0% found this document useful (0 votes)
20 views59 pages

Complete Writeup (ALARAPE MUNMINAT BOLANLE)

Complete Writeup (ALARAPE MUNMINAT BOLANLE)

Uploaded by

michael samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views59 pages

Complete Writeup (ALARAPE MUNMINAT BOLANLE)

Complete Writeup (ALARAPE MUNMINAT BOLANLE)

Uploaded by

michael samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 59

DESIGN AND IMPLEMENTATION OF AN AUTOMATION OF CRIME

RECORDS
A CASE STUDY OF AREA DIVISION ILORIN

ALARAPE MUMINAT BOLANLE


CS/HND/F22/3392

SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE,


IN PARTIAL FULFILMENT FOR THE AWARD OF HIGHER
NATIONAL DIPLOMA (HND) IN COMPUTER SCIENCE.
SCHOOL OF COMPUTING
FEDERAL POLYTECHNIC, OFFA
P.M.B. 420, OFFA, KWARA STATE, NIGERIA.

SUPERVISED BY:
MISS TOYE N,T

2024
CERTIFICATION

I certify that this project was carried out by Alarape Munminat Bolanle with matric
numbers CS/HND/F22/3392, a student of the department of Computer Science,
School of Computing, Federal Polytechnic, Offa, Kwara State. In partial fulfillment
of the requirements for the award of Higher National Diploma (HND) in Computer
Science.

_____________________________ _______________________
ALARAPE MUNMINAT BOLANLE DATE
PROJECT STUDENT

i
APPROVAL PAGE

This project work carried out by Alarape Munminat Bolanle with matric number
CS/HND/F22/3392 has been read and approved by my supervisor for submission to
the department of Computer Science, School of Computing, Federal Polytechnic,
Offa, Kwara State. In partial fulfillment of the requirements for the award of Higher
National Diploma(HND) in Computer Science.

_____________________________ __________________________
MISS TOYE N.T DATE
PROJECT SUPERVISOR

_____________________________ __________________________
MR ALIYU M.J DATE
HEAD OF DEPARTMENT

ii
ABSTRACT

The modernization of crime record management systems is increasingly


becoming a necessity for law enforcement agencies worldwide. Traditional
manual methods of managing crime records are often plagued with
inefficiencies, inaccuracies, and security vulnerabilities. As technology
advances, the automation of these records presents an opportunity to
enhance the effectiveness and efficiency of law enforcement operations
This study focuses on the automation of crime records in the Area Division
of Ilorin, a significant step towards modernizing the division's crime
management system. Manual crime record management systems involve
extensive paperwork and are prone to human error, leading to data
inaccuracies and delays in information retrieval, Furthermore, automated
systems can enhance data security through advanced encryption and
access control mechanisms, protecting sensitive information from
unauthorized access and tampering, for the implementation of the system,
web base platform was used to implement the system because is it provide
good data security and very easy to navigate through, the system enables
the police division Ilorin, to adequate monitor the rate crime committed
and do proper follow up rather than the manual process, By addressing
the inefficiencies and vulnerabilities of the manual system, automation can
enhance the division's capacity to manage crime data effectively and
securely. This study aims to develop and implement an automated system
tailored to the needs of the Area Division, ultimately contributing to
improved public safety and trust in law enforcement.

iii
DEDICATION

This project is dedicated to Almighty Allah the creator of heaven and earth, the giver
of life. For his love, guidance, mercy, wisdom, favour and protection throughout the
completion of my program. And also dedicated to my beloved parent Mr and Mrs
Alarape for their prayer and their monetary for the success of this programmed.

