The document describes a proposed crime reporting management system. Some key points:
- The current manual system is inefficient, with disconnected police departments and no centralized data storage or sharing.
- The proposed computerized system would facilitate collection, storage, retrieval, analysis and sharing of data between police departments and headquarters.
- It would allow face identification of criminals by constructing an identifiable face from eyewitness descriptions and image slices, then retrieving the associated criminal record.
Crime Management System final year projectBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
Project Report On Online Crime Management Applicationsatvirsandhu9
This presentation represents a project developed using asp .net and sql database. It is very useful for the engineering students and MCA/BCA/PG students for their industrial projects
Crime Management System final year projectBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
Project Report On Online Crime Management Applicationsatvirsandhu9
This presentation represents a project developed using asp .net and sql database. It is very useful for the engineering students and MCA/BCA/PG students for their industrial projects
Crime Record Management System Mainly used in crime branch or police stations. Based on Ten entities that are essential for any crime record.
Having
1.Introduction
2.Scope of the Project
3.ERD
4.Entities
5.Relations
6.Relational Schema
Android based crime managements syetem final year pdfBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
The project Criminal Record Management System in the perspective of Somalia is a Criminal record management system that uses to record crime activities of criminals. It can be used to report crime activities. This project is mainly useful for law and enforcement agencies in Somalia. The law and enforcement authority can preserve records of the criminals and search any criminal using the system. This is an online web application with database system in which police will keep the record of criminals who have been arrested. We have used HTML, JavaScript, CSS, PHP, MySql and Bootstrap to develop this project. We also used binary search algorithm to find a
Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment. The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time. In our Project we are going to implement a CRMS (Criminal Record Management System).
In our CSE471 course, System Analysis and Design, we presented our proposal to create an Employee Management system.
The Use Case Diagram, Activity Diagram, Sequence diagram, Data Flow Diagram, and Windows Navigation Diagram, all are shown here
Employee management system in Software EngineeringSadia Akter
Employee management system in Software Engineering
Employee management system in Software Engineering pdf
Employee Management System with Scenario, Use-case, GUI, Class diagram.
Thank you
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Crime Record Management System Mainly used in crime branch or police stations. Based on Ten entities that are essential for any crime record.
Having
1.Introduction
2.Scope of the Project
3.ERD
4.Entities
5.Relations
6.Relational Schema
Android based crime managements syetem final year pdfBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
The project Criminal Record Management System in the perspective of Somalia is a Criminal record management system that uses to record crime activities of criminals. It can be used to report crime activities. This project is mainly useful for law and enforcement agencies in Somalia. The law and enforcement authority can preserve records of the criminals and search any criminal using the system. This is an online web application with database system in which police will keep the record of criminals who have been arrested. We have used HTML, JavaScript, CSS, PHP, MySql and Bootstrap to develop this project. We also used binary search algorithm to find a
Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment. The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time. In our Project we are going to implement a CRMS (Criminal Record Management System).
In our CSE471 course, System Analysis and Design, we presented our proposal to create an Employee Management system.
The Use Case Diagram, Activity Diagram, Sequence diagram, Data Flow Diagram, and Windows Navigation Diagram, all are shown here
Employee management system in Software EngineeringSadia Akter
Employee management system in Software Engineering
Employee management system in Software Engineering pdf
Employee Management System with Scenario, Use-case, GUI, Class diagram.
Thank you
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Chat Application using Java which is based on Socket Programming java , there is Software managed (SEPM) file ppt based for gudence on project using life cycle of project ,like Feasibility study and steps of Project life cycle that how 1 software faces the phases of development . socket based programming in java ,based on client server technology .
What is Software or System ?
How to develop a good Software or System ?
What attributes of designing a good Software or System ?
Which methodology should be to design a good Software or System ?
What is SDLC ?
How many phases available in SDLC ?
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
Running head: CRIME ANALYSIS TECHNOLOGY 1
CRIME ANALYSIS TECHNOLOGY 9
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Crime Analysis Technology
Peer-Reviewed Article Analysis
Technology has evolved over the years in various sectors, with new technological innovations being developed. One of the areas that has witnessed great applications of technological evolution is in the detection and prevention of crime. This article will analyze the various technologies that are used to prevent and detect crime.
Byrne and Marx (2011) in their article reviews the topic in detail and gives insight in the role of technology in combating crime.
The key data that will be used in this research is secondary data from various peer-reviewed sources that review the topic of Crime Analysis Technology from various perspectives. Byrne and Marx (2011) presents various data on crime and the use of Information Technology in crime detection and prevention. For instance, it highlights that the percentage of schools in the United States that deploy metal detectors is approximately 2%. The article also approximates that as of 2006, one million CCTV cameras had been deployed in the United States, although the article does not provide current estimates on the same.
