SlideShare a Scribd company logo
1 of 7
Download to read offline
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 887
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue1)
Available online at: www.ijariit.com
Crime File System
Dr. Nilakshi Jain
Information Technology Department
Shah and Anchor kutchhi
Engineering College
nilakshijain1986@gmail.com
Siddharth Agarwal
Information Technology
Department
Shah and Anchor kutchhi
Engineering College
siddharthagarwal46@gm ail.com
Gaurav Joshi
Information Technology
Department
Shah and Anchor kutchhi
Engineering College
joshigaurav527@gmail.com
Rahul Gupta
Information Technology
Department
Shah and Anchor kutchhi
Engineering College
rahulgupta18333@gmail.com
Aditya Kataria
Information Technology
Department
Shah and Anchor kutchhi
Engineering College
adityakataria.47@gmail.com
Abstract— the project is aimed to develop a crime file for maintain a computerized record of all the F.I.R against
crime .The system is desktop application that can be access throughout the police department. This system can be used
as an application for the crime file of the police department to manage the records of different activity of related to
first information report .In such desktop Crime file system we will manage all such activities (like registration of the
complaint updating information, search of particular viewing of the respective reports of crimes) that will save time,
manpower. This software is for police station which provides facility for reporting crimes, complaints, FIR, charge
sheet, prisoner records, and show most wanted criminal’s details.
This system will provide better prospective for the enhancement of organization regarding to quality and transparency
Keywords— Crime file, F.I.R, Complaint, Crime.
I. INTRODUCTION
Crime File System is a system used to report crimes. It can used to report Crime. This project is mainly useful for police
stations. This system will help to manage all the activities in a police station using computers. Currently all the works
are done manually, by computerizing all the activities inside a police station can be managed easily and effectively. This
system will help to manage all the activities in a police station using computers. It is a problem solving activity that
requires intensive communication between the system users and system developers. Objective of this application is to
maintain a computerized record of all the F.I.R against crime. Agile process model-Agile SDLC model is a combination
of iterative and incremental model which focus on process adaptability and customer satisfaction by rapid delivery of
working software product. Agile methods break the product into small incremental builds. These builds are provided in
iteration.
A. Review of Literature
In creator sachinbagga, akshaygirdhar, rajunyan and zihanlin [1] have advanced an apiknown as rmi( remote method
invocation) is being used with the help of which programmer can create allotted programs so that items that are residing
on the one of a kind systems can engage with every different in an efficient way. The divide and conquer technique of the
inograd’s variation technique is the main thing which facilitates us in dispensed computing. partitioning a given matrix
into sub matrix is achieved on the grasp facet and at every slave the logical partitioning into 2*2 matrixes has been
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 888
completed for enforcing given algorithm. Blessings of rmi is centered on java, with connectivity to current structures the
usage of local methods. this means rmi can take a natural, direct, and fully-powered method to offer you with a disbursed
computing era that helps you to upload java functionality at some stage in your system in an incremental, but seamless
way. hazards of rmi strictly java. Cannot use with other code outside java. Cannot guarantee that a client will always use
the same thread in consecutive calls. Meaning you want to jot down a mechanism for figuring out the purchaser yourself.
authordavidfojtik, petrpodesva, jangebauer [2] have advanced the thing describes verified techniques for ms square
server express which automatically keep the state-of-the-art statistics inside the number one database, at the same time as
older data are transferred into dynamically created databases. The gadget became deployed in ti'ineckezelezarny a. s.
where the information older than 30 days is saved in the number one database, and older data is transferred into databases
that had been dynamically created for each month of manufacturing. Thanks to this technique, all databases are smaller
than 2 gigabytes, at the same time as all information is without problems available from one square server explicit.
benefits of sq. queries can be used to retrieve massive quantities of records from a database quickly and efficiently,
square databases use lengthy-mounted standard, which is being followed by using ansi&iso. Non-square databases do
now not adhere to any clear standard. Dangers of sq. is interfacing an square database is extra complicated than adding a
few strains of code, despite the fact that sq. databases comply with ansi&iso requirements, some databases go for
proprietary extensions to traditional sq. to make certain vendor lock-in.2 writer dr. r. Nagesh Wararao [3] have protected
