0% found this document useful (0 votes)
18 views11 pages

Crime Record Management System Using Fingerprinter

Uploaded by

Dawit Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views11 pages

Crime Record Management System Using Fingerprinter

Uploaded by

Dawit Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CRIME REPORT AND MANAGEMENT SYSTEM

USING FINGERPRINTER

A PROPOSAL PREPARED FOR PARTIAL FULFILMENT OF THE


REQUIRMENTS FOR BSc DEGREE IN COMPUTER SCIENCE

Prepared by
Abel Gezahegn

Bonsa Wakuma

Genet Merid

Nahom Mulugeta

Senait Abebe
Tigist Tufa

Advisor: Ms. Dawit

HARAMBE UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
May, 2024

Adama, Ethiopia
ABSTRACT
Crime Report and Management System using finger printer is a Completely Web Based
Application which is applies to all police stations, court and airlines across the country.
Nowadays, Crimes are happened over the world, and it is in maximum case. Crime Report and
Management System is available offline as well as online with the active participation of the
system. The main purpose of Crime Report and Management System using finger printer is to
reduce the cases of crime because of recording criminal scenario with integrate user fingerprint
and store on database. The project specially moves towards crime record and verification. This
study is help to provide an investigation of crime and provide effective and efficient approaches to
the investigation. The development of software includes the process of planning, requirement
analysis, system analysis and deployment and maintenance Crime Record and management would
really help the complainant and the authority to communicate privately. This software provides a
facility for reporting crimes online, registering complaints, entering missing persons, showing
most wanted person details, news reporting. Police and police will receive the complaint can send
a message regarding the status of the complaint to the user who filed the complaint. Police can
use this software to manage different crimes, judge use for applying sentence and modifying
criminal status and airline officer can see specific criminal that not allow to move other country.
Police, judge and airline officers gets their login password from the admin directly. A MongoDB
must be maintained for the temporary storage of the database to enable the processing facilities.
This paper describes how simple react coding has been used to design the website. Finger print
reader available on every police stations for verification purpose. Then we took a look at the
challenges ahead and opportunities in this fundamental technology that is all set to revolutionize
our digital world.

i
Table of Contents
May, 2024.......................................................................................................................................... 1
ABSTRACT ....................................................................................................................................... i
CHAPTER ONE ............................................................................................................................... 1
INTRODUCTION ............................................................................................................................ 1
1.1. Background of the Study ............................................................................................................ 1
1.2. Statement of the Problem ........................................................................................................... 1
1.3. Objective of Project ................................................................................................................... 2
1.3.1. General objective .............................................................................................................................. 2
1.3.2. Specific Objective ............................................................................................................................. 2
1.4. Significance of Project ............................................................................................................... 2
1.5. Scope and Limitations of a Project ............................................................................................ 3
1.5.1. Scope ................................................................................................................................................. 3
1.5.2. Limitation.......................................................................................................................................... 3
CHAPTER TWO .............................................................................................................................. 4
METHODOLOGY ........................................................................................................................... 4
2.1. Data collection ........................................................................................................................... 4
2.2. Data Analysis ............................................................................................................................. 4
2.3. Tools to use ................................................................................................................................ 4
2.3.1. Tools for front end development ....................................................................................................... 4
2.3.2. Tools for back end development ....................................................................................................... 5
2.4. Risk and Constraints .................................................................................................................. 5
2.4.1. Risk ................................................................................................................................................... 5
2.4.2. Action Taken ..................................................................................................................................... 5
2.5. Software and Hardware Specification ....................................................................................... 5
2.5.1. Software requirements ...................................................................................................................... 5
2.5.2. Hardware requirements ..................................................................................................................... 5
Teams compositions.......................................................................................................................... 6
Time and budget schedule ................................................................................................................. 7
a. Time schedule ....................................................................................................................................... 7
b. Budget schedule .................................................................................................................................... 7
Conclusion ........................................................................................................................................ 8
Reference........................................................................................................................................... 8

ii
CHAPTER ONE
INTRODUCTION
1.1. Background of the Study
The need for good record-keeping and information-sharing practices has taken on great significance
in today's global environment. Not only do well-organized records provide important internal
information (i.e., business operations and case management support— not to forget the official
memory of an agency's investigations), law enforcement agencies are now required to communicate
agency-to-agency and across continents to protect the Nation's citizens. Nothing is more necessary
to accomplishing that mission than having accessibility to accurate and timely records. Calls for
service records and investigative, arrest, criminal identification, detention, and even civil records
hold data that by themselves mean little; however, once pieced together with information from other
jurisdictions, the result can help with all levels of investigations and aid in safeguarding the Nation.

