Criminal Navigation Using Email Tracking System
Criminal Navigation Using Email Tracking System
TRACKING SYSTEM
The Project Report is submitted in partial fulfillment of the
requirements for the award of the degree of
Master of Computer Applications
Submitted by:
VANAPALLI BHAGYA PRIYA
2385351120
Submitted to
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
COLLEGE OF ENGINEERING
ADIKAVI NANNAYA UNIVERSITY
RAJAHMAHENDRAVARAM
2024-2025
B.V. RAJUCOLLEGE (AUTONOMOUS)
(Re-Accredited with ‘B++’ Grade by NAAC)
Department of MCA
Vishnupur :: Bhimavaram
CERTIFICATE
This is to certify that this project entitled “CRIMINAL NAVIGATION USING
EMAIL TRACKING SYSTEM” submitted in partial fulfillment of the degree of
MASTER OF COMPUTER APPLICATIONS to Adikavi Nannaya University
from 7itech solutions through B.V. Raju College, done by Ms. VANAPALLI
BHAGYA PRIYA Regd. No. 2385351120 is an authentic work carried out by her
during the Academic Year 2024-2025 at under my guidance. The matter embodied in
this project work has not been submitted earlier for award of any degree or diploma to
the best of my knowledge and belief.
The first person I would like to thank Dr. I.R.krishnam Raju, Principal MCA,
B V Raju College, Bhimavaram. His wide knowledge and logical way of thinking have
made a deep impression on me. His understanding, encouragement and personal guidance have
provided the basis for this thesis. He is a source of inspiration for innovative ideas and his kind
support is well known to all his students and colleagues.
2385351120
DECLARATION
This is to certify that the project report entitled “CRIMINAL NAVIGATION USING
EMAIL TRACKING SYSTEM” is done by me is an authentic work carried out for the
partial fulfillment of the requirements for the award of the degree of Master of
Computer Applications under the guidance of Ms.P.B.Sowjanya, Assistant Professor,
Dept. of MCA. The matter embodied in this project work has not been submitted earlier
for award of any degree or diploma to the best of my knowledge and belief.
2385351120
B.V.Raju College.
CONTENTS
1. INTRODUCTION 1-3
5.1. INTRODUCTION
5.2 UML DIAGRAMS
5.3 NORMALIZATION
5.4 DATA DICTIONARY
8.1 INTRODUCTION
9. CONCLUSION 35-36
10. BIBLIOGRAPHY
37-38
1. INTRODUCTION AND OBJECTIVE
1.1. INTRODUCTION
The spread of navigation devices has increased significantly over the last 10 years.
With the help of the current development of even smaller navigation receiver units it is to
navigate with almost any current smart phone. Modern navigation systems are no longer limited
to satellite navigation, but use current techniques, e.g., WLAN localization. Due to the increased
use of navigation devices their relevance to forensic investigations has risen rapidly. Because
navigation, for example with navigation equipment and smart phones, have become common
place these days, also the amount of saved navigation data has risen rapidly. All of these
developments lead to a necessary forensic analysis of these devices. However, there are very few
current procedures for investigating of navigation devices. Navigation data is forensically
interesting because by the position of the devices in most cases the location and the travelled
path of the owner can be reconstructed. In this work practices for forensic analysis of navigation
devices are developed. Different devices will be Analized and it is attempted, by means of
forensic procedures to restore the travelled path of the mobile device. For analysis of the various
devices different software and hardware is used. There will be presented common procedures for
securing and testing of mobile devices. Further there will be represented the specials in the
investigation of each device. The different classes considered are GPS handhelds, mobile
navigation devices and smart phones. It will be attempted, wherever possible, to read all data of
the device.
FUNCTIONAL SCOPE :
The functional scope of this project primarily covers the functions and activities at the city police
stations. This can primarily be categorized into the following modules.
1) Registration of
a. Lost Property.
b. Crimes and Criminals.
c. international hotels.
d. Customer booked in hotel information.
1
2) Verification (cross-check and generate report in case customer booked in hotel
information matches information recorded in criminals table).
3) Manage user accounts.
4)Search, update and delete data.
5)Generate report and print.
Crime has been increasing day by day and everyone in the world is trying to figure out how to
manage the crime rate and to work on certain cases, most of the people are trying to store the
data for future reference. Human errors can occur at any point of time. There are different types
of crimes law enforcement levels, such as traffic violations, sex crime, theft, violent crime, arson,
gang/drug offenses, cybercrime. Different crime data mining techniques are proposed among
each of them including entity extraction, clustering techniques, Association rule mining. Crime
zones can be identified by occurrence of crime, by using hotspots. Patrol is needed at these
hotspot areas. The data mining tool helps in reducing the crime rate drastically.