subjects all elements of core java programming language. It starts off evolved with fundamentals, together with such
factor as data types, control statements, and instructions. java’s exception-coping with mechanism, multithreading
subsystem, programs and inter5faces.blessings of java are its miles item orientated, platform unbiased, .java is
distributed.java is designed to make dispensed computing smooth with the networking functionality this is inherently
integrated into it. Writing network packages in java is like sending and receiving data to and from a record. A danger of
javathe first and fundamental disadvantage anybody accepts is java's gradual speed of execution. of course it's miles
designed as a way to get the have an effect on of platform-unbiased feature. with java, low-degree programming cannot
be achieved as it is supposed to be portable throughout systems.
creator patricknaughton, herbertschlidt [4] covers some issues referring to the java beans swing,and servlets.it
additionally provides a number of high powered java applets, known as scrabblet, is a entire, multiuser networked sport.it
suggests a way to deal with a number of the toughest issues involved in internet-based programming. Swing affords a
richer set of additives than awt. They’re a hundred% java-based totally .awt then again became developed with the
thoughts set that if a component or capability of a thing wasn't to be had on one platform, it might not be available on any
platform. Something quickly portable from platform x, to y, to z. because of the peer-based totally nature of awt, what
might paintings on one implementation won't paintings on another, as the peer-integration won't be as sturdy. many of
the unique awt issues have been traceable to differences in peer implementations. Negative aspects of swings in
fashionable, the main problem with swing is that it didn't live up to how it became advertised. it's a perfectly good
enough generation for loads of use cases, however those first 5 or 6 years had been full of lousy implementations and
atrocious applets. and now it's old tech - directly to internet 3.zero or something.
Authormr. Rudrakshbatra [5] this e-book gives the “web developers” with a simple and constant mechanism for
extending the capability of a web server for gaining access to existing commercial enterprise structures. this may be a
completely unique ebook for self gaining knowledge of and getting expertization in java database and net technologies
together with jdbc, servlet, jsp, jstl and jsf.jdbc is used for connectivity among java and the database advantages of jdbc
agencies can hold to use their mounted databases and get entry to records even though it's far saved on exclusive database
control systems. The mixture of the java api and the jdb capi makes software development smooth and fee powerful. The
underlying centers and abilities of a selected database connection need to be understood. The jdb capi offers metadata
access that allows the improvement of sophisticated applications. Risks of jdbc are that jdbc isn't easy if it is used in
massive tasks. There’s a large programming overhead..Programmer should hardcode the transactions and concurrency
codes in the software. Handling the jdbc connections and well last the relationship is likewise a huge issue. properly
remaining the connection is should..jdbc isn't always accurate for big packages
II. PROPOSED SYSTEM
Digital In old system every task was done manually which takes lot of time and lack accuracy too? In the old system
there was need to recruit more employees to maintain all facilities. But through computerized system this need is reduced,
as computerized system is fast one. System can check duplicity; can enter self- generated Customer identification
numbers and telephone no. So there are less chances of mistake in generation of Ids. From the description of the present
system and problems with the existing system one can gauge the manpower wasted in these activities even then it is
difficult to gain access to different information. Addition, updating, viewing, searching is very easy in the computerized
system. Just on the click of fingers different data can be accessed. So, here lies the need for a change from the old system.
The project should be developed such that the necessary functions and performance are achieved within the constraints.
The project is developed within latest technology. Through the techno logy may become obsolete after some period
of time, due to the fact that never version of same software supports older versions, the system may still be used. So
there are minimal constraints involved with this project.
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 889
Fig 1: System Blok Diagram
The modules involved in this project are:
1. Login for user and admin
2. Complaint registration
3. View complaint status
4. Criminal register management
5. FIR Management
6. Case History Details management
7. Managing Post-mortem details
8. Prisoners register management
9. Manage list about most wanted criminals
1. LOGIN
This includes Administrator and User login. There will be a username and password to login into the system to use all
the facilities.
2. COMPLAINT REGISTRATION
This module helps to register the details about the crime. This is done by entering some details, such as incident
