIN This includes Administrator and User login. There will be a username and password to login into the system to use all the facilities. 1. COMPLAINT REGISTRATION This module helps to register the details about the crime. This is done by entering some details, such as incident details, Victim details, crime details etc 3. VIEW COMPLAINT STATUS This module allows us to view the status of the complaint that you have registered earlier. 84
  • 85. 4. CRIMINAL REGISTER MANAGEMENT Here we can have the facility to view the details of the criminals. The administrator can add new criminal’s details and save it in a database. This can be done by entering details such as criminal number, age, occupation, type of crime etc. 5. FIR MANGEMENT This module allows viewing the First Information Report of all the crimes that took place at recent years. The administrator can enter FIR information and save it in a database. 6.CASE HISTORY DETAILS MANAGEMENT Here we can view the details of the case, date of occurrence, the type of crime and place of occurrence etc… 7. MANAGING POSTMORTEM DETAILS This module helps to view the postmortem details of a person. The details such as date of death cause of death, name of the doctor etc. 8. PRISONER REGISTER MANGEMENT This module helps the administrator as well as the user to store, view and manage the details of the past and present prisoners. 9. MANAGE THE LIST OF MOST WANTED CRIMINALS 85
  • 86. This is an additional feature added to this Software, which helps us to make a quick search about the most wanted criminals. This helps to always keep track of and identify a person quickly, who is a most wanted criminal. TEST CASES Test cases used in this project are: Test case 1: Purpose: The main purpose of this test case to inform the administrator if he did not write the correct username or password. Pre condition and inputs: The precondition for this test case is if the administrator write the correct username and password, then only user will be able to access the application. Results: if username and password is not correct, then an error mess will be displayed for incorrect password/ username. Test case 2: Purpose: The main purpose of this test case to inform the administrator if any exception occurs while updating information on the application. The format should be correct while entering the details for the criminal or prisoner name or fir information. Precondition and inputs: The precondition of this test case is there are validations given in the form which indicates the correct format of the data .The user has to fill the all required field .. 86
  • 87. Results: lf data format entered is not correct or any field is blank, then no account will be generated. FUTURE ENHANCEMENT • We can update this system as online application • The main advantage of online application is that, a person can report the crime any time from anywhere. • Users can view the progress of their complaint online. • By the future technology user can view the case details and progress of the complaints on their mobile phones • Face recognition technology can apply. User or witness of the crime can give the physical information of the thief. 87
  • 88. CONCLUSION CRIME FILE MANAGEMENT SYSTEM initiates the objective of providing the user with customized and powerful complaint registration and process management system side software. The software is built with all options such as complaint registration, prisoner’s registration, and postmortem report generation etc…All the requirements specified during the analysis and design phase are fully met, thus resulting in the formation of good software. The interface provided is very user friendly and flexible for all times. 88
  • 89. References 4. 1. http://office.microsoft.com/en-us/access-help/what-s-new-in-microsoft-officeaccess-2007-HA010024185.aspx 2. http://ncrb.nic.in/cctns.htm 3. http://en.wikipedia.org/wiki/VB6 A Complete Visual Basic 6 Training Course: How to Programme: Package 89