The article plays a great role in my final research. It gives a highlight of the various technological applications for crime prevention and detection. This can provide a background for further research, especially the technological innovations that are currently being developed. The article also presents figures about various elements of technology in crime prevention and detection such as the number of CCTV cameras, the crime rates such as the registered sex offenders, among others. Projections can therefore be made to the future.
The article mentions several significant facts. First, it classifies technological innovations in criminal justice as hard technology versus soft technology. Hard technology innovations include hardware and materials while soft technology innovations include information systems and computer software. Examples of hard technology is the CCTV cameras, metal detectors, and security systems at homes and schools. Examples of soft technology include predictive policing technology, crime analysis techniques, software, and data sharing techniques, among others. Both of the two categories of technological innovations are important in criminal justice. Another fact is the new technology of policing. The article identifies hard policing technological tools such as non-lethal weaponry and technologies for officer safety. It highlights soft policing technologies such as data-driven policies in policing and information sharing. Another important fact that the article mentions is the issues that should be con ...
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
Running head: CRIME ANALYSIS TECHNOLOGY 1
CRIME ANALYSIS TECHNOLOGY 9
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Crime Analysis Technology
Peer-Reviewed Article Analysis
Technology has evolved over the years in various sectors, with new technological innovations being developed. One of the areas that has witnessed great applications of technological evolution is in the detection and prevention of crime. This article will analyze the various technologies that are used to prevent and detect crime.
Byrne and Marx (2011) in their article reviews the topic in detail and gives insight in the role of technology in combating crime.
The key data that will be used in this research is secondary data from various peer-reviewed sources that review the topic of Crime Analysis Technology from various perspectives. Byrne and Marx (2011) presents various data on crime and the use of Information Technology in crime detection and prevention. For instance, it highlights that the percentage of schools in the United States that deploy metal detectors is approximately 2%. The article also approximates that as of 2006, one million CCTV cameras had been deployed in the United States, although the article does not provide current estimates on the same.
The article plays a great role in my final research. It gives a highlight of the various technological applications for crime prevention and detection. This can provide a background for further research, especially the technological innovations that are currently being developed. The article also presents figures about various elements of technology in crime prevention and detection such as the number of CCTV cameras, the crime rates such as the registered sex offenders, among others. Projections can therefore be made to the future.
The article mentions several significant facts. First, it classifies technological innovations in criminal justice as hard technology versus soft technology. Hard technology innovations include hardware and materials while soft technology innovations include information systems and computer software. Examples of hard technology is the CCTV cameras, metal detectors, and security systems at homes and schools. Examples of soft technology include predictive policing technology, crime analysis techniques, software, and data sharing techniques, among others. Both of the two categories of technological innovations are important in criminal justice. Another fact is the new technology of policing. The article identifies hard policing technological tools such as non-lethal weaponry and technologies for officer safety. It highlights soft policing technologies such as data-driven policies in policing and information sharing. Another important fact that the article mentions is the issues that should be con.
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
Materi Perkuliahan Control and Auditing Information System in Uin Suska Riau.
About Fundamental and Theory Control and Audit. Where this Slide just Theory, not spesific because it just job from teacher in the class.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. Crime Reporting Management System
1. Introduction
1.1. Introduction
Crime File System is a system used to report crimes. This project is mainly useful for police
Departments. This system will help to manage all the activities in a police Department using
computers. Currently all the works are done manually, by computerizing all the activities inside a
police Department can be managed easily and effectively.
The police Departments in the country are, today, virtually unconnected islands. Thanks to
telephones and wireless, and especially thanks to mobile telephones, there is voice connectivity
between the police Department and senior police officers, but that is about all. There is no
system of data storage, data sharing and accessing data. There is no system under which one
police Department can talk to another directly. There is no record of crimes or criminals that can
be accessed by a Department House Officer, except the manual records relating to that police
Department. The goals of the system are to facilitate collection, storage, retrieval, analysis,
transfer and sharing of data and information at the police Department and between the police
Department and the State Headquarters and the Central Police Organizations.
1.2. Abstract
Criminal record generally contains personal information about particular person along with
photograph. To identify any criminal we need some identification regarding person, which are
given by eyewitnesses. In most cases the quality and resolution of the recorded image-segments
is poor and hard to identify a face. To overcome this sort of problem we are developing
software. Identification can be done in many ways like fingerprint, eyes, DNA etc. One of the
applications is face identification. The face is our primary focus of attention in social inter
course playing a major role in conveying identity and emotion. Although the ability to infer
intelligence or character from facial appearance is suspect, the human ability to recognize faces
is remarkable.
