SlideShare a Scribd company logo
1 of 71
ANDROID BASED CRIME
MANAGEMENT SYSTEM FINAL
YEAR PROJECT 1
GROUP NAME
1.BERESA ABEBE
2.ABDU SEYID
3.MOHAMED AMIN
KAMAL
4.SUTUME DANU
5.BIKILTU YIBELTAL
Advisor
Mr. Mulgeta
Contents
2
 Introduction
 Strength and Weakness
 Statement of problem
 Objective of the project
 Scope and limitation
 Description of existing system
 Player of existing system
CHAPTER ONE
3
1.1. BACKGROUND INFORMATION
In Ethiopia there is no any computer based method to handle day to day
activities of crimes happen. Since now we are trying to develop a system
that conveys good ways to handle those things. The Crime Management
System (CrimeManSys) provides optimal as possible as plan for crime
reports and managements. So many countries are faced with these
problems of crime reporting and managements of handlings. Now days
the members of peoples make crime are highly developed and educated
than police officers. To make more peoples are concerned to this and
help to stop crimes this system can improve knowledge methods of all
citizen become crime fighter.
1. INTRODUCTION
1.1.1. STRENGTH AND WEAKNESS CURRENT SYSTEM
4
1.1.1.1 STRENGTH OF CURRENT SYSTEM
Arranging comminuting police in society
Wearing police officers uniforms
Always arranging police officers at their local office (Zone)
Keeping governments and non-governments organizations
Using walkie-talkie for quickly sending information
Creating connections with peoples
Cont…
5
1.1.1.2. WEAKNESS OF CURRENT SYSTEM
 Lack of technology
 Lack of transportations
 Criminal peoples have high knowledge of technology
 Hard to gather information concerning crimes
 Lack moderated materials
 Collecting the crime effect is very hard
 Use file based system that consume time and labor
 Unable to generated automatic crimes report
Cont…
6
 Persons make crime is more developed in technology than police officers
 Lack of evidences after suspected criminal
 Persons make crime is more developed in technology than police officers
1.2. BACKGROUND OF PROJECT
The reasons that initiate us to develop this project is that we understand the
importance of technology in our day to day class learning and guessing where the
world is moving now. As well by guessing if our country police officers use
technology based methods struggling with criminals may reduce.
1.3. STATEMENT OF PROBLEM
7
 Criminals have high knowledge of technology.
 Hard to gather information concerning crimes.
 Lack moderated materials.
 Collecting the crime effect is very hard.
 Police officers are very far from technology.
 Persons make crime is more developed than police officers.
 Police officers force and the society are not equals.
 Lack of evidences after suspected criminal.
 Unable to generated automatic crimes report.
1.4. OBJECTIVE OF PROJECT
8
1.4.1. GENERAL OBJECTIVE
The main objectives of this projects is to improve the crime reports and
managements system by using computer and android based system and making the
system more interactive and user-friendly.
1.4.2. SPECIFIC OBJECTIVE
 To store, provide information of crime managements.
 To reduce time consuming to complete crime investigation
 To make detector auto gain information
Cont…
9
 To minimize delays of information and evidence gathering
 To make more peoples fight crimes easily and readily
 To make crime awareness among the local community.
1.5. SCOPE AND LIMITATION OF THE PROJECT10
1.5.1. SCOPE
As a general the scope of our system is as follows:
 Ensure data’s accuracy.
 Anyone can report crime to the crime authority.
 Minimize manual data entry.
 Greater efficiency and better services.
 Generates crime reports.
 The camera and video capturing are online.
 Include GPS (geographical positioning system).
 Assigning the police officer to the concerned Zones.
Cont…
11
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements
systems it doesn’t include the following because of time to do all this
 Not help to find perpetrators who abscond from the investigators
 It doesn’t bring the crime person to the court
 It doesn’t work without connection except reading article book
 It doesn’t upload videos or image but capture and send online
1.6 FEASIBILITY STUDY
12
1.6.1 Operational /Organizational Feasibility
 It might not be possible to see fully operational system within the given limit of
time for software development. However with great cooperation of the project
team the system can address over all problems of the current system.
1.6.2. Technical Feasibility
 Usually new systems established in order to overcome the technical illness of the
previous system. In the same way, this system is technically big enough to be
applied easily to the problem identified in the existing system. In addition, the
both hardware’s and software’s for this system are highly available and can be
owned with small cost. Therefore, it can be concluded that the system is
technically feasible.
Cont…
13
1.6.3. Economic Feasibility
 Fastest getting information.
 Small response time and many services.
 Easy and fast file management.
 Reduce cost for manual data management (Reduced expenses).
 Easy update & retrieval on stored records.
 Better decision making.
 Better service for crime handling.
 Little job burden for detectors and other police offices.
1.7. SIGNIFICANCE OF PROJECT
14
 Police office can access their daily working zones easily using their mobiles.
 The placement of police officer will be effective.
 Minimize wastage of resources including energy.
 It speeds up communication and cooperation between peoples and police
 Automatically send message to the suspected person.
 Automatically send message for calling witness “Ragaa ማስረጃ”.
 Helps the investigating police officer to get fresh information.
 The system is portable.
 Helps to initiate investigation on priority basis.
 Enhances accuracy of information to be collected for effective use.
 Helps to perform the speedy trials.
1.8. BENEFICIARIES OF THE PROJECT
15
In the future our system will be used by home and Law authority of Ethiopia.
Then when our project is successful we will have demonstration in front of set
authority and if our project is success then it will be used in overall Ethiopia.
Generally, When this project successfully implemented it is usable for the
community and Law authority.
1.9.Methodology of the project
16
1.9.1. Data collection
Data collection is the most important part of the project to find the main
requirement of the system and to understand how the system works. We are