Disadvantages :
Crime Mapping helps in understanding the concepts and practice of Crime Analysis in assisting
police and helps in reduction and prevention of crimes and crime disorders using data mining
tools. We can use data mining tools involved using ANN (Artificial Neural Networks) and KDD
(Knowledge Discovery in Databases).
Advantages :
MODULE
1. ADMIN
2. POLICE
2
MODULE DESCRIPTION
ADMIN :
In this application admin is the main module, here admin can login directly with the
application and after login successful admin can perform operations such as view Police and
activate police, add criminal data and view criminal data.
POLICE :
In this application police is a module, here police should register with the application and
he should be authorized by the admin then only the police can access his home page after
successful login he can perform some operations such as track criminal by entering email or
mobile number
3
2. SYSTEM ANALYSYS
4
2.1 STUDY OF THE SYSTEM
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information
clearly. In any system results of processing are communicated to the users and to other system
through outputs. In output design it is determined how the information is to be
5
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.
Umbrella
DOCUMENT CONTROL
Umbrell
Business a
Requirement
Documentation
• Feasibility
Requiremen Study
ts • TEAM ANALYSIS & CODE UNIT TEST
FORMATION ASSESSME
Gathering • NT
Project
INTEGRATIO ACCEPTANCE
N & SYSTEM
DELIVERY/INS TEST
TESTING
Umbrell
TRAININ
a
G
SDLC is nothing but Software Development Life Cycle. It is a standard which is used by
software industry to develop good software.
Stages in SDLC:
Requirement Gathering
Analysis
Designing
Coding
Testing
Maintenance
6
2.4 SYSTEM ARCHITECTURE
Architecture flow:
Below architecture diagram represents mainly flow of requests from users to database through
servers. In this scenario overall system is designed in three tires separately using three layers
called presentation layer, business logic layer and data link layer. This project was developed
using 3tire architecture.
URL pattern represents how the requests are flowing through one layer to another layer and how the
responses are getting by other layers to presentation layer through server in architecture diagram.
7
3. FEASIBILITY STUDY
8
3. Feasibility Study:
Preliminary investigation examines project feasibility, the likelihood the system will be useful to the
organization. The main objective of the feasibility study is to test the Technical, Operational and
Economical feasibility for adding new modules and debugging old running system. All systems
are feasible if they are given unlimited resources and infinite time. There are aspects in the
feasibility study portion of the preliminary investigation:
Technical Feasibility
Operation Feasibility
Economical Feasibility
The technical issue usually raised during the feasibility stage of the investigation includes the
following:
Do the proposed equipment have the technical capacity to hold the data required to use
the new system?
Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
Are there technical guarantees of accuracy, reliability, ease of access and data security.
9
3.2 OPERATIONAL FEASIBILITY
User-friendly
Customer will use the forms for their various transactions i.e., for adding new routes, viewing
the routes details. the Customer wants the reports to view the various transactions based on
the constraints. These forms and reports are generated as user-friendly to the Client.
Reliability
The package wills pick-up current transactions on line. Regarding the old transactions, User
will enter them in to the system.
Security
The web server and database server should be protected from hacking, virus etc.
Portability
The application will be developed using standard open source software (Except Oracle) like
Java, tomcat web server, Internet Explorer Browser etc., these software will work both on
Windows and Linux o/s. Hence portability problems will not arise.
Maintainability
The system called the ewheelz uses the 2-tier architecture. The 1st tier is the GUI, which
is said to be front-end and the 2nd tier is the database, which uses MySQL , which is the
back-end.
The front-end can be run on different systems (clients). The database will be running at the
server. Users access these forms by using the user-ids and the passwords.
The computerized system takes care of the present existing system’s data flow and procedures
completely and should generate all the reports of the manual system besides a host of other
management reports. Open source software like TOMCAT, JAVA, MySQL and Linux is
used to minimize the cost for the Customer.
10
4. REQUIREMENT SPECIFICATIONS
11
4.1 FUNCTIONAL REQUIREMENTS ELICITATIONS
Functional requirements describe the interactions between the system and its environment
independent of its implementation.
Login
The system has the functionality that enables users to login to the system and perform any
activities according to their access privilege assigned to them. That is each actor or
system user has his/her own credential stored in the database. The system will check the
keyed values against the values stored in the database.
