Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
1. ANDROID BASED CRIME
MANAGEMENT SYSTEM FINAL
YEAR PROJECT 1
GROUP NAME
1.BERESA ABEBE
2.ABDU SEYID
3.MOHAMED AMIN
KAMAL
4.SUTUME DANU
5.BIKILTU YIBELTAL
Advisor
Mr. Mulgeta
2. Contents
2
Introduction
Strength and Weakness
Statement of problem
Objective of the project
Scope and limitation
Description of existing system
Player of existing system
3. CHAPTER ONE
3
1.1. BACKGROUND INFORMATION
In Ethiopia there is no any computer based method to handle day to day
activities of crimes happen. Since now we are trying to develop a system
that conveys good ways to handle those things. The Crime Management
System (CrimeManSys) provides optimal as possible as plan for crime
reports and managements. So many countries are faced with these
problems of crime reporting and managements of handlings. Now days
the members of peoples make crime are highly developed and educated
than police officers. To make more peoples are concerned to this and
help to stop crimes this system can improve knowledge methods of all
citizen become crime fighter.
1. INTRODUCTION
4. 1.1.1. STRENGTH AND WEAKNESS CURRENT SYSTEM
4
1.1.1.1 STRENGTH OF CURRENT SYSTEM
Arranging comminuting police in society
Wearing police officers uniforms
Always arranging police officers at their local office (Zone)
Keeping governments and non-governments organizations
Using walkie-talkie for quickly sending information
Creating connections with peoples
5. Cont…
5
1.1.1.2. WEAKNESS OF CURRENT SYSTEM
Lack of technology
Lack of transportations
Criminal peoples have high knowledge of technology
Hard to gather information concerning crimes
Lack moderated materials
Collecting the crime effect is very hard
Use file based system that consume time and labor
Unable to generated automatic crimes report
6. Cont…
6
Persons make crime is more developed in technology than police officers
Lack of evidences after suspected criminal
Persons make crime is more developed in technology than police officers
1.2. BACKGROUND OF PROJECT
The reasons that initiate us to develop this project is that we understand the
importance of technology in our day to day class learning and guessing where the
world is moving now. As well by guessing if our country police officers use
technology based methods struggling with criminals may reduce.
7. 1.3. STATEMENT OF PROBLEM
7
Criminals have high knowledge of technology.
Hard to gather information concerning crimes.
Lack moderated materials.
Collecting the crime effect is very hard.
Police officers are very far from technology.
Persons make crime is more developed than police officers.
Police officers force and the society are not equals.
Lack of evidences after suspected criminal.
Unable to generated automatic crimes report.
8. 1.4. OBJECTIVE OF PROJECT
8
1.4.1. GENERAL OBJECTIVE
The main objectives of this projects is to improve the crime reports and
managements system by using computer and android based system and making the
system more interactive and user-friendly.
1.4.2. SPECIFIC OBJECTIVE
To store, provide information of crime managements.
To reduce time consuming to complete crime investigation
To make detector auto gain information
9. Cont…
9
To minimize delays of information and evidence gathering
To make more peoples fight crimes easily and readily
To make crime awareness among the local community.
10. 1.5. SCOPE AND LIMITATION OF THE PROJECT10
1.5.1. SCOPE
As a general the scope of our system is as follows:
Ensure data’s accuracy.
Anyone can report crime to the crime authority.
Minimize manual data entry.
Greater efficiency and better services.
Generates crime reports.
The camera and video capturing are online.
Include GPS (geographical positioning system).
Assigning the police officer to the concerned Zones.
11. Cont…
11
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements
systems it doesn’t include the following because of time to do all this
Not help to find perpetrators who abscond from the investigators
It doesn’t bring the crime person to the court
It doesn’t work without connection except reading article book
It doesn’t upload videos or image but capture and send online
12. 1.6 FEASIBILITY STUDY
12
1.6.1 Operational /Organizational Feasibility
It might not be possible to see fully operational system within the given limit of
time for software development. However with great cooperation of the project
team the system can address over all problems of the current system.
1.6.2. Technical Feasibility
Usually new systems established in order to overcome the technical illness of the
previous system. In the same way, this system is technically big enough to be
applied easily to the problem identified in the existing system. In addition, the
both hardware’s and software’s for this system are highly available and can be
owned with small cost. Therefore, it can be concluded that the system is
technically feasible.