going to use different methods to collect data. Among the methods, we use the
following:
 Observations:- to analyze the organization the previous crime management
system
 Document analysis: - to get information about ways of crime managements
from 2nd district (ወረዳ) police office at Nekemte town.
 Interview:- for gathering direct information from the Commanders and other
polices
Cont…
17
1.9.2. Data Analysis
We are going to use object oriented approach and UML for the purpose of
analyzing the data. The main reason behind using OOA and UML is:
 In order to check reusability of the current crime management system in
Ethiopia
 In order to define new or modify objects that can be combine with the current
system
Cont…
18
1.9.3. Tools to use
The tools we are going to use for documents analysis in our
projects are:
 Microsoft office 2007, 2013 for the purpose of writing the
documentations
 Microsoft office VISIO professional 2007 for the purpose of
drawing the use-case, class, activity and other drawing.
During implementations we are going to use:
Cont…
19
1.9.3.1. For front end:
Android Studio version 2.2
JDK & Android SDK PHP
JavaScript WAMP
1.9.3.2 For back end
MYSQL
1.10. RISK AND CONSTRAINT
20
1.10.1. Risk
While we are developing our projects we may encounter different problems
among:
 The computer virus and failures are some of them.
 Power fluctuations and loss in the laboratories if computer is desktop
1.10.2. Action Taken
As a problems exist the solution as well be exists. Some solutions for
problems are:
 Scanning the computer with antivirus and recovering the files
 Using additional laptop and working with them
CHAPTER TWO
DESCRIPTIONS OF THE EXISTING SYSTEM
21
2.1. Description of Existing System
The Current System of the Crime Management system is file based which is time
and labor consumer. The detector collect the data from peoples, blood strain, and
hair on that place. Based on thus data the detector and other police start the
working to gain information corning the criminals. Then they will continue till to
get the exact information then present in front of the court. Others are when
compliant is want to complain someone he has to come the police officer biro and
start to fill the compliant forms manually. To call the suspected person they will
print out the form then manually fill that form after that send the form with the
help of other person.
2.1.1. The player of the existing system
22
2.1.1.1. Primary Actor
These actors are actors who directly initiate the system to run. We can classify this actor as
the main actor who plays the main role in the system. In the existing system these actors
interact with each other to fulfill the required tasks. Those actors are listed below:
 Commander (District Administrator)
 Criminal Detection Room
2.1.1.2. Secondary Actors
Those actors are who works under Primary actors. They do only what main actor order
them to do. Those actors are:
 Crime detector
 Comminuting police
2.2. Major function of existing system with clear input, process and
output
23
The major functions of the existing system are namely:
 Assigning community police.
 Filling new police and complaint Information.
 Filling the new data of Community police
 Enter Zone information.
 Enter suspected information.
 View community police at different zones
 How the police officer get information
Input:-
 Crime happen at some place
Process:-
 After crime happen police will reach that place and start to investigate about the crimes by using
different methods
Output:-
 After some times the detector get the information’s
2.3. Business Rules
24
A business rule describes how people think and talk about things.
Thus, defining a term is establishing a category of business rule.
Business Rule regarding the detectors
 The detector must be not talkative.
 The detector always try to investigate the truth about incidence
(crimes).
2.4. Report Generation In Existing System
25
The report generated in the existing Criminal Management system is
somewhat in different manner. Those concerning number of
Comminuting police and society are always generated annually once.
Those corning criminal are generated weekly. That means the report in
the existing system are not computer based but they are written by using
paper, pen, as well pencil and other material used for drawing and
writing.
2.5. Forms and Documents used in existing system
26
Totally the existing system is a paper based, that is time and labor
consuming works. Many forms used in this existing system are drawn by
pen and ruler. After drawing they start to fill the data’s concerning that
forms what they needs.
Forms are like:
•Adding new community police
•Adding annual renter and renting society
•Add suspected person form
•Register new police officer
•And others
Cont…
27
Documents are like:
 All day to day crime record of crimes
 Specific police investigation files
 Medical/traffic evidence and other written evidence
 Forgery-forged document
 Forensic/medical evidence certificate
 And others
2.6. Problem of the Existing System using Pieces Fame Work
28
 Difficulty in report
 The officer dealing with a particular case cannot take decision by himself
even when he is having the firsthand knowledge/information about the case
and he can expect obstructions from higher authorities/officials.
 Even an efficient officer cannot/may not be able to handle more than one
case at a time.
 As we all know, a covered truth, Bribery plays an important role in the
existing system.
 Many cases are piled up in the corners, which are not proved, due to lack of
commitment in the job.
 In most of the cases, the innocent are accused in the existing system.
 And for more detail read documentation.
2.7. Practice to be preserved from Existing System
29
This project will come up with a solution that can minimize the above
listed problems of the system in the country and enable the police officer
to be effective and efficient by considering the limited resources they
have. By considering those strengths of the existing system. We conserved
all the strength of the existing system already mentioned in the
documentation parties of our projects.
2.8. Alternative options to address problem of the existing system
30
 Developing system that assign police officer to different zone.
 Storing updated information on the system.
 Better communication, better leadership, better training, and more
defined roles in terms of contribution to the society.
 Working with partners.
 Develop system that send message to suspected and witness.
