Crime Record Management System11
Crime Record Management System11
Crime Record Management System11
First of all we would like to thank GOD for helping us to reach this time and do this project.
After that we would like to thank our honorable advisor ______ who contributed in giving her
continuous advice and comments this project. Finally, we would like to thank WU staff for
giving us the necessary information about how the current system works.
i
Abstract
The purpose of this project is to full fill the requirement of bachelor degree of MIS as final year
project in order to graduate.
Now days, using computers to simplify tedious manual work is significance. Because using
computer gives many benefits like speed, accuracy, storage capacity, security, flexibility, cost
reduction and minimizing tedious manual work. Nekemte City police office was limited on manual
works. This has a limitation for customers wasting large amount of time in front of the office to
register and high consumption of resources.
To overcome this problem we are proposing the new web base system for Crime Record
management System for Nekemte City. Customer can find any crime by using online system. So
that no needs waste the time and resource to find the recorded crime
This system is developed based on two-tier approach with step by step from planning, analysis,
design, and then implementation. With the Unified Modeling Language (UML) diagram such as
use case, activity diagram and sequence diagram is drawn. The system flow and the actor are drawn
to understand how the system works does and who the actors that interact the system are.
The programming language used to develop this project is PHP and HTML .Database application
is MySQL.
ii
Contents
Chapter one ..................................................................................................................................... 1
Introduction ................................................................................................................................. 1
1.1 Background ........................................................................................................................... 2
1.2 Statement of the problem ...................................................................................................... 3
1.3 Objective of the project ...................................................................................................... 3
1.3.1 General objective: ........................................................................................................... 3
1.3.2Specific objectives ........................................................................................................... 3
1.4 Scope and limitation of the project ....................................................................................... 4
1.4.1 Scope: ............................................................................................................................. 4
1.4.2 Limitations of the project: .............................................................................................. 4
1.5 Significance and beneficiaries of the project ........................................................................ 4
1.5.1 Significance of the project .............................................................................................. 4
1.5.2Beneficiaries of the Project.............................................................................................. 4
1.6 Methodology ......................................................................................................................... 5
1.6.1System Analysis .............................................................................................................. 5
1.6.2 System development and implementation tools ................................................................. 6
1.7 Feasibility .............................................................................................................................. 6
1.7.1 Technical feasibility ....................................................................................................... 6
1.7.2 Political feasibility .......................................................................................................... 7
1.7.3 Economic feasibility ....................................................................................................... 7
1.7.3.1Tangible benefits .............................................................................................................. 7
1.7.3.2 Intangible benefits ........................................................................................................... 7
1.7.5 Budget ............................................................................................................................. 9
1.8 Significance of the project..................................................................................................... 9
1.9 Team composition ............................................................................................................... 10
Chapter two ................................................................................................................................... 11
Existing/Current System Description ........................................................................................... 11
2. 1 Description of existing system ........................................................................................... 11
2.2 Major Functions of the Existing system .............................................................................. 11
iii
2.3 Forms and Documents Used in the Existing System .......................................................... 12
2.4 Practices to be preserved from the Existing system .......................................................... 12
2.5 Players in the Existing system ............................................................................................. 13
2.6 Business rules ...................................................................................................................... 14
2.7 Problems in the Existing system ......................................................................................... 15
2.7.1 Performance related problem........................................................................................ 15
2.7.2 Information related problem ......................................................................................... 16
2.7.3 Efficiency Problem ....................................................................................................... 17
2.7.3 Security and control problem ....................................................................................... 17
2.8 Alternative Solution for the Existing Problems .................................................................. 17
2.9 System requirements of the new system ............................................................................. 18
Chapter three ................................................................................................................................. 19
Overview of the proposed system ................................................................................................. 19
3.1 Functional Requirement ...................................................................................................... 19
3.2 Non-functional Requirements (NFR) .................................................................................. 20
3.3 Hardware and Software Requirement ................................................................................. 21