iv
ACKNOWLEDGEMENT

It is expedient on my part to give glory, honour and adoration to the almighty Allah
who has sailed me through the turbulent waves of challenges and difficulties that
may be involved for the completion of my programmed. Therefore, glory is to God
in the highest for he has done it.
I am indebted to my parent, Mr & Mrs. Alarape for their support; financially,
spiritually and their parental advice that made me what i am today. I pray that God
will bless you tremendously and grant you long life and prosperity.
I must not forget my dynamic project supervisor Miss Toye N.T for their good
judgement and patience to get the best from everything he has supervised, sir you
have taught me hard work and I can never forget you.
I Acknowledge the effort of my Beloved Husband Mr Oladoyin Roqeeb and
brothers Mr Alarape Azeez, Mr Alarape Habeeb you will never lack.

v
TABLE OF CONTENTS

CERTIFICATION.....................................................................................................................i
APPROVAL PAGE..................................................................................................................ii
ABSTRACT............................................................................................................................iii
DEDICATION.........................................................................................................................iv
ACKNOWLEDGEMENT........................................................................................................v
TABLE OF CONTENTS........................................................................................................vi
LIST OF TABLES................................................................................................................viii
LIST OF FIGURES.................................................................................................................ix
LIST OF APPENDICES...........................................................................................................x

CHAPTER ONE.........................................................................................................1
1.1 GENERAL INTRODUCTION..............................................................................1
1.2 STATEMENT OF THE PROBLEM.....................................................................3
1.3 AIM AND OBJECTIVES OF THE STUDY.........................................................3
1.4 SIGNIFICANCE OF THE STUDY.......................................................................4
1.5 SCOPE OF THE STUDY......................................................................................4
1.6 LIMITATION OF THE STUDY...........................................................................5
1.7 DEFINITION OF TERMS.....................................................................................5

CHAPTER TWO........................................................................................................8
2.1 THEORETICAL CONCEPT.................................................................................8
2.1.1 CURRENT PRACTICES IN CRIME RECORD MANAGEMENT.........11
2.1.2 LEGAL AND ETHICAL CONSIDERATIONS IN CRIME DATA
MANAGEMENT................................................................................................12
2.1.3 PERFORMANCE METRICS AND EVALUATION OF CRIME
RECORD SYSTEMS.........................................................................................13
2.2 REVIEW OF RELATED WORK........................................................................15
2.2.1 INTEROPERABILITY AND INFORMATION SHARING AMONG
LAW ENFORCEMENT AGENCIES................................................................17
2.2.2 DEVELOPMENT AND EVOLUTION OF CRIME RECORD SYSTEMS
.............................................................................................................................19

vi
CHAPTER THREE.................................................................................................21
3.1 DATA COLLECTION.........................................................................................21
3.2 DESCRIPTION OF THE PROPOSED SYSTEM...............................................23
3.3 ANALYSIS OF THE PROPOSED SYSTEM.....................................................24
3.4 SYSTEM DESIGN...............................................................................................26

CHAPTER FOUR....................................................................................................30
4.1 SYSTEM REQUIREMENTS..............................................................................30
4.1.1 SOFTWARE REQUIREMENTS..............................................................30
4.1.2 HARDWARE REQUIREMENTS.............................................................30
4.2 SYSTEM IMPLEMENTATION:........................................................................30
4.2.1 INPUT INTERFACE.................................................................................30
4.3 SYSTEM DOCUMENTATION AND MAINTENANCE..................................33
4.3.1 PROGRAM DESCRIPTION.....................................................................33
4.3.2 OPERATING THE SYSTEM....................................................................34
4.3.3 MAINTENANCE OF THE SYSTEM.......................................................34
4.3.4 BENEFITS OF THE SYSTEM..................................................................34

CHAPTER FIVE......................................................................................................36
5.1 SUMMARY.........................................................................................................36
5.2 CONCLUSION....................................................................................................36
5.3 RECOMMENDATION........................................................................................37

REFERENCES.........................................................................................................38

vii
LIST OF TABLES

No table of figures entries found.

viii
LIST OF FIGURES

Fig 3.1: Automation of Crime Record Data Flow Diagram...................................................25