 Develop system that store data of complaint.
 Develop system that register new Police.
 Reducing crime and disorder.
 Confidently and anonymity issues.
2.9. System Requirements of the new System
31
2.9.1 Functional Requirements
 The system will allow insert police officer information.
 The system should provide password changing facility.
 The system should provide user authentication mechanism.
 The system should be able to generate report.
 Storing, updating and deleting records.
 Validate data and store it without error.
 Assign police officers for each zones.
 Allow anyone to send crime report
 Allow police officer to call witness and suspected through message
Cont…
32
2.9.2. Non-functional Requirements
 User interface and human requirements
 Hardware requirement
 Software requirement
 Security issue
 Performance characteristics
 Error handling
 Quality issue
 System modification
CHAPTER THREE
MODELING
33
3.1. Use case Diagram
Our system have 4 actors having
different responsibility.
Those actors are namely:
1. Police officer
2. Administrator
3. Member
4. Visitor/View/User
3.1.1. Police officer use case
34
35
Administrator use case diagram
36
Member use case diagram
37
Visitor use case diagram
3.2. Use case documentation
38
3.2.1. Description of Actor
In this system we have four main actors. Those are
1. Name: Administrator
Description: An Administrator is a person who
Manage account,
Manage own account
View station,
View feedback
Give feedback,
View crime detail,
View article book,
Give report
Cont…
39
2. Name: Member
Description: A members those who are voluntary engaged to protect
the crimes and send different information concerning the crimes to the
police officer. They have right to:
Manage their own account,
View crime detail,
Give report,
View station,
Give feedback,
View article book
other responsibility in the system.
Cont…
40
3. Name: Police officer
Description: A police officer is a police who administrators other police
and who:
manages members,
manage article book,
manage report,
manage complaint
manage feedback,
manage crime detail,
manage suspected,
manage police,
manage station,
manage witness account
view station,
give feedback,
view feedback
view crime detail,
View article book.
Cont…
41
4. Name: Visitor
Description: A visitor is a people who is guest for the system but he/she
want to view the system.
1. View article
2. Report crime
3.2.2. Description of use case
42
Use case lists:
1. Manage member
2. Manage account
3. Manage article book
4. Mange feedback
5. Manage report
6. Manage police
7. Manage suspected
8. Manage crime detail
9. Manage witness
10. Manage station
11. Manage own account
12. Manage complaint
13. View station
14. Give feedback
15. View article
16. Send criminal report
17. View crime detail
18. View feedback
19. Login
20. Validate user
3.2.2.1. Use case Name: Manage Member
43
Actor: Police officer
Description: Add, delete and modify member’s activity.
Pre condition: Member is identified and then authenticated.
Include: Login
Extends: validate user
Flow of events
For Add member
1. The authenticated actor wants to add member.
2. The actor wants to register a member.
3. The actor goes to member page.
4. The actor click on join member button.
Cont…
44
5. The actor fill all information need to be a member.
6. The actor click on Join Now button.
7. The system send verification message to phone or email.
8. The actor insert verification to space provided.
9. After verification the user is registered.
10. The use case end
Post Condition: New member added to database
Cont…
45
For deleting Member
1. The authenticated actor wants to remove member.
2. The authenticated actor login to the system.
3. The actor goes to Member pages.
4. The actor click on Delete member.
5. The system display searching area.
6. The actor search member he/she wants to delete. [Alternative]
7. The system display that member.
8. The authenticated actor click remove button.
9. The system removes the member from the database.
10. Use case ends
Post Condition: Member is deleted from database
Cont…
46
 [Alternative]
1. If the member not found
2. The system display message “The member you searched is not
found. Try again!”
3. The use case end.
For Modify member
1. The actor wants to modify an existing member.
2. Authenticated actor logs in.
3. The actor goes to Member page.
Cont…
47
4. The actor click on Update Member button.
5. The system display search area.
6. The actor insert member he/she wants to update[Alternative]
7. The system display member.
8. The actor click edit button.
9. The system save button.
10.Use case ends.
Post Condition: Member in database modified
Cont…
48
Alternative flow:- [if not found]
 The system displays ‘information Member not found ‘message
 Exit
3.2.2.2. Use case Name: Manage Suspected
 Actor: Police officer
 Description: Add, Delete and modify suspected files
 Precondition: The actor should know the phone number of suspected
 Include: login
 Extends: validate user
 Flow of Events
Cont…
49
For adding suspected
1. The authenticated actor wants to add new suspected
2. The actor login to the system
3. The actor goes to suspected page
4. The actor fill all the information needed to call suspected
5. The actor send message to the suspected
6. The suspected receive message
7. The use case end
Post condition: The new suspected record is added and message sent.
3.2.2.3. Use case Name: Give Feedback
50
 Actor: Administrator, Police officer, Member
 Description: Add the feedback
 Precondition: user should be identified and authenticated
 Include: login
 Extends: validate users
 Flow of events
1. The authenticated actor wants to add feedback
2. The user wants to add new feedback
3. The user wants to fill all information need to add feedback
4. The user click send feedback
5. The feedback added
6. The use case end
Post condition: New feedback added to database
3.2.2.4. Use case Name: View Article
51
 Actor: Administrator, Police officer, Member, Visitor
 Description: Allow the user to view the book of article
 Per-condition: The information should exist in the database
 Flow of Event
1. The user want to view articles
2. The user click on the button view article
3. The system display article book
4. The user select article to view
5. The use case end
Post-Condition: The crime article book will be displayed
3.2.2.5. Use case Name: Report Crime
52
 Actor: Administrators, Police officer, Member, visitor
 Description: Allow the user to send crime happening at that moment
 Pre-condition: The system should be running at server side