In Ethiopia there is no any computer based method to handle day to day activities of crimes happen.
Since now we are trying to develop a system that conveys good ways to handle those things. The
Crime Report and Management System (CRMS) provides optimal as possible as plan for crime
reports and managements. So many countries are faced with these problems of crime reporting and
managements of handlings. Now days the members of peoples make crime are highly developed
and educated than police officers. To make more peoples are concerned to this and help to stop
crimes this system can improve knowledge methods of all citizen become crime fighter.
1.2. Statement of the Problem
Since the current system is file based, not using fingerprint reader for integrate criminal data and
not computerized ways it faces so many problems include technological, transport, material and
lack of moderate knowledge those all problems are listed under the following. Those are:
 Criminal peoples have high knowledge of technology
 Hard to gather information concerning crimes
 Lack moderated materials
 Collecting the crime effect is very hard
 Police officers are very far from technology
 Police officers force and the society are not equals
1
 Lack of evidences after suspected criminal
 Unable to generated automatic crimes report
 Lack of technology
 Lack of transportations
 Use file based system that consume time and labor
 Unable to generated automatic crimes report
 Persons make crime is more developed in technology than police officers
 Lack of evidences after suspected criminal
 Persons make crime is more developed in technology than police officers
1.3. Objective of Project
1.3.1. General objective
The main objectives of this projects is to improve the crime reports and managements system by
using computer and web based system and making the system more interactive and user-friendly.
1.3.2. Specific Objective
To achieve the above mentioned general objective, the project will also address the following
specific objectives.
 To make detector auto gain information
 To change the current system of paper based to computer and web based one.
 To store, provide information of crime managements.
 To minimize let reaching and losing information
 To reduce time consuming
 To minimize delays of information and evidence gathering
 To make more peoples fight crimes easily and readily
 To make crime awareness among the local community.
1.4. Significance of Project
By digitizing and storing fingerprint data in an online system, law enforcement agencies can quickly
search and match prints against a database of known offenders. This expedites the investigation
process and facilitates the apprehension of suspects. Online systems streamline record-keeping
processes by automating data entry and retrieval tasks. This reduces the paperwork and
administrative burden on law enforcement personnel, allowing them to focus more on investigative

2
work. And also
 Police office can access their daily working zones easily using their computer.
 The placement of police officer will be effective.
 Minimize wastage of resources including energy.
 Helps the investigating police officer to get previous information.
 The system is portable.
 Helps to initiate investigation on priority basis.
 Enhances accuracy of information to be collected for effective use.
 Helps to perform the speedy trials.
1.5. Scope and Limitations of a Project
1.5.1. Scope
As a general the scope of our system is as follows:
 Ensure data’s accuracy.
 Minimize manual data entry.
 Greater efficiency and better services.
 Generates crime reports.
 Greater help for police about criminal detail information
 Fast for connection between police, judge and airline officer
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements systems it doesn’t include
the following because of time to do all this
 It doesn’t bring the crime person to the court
 It doesn’t work without connection except reading article book
 It doesn’t upload videos or image but capture and send online
 It doesn’t help for people for reporting report for police station

