0% found this document useful (0 votes)
22 views6 pages

PCRMS3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views6 pages

PCRMS3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ISSN (Online) 2394-2320

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

Criminal Management System


[1]
Vishal Jayaswal, [2]Saumya Gupta, [3]Ricky Yadav, [4]Shivani Sharma
[1][2][3][4]
Department of Computer Science and Engineering, MIET, Meerut

Abstract: The project aims at developing a criminal management system that will be capable of working online and which is
effortlessly approachable to the police department along with all the other residents of the country also. The residents of the
country can file the F.I.R. online and their F.I.R. will get registered in the nearby police station through centralized data handling.
To keep away the fake users, system will make use of O.T.P. generation and QR code technique. Also, to access the previous
records of the criminals correctly, system will use biometrics and images of the criminals for accuracy. The system also generates
the report of crime rate in a particular area through statistical analysis of crime rate. It enables the interstation communication in
real time for reduced time consumption. We intend to make a system which overcomes the shortcomings of primitive manual
criminal management system and make it run parallel to the developing world.

I. INTRODUCTION

Criminal management system is developed using MySql,


PHP and Apache HTTP Server. The main objective of
this project is to enhance the crime recording operation
quality of the security agencies exponentially. This
system can work 24/7 and open to every resident of the
country. It takes care of the social workers also by
enabling a feature of data analysis based on crime records
of the particular area. People will be able to judge the
security in the areas on the basis of the number of crimes
reported in the area. The older methods involves the
problems of deficiency of funding, corruption and
extortion and dearth of required skills and resources for
recording data appropriately.

This system is also immune to uncensored manipulation


by any corrupt police personnel, making it more secure
and trustworthy. It results in reduction of threat level to
the residents. No formal knowledge is required for the
usage of this system, all the steps to be followed while II. LITERATURE SURVEY
using it are self explanatory. It will make the process of
record keeping, a hassle free task, so that the precious [11]Behavioural analysis of crime against women using a
time wasted in record keeping can be utilized in more graph Based clustering approach.2017 International
important tasks. This system will make the manual system Conference on Computer Communication and
to be updated to digital system which is the need of an Information (ICCI):
hour.
Crimes related to women are expanding in an unstoppable
way in almost every part of India and Indian society’s
women are facing indignity, torment behaviour of many
people, harassment and ill treatment towards them. It was
in existence earlier also but recently this issues has come
to light for consideration. As per the data issued by the

14
ISSN (Online) 2394-6849

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

National Crime Records Bureau (NCRB) recently, crimes The research assess the effectiveness of Info map
in which women are the victims are clustering algorithm to detect various sections of society
of different states and UTs in India on the basis of crimes.
As this clustering approach makes use of graphs, all the
states and the union territories are used as nodes or
junctions of the graph and closeness among those
junctions have been measured on the grounds of different
forms of crimes. Each section or a community comprises
a cluster of states or UTs which consist some closeness on
the grounds of crime trends. In the starting, the proposed
method will find and differentiate the communities on the
grounds of present year data on crimes. Afterwards, in
the end of a year when new crime data and analysis for
the next year is accessible.

PROBLEM STATEMENT

To design a program for the police department to easily


access the criminals’ records online and analyse the crime
rate of a particular area along witch some other
additional features.

PROPOSED MODEL

The main purpose lies in online reporting at people’s side


and centralized data handling at police’s side. The system
is capable of overriding the shortcomings of manual
record system where files of records go missing and
Flow chart of Proposed Model which is prone to
corruption also.

Modules

Admin Module :

Firstly, each of the station has to register with the


software.
increasing and they have doubled in last decade. A Once the prospective station's registration is completed
number of surveys and analysis have been done in the with the software, they can upload the record.
respective area covering the detection of patterns of
crime, but no one has done a deep research on the crime
happening against Indian women. The present paper
narrates a behavioural research and analysis of crime that
is done against women in India during the years 2001 to
2014.

15
ISSN (Online) 2394-6849

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

Admin table User table

Users Module : 1. Police module :

This is a police dashboard where the police can accept the Police office bearers can shortly view number of new
absolute information using login password. FIRs, total approved FIR, chargesheet and criminals.
Police officers can search for criminals and FIR
To access the online criminal management system we particulars with the aid of criminal ID and FIR number
need to- respectively.
Add on users (police office bearers along with the
background screening agencies) and allocate them various
levels of entitlements.
Verify user login particulars and also make sure user level
prerogatives to data.
Stock as well as recover all the data about crime and
criminals.
Execute search tasks on the grounds of some defined
standards.
Execute crime inspection and analysis along with the
statistics to generate adequate reports • Now, generate the
criminal reports.

16
ISSN (Online) 2394-6849

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

Architecture of the Proposed Model

V. METHODOLOGY

The employed model here is the Waterfall model in


Police table software development. The proposed model adhere to a
subsequent order which makes sure that one phase is
Advantages of the Proposed Model concluded prior to the new phase.

Interstation communication can be The stages of the waterfall model comprises of :


done immediately
Data handling becomes centralized Requirements analysis: This is the phase which
Time consumption also reduces incorporates the assembling of all requirements from the
Operational efficiency end users. The requirements are accumulated and stocked
Cost reduction as a requirements specification document.

System Analysis and Design: The requirement


specifications referred in the above mentioned first phase
are to be considered in this second phase and after this the
system design is constructed. Proper research and analysis
of existing system is completed in this phase only; the
shortcomings of the already existing model are examined
and then work is done on them to eliminate or reduce
them.
Design tools used for this project include: PHP, MySQL,
APACHE HTTP server.

Implementation: The CMS is implemented through


HTML and JavaScript for graphical user interface.

