PCRMS3
PCRMS3
Abstract: The project aims at developing a criminal management system that will be capable of working online and which is
effortlessly approachable to the police department along with all the other residents of the country also. The residents of the
country can file the F.I.R. online and their F.I.R. will get registered in the nearby police station through centralized data handling.
To keep away the fake users, system will make use of O.T.P. generation and QR code technique. Also, to access the previous
records of the criminals correctly, system will use biometrics and images of the criminals for accuracy. The system also generates
the report of crime rate in a particular area through statistical analysis of crime rate. It enables the interstation communication in
real time for reduced time consumption. We intend to make a system which overcomes the shortcomings of primitive manual
criminal management system and make it run parallel to the developing world.
I. INTRODUCTION
14
ISSN (Online) 2394-6849
National Crime Records Bureau (NCRB) recently, crimes The research assess the effectiveness of Info map
in which women are the victims are clustering algorithm to detect various sections of society
of different states and UTs in India on the basis of crimes.
As this clustering approach makes use of graphs, all the
states and the union territories are used as nodes or
junctions of the graph and closeness among those
junctions have been measured on the grounds of different
forms of crimes. Each section or a community comprises
a cluster of states or UTs which consist some closeness on
the grounds of crime trends. In the starting, the proposed
method will find and differentiate the communities on the
grounds of present year data on crimes. Afterwards, in
the end of a year when new crime data and analysis for
the next year is accessible.
PROBLEM STATEMENT
PROPOSED MODEL
Modules
Admin Module :
15
ISSN (Online) 2394-6849
This is a police dashboard where the police can accept the Police office bearers can shortly view number of new
absolute information using login password. FIRs, total approved FIR, chargesheet and criminals.
Police officers can search for criminals and FIR
To access the online criminal management system we particulars with the aid of criminal ID and FIR number
need to- respectively.
Add on users (police office bearers along with the
background screening agencies) and allocate them various
levels of entitlements.
Verify user login particulars and also make sure user level
prerogatives to data.
Stock as well as recover all the data about crime and
criminals.
Execute search tasks on the grounds of some defined
standards.
Execute crime inspection and analysis along with the
statistics to generate adequate reports • Now, generate the
criminal reports.
16
ISSN (Online) 2394-6849
V. METHODOLOGY
17
ISSN (Online) 2394-6849
MySQL is employed in scheming a strong and robust against the crime. However, this system was having a
database and PHP is the application logic that sanctions drawback that it was only accessible to police department,
transactions in the middle of the front end and the common public couldn’t use it. But our system provides
backend. interface for common people also to file an FIR, check its
status and history, hence overcoming the drawback of
Testing: All of the units evolved in the implementation above mentioned system.
phase are unified into a system following testing of each
unit. After integration, the complete system is tested for VII. CONCLUSION
any faults and failures present.
This project fulfils the gap of easy interaction between
Deployment of system: Following the functional and non- police and common public. It will prove to be a perfect
functional testing, the product is dispatched in the replacement for the manual crime recording system. The
customer environment or allowed to go in the market. greatest strength lies in the fact that it is parallel to the
After this, our offered system model is installed and the digitalization era of new world. It will also prove to be
transition phase starting from the old environment and beneficial in crime reduction in the long run, making it a
reaching to new environment is looked upon consistently. better option to adopt. The Software made is found to be
This phase includes training of the officers who will running efficiently and effectually. It results in consistent
operate the system in future. and timely action in case of crime reported. It can be
perceived that the details can be obtained effortlessly and
Maintenance: In this phase, problems appearing on precisely. The Software is made adaptable to the
deployment of the system in the client environment are maximum so that any layman can run the software
inspected and solved. To do so, patches are allowed to be provided he could access to the system via login
released. And to enhance the working of product, some password. It believes that partnership work is highly
better versions are also released to keep it updated with beneficial to the organization and that partnership work is
respect to upcoming technological transitions. the way forward to lessen crime and disorder.
Maintenance is done consistently to deliver these changes
in the customer environment on regular basis.
VII. FUTURE WORK
VI. COMPARATIVE ANALYSIS
In this project, an integrated system is going to be
[13]“A Real-Time Records Management System for developed which will be valid for future generations also.
National Security Agencies”, Onulri Ernest.E, Oludeli However, best suited way to deal with the crime specific
Awodeli. to a particular area system can also be developed on the
This system was having an objective of keeping record of basis of crime rate analysis.
arrested or to be arrested criminals. This system
provided opportunity for storage information about After carrying out extensive research on crime record
escaped criminals also. But it was having a drawback also management at home and abroad and on full
which has been removed by our model of criminal implementation of the CMS, some points to ponder about
management system. Above mentioned system does not improving the efficiency of the existing CMS of the
generate QR code for verification. Our proposed model security agencies include;
generates QR code for more authentic verification.
A generic platform for keeping human records from birth
[8]“Crime Reporting Interface Design using Mobile till death throughout the country. Then CMS can be
Technologies”, linked to this system and provide comprehensive data
Priyanka Vakkalagadda, Ramya Sahithi Amathi and of all the people in the country.
Srinidhi Eragam Reddy
This system was having an objective of developing a The CMS should be amalgamated with the criminal
crime file to maintain a computerized records of all FIR justice system to give output to a bigger and better system
18
ISSN (Online) 2394-6849
that includes all the facets of the justice system. This will management system. Innovative systems design and
enhance synchronization between the court of law and engineering, 1-11.
security forces
William Adesoji Johnson; Jide Johnson; Tolu Elizabeth
Verification using Biometric: A biometric system be Ifedayo. (2013). Evaluation and structures and operations
added to the system to enhance the security of data. This of the nigeria police public relations department. Kuwait
is a recommendation that can help develop this system Chapter of Arabian Journal of Business and Management
even better. This restricts the system from the reach of Review Vol. 2, No.11; July 2013, 1-2.
unauthorized users.
Behavioural analysis of crime against women using a
REFERENCE graph Based clustering approach.2017 International
Conference on Computer Communication and
[1] “Criminal Records Ohio Information System”, Information (ICCI)
[online]. Available:
http://ww.society.ezinemark.com/criminalrecords- ohio- Onulri Ernest.E, Oludeli Awodeli A Real-Time Records
informationsystem171e851d4ae.html[accessed 18 April Management System for National Security Agencies”,
2019] [2] Archana M., et al., Online Crime Reporting Onulri Ernest.E, Oludeli Awodeli
System, in Int. Jnl. Of Advanced Networking and
Applications((IJANA)
19