SlideShare a Scribd company logo

Secure crime identification system

Sameer Telikicherla
Sameer Telikicherla
Sameer TelikicherlaSr. Team Lead at Microsoft

Secure Crime Identification System is a resourceful project which has the key elements of investigating the crime scene online and updating,tracking the details of the victims through system generated charge sheets, FIR and all. The flexibility the application provides is the modules for separate users. This intuitive project is being developed in such a way that it will be projected before the CBI and APP Committees and gain acknowledgement to completely work on the integration of this project.

Secure crime identification system

1 of 22
Download to read offline
Secure Crime IdentificationSecure Crime Identification
SystemSystemMini Project PresentationMini Project Presentation
Prepared by :
T.SAMEER
H.T.No:10BE1A05A3
Dept Of Computer Science & Engg
2012-2013
Under the guidance of
Mr.N.Ashok
Asst.Prof ,CSE Dept.
Vision & MottoVision & Motto
 To provide high quality and transparentTo provide high quality and transparent
policing in the state.policing in the state.
 To build a deep sense of trust in the policeTo build a deep sense of trust in the police
force and the citizens.force and the citizens.
 To instill security in the public, especiallyTo instill security in the public, especially
to the victims.to the victims.
 To build a podium where the police andTo build a podium where the police and
public can have a mutual interaction.public can have a mutual interaction.
 To integrate this application throughoutTo integrate this application throughout
the country for establishing a gateway.the country for establishing a gateway.
ObjectivesObjectives
 Detection & Conviction of criminals by InformationDetection & Conviction of criminals by Information
Management Systems.Management Systems.
 Computerize the attempt of taking complaints andComputerize the attempt of taking complaints and
records and establishing a communication gatewayrecords and establishing a communication gateway
among other police stations.among other police stations.
 Transferring the cases or complaints to appropriateTransferring the cases or complaints to appropriate
police station by its ID & Locality.police station by its ID & Locality.
 Assign police officials for cases and enlosing all theAssign police officials for cases and enlosing all the
details of the victims to them.details of the victims to them.
 Update the case details timely to ensure that fast actionUpdate the case details timely to ensure that fast action
strategy is applied.strategy is applied.
 Provide the flexibility to victims to register a complaint atProvide the flexibility to victims to register a complaint at
any police station nearest, neverthless the locality ofany police station nearest, neverthless the locality of
crime.crime.
 Provide a complaint ID to vicitms to track their complaintProvide a complaint ID to vicitms to track their complaint
details timely.details timely.
Need for Secure Crime Identification?Need for Secure Crime Identification?
 To have a mechanism of computerized
charge sheets and complaints which cannot
be tampered or missed.
 To provide security to the case details and
victim details.
 To ensure that speedy action is being taken
by updating the case.
 To have a secure communication between
police officials through all the police
stations.
Future ImprovementsFuture Improvements
 Integrated Crime Management SystemIntegrated Crime Management System
 Image Pattern Recognition SystemImage Pattern Recognition System
 Bio Metric Recognition SystemBio Metric Recognition System
RequirementsRequirements
Functional Requirements
 Administrator Module
 Content Management & Organization
 Report Generation
a) List Of Cases
b) Result Of Cases
c) FIR & Chargesheets
d) Police Station Details

Recommended

Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Applicationsatvirsandhu9
 
Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project Janella
 
Crime investigation system
Crime investigation systemCrime investigation system
Crime investigation systemDeepa Rani
 

More Related Content

What's hot

Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)Nidhi Singh
 
Police Management System
Police Management SystemPolice Management System
Police Management SystemShane Williams
 
Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year projectBeresa Abebe
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposalBeresa Abebe
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting SystemKusum Sankhala
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET Journal
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system pptYOGESH SHARMA
 
Crime file system
Crime file system Crime file system
Crime file system deva491
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record ManagementKhokan Sardar
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPTuhin Ray
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting pptShirinAkhtar5
 
Automated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAutomated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAditya Chauhan
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification systemAkash Kumar Singh
 

What's hot (20)

E-Police Android APP
E-Police  Android APPE-Police  Android APP
E-Police Android APP
 
Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)
 
Police Management System
Police Management SystemPolice Management System
Police Management System
 
Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year project
 
Crime report
Crime reportCrime report
Crime report
 
CRMS
CRMSCRMS
CRMS
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposal
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system ppt
 
Crime file system
Crime file system Crime file system
Crime file system
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Project
ProjectProject
Project
 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting ppt
 
Automated crime m_anagement-synopsis
Automated crime m_anagement-synopsisAutomated crime m_anagement-synopsis
Automated crime m_anagement-synopsis
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification system
 

Viewers also liked

Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Online Crime Management system
Online Crime Management system Online Crime Management system
Online Crime Management system shinyvaibhav
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Crime Reporting System
Crime Reporting SystemCrime Reporting System
Crime Reporting SystemHaroon Alam
 
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2Vượng Vũ
 
Integrating ict in traffic police department in uganda design and development...
Integrating ict in traffic police department in uganda design and development...Integrating ict in traffic police department in uganda design and development...
Integrating ict in traffic police department in uganda design and development...Alexander Decker
 
STN Project documentation
STN Project documentationSTN Project documentation
STN Project documentationSaw Naing
 
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMHimanshu Chaurishiya
 
Sequence diagram- UML diagram
Sequence diagram- UML diagramSequence diagram- UML diagram
Sequence diagram- UML diagramRamakant Soni
 
Jini network technology
Jini network technologyJini network technology
Jini network technologyKeerthi Thomas
 
Complaint management system
Complaint management systemComplaint management system
Complaint management systemMitesh Patel
 
Project report on ONLINE REAL ESTATE BUSINESS
Project report on ONLINE REAL ESTATE BUSINESSProject report on ONLINE REAL ESTATE BUSINESS
Project report on ONLINE REAL ESTATE BUSINESSDivyesh Shah
 
GPS based Bus management system
GPS based Bus management systemGPS based Bus management system
GPS based Bus management systemNeeraj Kansal
 
Brand As Verb: Principles of High Performing Experience Brands
Brand As Verb: Principles of High Performing Experience BrandsBrand As Verb: Principles of High Performing Experience Brands
Brand As Verb: Principles of High Performing Experience BrandsBen Grossman
 
Dfd examples
Dfd examplesDfd examples
Dfd examplesMohit
 
Prisoner Management System
Prisoner Management SystemPrisoner Management System
Prisoner Management SystemPrince Kumar
 
Online shopping presentation
Online shopping presentationOnline shopping presentation
Online shopping presentationpobr0702
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (20)

Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Online Crime Management system
Online Crime Management system Online Crime Management system
Online Crime Management system
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Crime Reporting System
Crime Reporting SystemCrime Reporting System
Crime Reporting System
 
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2
Project Semester II - FPT Greenwich (i10) - GC0602 - Group 2
 
Integrating ict in traffic police department in uganda design and development...
Integrating ict in traffic police department in uganda design and development...Integrating ict in traffic police department in uganda design and development...
Integrating ict in traffic police department in uganda design and development...
 
Presentation Slides
Presentation SlidesPresentation Slides
Presentation Slides
 
STN Project documentation
STN Project documentationSTN Project documentation
STN Project documentation
 
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEM
 
Sequence diagram- UML diagram
Sequence diagram- UML diagramSequence diagram- UML diagram
Sequence diagram- UML diagram
 
Jini network technology
Jini network technologyJini network technology
Jini network technology
 
Complaint management system
Complaint management systemComplaint management system
Complaint management system
 
Project report on ONLINE REAL ESTATE BUSINESS
Project report on ONLINE REAL ESTATE BUSINESSProject report on ONLINE REAL ESTATE BUSINESS
Project report on ONLINE REAL ESTATE BUSINESS
 
GPS based Bus management system
GPS based Bus management systemGPS based Bus management system
GPS based Bus management system
 
Brand As Verb: Principles of High Performing Experience Brands
Brand As Verb: Principles of High Performing Experience BrandsBrand As Verb: Principles of High Performing Experience Brands
Brand As Verb: Principles of High Performing Experience Brands
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
 
Future of Retail #FutureOf
Future of Retail #FutureOfFuture of Retail #FutureOf
Future of Retail #FutureOf
 
Prisoner Management System
Prisoner Management SystemPrisoner Management System
Prisoner Management System
 
Online shopping presentation
Online shopping presentationOnline shopping presentation
Online shopping presentation
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Secure crime identification system

Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...IRJET Journal
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019Grid Dynamics
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksIRJET Journal
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert serviceMinh Le
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONijcsit
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
 
A New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayA New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayAlicia Brooks
 

Similar to Secure crime identification system (20)

Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
E010213039
E010213039E010213039
E010213039
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
sdReport
sdReportsdReport
sdReport
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayA New Security System On Captcha Technology Essay
A New Security System On Captcha Technology Essay
 

Recently uploaded

CIRCLE geometry lesson 2nd quarter grade 10
CIRCLE geometry lesson 2nd quarter  grade 10CIRCLE geometry lesson 2nd quarter  grade 10
CIRCLE geometry lesson 2nd quarter grade 10RicFernandez4
 
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdf
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdfZ-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdf
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdfDomotica daVinci
 
OTel Orientation_ How to Train Teams (OTel in Practice).pdf
OTel Orientation_ How to Train Teams (OTel in Practice).pdfOTel Orientation_ How to Train Teams (OTel in Practice).pdf
OTel Orientation_ How to Train Teams (OTel in Practice).pdfPaige Cruz
 
Dissecting Real-World Database Performance Dilemmas
Dissecting Real-World Database Performance DilemmasDissecting Real-World Database Performance Dilemmas
Dissecting Real-World Database Performance DilemmasScyllaDB
 
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxEvolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxKyle Willson
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfLLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfThomas Poetter
 
Artificial-Intelligence-in-Marketing-Data.pdf
Artificial-Intelligence-in-Marketing-Data.pdfArtificial-Intelligence-in-Marketing-Data.pdf
Artificial-Intelligence-in-Marketing-Data.pdfIsidro Navarro
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersThousandEyes
 
Microsoft Azure - GAA and Irish Tech Society Hackathon
Microsoft Azure - GAA and Irish Tech Society HackathonMicrosoft Azure - GAA and Irish Tech Society Hackathon
Microsoft Azure - GAA and Irish Tech Society HackathonJuarez Junior
 
Introduction to Serverless with AWS Lambda in C#.pptx
Introduction to Serverless with AWS Lambda in C#.pptxIntroduction to Serverless with AWS Lambda in C#.pptx
Introduction to Serverless with AWS Lambda in C#.pptxBrandon Minnick, MBA
 
Tete thermostatique Zigbee MOES BRT-100 V2.pdf
Tete thermostatique Zigbee MOES BRT-100 V2.pdfTete thermostatique Zigbee MOES BRT-100 V2.pdf
Tete thermostatique Zigbee MOES BRT-100 V2.pdfDomotica daVinci
 
Heltun_HE-RS01_User_Manual_B9AH.pdf
Heltun_HE-RS01_User_Manual_B9AH.pdfHeltun_HE-RS01_User_Manual_B9AH.pdf
Heltun_HE-RS01_User_Manual_B9AH.pdfMarielaL5
 
M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____Aathiraju
 
A Comprehensive Theoretical Overview of Self-Driving Car Technology
A Comprehensive Theoretical Overview of Self-Driving Car TechnologyA Comprehensive Theoretical Overview of Self-Driving Car Technology
A Comprehensive Theoretical Overview of Self-Driving Car TechnologyKumar Bipin
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?GleecusTechlabs1
 
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-CManual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-CDomotica daVinci
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingSoracom Global, Inc.
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education pptsafnarafeek2002
 
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb
 
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!XfilesPro
 

Recently uploaded (20)

CIRCLE geometry lesson 2nd quarter grade 10
CIRCLE geometry lesson 2nd quarter  grade 10CIRCLE geometry lesson 2nd quarter  grade 10
CIRCLE geometry lesson 2nd quarter grade 10
 
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdf
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdfZ-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdf
Z-Wave Fan coil Thermostat Heltun_HE-HT01_User_Manual.pdf
 
OTel Orientation_ How to Train Teams (OTel in Practice).pdf
OTel Orientation_ How to Train Teams (OTel in Practice).pdfOTel Orientation_ How to Train Teams (OTel in Practice).pdf
OTel Orientation_ How to Train Teams (OTel in Practice).pdf
 
Dissecting Real-World Database Performance Dilemmas
Dissecting Real-World Database Performance DilemmasDissecting Real-World Database Performance Dilemmas
Dissecting Real-World Database Performance Dilemmas
 
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxEvolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfLLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
 
Artificial-Intelligence-in-Marketing-Data.pdf
Artificial-Intelligence-in-Marketing-Data.pdfArtificial-Intelligence-in-Marketing-Data.pdf
Artificial-Intelligence-in-Marketing-Data.pdf
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
Microsoft Azure - GAA and Irish Tech Society Hackathon
Microsoft Azure - GAA and Irish Tech Society HackathonMicrosoft Azure - GAA and Irish Tech Society Hackathon
Microsoft Azure - GAA and Irish Tech Society Hackathon
 
Introduction to Serverless with AWS Lambda in C#.pptx
Introduction to Serverless with AWS Lambda in C#.pptxIntroduction to Serverless with AWS Lambda in C#.pptx
Introduction to Serverless with AWS Lambda in C#.pptx
 
Tete thermostatique Zigbee MOES BRT-100 V2.pdf
Tete thermostatique Zigbee MOES BRT-100 V2.pdfTete thermostatique Zigbee MOES BRT-100 V2.pdf
Tete thermostatique Zigbee MOES BRT-100 V2.pdf
 
Heltun_HE-RS01_User_Manual_B9AH.pdf
Heltun_HE-RS01_User_Manual_B9AH.pdfHeltun_HE-RS01_User_Manual_B9AH.pdf
Heltun_HE-RS01_User_Manual_B9AH.pdf
 
M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____
 
A Comprehensive Theoretical Overview of Self-Driving Car Technology
A Comprehensive Theoretical Overview of Self-Driving Car TechnologyA Comprehensive Theoretical Overview of Self-Driving Car Technology
A Comprehensive Theoretical Overview of Self-Driving Car Technology
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
 
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-CManual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education ppt
 
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx
2) Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptx
 
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
 

Secure crime identification system

  • 1. Secure Crime IdentificationSecure Crime Identification SystemSystemMini Project PresentationMini Project Presentation Prepared by : T.SAMEER H.T.No:10BE1A05A3 Dept Of Computer Science & Engg 2012-2013 Under the guidance of Mr.N.Ashok Asst.Prof ,CSE Dept.
  • 2. Vision & MottoVision & Motto  To provide high quality and transparentTo provide high quality and transparent policing in the state.policing in the state.  To build a deep sense of trust in the policeTo build a deep sense of trust in the police force and the citizens.force and the citizens.  To instill security in the public, especiallyTo instill security in the public, especially to the victims.to the victims.  To build a podium where the police andTo build a podium where the police and public can have a mutual interaction.public can have a mutual interaction.  To integrate this application throughoutTo integrate this application throughout the country for establishing a gateway.the country for establishing a gateway.
  • 3. ObjectivesObjectives  Detection & Conviction of criminals by InformationDetection & Conviction of criminals by Information Management Systems.Management Systems.  Computerize the attempt of taking complaints andComputerize the attempt of taking complaints and records and establishing a communication gatewayrecords and establishing a communication gateway among other police stations.among other police stations.  Transferring the cases or complaints to appropriateTransferring the cases or complaints to appropriate police station by its ID & Locality.police station by its ID & Locality.  Assign police officials for cases and enlosing all theAssign police officials for cases and enlosing all the details of the victims to them.details of the victims to them.  Update the case details timely to ensure that fast actionUpdate the case details timely to ensure that fast action strategy is applied.strategy is applied.  Provide the flexibility to victims to register a complaint atProvide the flexibility to victims to register a complaint at any police station nearest, neverthless the locality ofany police station nearest, neverthless the locality of crime.crime.  Provide a complaint ID to vicitms to track their complaintProvide a complaint ID to vicitms to track their complaint details timely.details timely.
  • 4. Need for Secure Crime Identification?Need for Secure Crime Identification?  To have a mechanism of computerized charge sheets and complaints which cannot be tampered or missed.  To provide security to the case details and victim details.  To ensure that speedy action is being taken by updating the case.  To have a secure communication between police officials through all the police stations.
  • 5. Future ImprovementsFuture Improvements  Integrated Crime Management SystemIntegrated Crime Management System  Image Pattern Recognition SystemImage Pattern Recognition System  Bio Metric Recognition SystemBio Metric Recognition System
  • 6. RequirementsRequirements Functional Requirements  Administrator Module  Content Management & Organization  Report Generation a) List Of Cases b) Result Of Cases c) FIR & Chargesheets d) Police Station Details
  • 7. Requirements contd...Requirements contd... Non-Functional Requirements  Performance Requirements  Safety Requirements  Security Requirements  Maintenance Requirements  Software Quality Attributes
  • 8. Technical RequirementsTechnical Requirements Hardware Requirements  P IV Processor & Above, Min 512 MB Memory, 80 GB Hard disk or above, LAN Software Requirements  JDK 1.5, Oracle 10g Database, SQL Server, Apache Tomcat 7.0, Windows XP SP 3 / 7 or higher
  • 9. Development & DeploymentDevelopment & Deployment  Easy to use, user-friendly GUI Interface.  Flexible and simple navigation options.  Java as Front End & Oracle as Back End  Contains three major modules:- a) Police Station Registration Module b) Victims FIR Registration Module c) Investigation Evidence Registration Module
  • 11. UML Diagrams USE CASE DIAGRAM FOR INVESTIGATING OFFICER
  • 12. USE CASE DIAGRAM FOR ADMINISTRATOR MODULE
  • 13. USE CASE DIAGRAM FOR WRITER MODULE
  • 14. SEQUENCE DIAGRAM FOR ADMINISTRATOR MODULE
  • 15. SEQUENCE DIAGRAM FOR INVESTIGATOR MODULE
  • 16. SEQUENCE DIAGRAM FOR WRITER MODULE
  • 21. Bibilography & References Charles Petzold,2002 Addison-Wesley Publishing Company Roger S.Pressman Programming Windows Java Server Pages by Nick Todd JDBC by Patel Moss www.w3schools.com www.defensewiki.ibj.org www.coj.net
  • 22. Thanks I extend my sincere vote of thanks to all my professors and faculty, friends for their encouragement and constant assistance. I would like to thank our Head of the Department (CSE), Associate Professor - Mr.N.M.S Desai, and my Internal Guide Mr.N.Ashok ,Krishna Murthy Institute Of Technology & Engineering, for their indefatigable inspiration, guidance, cogent discussion, encouragement, constructive criticisms, and co-operation for the successful completion of my project work. T. SAMEER (10BE1A05A3)