details, Victim details, crime details etc
3. VIEW COMPLAINT STATUS
This module allows us to view the status of the complaint that you have registered earlier.
4. CRIMINAL REGISTER MANAGEMENT
Here we can have the facility to view the details of the criminals. The administrator can add new criminal’s
details and save it in a database. This can be done by entering details such as criminal number, age, occupation, type of
crime etc.
5. FIR MANGEMENT
This module allows viewing the First Information Report of all the crimes that took place at recent years. The
administrator can enter FIR information and save it in a database.
6. CASE HISTORY DETAILS MANAGEMENT
Here we can view the details of the case, date of occurrence, the type of crime and place of occurrence etc…
7. MANAGING POSTMORTEM DETAILS
This module helps to view the post-mortem details of a person. The details such as date of death cause of death,
name of the doctor etc.
8. PRISONER REGISTER MANGEMENT
This module helps the administrator as well as the user to store, view and manage the details of the past and
present prisoners.
9. MANAGE THE LIST OF MOST WANTED CRIMINALS
This is an additional feature added to this Software, which helps us to make a quick search about the most
wanted criminals. This helps to always keep track of and identify a person quickly, who is a most wanted criminal.
III. WORKING FLOW OF PROPOSED SYSTEM
The workflow of our proposed system starts with the user registering to our system as given in figure 2 and then logging in
to the system as shown in Figure 3.
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 890
Fig 2. Server login page
This is server login page and you can add your admin and user account
Fig. 3 Login page
This is user login account user can login into the software.
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 891
Fig. 4 Front Page
User can use differentfunctionalities in this page
Fig. 5 List of complaints
User can view list of complaints added by user
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 892
Fig. 6 Complaint Register
IV. ADVANTAGES AND DISADVANTAGES
A. Advantages
• It will provide security for the data.
• Ensure more data accuracies in the system.
• Proper control of the
• Higher officials.
• Minimize manual data entry by the user.
• Minimum time needed for the various processing in the system
• It provides with Greater efficiency.
• Better service than older system
• User friendliness and Interactive which can easily operated by everyone.
• Minimum time required by the system.
B. Disadvantages
• Criminal finger print record can be captured but this system but the feature is not included
• The project is a desktop version so the client software has to be installed on the system, however web interface
for the client could be developed
CONCLUSION
Crime file system initiates the objective of providing the user with customized and powerful complaint registration and
process management system side software. The software is built with all options such as complaint registration,
prisoner’s registration, and post-mortem report generation etc…All the requirements specified during the analysis and
design phase are fully met, thus resulting in the formation of good software.
The system is strong enough to withstand regressive yearly operations under conditions where the database is maintained
and cleared over a certain time of span. The interface provided is very user friendly and flexible for all times. The
implementation of the system in the organization will considerably reduce data entry, time and also provide readily
calculated reports.
Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 893
REFERENCES
[1] SachinBagga, AkshayGirdhar, Rajun Yan and Zihan Lin, Virtualization Approach to Cluster Based Winograd’s
Variant of Strassen’s Method using RMI, Second International Conference on Computational Intelligence &
Communication Technology, 2016.
[2] David Fojtik, PetrPodesva and Jan Gebauer, Storing High Volumes of Data in MS SQL Server Express, 16th
International Carpathian Control Conference (ICCC) ,2015.
[3]Dr. R. Nageshwararao," Core Java: An Integrated Approach", Dreamtech press.
[4]Patrick Naughton and Herbert Schlidt, "Java: The Complete References",seventh edition.
[5]RudrakshBatra," Java EE 5 Black Book",Dreamtech press.
[6]SachinBagga, AkshayGirdhar, MuneshChandra Trivedi and Yingzhi Yang, RMI Approach to Cluster Based Cache
Oblivious Peano Curves, Second International Conference on Computational Intelligence & Communication
Technology,2016.
[7] HarmanpreetKaur, SachinBagga ,AnkitArora, RMI Approach to Cluster Based Winograd’sVariant
ofStrassen’sMethod, IEEE 3rd InternationalConferenceon MOOCs, Innovation and Technology in Education
(MITE),2015.
[8] Ala’ Alkhaldi, Indranil Gupta, VaijayanthRaghavan, MainakGhosh, Leveraging Metadata inNoSQLStorage
Systems,2015.
[9] Wikipedia –SQL Server Express - https://en.wikipedia.org/wiki/SQL_Server_Express.
[10] Wikipedia – NetBeans- https://en.wikipedia.org/wiki/NetBeans.
[11] Wikipedia –JDBC CONNECTIVITY- https://en.wikipedia.org/wiki/Java_Database_Connectivity.
[12]Wikipedia –Swing (java)- https://en.wikipedia.org/wiki/Swing_(Java).
[13]Wikipedia –Java Remote Method Invocation - https://en.wikipedia.org/wiki/Java_remote_method_invocation
January 2015.