3.3.1 Hardware requirement ...................................................................................................... 21
3.3.2 Software requirement ....................................................................................................... 21
3.4 system security and Procedure ............................................................................................ 21
3.5 System use case diagram ................................................................................................... 22
3.6 Use case diagram description ............................................................................................ 22
3.7 class diagram ....................................................................................................................... 27
3.8 Sequence Diagram............................................................................................................... 29
3.9 Activity Diagram ................................................................................................................. 33
Chapter Five .................................................................................................................................. 55
References ..................................................................................................................................... 61
iv
List of figures
Figure 1: Use Case Diagram ........................................................................................................ 22
Figure 2:Class Diagram ................................................................................................................ 28
Figure 3: Sequence diagram for create account ............................................................................ 30
Figure 4:Sequence Diagram for register crime ............................................................................ 31
Figure 5:Sequence Diagram for view appointment ..................................................................... 32
Figure 6:Activity diagram for login .............................................................................................. 33
Figure 7: Activity Diagram for Search ......................................................................................... 34
Figure 8:Activity Diagram for Search .......................................................................................... 35
Figure 9: Collaboration diagram for Detective team .................................................................... 37
Figure 10:Collaboration diagram for Judge .................................................................................. 38
Figure 11:Collaboration diagram for Accuser .............................................................................. 39
Figure 12:Deployment diagram .................................................................................................... 40
Figure 13:Component Diagram .................................................................................................... 41
List of Tables
Table 1:Project Schedule ................................................................................................................ 8
Table 2:Budget Plan ........................................................................................................................ 9
Table 3:Team Composition........................................................................................................... 10
Table 4:Use case description for login.......................................................................................... 23
Table 5:Use case description for generate report .......................................................................... 24
Table 6:Use case cdescription for register crime .......................................................................... 25
Table 7:Use case description for update crime ............................................................................. 26
Table 8:Use case description for give appointment ...................................................................... 27
Table 9:test case ............................................................................................................................ 57
v
Chapter One
Introduction
Nowadays, use of information and communication technology in all over the world is very
advantageous in each and every activity and the great break through, the sector is showing in terms
of simplifying the way that things are done in organization are mainly the result of information
technology.
More specifically, due to this reason, there is a rapid and considerable advancement in the sector
of police institution owing to the application of computer technology.
The development of one country is analyzed from many angles. That there are many factors such
as peaceful security of the people and their property etc. those are protected by police and peoples.
The institution of police station is standing to protect peoples and their property from danger.
Nekemte City police station is one of the institutions of police station which give service to protect
Nekemte City from crime but on the given of this service there are many problems on the crime
management system therefore our project has been prepared with view of winning on approval for
a project that has the objective of developing a new Web based Police-Crime Management System.
Online Crime Management systems aimed at developing a web-based and central Recruitment
Process System for the Nekemte City Police station.
The proposed System applies to police institution all across the country and specially looks in the
subject of crime record management system. The station has responsible for reporting and storing
the nature of the crime, the location details, the sequence of the crime, information on victims
therefore this project has the objective of diving a new database system for Nekemte City Police
station crime records management system.
This proposal is the precondition for solving the problems of Nekemte City Crime Management
system is currently implemented manually. Therefore, it needs providing the Online Crime
Management system to reduce the problems that are encountered in the existing system.
1
1.1 Background
Nekemte city found in the west parts of Addis Ababa at 462 kilometers from the capital city of
Ethiopia. The city has early civilization like other early cities of Ethiopia. It is the main tourism
center in Oromia region and has its own administration structure to organize, control and manage
the local communities. In Nekemte city, there are governmental and non-governmental
organizations which facilitate the development of the city and provide services to the community.
From those governmental institution police stations are one part which serves that will be peaceful
security among the people and their property prevalence. Creating the country that have peaceful
relationship and stable rule of law which prevents the right of the community and freedom of their
life is set as a vision, and By actively participating the local community, the police station should
have the duty to create strong information chain between them set as a mission of the police
station. Nekemte police station is a well-organized police station that serves crime prevention;
detection and convection of criminals depend on a highly responsive manner. But the efficiency
of the policing function and the effectiveness
With which it tackles crime depend on what quality of information it can drive from its existing
record and how fast it can have access to it is not qualified. The station has responsible for reporting
and storing the nature of the crime, the location details, the sequence of the crime information on
victims.