Figure 4.1: Login Page............................................................................................................31
Figure 4.2: Officer Dashboard Page.......................................................................................31
Figure 4.3: Crime Investigation Page.....................................................................................32
Figure 4.4: Database Interface................................................................................................33

ix
LIST OF APPENDICES

Appendix A.............................................................................................................................42
Appendix B.............................................................................................................................43
Appendix C.............................................................................................................................45

x
CHAPTER ONE

One.1 GENERAL INTRODUCTION

The modernization of crime record management systems is increasingly


becoming a necessity for law enforcement agencies worldwide. Traditional
manual methods of managing crime records are often plagued with
inefficiencies, inaccuracies, and security vulnerabilities. As technology
advances, the automation of these records presents an opportunity to enhance
the effectiveness and efficiency of law enforcement operations. This study
focuses on the automation of crime records in the Area Division of Ilorin, a
significant step towards modernizing the division's crime management
system.Manual crime record management systems involve extensive
paperwork and are prone to human error, leading to data inaccuracies and
delays in information retrieval (Smith, 2018). These systems are also
susceptible to physical damage and loss, which can impede criminal
investigations and the administration of justice (Jones & Brown, 2020).
Moreover, the manual process of managing records is time-consuming, often
diverting valuable resources from critical law enforcement duties to
administrative tasks (Williams, 2019).Automation, defined as the use of
technology to perform tasks with minimal human intervention, offers
numerous benefits in the context of crime record management. Automated
systems can significantly reduce the margin of error by ensuring that data is
entered and processed accurately. They also facilitate quicker retrieval of
information, which is crucial in time-sensitive investigations (Johnson,
2017). Furthermore, automated systems can enhance data security through
advanced encryption and access control mechanisms, protecting sensitive
information from unauthorized access and tampering (Taylor, 2016).The
implementation of an automated crime record system in the Area Division of
Ilorin aims to address the limitations of the current manual system. By

1
leveraging technology, the division can improve the accuracy, accessibility,
and security of crime-related data. This is particularly important in today's
digital age, where timely and accurate information is paramount to effective
law enforcement (Miller, 2021).One of the key drivers for the automation of
crime records is the increasing volume and complexity of data that law
enforcement agencies must manage. As the population grows and urbanizes,
crime rates often rise, leading to more data that needs to be meticulously
recorded and analyzed (Roberts, 2020). Automated systems can handle large
datasets efficiently, enabling law enforcement agencies to detect crime
patterns and trends more effectively. This capability can enhance strategic
planning and resource allocation, ultimately improving public safety (Lee,
2018).Additionally, automated crime record systems can support inter-
agency collaboration by providing a standardized platform for data sharing.
This is particularly beneficial in tackling cross-jurisdictional crimes, where
seamless communication and information exchange between different law
enforcement agencies are critical (Garcia, 2017). The integration of
automated systems can thus foster a more coordinated and effective response
to crime.The significance of automating crime records extends beyond
operational efficiency. It also has implications for the transparency and
accountability of law enforcement agencies. Automated systems can provide
audit trails and detailed logs of data entries and modifications, which are
essential for maintaining the integrity of crime records (Davis, 2019). This
transparency can build public trust in law enforcement agencies, as it
demonstrates a commitment to accuracy and accountability.The automation
of crime records in the Area Division of Ilorin represents a transformative
step towards modernizing law enforcement practices. By addressing the
inefficiencies and vulnerabilities of the manual system, automation can
enhance the division's capacity to manage crime data effectively and
securely. This study aims to develop and implement an automated system

2
tailored to the needs of the Area Division, ultimately contributing to
improved public safety and trust in law enforcement.