More Related Content

What's hot

Post Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data SciencePost Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data ScienceMamathaSharma4
 
Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...IJECEIAES
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryptionkitechsolutions
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
 
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...ijp2p
 
Sainath_Resume_updated
Sainath_Resume_updatedSainath_Resume_updated
Sainath_Resume_updatedsainath devara
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Conference Papers
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud Systemdbpublications
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of thingsPankesh Patel
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature IJECEIAES
 

What's hot (19)

Post Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data SciencePost Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data Science
 
resume4
resume4resume4
resume4
 
Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
 
2015 2016 ieee java project titles
2015 2016 ieee java project titles2015 2016 ieee java project titles
2015 2016 ieee java project titles
 
Shrichand gupta profile
Shrichand gupta profileShrichand gupta profile
Shrichand gupta profile
 
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
 
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...
 
Sainath_Resume_updated
Sainath_Resume_updatedSainath_Resume_updated
Sainath_Resume_updated
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
Paper summary
Paper summaryPaper summary
Paper summary
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud System
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of things
 
Resume
ResumeResume
Resume
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
 

Similar to Crime File System

Online java compiler with security editor
Online java compiler with security editorOnline java compiler with security editor
Online java compiler with security editorIRJET Journal
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement PortalIRJET Journal
 
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CDMACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CDIRJET Journal
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesIRJET Journal
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiIRJET Journal
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
Secret Twists to Efficiently Develop Reactive Software Systems
Secret Twists to Efficiently Develop Reactive Software SystemsSecret Twists to Efficiently Develop Reactive Software Systems
Secret Twists to Efficiently Develop Reactive Software SystemsBart Jonkers
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management SystemRIDDHICHOUHAN2
 
IRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Editor IJCATR
 
Improved Strategy for Distributed Processing and Network Application Development
Improved Strategy for Distributed Processing and Network Application DevelopmentImproved Strategy for Distributed Processing and Network Application Development
Improved Strategy for Distributed Processing and Network Application DevelopmentEditor IJCATR
 
Voice Controlled News Web Based Application With Speech Recognition Using Ala...
Voice Controlled News Web Based Application With Speech Recognition Using Ala...Voice Controlled News Web Based Application With Speech Recognition Using Ala...
Voice Controlled News Web Based Application With Speech Recognition Using Ala...IRJET Journal
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep LearningIRJET Journal
 
IRJET- Implementation of Web Enabled Notice Board using SOC
IRJET- Implementation of Web Enabled Notice Board using SOCIRJET- Implementation of Web Enabled Notice Board using SOC
IRJET- Implementation of Web Enabled Notice Board using SOCIRJET Journal
 
IRJET- Online Compiler for Computer Languages with Security Editor
IRJET-  	  Online Compiler for Computer Languages with Security EditorIRJET-  	  Online Compiler for Computer Languages with Security Editor
IRJET- Online Compiler for Computer Languages with Security EditorIRJET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerRonitShrivastava057
 

Similar to Crime File System (20)

Online java compiler with security editor
Online java compiler with security editorOnline java compiler with security editor
Online java compiler with security editor
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement Portal
 
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CDMACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
MACHINE LEARNING AUTOMATIONS PIPELINE WITH CI/CD
 
Design and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital PropertiesDesign and Monitoring Performance of Digital Properties
Design and Monitoring Performance of Digital Properties
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using Wifi
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
Secret Twists to Efficiently Develop Reactive Software Systems
Secret Twists to Efficiently Develop Reactive Software SystemsSecret Twists to Efficiently Develop Reactive Software Systems
Secret Twists to Efficiently Develop Reactive Software Systems
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management System
 
IRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless Payment
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...
 
Improved Strategy for Distributed Processing and Network Application Development
Improved Strategy for Distributed Processing and Network Application DevelopmentImproved Strategy for Distributed Processing and Network Application Development
Improved Strategy for Distributed Processing and Network Application Development
 
Voice Controlled News Web Based Application With Speech Recognition Using Ala...
Voice Controlled News Web Based Application With Speech Recognition Using Ala...Voice Controlled News Web Based Application With Speech Recognition Using Ala...
Voice Controlled News Web Based Application With Speech Recognition Using Ala...
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
Uday Resume
Uday ResumeUday Resume
Uday Resume
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
 
IRJET- Implementation of Web Enabled Notice Board using SOC
IRJET- Implementation of Web Enabled Notice Board using SOCIRJET- Implementation of Web Enabled Notice Board using SOC
IRJET- Implementation of Web Enabled Notice Board using SOC
 