The crime record system of the station currently investigated with the problem of recording,
storing, retrieving and updating of crime information to generate reports and decision-making
purpose. Currently the police station processes tasks in the form of document based applications
or traditional file systems. The current system of city police station recording personal
information of crimes on traditional document formats has been depicted at the back of the page.
On the other hand, processing of the crime record can be automated by Nekemte City crime record
management system, which is newly implemented. The proposed system can be taken as to
automate processing tasks with less efforts and resources (like, reducing accessing times and
material requirements).
2
1.2 Statement of the problem
The current system of the Nekemte City Police station is a manual one so that, each activity is
done in unorganized manner. It will also face many technological problems to site some this
multiphase factor in the case of police stations.
To design and develop Web Based Online Crime report System for the Nekemte City Police
station.
1.3.2Specific objectives
The project will have the following specific objectives.
3
To change the manual system which spends more resources into computerized and online which
needs small resources.
4
Clients of the system
Group members Beneficiary
The project has initiated our team to get knowledge of how to develop the required system
application.
While struggling with some difficulties, the team got a lot of experiences of solving
problems.
1.6 Methodology
In developing Nekemte City police crime record system, the following development
methodologies and tools will be applied.
A) Interview: - was used to gather required data for the project by contacting different
employees of the organization.
B) Observation: -was used to gather additional data by observing the actual work being done by
the staff and consolidated with what was obtained through Interview.
C) Document Analysis: - consulted and analyzed written materials that describe the operations
conducted in the station to further strengthen and support the information that applied the above
technique
1.6.1System Analysis
To design the system the project team has choose Object Oriented Modeling techniques because
of the following advantages
5
1.6.2 System development and implementation tools
For the successful completion of Nekemte City police station system different tools and techniques
would be put for different purposes & tasks. This includes:
Software tools: -
Hardware tools: -
Flash disk
CD- ROM Disks
Computers
Scanner
Server computer
We may use other HW tools
1.7 Feasibility
The new implemented online crime management system feasibility studies done by consider the
economically, technically, operationally and politically that the system is acceptable by the
Agency. The benefit and cost of the system are done as the following.
6
base technology .so that all the agency responsible bodies are easily managed and communicate
with the system.
This system is technically big enough to be applied easily to the problem identified in the existing
system. In addition; the both hard wares and soft wares for this system are highly available and
can be owned with small cost.
For a software development project detailed and accurate cost estimates are essential prerequisites
for managing the project. Moreover, cost in a project is due to the requirements for software,
hardware and human resources.
1.7.3.1Tangible benefits
Benefits that are easily quantified from the conducted system are:
7
Organizing the office with the new organization.
Generally, it is possible to get positive result by subtracting the cost break down of the current
system from the previous system. Getting positive result informs the economic feasibility.
Therefore, the system is economically feasible
The breakdown of the project and its component tasks have estimated amount of time.
Task Date
proposal
Requirement analysis
document
System design
Object design
Coding and
integration
Implementation
Testing
8
1.7.5 Budget
Table 2: Budget Plan
(Birr) (Birr)
Though this project provides lots of advantages for the target uses, the major significances are as
described below:
9
Minimize the effect of external factors on the loss of documents
Avoid data redundancy
Simplify Data Manipulation
Reduce external factors
Make report and Document Analysis ease to user
10
Chapter two
The current system of Nekemte City Crime Management System is manual based. In the existing
system, the information is very difficult to retrieve and find particular guilty information, the
accuser and accused information, report of crimes on time, even it is difficult to differentiate the
vehicle which made crime because the cars information is manually stored in the transport agency
and information sharing across the police station and transport agency is difficult because the
existing system is not network (web) based.