The operator first logs into the system by entering username and
password. Then depending on the work allotted he has to select the screens from main menu
2. Crime Reporting Management System
screen. There are mainly three important function which he can do they are adding details,
clipping image and finally construction of the face by using the eyewitness. The face that is
finally formed is one the who has done the crime.
3. Crime Reporting Management System
2. System Analysis
2.1 Existing System
The development of face identification has been past from the year to years. In recent years to
identify any criminal face they used to make a sketch or draw a image based on the eyewitnesses.
It used to take more amount of time and it was very difficult task for any investigation
department to easily catch the criminals within a stipulated time. In order to catch the criminals
first they used to search their record whether to find out is there any record about that particular
person in the past. In olden days each and every record was maintained in the books or registers
or files which used to contain information about previous criminals with their names, alias name,
gender, age, crime involved, etc. Here each and every task used to take the help of the person
because they used to write in them and it needed very much of manual effort.
There are three major research groups, which propose three different approaches to the face
recognition problem. The largest group has dealt with facial characteristics. The second group
performs human face identification based on feature vectors extracted from profile silhouettes.
The third group uses feature vectors extracted from a frontal view of the face. The first method
is based on the information theory concepts in other words on the principal component analysis
methods. In this approach, the most relevant information that best describes a face is derived
from the entire face image. The second method is based on extracting feature vectors from the
basic parts of a face such as eyes, nose, mouth and chin.
DISADVANTAGES OF EXISTING SYSTEM:
Need of extra manual effort.
It used to take much time to find any criminals
Not very much accurate.
Danger of losing the files in some cases.
Need Good Knowledge in drawing.
4. Crime Reporting Management System
2.2 ProposedSystem
To overcome the drawbacks that were in the existing system we develop a system that will be
very useful for any investigation department. Here the program keeps track of the record number
of each slice during the construction of identifiable human face and calculate maximum number
of slices of the similar record number. Based on this record number the program retrieves the
personal record of the suspect (whose slice constituted the major parts of the constructed human
face) on exercising the “locate” option.
ADVANTAGES OF PROPOSED SYSTEM:
Very fast and accurate.
No need of any extra manual effort.
No fever of data loss.
Just need a little knowledge to operate the system.
Doesn’t require any extra hardware device.
At last very easy to find the criminals.
2.3. FeasibilityStudy
Once the problem is clearly understood, the next stepis to conduct feasibility study, which is
high-level capsule version of the entered systems and design process. The objective is to
determine whether or not the proposed system is feasible. The three tests of feasibility have been
carried out.
Technical Feasibility
Economical Feasibility
Operational Feasibility
5. Crime Reporting Management System
TECHNICAL FEASIBILITY
In Technical Feasibility study, one has to test whether the proposed system can be
developed using existing technology or not. It is planned to implement the proposed
system using java technology. It is evident that the necessary hardware and software are
available for development and implementation of the proposed system. Hence, the
solution is technically feasible.
ECONOMICAL FEASIBILITY
As part of this, the costs and benefits associated with the proposed system compared and
the project is economically feasible only if tangible or intangible benefits outweigh costs.
The system development costs will be significant. So the proposed system is
economically feasible.
OPERATIONAL FEASIBILITY
It is a standard that ensures interoperability without stifling competition and innovation
among users, to the benefit of the public both in terms of cost and service quality. The
proposed system is acceptable to users. So the proposed system is operationally feasible.
6. Crime Reporting Management System
3. System Design
3.1. Data Flow Diagram
The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to
represent a system in terms of input data to the system, various processing carried out on this
data, and the output data is generated by this system. The data flow diagram (DFD) is one of the
most important modelling tools. It is used to model the system components. These components
are the system process, the data used by the process, an external entity that interacts with the
system and the information flows in the system.DFD shows how the information moves through
the system and how it is modified by a series of transformations. It is a graphical technique that
depicts information flow and the transformations that are applied as data moves from input to
output.DFD is also known as bubble chart. A DFD may be used to represent a system at any
level of abstraction. DFD may be partitioned into levels that represent increasing information
flow and functional detail.
8. Crime Reporting Management System
3.2. ER-Diagram
An entity relationship diagram (ERD) shows the relationships of entity sets stored in a database.
An entity in this context is a component of data. In other words, ER diagrams illustrate the
logical structure of databases.
At first glance an entity relationship diagram looks very much like a flowchart. It is the
specialized symbols, and the meanings of those symbols, that make it unique.