IRJET- Online Compiler for Computer Languages with Security Editor
IRJET-  	  Online Compiler for Computer Languages with Security EditorIRJET-  	  Online Compiler for Computer Languages with Security Editor
IRJET- Online Compiler for Computer Languages with Security Editor
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
 

Recently uploaded

An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 

Recently uploaded (20)

An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 

Crime File System

  • 1. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 887 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue1) Available online at: www.ijariit.com Crime File System Dr. Nilakshi Jain Information Technology Department Shah and Anchor kutchhi Engineering College nilakshijain1986@gmail.com Siddharth Agarwal Information Technology Department Shah and Anchor kutchhi Engineering College siddharthagarwal46@gm ail.com Gaurav Joshi Information Technology Department Shah and Anchor kutchhi Engineering College joshigaurav527@gmail.com Rahul Gupta Information Technology Department Shah and Anchor kutchhi Engineering College rahulgupta18333@gmail.com Aditya Kataria Information Technology Department Shah and Anchor kutchhi Engineering College adityakataria.47@gmail.com Abstract— the project is aimed to develop a crime file for maintain a computerized record of all the F.I.R against crime .The system is desktop application that can be access throughout the police department. This system can be used as an application for the crime file of the police department to manage the records of different activity of related to first information report .In such desktop Crime file system we will manage all such activities (like registration of the complaint updating information, search of particular viewing of the respective reports of crimes) that will save time, manpower. This software is for police station which provides facility for reporting crimes, complaints, FIR, charge sheet, prisoner records, and show most wanted criminal’s details. This system will provide better prospective for the enhancement of organization regarding to quality and transparency Keywords— Crime file, F.I.R, Complaint, Crime. I. INTRODUCTION Crime File System is a system used to report crimes. It can used to report Crime. This project is mainly useful for police stations. This system will help to manage all the activities in a police station using computers. Currently all the works are done manually, by computerizing all the activities inside a police station can be managed easily and effectively. This system will help to manage all the activities in a police station using computers. It is a problem solving activity that requires intensive communication between the system users and system developers. Objective of this application is to maintain a computerized record of all the F.I.R against crime. Agile process model-Agile SDLC model is a combination of iterative and incremental model which focus on process adaptability and customer satisfaction by rapid delivery of working software product. Agile methods break the product into small incremental builds. These builds are provided in iteration. A. Review of Literature In creator sachinbagga, akshaygirdhar, rajunyan and zihanlin [1] have advanced an apiknown as rmi( remote method invocation) is being used with the help of which programmer can create allotted programs so that items that are residing on the one of a kind systems can engage with every different in an efficient way. The divide and conquer technique of the inograd’s variation technique is the main thing which facilitates us in dispensed computing. partitioning a given matrix into sub matrix is achieved on the grasp facet and at every slave the logical partitioning into 2*2 matrixes has been
  • 2. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 888 completed for enforcing given algorithm. Blessings of rmi is centered on java, with connectivity to current structures the usage of local methods. this means rmi can take a natural, direct, and fully-powered method to offer you with a disbursed computing era that helps you to upload java functionality at some stage in your system in an incremental, but seamless way. hazards of rmi strictly java. Cannot use with other code outside java. Cannot guarantee that a client will always use the same thread in consecutive calls. Meaning you want to jot down a mechanism for figuring out the purchaser yourself. authordavidfojtik, petrpodesva, jangebauer [2] have advanced the thing describes verified techniques for ms square server express which automatically keep the state-of-the-art statistics inside the number one database, at the same time as older data are transferred into dynamically created databases. The gadget became deployed in ti'ineckezelezarny a. s. where the information older than 30 days is saved in the number one database, and older data is transferred into databases that had been dynamically created for each month of manufacturing. Thanks to this technique, all databases are smaller than 2 gigabytes, at the same time as all information is without problems available from one square server explicit. benefits of sq. queries can be used to retrieve massive quantities of records from a database quickly and efficiently, square databases use lengthy-mounted standard, which is being followed by using ansi&iso. Non-square databases do now not adhere to any clear standard. Dangers of sq. is