 Flow of Event:
1. The user want to report crime happening
2. The user may or may not fill all information
3. The user must use of camera or videos including other information
4. The user report crime and send data to server if sever is running
5. The use case end
Post Condition: The report sent successfully.
3.3. Sequence Diagram
53
3.3.1. Sequence diagram of add
Member
Cont…
54
3.3.2. Sequence diagram of
report generation
3.4. Analysis level class
Diagram
55
Conceptual modeling
show the model
dependency and
connection between
user interface classes.
The following figure
shows class diagram of
Crime Management
system.
3.5. Business rule of the new system
56
 The system works if and only if the required data are inserted.
 The member can’t create the double account using the same username
and phone number
 The system work connection based.
 It may increase false accusation unless the awareness creation is made.
 Physical presence of the person reporting a crime or the victim is
required to complete the investigation and frame a charge against the
suspect. This is because the Ethiopian Criminal Procedure Code
requires a witness to give his/her testimony in person; the testimony
should be read to the witness and finally signed by the witness.
CHAPTER FOUR
4. SYSTEM DESIGN
57
4.1 Introduction
Project design is the general approach given to develop the software to
solve the problem of a particular organization. Project design is the stage
at which description of project development is given and how the project
is designed. The purpose of design is to determine how to build the
system and to obtain information needed to drive the actual
implementation of the system. The focus is particularly on the solution
domain rather than on the problem domain. Object oriented design
consists of transforming the analysis model into the design model. It
describes the system in terms of its architecture.
4.2. Class Type Architecture
58
Since our system modeling approach is object oriented, we have to
describe the system in terms of its architecture, such as its hardware
/software mapping, global control flow and persistency management.
Therefore, this session mainly concerned with the design part of Crime
management system.
Cont…
59
This figure presents a high level
layering strategy for software
application. The various layers
are represented by the rectangles
and collaboration between layers
indicated by the arrows. The
primary name of the layer is
indicated first, and other common
names indicated in parenthesis.
4.3. Class Modeling
60
Class Diagram:-
shows the things such
as classes and types,
their internal structure
and relationships, to
other things.
4.4. Component
Modeling
61
A component diagram
shows dependencies
among components. In
our projects we do
have to component
modeling. Those are:
Administrator and the
Police officers
4.5. Deployment Modeling
62
Client: Browser
Webserver (Apache)
Mobile
<<App>>
Manage Member
Manage Report
Manage Police
Manage Feedback
Manage Complaint
View Article Book
Manage Station
User Account
DB Server MYSQL
Persistence
CrimeManSys<<AppLication>>
Database
Deployment Modeling of Crime Management System Project
Deployment diagrams
show the hardware for
the system, the software
that is installed on that
hardware, and the
middleware used to
connect separate
machines on one another.
4.6. Data Persistence Management
63
Persistence data model or Entity relationship (ER) models are used to
communicate the design of a database, usually a relational database, to
both users and other developers.
Persistence are use the schema of database. The strength of persistence
data models is that data entities are conceptually the same as the table of
relation data base and that attributes are the same as table columns.
In the current database system we have used different tables as object
and each object is related to each other and enforced by referential
integrity by the use of foreign key and primary key.
Cont…
64
4.7 Mapping
65
4.7.1 Hardware Mapping
The hardware used for
registration system and
other service of the crime
management system is an
android based mobile or
personal computer.
Cont…
66
4.7.2. Software Mapping
The system uses Microsoft Windows 8.1
Operating System. That we are working
with. The proposed system uses sublime
or android studio as a text editor, PHP,
JavaScript, android parts as well we use
android studio rather than using
another IDE to develop the system. The
system uses MySQL server to store data.
2.8. Object Model
67
2.8.1. Revised class
Diagram
Through revision of class
diagram we prepared
another class diagram
including complaint
registration class that we
omit in case of class
modeling and conceptual
modeling
Cont…
68
4.8.2. Service Specification
1. Member:- Attribute and Method description
Username:- This attribute is a unique identifier
for the member
Full name:-This attribute is the first and last
name of member
Phone: - an attribute the member receive
verification codes. It is unique for all member.
Nationality:- This attribute is used to identify the
country of member or its nation
State:- used to input the region of member
Zone:- for zone member is involved
Kebele:- this attribute is for Kebele member is
living in
Register():- This
method is used to
register unregistered
member
Cont…
69
2. Witness:- Attribute description
Number:-This attribute is a unique
identifier of suspected from one to an other
Date:- This is the date on which message is
going to send
Mr./Mrs.:- This attribute is the name of
suspected person
About:- The reason the suspected is called
DateofCalled:- The date on which
suspected called
TimeofCalled:- The time on which
suspected called
Conclusion
70
 The manual system is adaptable and useful in the handling of crimes.
However, the automated CrimeManSys system is more functional because of
people automatically can report crimes around them in picture or video
format to the crime authority. In the aspect of speed, project design, accuracy
and stability with these features, an android based system crime management
can solve the primary problems being encountered during the Crime
reporting and managements.
 Our project is only a humble venture to satisfy the needs in our country.
Several user friendly coding have also adopted. This package shall prove to be
a powerful package in satisfying the requirements of the Crime Managements
in our country. On the last our project is still on going actually it is not
completely completed.
Thank You!
71