An entity relationship diagram is a means of visualizing how the information a system produces
is related. There are five main components of an ERD:
Entities, which are represented by rectangles. An entity is an object or concept about
which you want to store information.
A weak entity is an entity that must defined by a foreign key relationship with another
entity as it cannot be uniquely identified by its own attributes alone.
Actions, which are represented by diamond shapes, show how two entities share
information in the database.
9. Crime Reporting Management System
In some cases, entities can be self-linked. For example, employees can supervise other
employees.
Attributes, which are represented by ovals. A key attribute is the unique, distinguishing
characteristic of the entity. For example, an employee's social security number might be
the employee's key attribute.
A multivalve attribute can have more than one value. For example, an employee entity
can have multiple skill values.
10. Crime Reporting Management System
A derived attribute is based on another attribute. For example, an employee's monthly
salary is based on the employee's annual salary.
Connecting lines, solid lines that connect attributes to show the relationships of entities in
the diagram.
Cardinality specifies how many instances of an entity relate to one instance of another
entity. Cardinality is also closely linked to cardinality. While cardinality specifies the
occurrences of a relationship, Cardinality describes the relationship as either mandatory
or optional. In other words, cardinality specifies the maximum number of relationships
and Cardinality specifies the absolute minimum number of relationships.
12. Crime Reporting Management System
3.3. Databasetable
A relational database is made up of several components, of which the table is most significant.
The table is where all the data in a database is stored, and without tables, there would not be
much use for relational databases.
A database consists of one or more tables. Each table is made up of rows and columns. If you
think of a table as a grid, the column go from left to right across the grid and each entry of data is
listed down as a row.
Each row in a relational is uniquely identified by a primary key. This can be by one or more sets
of column values. In most scenarios it is a single column, such as employee ID.
Every relational table has one primary key. Its purpose is to uniquely identify each row in the
database. No two rows can have the same primary key value. The practical result of this is that
you can select every single row by just knowing its primary key.
Columns are defined to hold a specific type of data, such as dates, numeric, or textual data. In
the simplest of definitions a column is defined by its name and data type. The name is used in
SQL statements when selecting and ordering data, and the data type is used to validate
information stored.
So, a DateOfBirth column defined as a date, can be referred to in an order by clause as
And, if you try to add a value of “Hello Kitty” to the column, as part of its validation, it will
recognize it isn’t a date, and reject it.
Columns names can’t be duplicated in a table. So, having two “name” columns is a no no.
Though you could have two “name” columns, such as name1, and name2, you’ll learn later on,
that this is frowned up, as it breaks normal form (I explain this in another post).
13. Crime Reporting Management System
Rows
A table can contain zero or more rows. When there are zero, it said to be empty. There is not
practical limit on the number of rows a table can hold; however, remember the table’s primary
key may have some influence on this. What I mean, is that if your table holds states, and the
primary key is the state’s abbreviation, then by definition, since there are only fifty states in the
union, and you cannot have duplicates in a primary key, your table is limited to fifty rows.
There is no guarantee that the rows in a table are stored in a particular order. Use the ORDER
BY clause to do so.
Also, strictly speaking, in a relational database there is no first or last row. Yes, you can tease
out a first row of a result using a keyword such as LIMIT or TOP, but those are used once the
data is retrieved and sorted. The difference here is that you’re seeing the first row of the result,
not what is physically stored in the table.