First the guilty come’s to the police station when he/she make a crime and give all the information
for the detective team. The accuser makes new accusation in new manual form and there is no
searching of the accused person made crime before that because it is very difficult to retrieve the
information at that time.
11
Making decisions based on the information and passed judgments
Updating the necessary information’s
Posting the news, the appointment and all the necessary information’s of
the organization to different departments manually.
2.3 Forms and Documents Used in the Existing System
In any business documents and forms are the fundamental for the existence of different process.
Input
Crime registers
Process
Crime registered
Produce crime report
Make decision or judgment
Stored in a manual document as a file
2.4 Practices to be preserved from the Existing system
Even if the existing Nekemte City Police Station system is manually it has its own strength, its
strengths must be preserved to develop the new system. The following strengths are to be
preserved in the automated system:
For a single guilty it has a unique guilty number (guilty ID).
Using the registration form when new applicant registered.
All forms and documents mentioned above must be used.
Information that is too sensitive has to be kept in hard copy.
User cannot get services online that there is a physical contact between the
applicant and crime management system of the Nekemte City as the previous.
Some time there is paper based service to have sign of higher official.
12
Keep rule and regulation of the organization.
Keep the mission and vision of organization.
Keep security of organization.
Detective managers
Commander
Information Desk
Personal clerks
Police member
Prosecutor law
Role of Detective managers
The main role of Detective managers in police station is:
Role of Commander:
The following activities are performed under the Commander of Nekemte City police
13
Posting the news, the appointment and all the necessary information’s
of the organization to different departments manually.
Communicating with the police stations.
Role of Information Desk teams
Daily Recording and accessing of crime information’s
Communicating individuals who has an issue to different office
managers and give directions about the Administration hierarchies to
whom they complained.
Generating reports and distributing to the Administrator body.
Role of personal clerks
14
and control organization resources properly. The following business rules are investigated within
Nekemte City police station.
Br1: Any customer who enters to the station should have an identity card.
Br2: An individual who is arrested by the police and stay in prison should have legal rights and
not be torched as well.
Br3: If the arrested person does not do the crime he/she who were previously suspected by the law,
has the rights to release after all evidences are investigated with legal protection.
Br4: Any person who did a crime and arrested under the law should get legal judgment within 48
hours.
Br5: Any individuals who suffered by the victim has the right to forward formal complaint towards
the station depending on full evidence.
Br6: Customers should not hold materials like gun, stick, knife etc. which is not allowed by the
station.
Br7: No one moves without the allowed destination when he/she is arrested who suspected as a
criminal, and stay within the allowed room until he/she gets legal judgments from the court.
Br8: No one enters to the station for any case without getting legal permissions from police guards
etc.
Br9: Any employees within the station should not post any notice on the board without the legal
seal of the department offices.
Br10: Any employees should must have to make report.
Br11: Any employees who made a crime are responsible by the law
15
Throughput
Modifying guilty information: - since the documents of guilty are written manually, then
to modify their information the documents must be changed. Also, there is no any searching
method, so to find each document it needs more time and difficult.
Registering the guilty and vehicle information: - since the registration is done manually,
it difficult to registering many guilty and vehicle at short time. Registering a guilty and
vehicle also involves some redundant and bulk item information to be processed due to
manually. In this case the problem of redundancy, loss of human power and time occurred.
Generate Report: - the task of report generating takes much time. So, it is difficult to
generate important data easily.
Sharing of information across police station: - since the system works manually there is
no fast sharing of information.
Search all information: -to search employee information from the document or file of the
existing system is very difficult. Because of no easily search method without simply collect
all documents and search by hand each document one by one.
B. Response Time
It is difficult to predict the response time of each process based on the detailed description of the
major functions of the existing system such as generating report, updating the all the necessary
information, search the guilty and vehicle information.
Invalid input of data –Record values can be put to the wrong fields resulting in wrong information
about guilty or other records which are kept in the database. Also, inaccurate capture of data –
Data is handled in a way that is not efficient for retrieval or processing purpose. That means all
information that must be captured in the current Nekemte City Crime Management System is still
performed manually which results on redundant data when input the information.