More Related Content

What's hot

ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationAhammad Karim
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system pptYOGESH SHARMA
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPTuhin Ray
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting pptShirinAkhtar5
 
Police Management System
Police Management SystemPolice Management System
Police Management SystemShane Williams
 
Software reuse ppt.
Software reuse ppt.Software reuse ppt.
Software reuse ppt.Sumit Biswas
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal SystemRajib Roy
 
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Mohammad Karim Shahbaz
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result SystemKuMaR AnAnD
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Reportstalin george
 
Program security
Program securityProgram security
Program securityG Prachi
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemPranil Dukare
 

What's hot (20)

ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android Application
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system ppt
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting ppt
 
Crime
CrimeCrime
Crime
 
Police Management System
Police Management SystemPolice Management System
Police Management System
 
Online FIR System
Online FIR SystemOnline FIR System
Online FIR System
 
Software reuse ppt.
Software reuse ppt.Software reuse ppt.
Software reuse ppt.
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal System
 
Ppt
PptPpt
Ppt
 
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result System
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 
Program security
Program securityProgram security
Program security
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 

Similar to Crime Management System final year project

Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project Janella
 
Community reporting system: road violation
Community reporting system: road violationCommunity reporting system: road violation
Community reporting system: road violationjournalBEEI
 
Community reporting system: road violation
Community reporting system: road violationCommunity reporting system: road violation
Community reporting system: road violationjournalBEEI
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...IRJET Journal
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013VinothkumaR Ramu
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting SystemIRJET Journal
 
Suryansh.docx
Suryansh.docxSuryansh.docx
Suryansh.docxRapperEzy
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET Journal
 
Android Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationAndroid Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationIJERA Editor
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 

Similar to Crime Management System final year project (20)

E-Police Android APP
E-Police  Android APPE-Police  Android APP
E-Police Android APP
 
Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project
 
Community reporting system: road violation
Community reporting system: road violationCommunity reporting system: road violation
Community reporting system: road violation
 
Community reporting system: road violation
Community reporting system: road violationCommunity reporting system: road violation
Community reporting system: road violation
 
sdReport
sdReportsdReport
sdReport
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
 
Cis second draft
Cis second draftCis second draft
Cis second draft
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
Crime free
Crime freeCrime free
Crime free
 
Suryansh.docx
Suryansh.docxSuryansh.docx
Suryansh.docx
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
Android Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationAndroid Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal Corporation
 
City Without Crime
City Without CrimeCity Without Crime
City Without Crime
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
J017555559
J017555559J017555559
J017555559
 

Recently uploaded

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Crime Management System final year project