27. Crime Reporting Management System
{
}
}
}
}
Mainform.cs
//Multiple face detection and recognition in real time
//Using EmguCV cross platform .Net wrapper to the Intel OpenCV image processing library for
C#.Net
//Writed by Sergio Andrés Guitérrez Rojas
//"Serg3ant" for the delvelopercomunity
// Sergiogut1805@hotmail.com
//Regards from Bucaramanga-Colombia ;)
using System;
usingSystem.Collections.Generic;
usingSystem.Drawing;
usingSystem.Windows.Forms;
using Emgu.CV;
usingEmgu.CV.Structure;
usingEmgu.CV.CvEnum;
using System.IO;
usingSystem.Diagnostics;
namespaceMultiFaceRec
{
publicpartialclassFrmPrincipal : Form
28. Crime Reporting Management System
{
//Declararation of all variables, vectors and haarcascades
Image<Bgr, Byte>currentFrame;
Capture grabber;
HaarCascade face;
HaarCascade eye;
MCvFont font = new MCvFont(FONT.CV_FONT_HERSHEY_TRIPLEX, 0.5d, 0.5d);
Image<Gray, byte> result, TrainedFace = null;
Image<Gray, byte> gray = null;
List<Image<Gray, byte>>trainingImages = new List<Image<Gray, byte>>();
List<string> labels= new List<string>();
List<string>NamePersons = new List<string>();
intContTrain, NumLabels, t;
string name, names = null;
publicFrmPrincipal()
{
InitializeComponent();
//Load haarcascades for face detection
face = new HaarCascade("haarcascade_frontalface_default.xml");
//eye = new HaarCascade("haarcascade_eye.xml");
try
{
//Load of previustrainned faces and labels for each image
stringLabelsinfo = File.ReadAllText(Application.StartupPath +
"/TrainedFaces/TrainedLabels.txt");
string[] Labels = Labelsinfo.Split('%');
NumLabels = Convert.ToInt16(Labels[0]);
ContTrain = NumLabels;
stringLoadFaces;
29. Crime Reporting Management System
for (inttf = 1; tf< NumLabels+1; tf++)
{
LoadFaces = "face" + tf + ".bmp";
trainingImages.Add(new Image<Gray, byte>(Application.StartupPath + "/TrainedFaces/" +
LoadFaces));
labels.Add(Labels[tf]);
}
}
catch(Exception e)
{
//MessageBox.Show(e.ToString());
MessageBox.Show("Nothing in binary database, please add at least a face(Simply train the
prototype with the Add Face Button).", "Triained faces load", MessageBoxButtons.OK,
MessageBoxIcon.Exclamation);
}
}
private void button1_Click(object sender, EventArgs e)
{
//Initialize the capture device
grabber = new Capture();
grabber.QueryFrame();
//Initialize the FrameGraber event
Application.Idle += new EventHandler(FrameGrabber);
button1.Enabled = false;
}
30. Crime Reporting Management System
private void button2_Click(object sender, System.EventArgs e)
{
try
{
//Trained face counter
ContTrain = ContTrain + 1;
//Get a gray frame from capture device
gray = grabber.QueryGrayFrame().Resize(320, 240,
Emgu.CV.CvEnum.INTER.CV_INTER_CUBIC);
//Face Detector
MCvAvgComp[][] facesDetected = gray.DetectHaarCascade(
face,
1.2,
10,
Emgu.CV.CvEnum.HAAR_DETECTION_TYPE.DO_CANNY_PRUNING,
new Size(20, 20));
//Action for each element detected
foreach (MCvAvgComp f in facesDetected[0])
{
TrainedFace = currentFrame.Copy(f.rect).Convert<Gray, byte>();
break;
}
//resize face detected image for force to compare the same size with the
//test image with cubic interpolation type method
TrainedFace = result.Resize(100, 100, Emgu.CV.CvEnum.INTER.CV_INTER_CUBIC);
trainingImages.Add(TrainedFace);
31. Crime Reporting Management System
labels.Add(textBox1.Text);
//Show face added in gray scale
imageBox1.Image = TrainedFace;
//Write the number of triained faces in a file text for further load
File.WriteAllText(Application.StartupPath + "/TrainedFaces/TrainedLabels.txt",
trainingImages.ToArray().Length.ToString() + "%");
//Write the labels of triained faces in a file text for further load
for (int i = 1; i <trainingImages.ToArray().Length + 1; i++)
{
trainingImages.ToArray()[i - 1].Save(Application.StartupPath + "/TrainedFaces/face" + i +
".bmp");
File.AppendAllText(Application.StartupPath + "/TrainedFaces/TrainedLabels.txt",
labels.ToArray()[i - 1] + "%");
}
MessageBox.Show(textBox1.Text + "´s face detected and added :)", "Training OK",
MessageBoxButtons.OK, MessageBoxIcon.Information);
}
catch
{
MessageBox.Show("Enable the face detection first", "Training Fail", MessageBoxButtons.OK,
MessageBoxIcon.Exclamation);
}
}
voidFrameGrabber(object sender, EventArgs e)
{
32. Crime Reporting Management System
label3.Text = "0";
//label4.Text = "";
NamePersons.Add("");
//Get the current frame form capture device
currentFrame = grabber.QueryFrame().Resize(320, 240,
Emgu.CV.CvEnum.INTER.CV_INTER_CUBIC);
//Convert it to Grayscale
gray = currentFrame.Convert<Gray, Byte>();
//Face Detector
MCvAvgComp[][] facesDetected = gray.DetectHaarCascade(
face,
1.2,
10,
Emgu.CV.CvEnum.HAAR_DETECTION_TYPE.DO_CANNY_PRUNING,
new Size(20, 20));
//Action for each element detected
foreach (MCvAvgComp f in facesDetected[0])
{
t = t + 1;
result = currentFrame.Copy(f.rect).Convert<Gray, byte>().Resize(100, 100,
Emgu.CV.CvEnum.INTER.CV_INTER_CUBIC);
//draw the face detected in the 0th (gray) channel with blue color
currentFrame.Draw(f.rect, new Bgr(Color.Red), 2);