13. Cont…
13
1.6.3. Economic Feasibility
Fastest getting information.
Small response time and many services.
Easy and fast file management.
Reduce cost for manual data management (Reduced expenses).
Easy update & retrieval on stored records.
Better decision making.
Better service for crime handling.
Little job burden for detectors and other police offices.
14. 1.7. SIGNIFICANCE OF PROJECT
14
Police office can access their daily working zones easily using their mobiles.
The placement of police officer will be effective.
Minimize wastage of resources including energy.
It speeds up communication and cooperation between peoples and police
Automatically send message to the suspected person.
Automatically send message for calling witness “Ragaa ማስረጃ”.
Helps the investigating police officer to get fresh information.
The system is portable.
Helps to initiate investigation on priority basis.
Enhances accuracy of information to be collected for effective use.
Helps to perform the speedy trials.
15. 1.8. BENEFICIARIES OF THE PROJECT
15
In the future our system will be used by home and Law authority of Ethiopia.
Then when our project is successful we will have demonstration in front of set
authority and if our project is success then it will be used in overall Ethiopia.
Generally, When this project successfully implemented it is usable for the
community and Law authority.
16. 1.9.Methodology of the project
16
1.9.1. Data collection
Data collection is the most important part of the project to find the main
requirement of the system and to understand how the system works. We are
going to use different methods to collect data. Among the methods, we use the
following:
Observations:- to analyze the organization the previous crime management
system
Document analysis: - to get information about ways of crime managements
from 2nd district (ወረዳ) police office at Nekemte town.
Interview:- for gathering direct information from the Commanders and other
polices
17. Cont…
17
1.9.2. Data Analysis
We are going to use object oriented approach and UML for the purpose of
analyzing the data. The main reason behind using OOA and UML is:
In order to check reusability of the current crime management system in
Ethiopia
In order to define new or modify objects that can be combine with the current
system
18. Cont…
18
1.9.3. Tools to use
The tools we are going to use for documents analysis in our
projects are:
Microsoft office 2007, 2013 for the purpose of writing the
documentations
Microsoft office VISIO professional 2007 for the purpose of
drawing the use-case, class, activity and other drawing.
During implementations we are going to use:
19. Cont…
19
1.9.3.1. For front end:
Android Studio version 2.2
JDK & Android SDK PHP
JavaScript WAMP
1.9.3.2 For back end
MYSQL
20. 1.10. RISK AND CONSTRAINT
20
1.10.1. Risk
While we are developing our projects we may encounter different problems
among:
The computer virus and failures are some of them.
Power fluctuations and loss in the laboratories if computer is desktop
1.10.2. Action Taken
As a problems exist the solution as well be exists. Some solutions for
problems are:
Scanning the computer with antivirus and recovering the files
Using additional laptop and working with them
21. CHAPTER TWO
DESCRIPTIONS OF THE EXISTING SYSTEM
21
2.1. Description of Existing System
The Current System of the Crime Management system is file based which is time
and labor consumer. The detector collect the data from peoples, blood strain, and
hair on that place. Based on thus data the detector and other police start the
working to gain information corning the criminals. Then they will continue till to
get the exact information then present in front of the court. Others are when
compliant is want to complain someone he has to come the police officer biro and
start to fill the compliant forms manually. To call the suspected person they will
print out the form then manually fill that form after that send the form with the
help of other person.
22. 2.1.1. The player of the existing system
22
2.1.1.1. Primary Actor
These actors are actors who directly initiate the system to run. We can classify this actor as
the main actor who plays the main role in the system. In the existing system these actors
interact with each other to fulfill the required tasks. Those actors are listed below:
Commander (District Administrator)
Criminal Detection Room
2.1.1.2. Secondary Actors
Those actors are who works under Primary actors. They do only what main actor order
them to do. Those actors are:
Crime detector
Comminuting police
23. 2.2. Major function of existing system with clear input, process and
output
23
The major functions of the existing system are namely:
Assigning community police.
Filling new police and complaint Information.
Filling the new data of Community police
Enter Zone information.
Enter suspected information.
View community police at different zones
How the police officer get information
Input:-
Crime happen at some place
Process:-
After crime happen police will reach that place and start to investigate about the crimes by using
different methods
Output:-
After some times the detector get the information’s
24. 2.3. Business Rules
24
A business rule describes how people think and talk about things.