  • 1. ANDROID BASED CRIME MANAGEMENT SYSTEM FINAL YEAR PROJECT 1 GROUP NAME 1.BERESA ABEBE 2.ABDU SEYID 3.MOHAMED AMIN KAMAL 4.SUTUME DANU 5.BIKILTU YIBELTAL Advisor Mr. Mulgeta
  • 2. Contents 2  Introduction  Strength and Weakness  Statement of problem  Objective of the project  Scope and limitation  Description of existing system  Player of existing system
  • 3. CHAPTER ONE 3 1.1. BACKGROUND INFORMATION In Ethiopia there is no any computer based method to handle day to day activities of crimes happen. Since now we are trying to develop a system that conveys good ways to handle those things. The Crime Management System (CrimeManSys) provides optimal as possible as plan for crime reports and managements. So many countries are faced with these problems of crime reporting and managements of handlings. Now days the members of peoples make crime are highly developed and educated than police officers. To make more peoples are concerned to this and help to stop crimes this system can improve knowledge methods of all citizen become crime fighter. 1. INTRODUCTION
  • 4. 1.1.1. STRENGTH AND WEAKNESS CURRENT SYSTEM 4 1.1.1.1 STRENGTH OF CURRENT SYSTEM Arranging comminuting police in society Wearing police officers uniforms Always arranging police officers at their local office (Zone) Keeping governments and non-governments organizations Using walkie-talkie for quickly sending information Creating connections with peoples
  • 5. Cont… 5 1.1.1.2. WEAKNESS OF CURRENT SYSTEM  Lack of technology  Lack of transportations  Criminal peoples have high knowledge of technology  Hard to gather information concerning crimes  Lack moderated materials  Collecting the crime effect is very hard  Use file based system that consume time and labor  Unable to generated automatic crimes report
  • 6. Cont… 6  Persons make crime is more developed in technology than police officers  Lack of evidences after suspected criminal  Persons make crime is more developed in technology than police officers 1.2. BACKGROUND OF PROJECT The reasons that initiate us to develop this project is that we understand the importance of technology in our day to day class learning and guessing where the world is moving now. As well by guessing if our country police officers use technology based methods struggling with criminals may reduce.
  • 7. 1.3. STATEMENT OF PROBLEM 7  Criminals have high knowledge of technology.  Hard to gather information concerning crimes.  Lack moderated materials.  Collecting the crime effect is very hard.  Police officers are very far from technology.  Persons make crime is more developed than police officers.  Police officers force and the society are not equals.  Lack of evidences after suspected criminal.  Unable to generated automatic crimes report.
  • 8. 1.4. OBJECTIVE OF PROJECT 8 1.4.1. GENERAL OBJECTIVE The main objectives of this projects is to improve the crime reports and managements system by using computer and android based system and making the system more interactive and user-friendly. 1.4.2. SPECIFIC OBJECTIVE  To store, provide information of crime managements.  To reduce time consuming to complete crime investigation  To make detector auto gain information
  • 9. Cont… 9  To minimize delays of information and evidence gathering  To make more peoples fight crimes easily and readily  To make crime awareness among the local community.
  • 10. 1.5. SCOPE AND LIMITATION OF THE PROJECT10 1.5.1. SCOPE As a general the scope of our system is as follows:  Ensure data’s accuracy.  Anyone can report crime to the crime authority.  Minimize manual data entry.  Greater efficiency and better services.  Generates crime reports.  The camera and video capturing are online.  Include GPS (geographical positioning system).  Assigning the police officer to the concerned Zones.
  • 11. Cont… 11 1.5.2. Limitation Even though this project focuses on the crime reporting and managements systems it doesn’t include the following because of time to do all this  Not help to find perpetrators who abscond from the investigators  It doesn’t bring the crime person to the court  It doesn’t work without connection except reading article book  It doesn’t upload videos or image but capture and send online
  • 12. 1.6 FEASIBILITY STUDY 12 1.6.1 Operational /Organizational Feasibility  It might not be possible to see fully operational system within the given limit of time for software development. However with great cooperation of the project team the system can address over all problems of the current system. 1.6.2. Technical Feasibility  Usually new systems established in order to overcome the technical illness of the previous system. In the same way, this system is technically big enough to be applied easily to the problem identified in the existing system. In addition, the both hardware’s and software’s for this system are highly available and can be owned with small cost. Therefore, it can be concluded that the system is technically feasible.
  • 13. Cont… 13 1.6.3. Economic Feasibility  Fastest getting information.  Small response time and many services.  Easy and fast file management.  Reduce cost for manual data management (Reduced expenses).  Easy update & retrieval on stored records.  Better decision making.  Better service for crime handling.  Little job burden for detectors and other police offices.
  • 14. 1.7. SIGNIFICANCE OF PROJECT 14  Police office can access their daily working zones easily using their mobiles.  The placement of police officer will be effective.  Minimize wastage of resources including energy.  It speeds up communication and cooperation between peoples and police  Automatically send message to the suspected person.  Automatically send message for calling witness “Ragaa ማስረጃ”.  Helps the investigating police officer to get fresh information.  The system is portable.  Helps to initiate investigation on priority basis.  Enhances accuracy of information to be collected for effective use.  Helps to perform the speedy trials.
  • 15. 1.8. BENEFICIARIES OF THE PROJECT 15 In the future our system will be used by home and Law authority of Ethiopia. Then when our project is successful we will have demonstration in front of set authority and if our project is success then it will be used in overall Ethiopia. Generally, When this project successfully implemented it is usable for the community and Law authority.
  • 16. 1.9.Methodology of the project 16 1.9.1. Data collection Data collection is the most important part of the project to find the main requirement of the system and to understand how the system works. We are going to use different methods to collect data. Among the methods, we use the following:  Observations:- to analyze the organization the previous crime management system  Document analysis: - to get information about ways of crime managements from 2nd district (ወረዳ) police office at Nekemte town.  Interview:- for gathering direct information from the Commanders and other polices
  • 17. Cont… 17 1.9.2. Data Analysis We are going to use object oriented approach and UML for the purpose of analyzing the data. The main reason behind using OOA and UML is:  In order to check reusability of the current crime management system in Ethiopia  In order to define new or modify objects that can be combine with the current system
  • 18. Cont… 18 1.9.3. Tools to use The tools we are going to use for documents analysis in our projects are:  Microsoft office 2007, 2013 for the purpose of writing the documentations  Microsoft office VISIO professional 2007 for the purpose of drawing the use-case, class, activity and other drawing. During implementations we are going to use:
  • 19. Cont… 19 1.9.3.1. For front end: Android Studio version 2.2 JDK & Android SDK PHP JavaScript WAMP 1.9.3.2 For back end MYSQL
  • 20. 1.10. RISK AND CONSTRAINT 20 1.10.1. Risk While we are developing our projects we may encounter different problems among:  The computer virus and failures are some of them.  Power fluctuations and loss in the laboratories if computer is desktop 1.10.2. Action Taken As a problems exist the solution as well be exists. Some solutions for problems are:  Scanning the computer with antivirus and recovering the files  Using additional laptop and working with them
  • 21. CHAPTER TWO DESCRIPTIONS OF THE EXISTING SYSTEM 21 2.1. Description of Existing System The Current System of the Crime Management system is file based which is time and labor consumer. The detector collect the data from peoples, blood strain, and hair on that place. Based on thus data the detector and other police start the working to gain information corning the criminals. Then they will continue till to get the exact information then present in front of the court. Others are when compliant is want to complain someone he has to come the police officer biro and start to fill the compliant forms manually. To call the suspected person they will print out the form then manually fill that form after that send the form with the help of other person.