Storing crime and criminal’s detail information
The crime and Criminals registration module is proposed to register and store cognizable
crime and criminals. Registration module would enable assignment of a unique number
to facilitate proper monitoring. The details captured may include but not limited to
missed persons, crime and criminals and suspected person.
Storing property detail information
The property registration module is used to capture detail information about stolen, lost and
found properties.
Registering International Hotels information
The hotels Interface module of the CCTS acts as a conduit for information exchange between
hotels and police stations. This module enables to register and stores detail information
about international hotels found city.
Recording and submitting Hotel’s customer information to police station
The system should support submission of daily customer’s booked in hotel information to
nearby woreda police office and retain copy of it.
Generate Report
This module is used to generate the daily, quarterly, SEMI Annual and annual report by
woreda police office to central police office.
The System should be able to take information from a user and enter it into the
database. The speed at which this will be completed depends on the number of records currently
12
in the database. None of the processes are time sensitive, however the response time should be
relatively short (somewhere around 20 seconds). A typical load on the system would be multiple
users entering information. It was tested for five computers and it works fine and we assumed
that the system supports up to 20 clients without any delayness.
The Java programming language is a high-level language that can be characterized by all
of the following buzzwords:
o Simple
o Architecture neutral
o Object oriented
o Portable
o Distributed
o High performance
o Interpreted
o Multithreaded
13
o Robust
o Dynamic
o Secure
A Servlet Is a generic server extension. a Java class that can be loaded dynamically to expand
the functionality of a server, Servlets are commonly used with web servers. Where they can take
the place CGI scripts.
A servlet is similar to proprietary server extension, except that it run inside a Java Virtual
Machine (JVM) on the server, so it is safe and portable. Servlets operate solely within the
domain of the server. Unlike CGI and Fast CGI, which use multiple processes to handle separate
program or separate requests, separate threads within web server process handle all servlets.
This means that servlets are all efficient and scalable.Servlets are portable; both across operating
systems and also across web servers. Java Servlets offer the best possible platform for web
application development.
4.4.3 Oracle
Oracle is a relational database management system, which organizes data in the form of tables.
Oracle is one of many database servers based on RDBMS model, which manages a seer of data
that attends three specific things-data structures, data integrity and data manipulation.
With oracle cooperative server technology. we can realize the benefits of open, relational
systems for all the applications. Oracle makes efficient use of all systems resources, on all
hardware architecture; to deliver unmatched performance, price performance and scalability.
Any DBMS to be called as RDBMS has to satisfy DrE.F.Codd’s rules.
4.4.4 HTML
Hypertext Markup Language (HTML), the languages of the world wide web(WWW), allows
users to produces web pages that included text, graphics and pointer to other web pages
(Hyperlinks).
Html can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop.HTML provides tags(special codes) to make the document look attractive.HTML
14
provides are not case-sensitive. Using graphics,fonts,different sizes, colour, etc.,Can enhance the
presentation of the document.
JavaScript is a compact, object-based scripting language for developing client and server
internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded
directly in an HTML page. and Livewire enables you to create server-based applications
similar to common gateway interface(CGI) programs.
15
5. SYSTEM DESIGN
16
5.1. INTRODUCTION
Systems design
Introduction: Systems design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. One could see it as the
application of systems theory to product development. There is some overlap and synergy with
the disciplines of systems analysis, systems architecture and systems engineering.
5.2.UML DIAGRAMS
UML stands for Unified Modelling Language. UML is a standardized general-purpose modelling
language in the field of object-oriented software engineering. The standard is managed, and was
created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object-oriented computer
software. In its current form UML is comprised of two major components: a Meta- model and a
notation. In the future, some form of method or process may also be added to; or associated with,
UML.
The Unified Modelling Language is a standard language for specifying, Visualization, Constructing
and documenting the facts of software system, as well as for business modelling and other non-
software systems.
GOALS:
The Primary goals in the design of the UML are as follows:
Provide users a ready-to-use, expressive visual modelling Language so that they can
develop and exchange meaningful models.
Provide extendibility and specialization mechanisms to extend the core concepts.
Be independent of particular programming languages and development process.
Provide a formal basis for understanding the modelling language.
Encourage the growth of OO tools market.
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
17
diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by a system in terms of actors, their goals (represented as
use cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors in
the system can be depicted.
registe
r
logi
n
polic
e
trackCriminal
s
logout
logi
n
viewPolic
e
authorizePolic
e
Admi
n
addCriminalDa
ta
viewCriminalDa
ta
logout
18
CLASS DIAGRAM:
In software engineering, a class diagram in the Unified Modelling Language (UML) is a type of
static structure diagram that describes the structure of a system by showing the system's classes,
their attributes, operations (or methods), and the relationships among the classes. It explains
which class contains information.