if (trainingImages.ToArray().Length != 0)
33. Crime Reporting Management System
{
//TermCriteria for face recognition with numbers of trained images like
maxIteration
MCvTermCriteriatermCrit = new MCvTermCriteria(ContTrain, 0.001);
//Eigen face recognizer
EigenObjectRecognizer recognizer = new EigenObjectRecognizer(
trainingImages.ToArray(),
labels.ToArray(),
3000,
reftermCrit);
name = recognizer.Recognize(result);
//Draw the label for each face detected and recognized
currentFrame.Draw(name, ref font, new Point(f.rect.X - 2, f.rect.Y - 2), new
Bgr(Color.LightGreen));
}
NamePersons[t-1] = name;
NamePersons.Add("");
//Set the number of faces detected on the scene
label3.Text = facesDetected[0].Length.ToString();
/*
//Set the region of interest on the faces
gray.ROI = f.rect;
34. Crime Reporting Management System
MCvAvgComp[][] eyesDetected = gray.DetectHaarCascade(
eye,
1.1,
10,
Emgu.CV.CvEnum.HAAR_DETECTION_TYPE.DO_CANNY_PRUNING,
new Size(20, 20));
gray.ROI = Rectangle.Empty;
foreach (MCvAvgCompey in eyesDetected[0])
{
Rectangle eyeRect = ey.rect;
eyeRect.Offset(f.rect.X, f.rect.Y);
currentFrame.Draw(eyeRect, new Bgr(Color.Blue), 2);
}
*/
}
t = 0;
//Names concatenation of persons recognized
for (intnnn = 0; nnn<facesDetected[0].Length; nnn++)
{
names = names + NamePersons[nnn] + ", ";
}
//Show the faces procesed and recognized
42. Crime Reporting Management System
4. System Implementation
4.1. Introduction to C# .NET
FEATURES OF.NET
Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating
XML Web services, Microsoft Windows-based applications, and Web solutions. The .NET
Framework is a language-neutral platform for writing programs that can easily and securely
interoperate. There’s no language barrier with .NET: there are numerous languages available to
the developer including Managed C++, C#, Visual Basic and Java Script. The .NET framework
provides the foundation for components to interact seamlessly, whether locally or remotely on
different platforms. It standardizes common data types and communications protocols so that
components created in different languages can easily interoperate.
“.NET” is also the collective name given to various software components built upon the .NET
platform. These will be both products (Visual Studio.NET and Windows.NET Server, for
instance) and services (like Passport, .NET My Services, and so on).
THE .NET FRAMEWORK
The .NET Framework has two main parts:
1. The Common Language Runtime (CLR).
2. A hierarchical set of class libraries.
The CLR is described as the “execution engine” of .NET. It provides the environment within
which programs run. The most important features are
Conversion from a low-level assembler-style language, called Intermediate Language
(IL), into code native to the platform being executed on.
Memory management, notably including garbage collection.
Checking and enforcing security restrictions on the running code.
43. Crime Reporting Management System
Loading and executing programs, with version control and other such features.
The following features of the .NET framework are also worth description:
Managed Code
The code that targets .NET, and which contains certain extra
Information - “metadata” - to describe itself. Whilst both managed and unmanaged code can run
in the runtime, only managed code contains the information that allows the CLR to guarantee,
for instance, safe execution and interoperability.
Managed Data
With Managed Code comes Managed Data. CLR provides memory allocation and Deal location
facilities, and garbage collection. Some .NET languages use Managed Data by default, such as
C#, Visual Basic.NET and JScript.NET, whereas others, namely C++, do not. Targeting CLR
can, depending on the language you’re using, impose certain constraints on the features
available. As with managed and unmanaged code, one can have both managed and unmanaged
data in .NET applications - data that doesn’t get garbage collected but instead is looked after by
unmanaged code.
Common Type System
The CLR uses something called the Common Type System (CTS) to strictly enforce type-safety.
This ensures that all classes are compatible with each other, by describing types in a common
way. CTS define how types work within the runtime, which enables types in one language to
interoperate with types in another language, including cross-language exception handling. As
well as ensuring that types are only used in appropriate ways, the runtime also ensures that code
doesn’t attempt to access memory that hasn’t been allocated to it.
44. Crime Reporting Management System
Common Language Specification
The CLR provides built-in support for language interoperability. To ensure that you can develop
managed code that can be fully used by developers using any programming language, a set of
language features and rules for using them called the Common Language Specification (CLS)
has been defined. Components that follow these rules and expose only CLS features are
considered CLS-compliant.
THE CLASS LIBRARY
.NET provides a single-rooted hierarchy of classes, containing over 7000 types. The root of the
namespace is called System; this contains basic types like Byte, Double, Boolean, and String, as
well as Object. All objects derive from System. Object. As well as objects, there are value types.
Value types can be allocated on the stack, which can provide useful flexibility. There are also
efficient means of converting value types to object types if and when necessary.
The set of classes is pretty comprehensive, providing collections, file, screen, and network I/O,
threading, and so on, as well as XML and database connectivity.
The class library is subdivided into a number of sets (or namespaces), each providing distinct
areas of functionality, with dependencies between the namespaces kept to a minimum.
45. Crime Reporting Management System
LANGUAGES SUPPORTED BY .NET
The multi-language capability of the .NET Framework and Visual Studio .NET enables
developers to use their existing programming skills to build all types of applications and XML
Web services. The .NET framework supports new versions of Microsoft’s old favorites Visual
Basic and C++ (as VB.NET and Managed C++), but there are also a number of new additions to
the family.
Visual Basic .NET has been updated to include many new and improved language features that
make it a powerful object-oriented programming language. These features include inheritance,
interfaces, and overloading, among others. Visual Basic also now supports structured exception
handling, custom attributes and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS-compliant language can
use the classes, objects, and components you create in Visual Basic .NET.
Managed Extensions for C++ and attributed programming are just some of the enhancements
made to the C++ language. Managed Extensions simplify the task of migrating existing C++
applications to the new .NET Framework.
C# is Microsoft’s new language. It’s a C-style language that is essentially “C++ for Rapid
Application Development”. Unlike other languages, its specification is just the grammar of the
language. It has no standard library of its own, and instead has been designed with the intention
of using the .NET libraries as its own.
Microsoft Visual J# .NET provides the easiest transition for Java-language developers into the
world of XML Web Services and dramatically improves the interoperability of Java-language
programs with existing software written in a variety of other programming languages.
46. Crime Reporting Management System
Active State has created Visual Perl and Visual Python, which enable .NET-aware applications
to be built in either Perl or Python. Both products can be integrated into the Visual Studio .NET
environment. Visual Perl includes support for Active State’s Perl Dev Kit.
Other languages for which .NET compilers are available include
• FORTRAN
• COBOL
• Eiffel
ASP.NET
XML WEB SERVICES
Windows Forms
Base Class Libraries
Common Language Runtime
Operating System
Fig1 .Net Framework
C#.NET is also compliant with CLS (Common Language Specification) and supports structured
exception handling. CLS is set of rules and constructs that are supported by the CLR (Common
Language Runtime). CLR is the runtime environment provided by the .NET Framework; it
manages the execution of the code and also makes the development process easier by providing
services.
C#.NET is a CLS-compliant language. Any objects, classes, or components that created in
C#.NET can be used in any other CLS-compliant language. In addition, we can use objects,
classes, and components created in other CLS-compliant languages in C#.NET .The use of CLS
ensures complete interoperability among applications, regardless of the languages used to create
the application.
47. Crime Reporting Management System
CONSTRUCTORS AND DESTRUCTORS:
Constructors are used to initialize objects, whereas destructors are used to destroy them.
In other words, destructors are used to release the resources allocated to the object. In C#.NET
the sub finalize procedure is available. The sub finalize procedure is used to complete the tasks
that must be performed when an object is destroyed. The sub finalize procedure is called
automatically when an object is destroyed. In addition, the sub finalize procedure can be called
only from the class it belongs to or from derived classes.
GARBAGE COLLECTION
Garbage Collection is another new feature in C#.NET. The .NET Framework monitors
allocated resources, such as objects and variables. In addition, the .NET Framework
automatically releases memory for reuse by destroying objects that are no longer in use.
In C#.NET, the garbage collector checks for the objects that are not currently in use by
applications. When the garbage collector comes across an object that is marked for garbage
collection, it releases the memory occupied by the object.
OVERLOADING
Overloading is another feature in C#. Overloading enables us to define multiple procedures with
the same name, where each procedure has a different set of arguments. Besides using
overloading for procedures, we can use it for constructors and properties in a class.
MULTITHREADING
C#.NET also supports multithreading. An application that supports multithreading can handle
multiple tasks simultaneously, we can use multithreading to decrease the time taken by an
application to respond to user interaction.
48. Crime Reporting Management System
STRUCTURED EXCEPTION HANDLING
C#.NET supports structured handling, which enables us to detect and remove errors at runtime.