  • 22. 2.1.1. The player of the existing system 22 2.1.1.1. Primary Actor These actors are actors who directly initiate the system to run. We can classify this actor as the main actor who plays the main role in the system. In the existing system these actors interact with each other to fulfill the required tasks. Those actors are listed below:  Commander (District Administrator)  Criminal Detection Room 2.1.1.2. Secondary Actors Those actors are who works under Primary actors. They do only what main actor order them to do. Those actors are:  Crime detector  Comminuting police
  • 23. 2.2. Major function of existing system with clear input, process and output 23 The major functions of the existing system are namely:  Assigning community police.  Filling new police and complaint Information.  Filling the new data of Community police  Enter Zone information.  Enter suspected information.  View community police at different zones  How the police officer get information Input:-  Crime happen at some place Process:-  After crime happen police will reach that place and start to investigate about the crimes by using different methods Output:-  After some times the detector get the information’s
  • 24. 2.3. Business Rules 24 A business rule describes how people think and talk about things. Thus, defining a term is establishing a category of business rule. Business Rule regarding the detectors  The detector must be not talkative.  The detector always try to investigate the truth about incidence (crimes).
  • 25. 2.4. Report Generation In Existing System 25 The report generated in the existing Criminal Management system is somewhat in different manner. Those concerning number of Comminuting police and society are always generated annually once. Those corning criminal are generated weekly. That means the report in the existing system are not computer based but they are written by using paper, pen, as well pencil and other material used for drawing and writing.
  • 26. 2.5. Forms and Documents used in existing system 26 Totally the existing system is a paper based, that is time and labor consuming works. Many forms used in this existing system are drawn by pen and ruler. After drawing they start to fill the data’s concerning that forms what they needs. Forms are like: •Adding new community police •Adding annual renter and renting society •Add suspected person form •Register new police officer •And others
  • 27. Cont… 27 Documents are like:  All day to day crime record of crimes  Specific police investigation files  Medical/traffic evidence and other written evidence  Forgery-forged document  Forensic/medical evidence certificate  And others
  • 28. 2.6. Problem of the Existing System using Pieces Fame Work 28  Difficulty in report  The officer dealing with a particular case cannot take decision by himself even when he is having the firsthand knowledge/information about the case and he can expect obstructions from higher authorities/officials.  Even an efficient officer cannot/may not be able to handle more than one case at a time.  As we all know, a covered truth, Bribery plays an important role in the existing system.  Many cases are piled up in the corners, which are not proved, due to lack of commitment in the job.  In most of the cases, the innocent are accused in the existing system.  And for more detail read documentation.
  • 29. 2.7. Practice to be preserved from Existing System 29 This project will come up with a solution that can minimize the above listed problems of the system in the country and enable the police officer to be effective and efficient by considering the limited resources they have. By considering those strengths of the existing system. We conserved all the strength of the existing system already mentioned in the documentation parties of our projects.
  • 30. 2.8. Alternative options to address problem of the existing system 30  Developing system that assign police officer to different zone.  Storing updated information on the system.  Better communication, better leadership, better training, and more defined roles in terms of contribution to the society.  Working with partners.  Develop system that send message to suspected and witness.  Develop system that store data of complaint.  Develop system that register new Police.  Reducing crime and disorder.  Confidently and anonymity issues.
  • 31. 2.9. System Requirements of the new System 31 2.9.1 Functional Requirements  The system will allow insert police officer information.  The system should provide password changing facility.  The system should provide user authentication mechanism.  The system should be able to generate report.  Storing, updating and deleting records.  Validate data and store it without error.  Assign police officers for each zones.  Allow anyone to send crime report  Allow police officer to call witness and suspected through message
  • 32. Cont… 32 2.9.2. Non-functional Requirements  User interface and human requirements  Hardware requirement  Software requirement  Security issue  Performance characteristics  Error handling  Quality issue  System modification
  • 33. CHAPTER THREE MODELING 33 3.1. Use case Diagram Our system have 4 actors having different responsibility. Those actors are namely: 1. Police officer 2. Administrator 3. Member 4. Visitor/View/User
  • 34. 3.1.1. Police officer use case 34
  • 38. 3.2. Use case documentation 38 3.2.1. Description of Actor In this system we have four main actors. Those are 1. Name: Administrator Description: An Administrator is a person who Manage account, Manage own account View station, View feedback Give feedback, View crime detail, View article book, Give report
  • 39. Cont… 39 2. Name: Member Description: A members those who are voluntary engaged to protect the crimes and send different information concerning the crimes to the police officer. They have right to: Manage their own account, View crime detail, Give report, View station, Give feedback, View article book other responsibility in the system.
  • 40. Cont… 40 3. Name: Police officer Description: A police officer is a police who administrators other police and who: manages members, manage article book, manage report, manage complaint manage feedback, manage crime detail, manage suspected, manage police, manage station, manage witness account view station, give feedback, view feedback view crime detail, View article book.
  • 41. Cont… 41 4. Name: Visitor Description: A visitor is a people who is guest for the system but he/she want to view the system. 1. View article 2. Report crime
  • 42. 3.2.2. Description of use case 42 Use case lists: 1. Manage member 2. Manage account 3. Manage article book 4. Mange feedback 5. Manage report 6. Manage police 7. Manage suspected 8. Manage crime detail 9. Manage witness 10. Manage station 11. Manage own account 12. Manage complaint 13. View station 14. Give feedback 15. View article 16. Send criminal report 17. View crime detail 18. View feedback 19. Login 20. Validate user
  • 43. 3.2.2.1. Use case Name: Manage Member 43 Actor: Police officer Description: Add, delete and modify member’s activity. Pre condition: Member is identified and then authenticated. Include: Login Extends: validate user Flow of events For Add member 1. The authenticated actor wants to add member. 2. The actor wants to register a member. 3. The actor goes to member page. 4. The actor click on join member button.
  • 44. Cont… 44 5. The actor fill all information need to be a member. 6. The actor click on Join Now button. 7. The system send verification message to phone or email. 8. The actor insert verification to space provided. 9. After verification the user is registered. 10. The use case end Post Condition: New member added to database
  • 45. Cont… 45 For deleting Member 1. The authenticated actor wants to remove member. 2. The authenticated actor login to the system. 3. The actor goes to Member pages. 4. The actor click on Delete member. 5. The system display searching area. 6. The actor search member he/she wants to delete. [Alternative] 7. The system display that member. 8. The authenticated actor click remove button. 9. The system removes the member from the database. 10. Use case ends Post Condition: Member is deleted from database
  • 46. Cont… 46  [Alternative] 1. If the member not found 2. The system display message “The member you searched is not found. Try again!” 3. The use case end. For Modify member 1. The actor wants to modify an existing member. 2. Authenticated actor logs in. 3. The actor goes to Member page.