Thus, defining a term is establishing a category of business rule.
Business Rule regarding the detectors
The detector must be not talkative.
The detector always try to investigate the truth about incidence
(crimes).
25. 2.4. Report Generation In Existing System
25
The report generated in the existing Criminal Management system is
somewhat in different manner. Those concerning number of
Comminuting police and society are always generated annually once.
Those corning criminal are generated weekly. That means the report in
the existing system are not computer based but they are written by using
paper, pen, as well pencil and other material used for drawing and
writing.
26. 2.5. Forms and Documents used in existing system
26
Totally the existing system is a paper based, that is time and labor
consuming works. Many forms used in this existing system are drawn by
pen and ruler. After drawing they start to fill the data’s concerning that
forms what they needs.
Forms are like:
•Adding new community police
•Adding annual renter and renting society
•Add suspected person form
•Register new police officer
•And others
27. Cont…
27
Documents are like:
All day to day crime record of crimes
Specific police investigation files
Medical/traffic evidence and other written evidence
Forgery-forged document
Forensic/medical evidence certificate
And others
28. 2.6. Problem of the Existing System using Pieces Fame Work
28
Difficulty in report
The officer dealing with a particular case cannot take decision by himself
even when he is having the firsthand knowledge/information about the case
and he can expect obstructions from higher authorities/officials.
Even an efficient officer cannot/may not be able to handle more than one
case at a time.
As we all know, a covered truth, Bribery plays an important role in the
existing system.
Many cases are piled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
And for more detail read documentation.
29. 2.7. Practice to be preserved from Existing System
29
This project will come up with a solution that can minimize the above
listed problems of the system in the country and enable the police officer
to be effective and efficient by considering the limited resources they
have. By considering those strengths of the existing system. We conserved
all the strength of the existing system already mentioned in the
documentation parties of our projects.
30. 2.8. Alternative options to address problem of the existing system
30
Developing system that assign police officer to different zone.
Storing updated information on the system.
Better communication, better leadership, better training, and more
defined roles in terms of contribution to the society.
Working with partners.
Develop system that send message to suspected and witness.
Develop system that store data of complaint.
Develop system that register new Police.
Reducing crime and disorder.
Confidently and anonymity issues.
31. 2.9. System Requirements of the new System
31
2.9.1 Functional Requirements
The system will allow insert police officer information.
The system should provide password changing facility.
The system should provide user authentication mechanism.
The system should be able to generate report.
Storing, updating and deleting records.
Validate data and store it without error.
Assign police officers for each zones.
Allow anyone to send crime report
Allow police officer to call witness and suspected through message
32. Cont…
32
2.9.2. Non-functional Requirements
User interface and human requirements
Hardware requirement
Software requirement
Security issue
Performance characteristics
Error handling
Quality issue
System modification
33. CHAPTER THREE
MODELING
33
3.1. Use case Diagram
Our system have 4 actors having
different responsibility.
Those actors are namely:
1. Police officer
2. Administrator
3. Member
4. Visitor/View/User
38. 3.2. Use case documentation
38
3.2.1. Description of Actor
In this system we have four main actors. Those are
1. Name: Administrator
Description: An Administrator is a person who
Manage account,
Manage own account
View station,
View feedback
Give feedback,
View crime detail,
View article book,
Give report
39. Cont…
39
2. Name: Member
Description: A members those who are voluntary engaged to protect
the crimes and send different information concerning the crimes to the
police officer. They have right to:
Manage their own account,
View crime detail,
Give report,
View station,
Give feedback,
View article book
other responsibility in the system.
40. Cont…
40
3. Name: Police officer
Description: A police officer is a police who administrators other police
and who:
manages members,
manage article book,
manage report,
manage complaint
manage feedback,
manage crime detail,
manage suspected,
manage police,
manage station,
manage witness account
view station,
give feedback,
view feedback
view crime detail,
View article book.
41. Cont…
41
4. Name: Visitor
Description: A visitor is a people who is guest for the system but he/she
want to view the system.