17
ISSN (Online) 2394-6849

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

MySQL is employed in scheming a strong and robust against the crime. However, this system was having a
database and PHP is the application logic that sanctions drawback that it was only accessible to police department,
transactions in the middle of the front end and the common public couldn’t use it. But our system provides
backend. interface for common people also to file an FIR, check its
status and history, hence overcoming the drawback of
Testing: All of the units evolved in the implementation above mentioned system.
phase are unified into a system following testing of each
unit. After integration, the complete system is tested for VII. CONCLUSION
any faults and failures present.
This project fulfils the gap of easy interaction between
Deployment of system: Following the functional and non- police and common public. It will prove to be a perfect
functional testing, the product is dispatched in the replacement for the manual crime recording system. The
customer environment or allowed to go in the market. greatest strength lies in the fact that it is parallel to the
After this, our offered system model is installed and the digitalization era of new world. It will also prove to be
transition phase starting from the old environment and beneficial in crime reduction in the long run, making it a
reaching to new environment is looked upon consistently. better option to adopt. The Software made is found to be
This phase includes training of the officers who will running efficiently and effectually. It results in consistent
operate the system in future. and timely action in case of crime reported. It can be
perceived that the details can be obtained effortlessly and
Maintenance: In this phase, problems appearing on precisely. The Software is made adaptable to the
deployment of the system in the client environment are maximum so that any layman can run the software
inspected and solved. To do so, patches are allowed to be provided he could access to the system via login
released. And to enhance the working of product, some password. It believes that partnership work is highly
better versions are also released to keep it updated with beneficial to the organization and that partnership work is
respect to upcoming technological transitions. the way forward to lessen crime and disorder.
Maintenance is done consistently to deliver these changes
in the customer environment on regular basis.
VII. FUTURE WORK
VI. COMPARATIVE ANALYSIS
In this project, an integrated system is going to be
[13]“A Real-Time Records Management System for developed which will be valid for future generations also.
National Security Agencies”, Onulri Ernest.E, Oludeli However, best suited way to deal with the crime specific
Awodeli. to a particular area system can also be developed on the
This system was having an objective of keeping record of basis of crime rate analysis.
arrested or to be arrested criminals. This system
provided opportunity for storage information about After carrying out extensive research on crime record
escaped criminals also. But it was having a drawback also management at home and abroad and on full
which has been removed by our model of criminal implementation of the CMS, some points to ponder about
management system. Above mentioned system does not improving the efficiency of the existing CMS of the
generate QR code for verification. Our proposed model security agencies include;
generates QR code for more authentic verification.
A generic platform for keeping human records from birth
[8]“Crime Reporting Interface Design using Mobile till death throughout the country. Then CMS can be
Technologies”, linked to this system and provide comprehensive data
Priyanka Vakkalagadda, Ramya Sahithi Amathi and of all the people in the country.
Srinidhi Eragam Reddy
This system was having an objective of developing a The CMS should be amalgamated with the criminal
crime file to maintain a computerized records of all FIR justice system to give output to a bigger and better system

18
ISSN (Online) 2394-6849

International Journal of Engineering Research in Computer Science and Engineering


(IJERCSE)
Vol 8, Issue 7, July 2021

that includes all the facets of the justice system. This will management system. Innovative systems design and
enhance synchronization between the court of law and engineering, 1-11.
security forces
William Adesoji Johnson; Jide Johnson; Tolu Elizabeth
Verification using Biometric: A biometric system be Ifedayo. (2013). Evaluation and structures and operations
added to the system to enhance the security of data. This of the nigeria police public relations department. Kuwait
is a recommendation that can help develop this system Chapter of Arabian Journal of Business and Management
even better. This restricts the system from the reach of Review Vol. 2, No.11; July 2013, 1-2.
unauthorized users.
Behavioural analysis of crime against women using a
REFERENCE graph Based clustering approach.2017 International
Conference on Computer Communication and
[1] “Criminal Records Ohio Information System”, Information (ICCI)
[online]. Available:
http://ww.society.ezinemark.com/criminalrecords- ohio- Onulri Ernest.E, Oludeli Awodeli A Real-Time Records
informationsystem171e851d4ae.html[accessed 18 April Management System for National Security Agencies”,
2019] [2] Archana M., et al., Online Crime Reporting Onulri Ernest.E, Oludeli Awodeli
System, in Int. Jnl. Of Advanced Networking and
Applications((IJANA)

Pradnya Ogale, et al., – Online Crime Reporting and


Management System using Data Mining, in International
Research Journal of Engineering and Technology
(IRJET), Volume 07, Issue –
01,Jan,2020

D. K. Tayal, et al., “Crime detection and Criminal


identification in India using data Mining Techniques,” AI
& SOCIETY, vol. 30, No. 1, pp. 117–127, 2015.

S. Saitta, et al., bounded Index for cluster


th International Conference on Validity,” in 5
Machine Learning and Data Mining (MLDM
2007), vol. 4571, July 2007, pp. 174–187

SaharBayoumi, Sarah AlDakhil, Eman Al Nakhilan,


Ebtehal Al Taleb, Hana AlShabib, “A Review of Crime
Analysis and Visualization. Case Study: Maryland State,
USA”, in Proc 10.1109/NCG, 2018, pp.56-57.

Priyanka Vakkalagadda,, Ramya Sahithi, Amathi and


Srinidhi Eragam Reddy, “Crime
Reporting Interface Design using Mobile
Technologies”

Mubaraka, C., Jirgi, I. M., & Nanyanci, P. L. (2013).


Integrating ICT in Traffic Police Department in
Uganda;Design and development of traffic case

19

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy