SlideShare a Scribd company logo
1 of 21
Presentation By
Donkala Sritha [197Y1A1252]
N.Avinash [197Y1A1204]
Under the Guidance of
MS.K.JAYASRI
Assistant Professor
Department of IT
ONLINE CRIME MANAGEMENT SYSTEM
2
Department of IT
 Abstract
 Introduction
 Objective
 Existing Systems
 Proposed Systems
 Proposed System Architecture
 Advantages
 Modules of proposed Systems
 System Requirements
 Conclusion
 References
CONTENTS
3
Department of IT
ABSTRACT
The proposed system applies to all Police stations across the country
and specifically looks into the subject of Crime Records Management. It
is well understood that Crime Prevention Detection and Conviction of
criminals depend on a highly responsive backbone of information
Management. The efficiency of the police function and the
effectiveness with which it tackles crime depend on what quality of
information it can derive from its existing records and how fast it can
have access to it The project has been planned to be having the view of
distributed architecture, with centralized storage of the database The
application for the storage of the data has been planned Using the
constructs of SQL server and all the user interfaces have been designed
using the JAVA technologies
Department of IT
INTRODUCTION
4
• The project titled as “Online Crime Management System “is a web-
based application.
• The purpose of Crime Management System is to automate the existing
manual system by the help of computerized equipment’s and full-
fledged computer software, fulfilling the requirements of all policemen.
• So that their valuable data/information can be stored for a longer
period with easy accessing of the same.
OBJECTIVE
Department of IT 5
 This software provides facility for criminal records, FIR,
requesting a letter, transferring officers, case approval. It
provides better prospective for the enhancement of
organization regarding quality and transparency.
In the existing crime management system, most of the
operations are done manually like send complaints, taking
actions against crimes, view status etc.
DISADVANTAGES:
Lack of security and data
More man power
Time consuming
Consumes large volume of pare work
EXISTING SYSTEMS
Department of IT 6
• The proposed crime records management system
can overcome all the limitations of the existing
system. The system provides proper security and
reduces the manual work. The efficiency of the
police function and the effectiveness with which it
tackles crime depend on what quality of information
it can derive from its existing records and how fast it
can have access to it. The existing system has several
disadvantages and many more difficulties to work
well.
PROPOSED SYSTEMS
Department of IT 7
PROPOSED SYSTEM ARCHITECTURE
Architecture of proposed system
Department of IT 8
ADVANTAGES:
❖ Ensure data accuracy
❖ Minimize manual data entry
❖Minimum time needed for the various processing
❖ Greater efficiency
ADVANTAGES
Department of IT 9
1) Inspector: Each of the inspector must login to the server.
2) Commissioner : This can have some extra privileges
compared to station/ sub inspector module like make an
entry for a new hired police officer.
3) Crime module: This module is used for entering all details
about the crime.
4) Case module: This module is used for entering all details
about the cases and registered.
MODULES OF PROPOSED SYSTEM
Department of IT 10
PROPOSED APPROACH
Deployment diagram of our proposed System
Department of IT 11
SYSTEM REQUIREMENTS
Department of IT 12
Software Requirements:
Operating System : Windows 2000/xp
Languages : java 2(EJB2.0, JDBC, JSP, Servlet )
Front End : HTML, JavaScript Platform : J2EE
Web Servers : Web Logic8.1/Tomcat 5.0
Backend : My SQL
Browser Program : Internet explorer/Mozilla Fireworks
Department of IT 13
SYSTEM REQUIREMENTS
Hardware Requirements:
Processor : Pentium III/AMD Athlone XP
RAM : 128 MB
Hard disk : 20 GB
FDD : 1.44MB
Monitor : 14 inches
Mouse : 3 Button scroll
CD Drive : 52 X
Keyboard : 108 keys
RESULTS/OUTPUTS
Department of IT 14
HOME PAGE
RESULTS/OUTPUTS
Department of IT 15
INSPECTOR LOGIN
RESULTS/OUTPUTS
Department of IT 16
ADD CRIMINAL:
FIR:
Department of IT 17
RESULTS/OUTPUTS
LOGIN AS COMMISSONER:
18
RESULTS/OUTPUTS
Department of IT
ACCESSING THE CRIMINAL RECORDS
• This software provides facility for reporting online crimes, complaints, FIR
registration, Transferring the officer, show criminal details mailing as well as
chatting.
• All modules in the system have been tested with valid data and invalid data and
everything work successfully.
• Hence the software has proved to work efficiently
CONCLUSION
Department of IT 19
• Elmasri Navathe ‘Fundamentals of database systems’
• John Bukowski (2000) ‘Mastering Java2’ BPB Publications
• Internet
• www.theserverside.com
• www.java.sun.com
REFERENCES
Department of IT 20
21
Department of IT

More Related Content

Similar to ppt mini.pptx

College management
College managementCollege management
College managementanandhan30
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netGeorgekutty Francis
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
departmental store
departmental storedepartmental store
departmental storeFreelancer
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management SystemIRJET Journal
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...IEEEFINALYEARSTUDENTPROJECT
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Abhay Ananda Shukla
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Disha Bedi
 

Similar to ppt mini.pptx (20)

College management
College managementCollege management
College management
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
departmental store
departmental storedepartmental store
departmental store
 
Wc4
Wc4Wc4
Wc4
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management System
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Public voice
Public voicePublic voice
Public voice
 