1. View article
2. Report crime
42. 3.2.2. Description of use case
42
Use case lists:
1. Manage member
2. Manage account
3. Manage article book
4. Mange feedback
5. Manage report
6. Manage police
7. Manage suspected
8. Manage crime detail
9. Manage witness
10. Manage station
11. Manage own account
12. Manage complaint
13. View station
14. Give feedback
15. View article
16. Send criminal report
17. View crime detail
18. View feedback
19. Login
20. Validate user
43. 3.2.2.1. Use case Name: Manage Member
43
Actor: Police officer
Description: Add, delete and modify member’s activity.
Pre condition: Member is identified and then authenticated.
Include: Login
Extends: validate user
Flow of events
For Add member
1. The authenticated actor wants to add member.
2. The actor wants to register a member.
3. The actor goes to member page.
4. The actor click on join member button.
44. Cont…
44
5. The actor fill all information need to be a member.
6. The actor click on Join Now button.
7. The system send verification message to phone or email.
8. The actor insert verification to space provided.
9. After verification the user is registered.
10. The use case end
Post Condition: New member added to database
45. Cont…
45
For deleting Member
1. The authenticated actor wants to remove member.
2. The authenticated actor login to the system.
3. The actor goes to Member pages.
4. The actor click on Delete member.
5. The system display searching area.
6. The actor search member he/she wants to delete. [Alternative]
7. The system display that member.
8. The authenticated actor click remove button.
9. The system removes the member from the database.
10. Use case ends
Post Condition: Member is deleted from database
46. Cont…
46
[Alternative]
1. If the member not found
2. The system display message “The member you searched is not
found. Try again!”
3. The use case end.
For Modify member
1. The actor wants to modify an existing member.
2. Authenticated actor logs in.
3. The actor goes to Member page.
47. Cont…
47
4. The actor click on Update Member button.
5. The system display search area.
6. The actor insert member he/she wants to update[Alternative]
7. The system display member.
8. The actor click edit button.
9. The system save button.
10.Use case ends.
Post Condition: Member in database modified
48. Cont…
48
Alternative flow:- [if not found]
The system displays ‘information Member not found ‘message
Exit
3.2.2.2. Use case Name: Manage Suspected
Actor: Police officer
Description: Add, Delete and modify suspected files
Precondition: The actor should know the phone number of suspected
Include: login
Extends: validate user
Flow of Events
49. Cont…
49
For adding suspected
1. The authenticated actor wants to add new suspected
2. The actor login to the system
3. The actor goes to suspected page
4. The actor fill all the information needed to call suspected
5. The actor send message to the suspected
6. The suspected receive message
7. The use case end
Post condition: The new suspected record is added and message sent.
50. 3.2.2.3. Use case Name: Give Feedback
50
Actor: Administrator, Police officer, Member
Description: Add the feedback
Precondition: user should be identified and authenticated
Include: login
Extends: validate users
Flow of events
1. The authenticated actor wants to add feedback
2. The user wants to add new feedback
3. The user wants to fill all information need to add feedback
4. The user click send feedback
5. The feedback added
6. The use case end
Post condition: New feedback added to database
51. 3.2.2.4. Use case Name: View Article
51
Actor: Administrator, Police officer, Member, Visitor
Description: Allow the user to view the book of article
Per-condition: The information should exist in the database
Flow of Event
1. The user want to view articles
2. The user click on the button view article
3. The system display article book
4. The user select article to view
5. The use case end
Post-Condition: The crime article book will be displayed
52. 3.2.2.5. Use case Name: Report Crime
52
Actor: Administrators, Police officer, Member, visitor
Description: Allow the user to send crime happening at that moment
Pre-condition: The system should be running at server side
Flow of Event:
1. The user want to report crime happening
2. The user may or may not fill all information
3. The user must use of camera or videos including other information
4. The user report crime and send data to server if sever is running
5. The use case end
Post Condition: The report sent successfully.
55. 3.4. Analysis level class
Diagram
55
Conceptual modeling
show the model
dependency and
connection between
user interface classes.
The following figure
shows class diagram of
Crime Management
system.
56. 3.5. Business rule of the new system
56
The system works if and only if the required data are inserted.
The member can’t create the double account using the same username
and phone number
The system work connection based.
It may increase false accusation unless the awareness creation is made.
Physical presence of the person reporting a crime or the victim is
required to complete the investigation and frame a charge against the
suspect. This is because the Ethiopian Criminal Procedure Code
requires a witness to give his/her testimony in person; the testimony
should be read to the witness and finally signed by the witness.