16
B Output related problems
After analyzing the problems in the existing system, our project team identified and evaluated
the following alternative solutions:
17
The accomplishment of a given task measured against preset known standards of accuracy
Speed
It is very important to get users of the system fully involved such that the problem of change
management does not arise. The stake holders, who will use the system therefore, were approached
during the study and were asked what they expected of the proposed system and the following
were the findings:
18
Chapter Three
Functional requirements capture the intended behavior of the system. This behavior may be
expressed as services, tasks or functions the system is required to perform. Therefore, the
functional requirements are
Record decision
Manage Account
Give appointment
View appointment
Generating reports
19
3.2 Non-functional Requirements (NFR)
Non-functional requirements are requirements which specify criteria that can be used to judge the
operation of a system, rather than specific behaviors. This is contrasted with functional
requirements that specify specific behavior or functions. Systems must exhibit software quality
attributes, such as accuracy, performance, cost, security and modifiability plus usability, i.e. easy
to use for the intended users. NFRs help to achieve the functional requirement of a system. Thus,
the proposed system does the following:
Portability: the new system can be executed in different platforms device without any restriction
and it is adaptable to work easily. This means exchanging Documents from one place to another
Security:-Our system is secured; means unauthorized body cannot damage system and system
resources. The system will have user accounts for its users. The passwords will be encrypted There
is no such functionality in the system by which the user can register himself to the system because
there are limited system users, so the user accounts are created by the system administrator. The
system administrator can activate, deactivate, create, edit and delete user accounts. The system
shall permit the administrator to edit player’s information.
User friendly interface: - Users easily navigate and access our web page by using user interface
design. The system must be compatible with any environment and user friendly
Incorrect input: the system handles many exceptions like inserting empty string to the
database, assigning a dormitory for empty student list, and inserting a duplicated id no and
display an appropriate message for each error.
Login error: the system shall handle an attempt to login with incorrect user name and
password and display appropriate message.
Form validation: validate form like that of unauthorized access
20
3.3 Hardware and Software Requirement
3.3.1 Hardware requirement
Hard disk 100 GB capacity.
Processor 3.2GHZ.
RAM 2GB.
NIC (network interference cared) for future growth of the system to operate one of the
environments.
Scanner
Network cables(RJ 45 connectors,CAT5 or above)
3.3.2 Software requirement
The system used Apache server for the database.
The system should use Notepad++ and PHP or (preprocessors of hypertext programs) to
design the user interface.
Notepad++.
The security of proposed system determines which information can be viewed, modified and the
security system ensuresprotectionofdataregardlessofhowregistrargainsaccesstotheDB.
Permit access to read and use only but you don’t update any information without
administrator.
Generate warning message for every invalid input.
Secure every document in order to be used in the future.
Allows the Registrar toper for mall tasks.
21
3.5 System use case diagram
A use case represents a complete flow of events through the system in a sense that it describes a
serious of related interactions that result from the initiation of the use case. The following use case
describes the overall functionality of CMS from the user point of view.
Description It is important in case of security. This mean it gives the privilege to the user.
Step 1. User must click Step 2. The system should display login form
login link
Step 5. The system should confirm and send
Step3. User should fill all acknowledgement to user
the necessary information
Step 6. System return backs the user if the users made
Step4. User should click mistake.
login button
Step 7. Otherwise the system displays windows of the
user with his/her privilege.
Alternative flow If the user makes an error the system displays some error message to the user and
displays the login form to fill the correct username and password.
23
B. The use case description for “generate report” use case.
Precondition The user should have to login to the system with the correct password,
username and privilege.
Post condition The report generated and logout.
Flow of event User action System response
Step1. The user clicks on Step2. The system displays the page which
generate report link. contains link of generating report.
24
C. Use case description for “Detective Registration Crime record” use case.
Actor Detective
Description Used to Register crime.
Precondition To register the crime the Detective Team should login to the system.