Lawyer’s diary
Lawyer’s diaryLawyer’s diary
Lawyer’s diary
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Documentation
DocumentationDocumentation
Documentation
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 

More from aashnareddy1

FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.pptaashnareddy1
 
sa-mincut-aditya.ppt
sa-mincut-aditya.pptsa-mincut-aditya.ppt
sa-mincut-aditya.pptaashnareddy1
 
Ai chatbot ppt.pptx
Ai chatbot ppt.pptxAi chatbot ppt.pptx
Ai chatbot ppt.pptxaashnareddy1
 
L2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptxL2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptxaashnareddy1
 

More from aashnareddy1 (6)

FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.ppt
 
NANOROBOTICS1.ppt
NANOROBOTICS1.pptNANOROBOTICS1.ppt
NANOROBOTICS1.ppt
 
sa-mincut-aditya.ppt
sa-mincut-aditya.pptsa-mincut-aditya.ppt
sa-mincut-aditya.ppt
 
Ai chatbot ppt.pptx
Ai chatbot ppt.pptxAi chatbot ppt.pptx
Ai chatbot ppt.pptx
 
L2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptxL2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptx
 
MFI.pptx
MFI.pptxMFI.pptx
MFI.pptx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

ppt mini.pptx

  • 1. Presentation By Donkala Sritha [197Y1A1252] N.Avinash [197Y1A1204] Under the Guidance of MS.K.JAYASRI Assistant Professor Department of IT ONLINE CRIME MANAGEMENT SYSTEM
  • 2. 2 Department of IT  Abstract  Introduction  Objective  Existing Systems  Proposed Systems  Proposed System Architecture  Advantages  Modules of proposed Systems  System Requirements  Conclusion  References CONTENTS
  • 3. 3 Department of IT ABSTRACT The proposed system applies to all Police stations across the country and specifically looks into the subject of Crime Records Management. It is well understood that Crime Prevention Detection and Conviction of criminals depend on a highly responsive backbone of information Management. The efficiency of the police function and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it The project has been planned to be having the view of distributed architecture, with centralized storage of the database The application for the storage of the data has been planned Using the constructs of SQL server and all the user interfaces have been designed using the JAVA technologies
  • 4. Department of IT INTRODUCTION 4 • The project titled as “Online Crime Management System “is a web- based application. • The purpose of Crime Management System is to automate the existing manual system by the help of computerized equipment’s and full- fledged computer software, fulfilling the requirements of all policemen. • So that their valuable data/information can be stored for a longer period with easy accessing of the same.
  • 5. OBJECTIVE Department of IT 5  This software provides facility for criminal records, FIR, requesting a letter, transferring officers, case approval. It provides better prospective for the enhancement of organization regarding quality and transparency.
  • 6. In the existing crime management system, most of the operations are done manually like send complaints, taking actions against crimes, view status etc. DISADVANTAGES: Lack of security and data More man power Time consuming Consumes large volume of pare work EXISTING SYSTEMS Department of IT 6
  • 7. • The proposed crime records management system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work. The efficiency of the police function and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it. The existing system has several disadvantages and many more difficulties to work well. PROPOSED SYSTEMS Department of IT 7
  • 8. PROPOSED SYSTEM ARCHITECTURE Architecture of proposed system Department of IT 8
  • 9. ADVANTAGES: ❖ Ensure data accuracy ❖ Minimize manual data entry ❖Minimum time needed for the various processing ❖ Greater efficiency ADVANTAGES Department of IT 9
  • 10. 1) Inspector: Each of the inspector must login to the server. 2) Commissioner : This can have some extra privileges compared to station/ sub inspector module like make an entry for a new hired police officer. 3) Crime module: This module is used for entering all details about the crime. 4) Case module: This module is used for entering all details about the cases and registered. MODULES OF PROPOSED SYSTEM Department of IT 10
  • 11. PROPOSED APPROACH Deployment diagram of our proposed System Department of IT 11
  • 12. SYSTEM REQUIREMENTS Department of IT 12 Software Requirements: Operating System : Windows 2000/xp Languages : java 2(EJB2.0, JDBC, JSP, Servlet ) Front End : HTML, JavaScript Platform : J2EE Web Servers : Web Logic8.1/Tomcat 5.0 Backend : My SQL Browser Program : Internet explorer/Mozilla Fireworks
  • 13. Department of IT 13 SYSTEM REQUIREMENTS Hardware Requirements: Processor : Pentium III/AMD Athlone XP RAM : 128 MB Hard disk : 20 GB FDD : 1.44MB Monitor : 14 inches Mouse : 3 Button scroll CD Drive : 52 X Keyboard : 108 keys
  • 15. RESULTS/OUTPUTS Department of IT 15 INSPECTOR LOGIN
  • 16. RESULTS/OUTPUTS Department of IT 16 ADD CRIMINAL: FIR:
  • 17. Department of IT 17 RESULTS/OUTPUTS LOGIN AS COMMISSONER:
  • 19. • This software provides facility for reporting online crimes, complaints, FIR registration, Transferring the officer, show criminal details mailing as well as chatting. • All modules in the system have been tested with valid data and invalid data and everything work successfully. • Hence the software has proved to work efficiently CONCLUSION Department of IT 19
  • 20. • Elmasri Navathe ‘Fundamentals of database systems’ • John Bukowski (2000) ‘Mastering Java2’ BPB Publications • Internet • www.theserverside.com • www.java.sun.com REFERENCES Department of IT 20