interfacing an square database is extra complicated than adding a few strains of code, despite the fact that sq. databases comply with ansi&iso requirements, some databases go for proprietary extensions to traditional sq. to make certain vendor lock-in.2 writer dr. r. Nagesh Wararao [3] have protected subjects all elements of core java programming language. It starts off evolved with fundamentals, together with such factor as data types, control statements, and instructions. java’s exception-coping with mechanism, multithreading subsystem, programs and inter5faces.blessings of java are its miles item orientated, platform unbiased, .java is distributed.java is designed to make dispensed computing smooth with the networking functionality this is inherently integrated into it. Writing network packages in java is like sending and receiving data to and from a record. A danger of javathe first and fundamental disadvantage anybody accepts is java's gradual speed of execution. of course it's miles designed as a way to get the have an effect on of platform-unbiased feature. with java, low-degree programming cannot be achieved as it is supposed to be portable throughout systems. creator patricknaughton, herbertschlidt [4] covers some issues referring to the java beans swing,and servlets.it additionally provides a number of high powered java applets, known as scrabblet, is a entire, multiuser networked sport.it suggests a way to deal with a number of the toughest issues involved in internet-based programming. Swing affords a richer set of additives than awt. They’re a hundred% java-based totally .awt then again became developed with the thoughts set that if a component or capability of a thing wasn't to be had on one platform, it might not be available on any platform. Something quickly portable from platform x, to y, to z. because of the peer-based totally nature of awt, what might paintings on one implementation won't paintings on another, as the peer-integration won't be as sturdy. many of the unique awt issues have been traceable to differences in peer implementations. Negative aspects of swings in fashionable, the main problem with swing is that it didn't live up to how it became advertised. it's a perfectly good enough generation for loads of use cases, however those first 5 or 6 years had been full of lousy implementations and atrocious applets. and now it's old tech - directly to internet 3.zero or something. Authormr. Rudrakshbatra [5] this e-book gives the “web developers” with a simple and constant mechanism for extending the capability of a web server for gaining access to existing commercial enterprise structures. this may be a completely unique ebook for self gaining knowledge of and getting expertization in java database and net technologies together with jdbc, servlet, jsp, jstl and jsf.jdbc is used for connectivity among java and the database advantages of jdbc agencies can hold to use their mounted databases and get entry to records even though it's far saved on exclusive database control systems. The mixture of the java api and the jdb capi makes software development smooth and fee powerful. The underlying centers and abilities of a selected database connection need to be understood. The jdb capi offers metadata access that allows the improvement of sophisticated applications. Risks of jdbc are that jdbc isn't easy if it is used in massive tasks. There’s a large programming overhead..Programmer should hardcode the transactions and concurrency codes in the software. Handling the jdbc connections and well last the relationship is likewise a huge issue. properly remaining the connection is should..jdbc isn't always accurate for big packages II. PROPOSED SYSTEM Digital In old system every task was done manually which takes lot of time and lack accuracy too? In the old system there was need to recruit more employees to maintain all facilities. But through computerized system this need is reduced, as computerized system is fast one. System can check duplicity; can enter self- generated Customer identification numbers and telephone no. So there are less chances of mistake in generation of Ids. From the description of the present system and problems with the existing system one can gauge the manpower wasted in these activities even then it is difficult to gain access to different information. Addition, updating, viewing, searching is very easy in the computerized system. Just on the click of fingers different data can be accessed. So, here lies the need for a change from the old system. The project should be developed such that the necessary functions and performance are achieved within the constraints. The project is developed within latest technology. Through the techno logy may become obsolete after some period of time, due to the fact that never version of same software supports older versions, the system may still be used. So there are minimal constraints involved with this project.