Post condition Registered the crime and logout from the system.
Step 1. The detective Step 2. The system displays the pages which
Team clicks Register contains the link of registering crime.
crime link.
Step 4. The system displays the Register Form
Step 3. The Detective
Step 7. The system displays the crime is
Team clicks on
registered message.
his/her link.
25
D. Use case description for “update crime record” use case.
Actor Detective
Description Used to update crime.
Precondition To update the crime the Detective Team should login to the system.
Post condition Update the crime and logout from the system.
Step 1. The detective Step 2. The system displays the pages which
Team clicks update contains the link of updating crime.
crime link.
Step 4. The system displays the update Form
Step 3. The Detective
Step 7. The system displays the crime is updated
Team clicks on
message.
his/her link.
26
E. The use case description for “give appointment” use case.
Step 1. The judge clicks give Step 2. The system displays the pages
appointment link. Step 3. The judge which contains the link of giving
clicks on his/her link. appointment.
Class diagrams describe the structure of the system in terms of classes and objects.
Classes are abstractions that specify the attributes and behavior of a set of objects.
Objects are entities that encapsulate state and behavior. Each object has an identity.
27
DBC DB
Judge
Accuser
-Crid: int
Detective team -Date: date
-Accusing name: string
-Detective name: string -Sex string ()
-Detective password: string -Age: int
……………………………………………….. Photo: OL object
+Record () -Educatinal_level: string
+Update () -Citizen: string
+Report () -Registration: string
-Wereda: string
-Kebele: string
-Member Name .
……………………………………………………………
+View appointment ()
+view decision ()
Administrator
-Administrator
-Name: string
Prosecutor law
-Administrator Password:
- Name: string Double
-Password: string ………………………………….
…………………………………… +View report
+Open file () +Add system user ()
+View crime () +Update System User ()
+view decision () +Search ()
+Manage Activity ()
+generate report ()
Figure 2: Class Diagram
28
3.8 Sequence Diagram
Sequence diagrams are dynamic model of use cases, showing the interaction among classes during
a specified time period. Sequence diagrams graphically document the use case by showing the
classes, the messages, & the timing of the messages.
Sequence diagrams show the timing of transaction between object as they occur. It depicts the
interactions between objects during a certain period of time. The interaction proceeds from top to
bottom a vertical timeline, while the horizontal arrows represent messages from one object to
another.
Sequence diagrams are used to model the logic contained in usage scenarios. A usage scenario is
the description of the way a potential use case is used. They are one of two dynamic models-the
other being activity diagram-used to model the dynamic aspect of our system. In recognition of its
growing popularity and its simplicity, we apply sequence here.
This section of the document consists of sequence diagrams representing the major use case and
the logic in an alternative course of action. All documentation needed for clear understanding of
the diagrams is clearly stated in the use case documentation and thus, to avoid redundancy, it has
been avoided here.
A sequence diagram in our system is used to formalize the behavior of the system and to visualize
the communication among objects. It helped us to identify additional objects and participate in the
use case. This phase of the document ties use cases with objects and shows the behavior of a use
case is distributed among its participating objects.
29
Sequence for create new privilege.
Administrator
Enter username
Check validate
Click() And password
Display invalid
valid
Click()
Click()
30
Sequence Diagram to report and record crime info
Click() valid
Click()
crime info
Save()
ok()
31
Sequence diagram to view appointment
view
DB
appoint
Home page help
view info ment
accuser
click()
click()
click()
Display()
32
3.9 Activity Diagram
The activities performed in the system. Each activity is represented by a narrow and more oval
shape. The processing with in an activity goes to completion and then an automatic transition to
the next activity occurs an arrow represents the transition from one activity to the next.
33
Activity Diagram for Search
Description: when Actors except accuser want to search either owner id or vehicle id
search
enter what y ou
want to search
Does n t exist
exist
display founded
data
Exit()
34
Activity diagram for Summit report
to provide either
adminitrator or
department report
Provides()
Adminstator head()
35