3
CHAPTER TWO
METHODOLOGY
2.1. Data collection
Data collection is the most important part of the project to find the main requirement of the system
and to understand how the system works. We are going to use different methods to collect data.
Among the methods, we use the following:
 Observations:- to analyze the organization the previous crime management system
 Document analysis: - to get information about ways of crime managements from Oromia
police based on adama
 Interview:- for gathering direct information from the Commanders, judges and other polices
2.2. Data Analysis
We are going to use functional programming paradigms because JavaScript has strong support for
functional programming concepts. The main reason behind using FP is:
 In order to check reusability of the current crime management system in Ethiopia
 In order to define new or modify objects that can be combine with the current system
2.3. Tools to use
The tools we are going to use for documents analysis in our projects are:
 Microsoft office 2013, 2019 for the purpose of writing the documentations
 Microsoft PowerPoint 2013, 2019
 Microsoft office VISIO professional 2013, 2017 and Edraw max for the purpose of drawing
the use-case, class, activity and other drawing. During implementations we are going to use:
 VS code for managing client and server side
 Github for collaborate the project
2.3.1. Tools for front end development
 React: for designing and dynamic functionality
 Tailwindcss: for styling the webpage
 Firebase: for store image files online
 Redux: for state management
 Redux toolkit: for easily use redux and redux persisitor
 Vite: to coordinate all front end tasks
4
2.3.2. Tools for back end development
 Node.js: for using JavaScript language as backend
 MongoDB: for NoSQL database
 Arduino UNO: for integrate fingerprint module to computer
 Fingerprint Module: for record and testing targeted person
 Express.js: for easily used node.js
 NPM: for controlling package managers
 JWT and passport.js: for authorization and authentication
2.4. Risk and Constraints
2.4.1. Risk
While we are developing our projects we may encounter different problems among:
 The computer virus and failures are some of them.
 Availability of hardware materials (fingerprint module)
 Power fluctuations and loss in the laboratories if computer is desktop
2.4.2. Action Taken
As a problems exist the solution as well be exists. Some solutions for problems are:
 Scanning the computer with antivirus and recovering the files
 Using additional laptop and working with them
 Searching companies that use similar hardware
2.5. Software and Hardware Specification
2.5.1. Software requirements
The CRMS uses VS code for the purpose of writing the codes and other required are listed below:
OS: Linux/Windows 7/8/8.1/10
Development tools: React, Node.js, MongoDB, Express.js and other libraries
2.5.2. Hardware requirements
Hardware requirement includes hardware required for developing the system. Those are:
Laptop or desktop with specification of
 Processor: Intel core i3 or more
 Hard disk: 50GB or more
 RAM: 6GB or more

5
Other hardware device
 Arduino UNO
 Fingerprint module
 Bread board

Teams compositions
The team that develops the project consists of six persons.
Name of Group Members Roles
Abel Gezahegn Programming
Bonsa Wakuma UX/UI design
Nahom Tesfaye Data Analysis
Genet Merid Data Analysis
Senait Abebe Data Analysis
Tigist Tufa Data Analysis

6
Time and budget schedule
a. Time schedule

No. Description
Month
Feb - Mar Apr - July
January 2024 June 2024
2024 2024
1 Proposal preparation ✓
2 Requirement elicitation ✓
3 Analysis ✓
4 System Design ✓
5 Coding the collected data ✓
6 Implementation and Testing ✓
8 Software Demonstration ✓
9 Research paper submission ✓

b. Budget schedule

No Items Quantity Unit cost Total cost

1 Printing 110 5 550


2 Binding 2 piece 30 60
3 Flash disk 1 600 600
4 Pen 10 25 250
5 Paper 1 pack 650 650
6 Arduino UNO 1750
7 Fingerprint Module 2050
8 Fingerprint Module cable 500
maintenance

7
9 Resistor an LED 4 each 80
10 Bread board 300
11 Transportation 1200
12 Mobile card 300
13 Contingency (10%) 829
Total 9119

Conclusion
The integration of fingerprint identification within an online crime management system offers
numerous advantages in terms of accuracy, efficiency, security, and collaboration, ultimately
contributing to more effective crime prevention and law enforcement efforts. The objective of
software planning is to provide a frame work that enables the administrator to make timely
schedules reasonable estimates made within a limited time frame at the beginning of the software
project and should be updated regularly as the project progresses.

Reference
wikipedia.org/wiki/Crime_in_Ethiopia.
https://www.scirp.org/journal/paperinformation?paperid=92272
https://et.usembassy.gov/u-s-citizen-services/victims-of-crime/

You might also like