  • 47. Cont… 47 4. The actor click on Update Member button. 5. The system display search area. 6. The actor insert member he/she wants to update[Alternative] 7. The system display member. 8. The actor click edit button. 9. The system save button. 10.Use case ends. Post Condition: Member in database modified
  • 48. Cont… 48 Alternative flow:- [if not found]  The system displays ‘information Member not found ‘message  Exit 3.2.2.2. Use case Name: Manage Suspected  Actor: Police officer  Description: Add, Delete and modify suspected files  Precondition: The actor should know the phone number of suspected  Include: login  Extends: validate user  Flow of Events
  • 49. Cont… 49 For adding suspected 1. The authenticated actor wants to add new suspected 2. The actor login to the system 3. The actor goes to suspected page 4. The actor fill all the information needed to call suspected 5. The actor send message to the suspected 6. The suspected receive message 7. The use case end Post condition: The new suspected record is added and message sent.
  • 50. 3.2.2.3. Use case Name: Give Feedback 50  Actor: Administrator, Police officer, Member  Description: Add the feedback  Precondition: user should be identified and authenticated  Include: login  Extends: validate users  Flow of events 1. The authenticated actor wants to add feedback 2. The user wants to add new feedback 3. The user wants to fill all information need to add feedback 4. The user click send feedback 5. The feedback added 6. The use case end Post condition: New feedback added to database
  • 51. 3.2.2.4. Use case Name: View Article 51  Actor: Administrator, Police officer, Member, Visitor  Description: Allow the user to view the book of article  Per-condition: The information should exist in the database  Flow of Event 1. The user want to view articles 2. The user click on the button view article 3. The system display article book 4. The user select article to view 5. The use case end Post-Condition: The crime article book will be displayed
  • 52. 3.2.2.5. Use case Name: Report Crime 52  Actor: Administrators, Police officer, Member, visitor  Description: Allow the user to send crime happening at that moment  Pre-condition: The system should be running at server side  Flow of Event: 1. The user want to report crime happening 2. The user may or may not fill all information 3. The user must use of camera or videos including other information 4. The user report crime and send data to server if sever is running 5. The use case end Post Condition: The report sent successfully.
  • 53. 3.3. Sequence Diagram 53 3.3.1. Sequence diagram of add Member
  • 54. Cont… 54 3.3.2. Sequence diagram of report generation
  • 55. 3.4. Analysis level class Diagram 55 Conceptual modeling show the model dependency and connection between user interface classes. The following figure shows class diagram of Crime Management system.
  • 56. 3.5. Business rule of the new system 56  The system works if and only if the required data are inserted.  The member can’t create the double account using the same username and phone number  The system work connection based.  It may increase false accusation unless the awareness creation is made.  Physical presence of the person reporting a crime or the victim is required to complete the investigation and frame a charge against the suspect. This is because the Ethiopian Criminal Procedure Code requires a witness to give his/her testimony in person; the testimony should be read to the witness and finally signed by the witness.
  • 57. CHAPTER FOUR 4. SYSTEM DESIGN 57 4.1 Introduction Project design is the general approach given to develop the software to solve the problem of a particular organization. Project design is the stage at which description of project development is given and how the project is designed. The purpose of design is to determine how to build the system and to obtain information needed to drive the actual implementation of the system. The focus is particularly on the solution domain rather than on the problem domain. Object oriented design consists of transforming the analysis model into the design model. It describes the system in terms of its architecture.
  • 58. 4.2. Class Type Architecture 58 Since our system modeling approach is object oriented, we have to describe the system in terms of its architecture, such as its hardware /software mapping, global control flow and persistency management. Therefore, this session mainly concerned with the design part of Crime management system.
  • 59. Cont… 59 This figure presents a high level layering strategy for software application. The various layers are represented by the rectangles and collaboration between layers indicated by the arrows. The primary name of the layer is indicated first, and other common names indicated in parenthesis.
  • 60. 4.3. Class Modeling 60 Class Diagram:- shows the things such as classes and types, their internal structure and relationships, to other things.
  • 61. 4.4. Component Modeling 61 A component diagram shows dependencies among components. In our projects we do have to component modeling. Those are: Administrator and the Police officers
  • 62. 4.5. Deployment Modeling 62 Client: Browser Webserver (Apache) Mobile <<App>> Manage Member Manage Report Manage Police Manage Feedback Manage Complaint View Article Book Manage Station User Account DB Server MYSQL Persistence CrimeManSys<<AppLication>> Database Deployment Modeling of Crime Management System Project Deployment diagrams show the hardware for the system, the software that is installed on that hardware, and the middleware used to connect separate machines on one another.
  • 63. 4.6. Data Persistence Management 63 Persistence data model or Entity relationship (ER) models are used to communicate the design of a database, usually a relational database, to both users and other developers. Persistence are use the schema of database. The strength of persistence data models is that data entities are conceptually the same as the table of relation data base and that attributes are the same as table columns. In the current database system we have used different tables as object and each object is related to each other and enforced by referential integrity by the use of foreign key and primary key.
  • 65. 4.7 Mapping 65 4.7.1 Hardware Mapping The hardware used for registration system and other service of the crime management system is an android based mobile or personal computer.
  • 66. Cont… 66 4.7.2. Software Mapping The system uses Microsoft Windows 8.1 Operating System. That we are working with. The proposed system uses sublime or android studio as a text editor, PHP, JavaScript, android parts as well we use android studio rather than using another IDE to develop the system. The system uses MySQL server to store data.
  • 67. 2.8. Object Model 67 2.8.1. Revised class Diagram Through revision of class diagram we prepared another class diagram including complaint registration class that we omit in case of class modeling and conceptual modeling
  • 68. Cont… 68 4.8.2. Service Specification 1. Member:- Attribute and Method description Username:- This attribute is a unique identifier for the member Full name:-This attribute is the first and last name of member Phone: - an attribute the member receive verification codes. It is unique for all member. Nationality:- This attribute is used to identify the country of member or its nation State:- used to input the region of member Zone:- for zone member is involved Kebele:- this attribute is for Kebele member is living in Register():- This method is used to register unregistered member
  • 69. Cont… 69 2. Witness:- Attribute description Number:-This attribute is a unique identifier of suspected from one to an other Date:- This is the date on which message is going to send Mr./Mrs.:- This attribute is the name of suspected person About:- The reason the suspected is called DateofCalled:- The date on which suspected called TimeofCalled:- The time on which suspected called
  • 70. Conclusion 70  The manual system is adaptable and useful in the handling of crimes. However, the automated CrimeManSys system is more functional because of people automatically can report crimes around them in picture or video format to the crime authority. In the aspect of speed, project design, accuracy and stability with these features, an android based system crime management can solve the primary problems being encountered during the Crime reporting and managements.  Our project is only a humble venture to satisfy the needs in our country. Several user friendly coding have also adopted. This package shall prove to be a powerful package in satisfying the requirements of the Crime Managements in our country. On the last our project is still on going actually it is not completely completed.