57. CHAPTER FOUR
4. SYSTEM DESIGN
57
4.1 Introduction
Project design is the general approach given to develop the software to
solve the problem of a particular organization. Project design is the stage
at which description of project development is given and how the project
is designed. The purpose of design is to determine how to build the
system and to obtain information needed to drive the actual
implementation of the system. The focus is particularly on the solution
domain rather than on the problem domain. Object oriented design
consists of transforming the analysis model into the design model. It
describes the system in terms of its architecture.
58. 4.2. Class Type Architecture
58
Since our system modeling approach is object oriented, we have to
describe the system in terms of its architecture, such as its hardware
/software mapping, global control flow and persistency management.
Therefore, this session mainly concerned with the design part of Crime
management system.
59. Cont…
59
This figure presents a high level
layering strategy for software
application. The various layers
are represented by the rectangles
and collaboration between layers
indicated by the arrows. The
primary name of the layer is
indicated first, and other common
names indicated in parenthesis.
60. 4.3. Class Modeling
60
Class Diagram:-
shows the things such
as classes and types,
their internal structure
and relationships, to
other things.
61. 4.4. Component
Modeling
61
A component diagram
shows dependencies
among components. In
our projects we do
have to component
modeling. Those are:
Administrator and the
Police officers
62. 4.5. Deployment Modeling
62
Client: Browser
Webserver (Apache)
Mobile
<<App>>
Manage Member
Manage Report
Manage Police
Manage Feedback
Manage Complaint
View Article Book
Manage Station
User Account
DB Server MYSQL
Persistence
CrimeManSys<<AppLication>>
Database
Deployment Modeling of Crime Management System Project
Deployment diagrams
show the hardware for
the system, the software
that is installed on that
hardware, and the
middleware used to
connect separate
machines on one another.
63. 4.6. Data Persistence Management
63
Persistence data model or Entity relationship (ER) models are used to
communicate the design of a database, usually a relational database, to
both users and other developers.
Persistence are use the schema of database. The strength of persistence
data models is that data entities are conceptually the same as the table of
relation data base and that attributes are the same as table columns.
In the current database system we have used different tables as object
and each object is related to each other and enforced by referential
integrity by the use of foreign key and primary key.
65. 4.7 Mapping
65
4.7.1 Hardware Mapping
The hardware used for
registration system and
other service of the crime
management system is an
android based mobile or
personal computer.
66. Cont…
66
4.7.2. Software Mapping
The system uses Microsoft Windows 8.1
Operating System. That we are working
with. The proposed system uses sublime
or android studio as a text editor, PHP,
JavaScript, android parts as well we use
android studio rather than using
another IDE to develop the system. The
system uses MySQL server to store data.
67. 2.8. Object Model
67
2.8.1. Revised class
Diagram
Through revision of class
diagram we prepared
another class diagram
including complaint
registration class that we
omit in case of class
modeling and conceptual
modeling
68. Cont…
68
4.8.2. Service Specification
1. Member:- Attribute and Method description
Username:- This attribute is a unique identifier
for the member
Full name:-This attribute is the first and last
name of member
Phone: - an attribute the member receive
verification codes. It is unique for all member.
Nationality:- This attribute is used to identify the
country of member or its nation
State:- used to input the region of member
Zone:- for zone member is involved
Kebele:- this attribute is for Kebele member is
living in
Register():- This
method is used to
register unregistered
member
69. Cont…
69
2. Witness:- Attribute description
Number:-This attribute is a unique
identifier of suspected from one to an other
Date:- This is the date on which message is
going to send
Mr./Mrs.:- This attribute is the name of
suspected person
About:- The reason the suspected is called
DateofCalled:- The date on which
suspected called
TimeofCalled:- The time on which
suspected called
70. Conclusion
70
The manual system is adaptable and useful in the handling of crimes.
However, the automated CrimeManSys system is more functional because of
people automatically can report crimes around them in picture or video
format to the crime authority. In the aspect of speed, project design, accuracy
and stability with these features, an android based system crime management
can solve the primary problems being encountered during the Crime
reporting and managements.
Our project is only a humble venture to satisfy the needs in our country.
Several user friendly coding have also adopted. This package shall prove to be
a powerful package in satisfying the requirements of the Crime Managements
in our country. On the last our project is still on going actually it is not
completely completed.