19
SEQUENCE DIAGRAM:
A sequence diagram in Unified Modelling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a Message
Sequence Chart. Sequence diagrams are sometimes called event diagrams, event scenarios, and
timing diagrams.
regist
er
logi
n
logi
n
viewPolice&Authori
ze
addCriminalDa
ta
viewCriminalData&Del
ete
TrackCrimin
al
logou
t logou
t
20
COLLABORATION
Collaboration is a working practice whereby individuals work together for a common purpose to
achieve business benefit. Collaboration enables individuals to work together to achieve a defined
and common business purpose.
8:
logout 9: logout
Police
Admin
4:
viewPolice&Authorize
1: register
2: login
3: login
5: addCriminalData
6:
Applica
ti on
5.3. NORMALIZATION
Retrieving data
21
Clarity and ease of use
Source code
Dbconnection.java
package com.database;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.SQLException;
try{
Class.forName("com.mysql.jdbc.Driver");
con =
DriverManager.getConnection("jdbc:mysql://localhost:3306/tracking", "root",
"root");
catch(Exception e){
e.printStackTrace();
22
}
return con;
Queries.java
/*
*/
package com.database;
import java.sql.*;
try{
Connection con=Dbconnection.getcon();
23
Statement
st=con.createStatement();
rs=st.executeQuery(query);
}catch(Exception e){
System.out.println(e);
return rs;
try{
Connection con=Dbconnection.getcon();
Statement st=con.createStatement();
i=st.executeUpdate(query);
}catch(Exception e){
System.out.println(e);
return i;
24
6. OUTPUT SCREENS
25
SCREENS
Police login
26
Police registration
Track Criminals
27
Admin login
Admin home
28
View police details and activate
29
7. SYSTEM TESTING
30
7.1. INTRODUCTION TO TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub assembles, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the Software system meets its requirements and user
expectations and does not fail in an unacceptable manner. There are various types of test Each
test type addresses a specific testing requirement.
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration.
Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional testing
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
31
System Testing
System testing is based on process descriptions and flows, emphasizing pre-driven process links
and integration points.
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. It is a testing in which the software under test is
treated, as a black box .you cannot “see” into it. The test provides inputs and responds to outputs
without considering how the software works.
Unit Testing
Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct
phases.
Integration Testing
Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software applications, eg.,
components in a software system or – one step up – software applications at the company level –
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant participation
by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
32
8. SYSTEM SECURITY
33
8.1 INTRODUCTION
System Security:
Introduction:
To configure authentication for a Web Application, use the <login-config> element of the web.xml
deployment descriptor. In this element you define the security realm containing the user
credentials, the method of authentication, and the location of resources for authentication.
1. Open the web.xml deployment descriptor in a text editor or use the Administration
Console. Specify the authentication method using the <auth-method> element. The
available options are:
BASIC
Basic authentication uses the Web Browser to display a username/password dialog box. This
username and password is authenticated against the realm.
FORM
Form-based authentication requires that you return an HTML form containing the username
and password. The fields returned from the form elements must be username and
password, and the action attribute must be security check.
34
9. CONCLUSION
35
CONCLUSION
Crime is a complex social phenomenon, particularly; technology advancements now a day make
more complicated and its cost and impact on the society is increasing. Hence, law enforcement
organizations like that of police need to learn the factors that constitute higher crime trends. To
control or track this social evil there is always a need for prudent crime prevention strategies and
policies. Understanding and processing of criminal records is one method to learn about both
crime and individuals who involve in misdeeds so that police can take crime prevention
measures accordingly.
In this project so as to combat such challenges the CCTS helps to keep data of customer’s
booked in international hotels, applicants and their lost or stolen properties details at district and
police office stations or woredas. These data is used to facilitate crime and criminals tracking for
future or at the time of recording. The system provides comparison facilities about suspects or
criminals when the hotel submits daily report to the nearby police station and provides
notification to the system administrator. The other issue that is being addressed in this project is
sharing of information among the four police stations and the district so that best practice, stolen
properties, news, and progress of the cases are commonly available to stations. Reports are
generated by clicking button. In addition to this, the system enables hotels to send or submit
report through network which reduces the cost they incur for human labore, paper, and to save
time.
36
10. BIBLIOGRAPHY
37
BIBLIOGRAPHY
JAVA Technologies
Todd
HTML
JDBC
38