  • 3. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 889 Fig 1: System Blok Diagram The modules involved in this project are: 1. Login for user and admin 2. Complaint registration 3. View complaint status 4. Criminal register management 5. FIR Management 6. Case History Details management 7. Managing Post-mortem details 8. Prisoners register management 9. Manage list about most wanted criminals 1. LOGIN This includes Administrator and User login. There will be a username and password to login into the system to use all the facilities. 2. COMPLAINT REGISTRATION This module helps to register the details about the crime. This is done by entering some details, such as incident details, Victim details, crime details etc 3. VIEW COMPLAINT STATUS This module allows us to view the status of the complaint that you have registered earlier. 4. CRIMINAL REGISTER MANAGEMENT Here we can have the facility to view the details of the criminals. The administrator can add new criminal’s details and save it in a database. This can be done by entering details such as criminal number, age, occupation, type of crime etc. 5. FIR MANGEMENT This module allows viewing the First Information Report of all the crimes that took place at recent years. The administrator can enter FIR information and save it in a database. 6. CASE HISTORY DETAILS MANAGEMENT Here we can view the details of the case, date of occurrence, the type of crime and place of occurrence etc… 7. MANAGING POSTMORTEM DETAILS This module helps to view the post-mortem details of a person. The details such as date of death cause of death, name of the doctor etc. 8. PRISONER REGISTER MANGEMENT This module helps the administrator as well as the user to store, view and manage the details of the past and present prisoners. 9. MANAGE THE LIST OF MOST WANTED CRIMINALS This is an additional feature added to this Software, which helps us to make a quick search about the most wanted criminals. This helps to always keep track of and identify a person quickly, who is a most wanted criminal. III. WORKING FLOW OF PROPOSED SYSTEM The workflow of our proposed system starts with the user registering to our system as given in figure 2 and then logging in to the system as shown in Figure 3.
  • 4. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 890 Fig 2. Server login page This is server login page and you can add your admin and user account Fig. 3 Login page This is user login account user can login into the software.
  • 5. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 891 Fig. 4 Front Page User can use differentfunctionalities in this page Fig. 5 List of complaints User can view list of complaints added by user
  • 6. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 892 Fig. 6 Complaint Register IV. ADVANTAGES AND DISADVANTAGES A. Advantages • It will provide security for the data. • Ensure more data accuracies in the system. • Proper control of the • Higher officials. • Minimize manual data entry by the user. • Minimum time needed for the various processing in the system • It provides with Greater efficiency. • Better service than older system • User friendliness and Interactive which can easily operated by everyone. • Minimum time required by the system. B. Disadvantages • Criminal finger print record can be captured but this system but the feature is not included • The project is a desktop version so the client software has to be installed on the system, however web interface for the client could be developed CONCLUSION Crime file system initiates the objective of providing the user with customized and powerful complaint registration and process management system side software. The software is built with all options such as complaint registration, prisoner’s registration, and post-mortem report generation etc…All the requirements specified during the analysis and design phase are fully met, thus resulting in the formation of good software. The system is strong enough to withstand regressive yearly operations under conditions where the database is maintained and cleared over a certain time of span. The interface provided is very user friendly and flexible for all times. The implementation of the system in the organization will considerably reduce data entry, time and also provide readily calculated reports.
  • 7. Jain Nilakshi et al.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 893 REFERENCES [1] SachinBagga, AkshayGirdhar, Rajun Yan and Zihan Lin, Virtualization Approach to Cluster Based Winograd’s Variant of Strassen’s Method using RMI, Second International Conference on Computational Intelligence & Communication Technology, 2016. [2] David Fojtik, PetrPodesva and Jan Gebauer, Storing High Volumes of Data in MS SQL Server Express, 16th International Carpathian Control Conference (ICCC) ,2015. [3]Dr. R. Nageshwararao," Core Java: An Integrated Approach", Dreamtech press. [4]Patrick Naughton and Herbert Schlidt, "Java: The Complete References",seventh edition. [5]RudrakshBatra," Java EE 5 Black Book",Dreamtech press. [6]SachinBagga, AkshayGirdhar, MuneshChandra Trivedi and Yingzhi Yang, RMI Approach to Cluster Based Cache Oblivious Peano Curves, Second International Conference on Computational Intelligence & Communication Technology,2016. [7] HarmanpreetKaur, SachinBagga ,AnkitArora, RMI Approach to Cluster Based Winograd’sVariant ofStrassen’sMethod, IEEE 3rd InternationalConferenceon MOOCs, Innovation and Technology in Education (MITE),2015. [8] Ala’ Alkhaldi, Indranil Gupta, VaijayanthRaghavan, MainakGhosh, Leveraging Metadata inNoSQLStorage Systems,2015. [9] Wikipedia –SQL Server Express - https://en.wikipedia.org/wiki/SQL_Server_Express. [10] Wikipedia – NetBeans- https://en.wikipedia.org/wiki/NetBeans. [11] Wikipedia –JDBC CONNECTIVITY- https://en.wikipedia.org/wiki/Java_Database_Connectivity. [12]Wikipedia –Swing (java)- https://en.wikipedia.org/wiki/Swing_(Java). [13]Wikipedia –Java Remote Method Invocation - https://en.wikipedia.org/wiki/Java_remote_method_invocation January 2015.