In C#.NET, we need to use Try…Catch…Finally statements to create exception handlers. Using
Try…Catch…Finally statements, we can create robust and effective exception handlers to
improve the performance of our application.
THE .NET FRAMEWORK
The .NET Framework is a new computing platform that simplifies application development in
the highly distributed environment of the Internet.
OBJECTIVES OF.NET FRAMEWORK
To provide a consistent object-oriented programming environment whether object codes
is stored and executed locally on Internet-distributed, or executed remotely.
To provide a code-execution environment to minimizes software deployment and
guarantees safe execution of code.
Eliminates the performance problems.
There are different types of application, such as Windows-based applications and Web-
based applications.
49. Crime Reporting Management System
4.2. Introduction to SQL Server
FEATURES OF SQL-SERVER
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000
Analysis Services. The term OLAP Services has been replaced with the term Analysis Services.
Analysis Services also includes a new data mining component. The Repository component
available in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data
Services. References to the component now use the term Meta Data Services. The term
repository is used only in reference to the repository engine within Meta Data Services
SQL-SERVER database consist of six type of objects,
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
TABLE:
A database is a collection of data about a specific topic.
VIEWS OF TABLE:
We can work with a table in two types,
Design View
Datasheet View
Design View
50. Crime Reporting Management System
To build or modify the structure of a table we work in the table design view. We can
specify what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that answers the
question from one or more table. The data that make up the answer is either dynaset (if you edit
it) or a snapshot (it cannot be edited).Each time we run query, we get latest information in the
dynaset. Access either displays the dynaset or snapshot for us to view or perform an action on it,
such as deleting or updating.
AJAX:
ASP.NET Ajax marks Microsoft's foray into the ever-growing Ajax framework market.
Simply put, this new environment for building Web applications puts Ajax at the front and center
of the .NET Framework.
51. Crime Reporting Management System
5. HARDWARE AND SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 MB
Monitor : 15 VGA color
Mouse : Logitech.
Keyboard : 110 keys enhanced
RAM : 256 MB
SOFTWARE REQUIREMENTS
O/S : Windows 7.
Language : c#.Net
Frontend Tool : Microsoft Visual Studio 2010
Data Base : SQL Server 2008.
52. Crime Reporting Management System
6. Software Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub assemblies, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific testing
requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
53. Crime Reporting Management System
Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centred on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on requirements, key functions, or
special test cases. In addition, systematic coverage pertaining to identify Business process flows;
data fields, predefined processes, and successive processes must be considered for testing.
Before functional testing is complete, additional tests are identified and the effective value of
current tests is determined.
System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
White Box Testing
White Box Testing is a testing in which in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose. It is purpose. It is used
to test areas that cannot be reached from a black box level.
54. Crime Reporting Management System
Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct
phases.
Test strategy and approach
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
55. Crime Reporting Management System
Integration Testing
Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant participation
by the end user. It also ensures that the system meets the functional requirements.
56. Crime Reporting Management System
7. Future Enhancement
The general experimental evaluation of the face expressional system guarantees better face
recognition rates. Having examined techniques to cope with expression variation, in future it
may be investigated in more depth about the face classification problem and optimal fusion of
color and depth information. Further study can be laid down in the direction of all elements of
genetic matching to the geometric factors of the facial expressions. The genetic property
evolution framework for facial expressional system can be studied to suit the requirement of
different security models such as criminal detection, governmental confidential security
branches etc.
57. Crime Reporting Management System
8. Conclusion
The purpose of face identification system is to identify criminals. In past years this process is
carried out by humans. This process gives the exact image of the criminal but it is very difficult
to identify the criminal details and also it requires much amount of human burden.
The main aim of our project is to overcome the drawbacks of human based system
by using the machine based face identification process. In this process we store the details of
criminal into the database along with his photo or image. Then we make the image into
different clips containing hair, forehead, eyes, nose, lips and chin and store these clips into the
database. When any crime occurs we compare the details given by the eyewitness with the
clips already stored in the database and we will identify the criminal. This project can be
extended to adjust the gaps between the clips after construction of the image to be a perfect
photograph using Image processing Techniques.
58. Crime Reporting Management System
9. Bibliography
ReferencesMade From:
1. User Interfaces in C#: Windows Forms and Custom Controls by Matthew
MacDonald.
2. Applied Microsoft® .NET Framework Programming (Pro-Developer) by
Jeffrey Richter.
3. Practical .Net2 and C#2: Harness the Platform, the Language, and the
Framework by Patrick Smacchia.
Website Referred:
www.google.com
www.wikipedia.com