One.2 STATEMENT OF THE PROBLEM

The current manual crime record management system in the Area Division of
Ilorin is fraught with significant challenges that hinder effective law
enforcement. These challenges include frequent data inaccuracies due to
human error, which compromise the reliability of crime records.
Additionally, the manual system is time-consuming and labor-intensive,
diverting law enforcement personnel from more critical duties such as crime
prevention and investigation. Data retrieval in this manual system is
cumbersome, leading to delays that can obstruct timely decision-making and
response to criminal activities. Furthermore, the manual system is vulnerable
to physical damage and loss of records, which can result in the permanent
loss of crucial information. Security issues also arise, as physical records are
more susceptible to unauthorized access and tampering. These inefficiencies
and vulnerabilities not only impede the operational effectiveness of the
police force but also undermine the overall administration of justice.In light
of these issues, there is an urgent need to transition to an automated crime
record system. Such a system promises to enhance data accuracy, improve
retrieval times, bolster security, and ultimately, streamline the overall process
of crime record management. This study aims to address these problems by
developing a comprehensive automated solution tailored to the needs of the
Area Division of Ilorin.

One.3 AIM AND OBJECTIVES OF THE STUDY

The aim of this project is to develop an automation of crime records.


The objectives are to:

3
1. Design an automated crime record system tailored to the needs of the
Area Division.
2. Develop and test the automated crime record system.
3. Evaluate the performance of the automated system` in terms of
accuracy, efficiency, and user satisfaction.

One.4 SIGNIFICANCE OF THE STUDY

The automation of crime records in the Area Division of Ilorin offers


substantial improvements in law enforcement efficiency and effectiveness.
Automated systems enhance data accuracy by minimizing human error,
ensuring reliable and precise crime records essential for informed decision-
making in investigations. Improved data accessibility allows officers to retrieve
information quickly, enabling timely responses to criminal activities.
Operational efficiency is significantly boosted as automation reduces the time
spent on routine administrative tasks, allowing officers to focus on critical
duties like crime prevention and investigation. Enhanced data security is
another key benefit, with automated systems providing advanced encryption
and access controls to protect sensitive information from unauthorized access
and tampering. Additionally, automated systems support advanced data
analysis, helping identify crime trends and patterns, which aids in strategic
planning and proactive crime prevention. This study is pivotal in modernizing
crime record management in Ilorin, leading to a more efficient, effective, and
trustworthy law enforcement system.

One.5 SCOPE OF THE STUDY

This study focuses on the development and implementation of an automated


crime record management system specifically for the Area Division of Ilorin.
It encompasses a comprehensive review of the current manual record-
keeping processes to identify existing inefficiencies and challenges. The
4
scope includes designing a system architecture tailored to address these
issues, followed by the actual development and testing of the automated
system.However, it is confined to the Area Division of Ilorin and does not
extend to other divisions or regions, thus the findings and recommendations
will be specifically applicable to this division.

One.6 LIMITATION OF THE STUDY

While this study aims to develop a comprehensive automated crime record


management system for the Area Division of Ilorin, it is subject to several
limitations. Resource constraints, including limited financial and technical
resources, may impact the development and implementation process.
Additionally, resistance to change from personnel accustomed to the manual
system could pose challenges to user adoption.Data migration from the
existing manual system to the new automated system may be time-
consuming and complex, potentially leading to temporary disruptions.
Technical issues, such as system downtimes or software bugs, could also
affect the system’s reliability and performance. Moreover, the study is
confined to the Area Division of Ilorin and may not account for the specific
needs or circumstances of other divisions or regions, limiting the
generalizability of the findings.

One.7 DEFINITION OF TERMS

Access Control: Security measures that restrict who can view or use
resources.
Audit Trail: A record of changes and access to data, used to track
modifications and ensure accountability.
Automation: The use of technology to perform tasks with minimal human
intervention.
5
Crime Record: Documentation of criminal incidents, investigations, and
outcomes.
Data Accuracy: The correctness and precision of data.
Data Migration: The process of transferring data between storage types,
formats, or systems.
Data Retrieval: The process of obtaining data from a database or other
storage system.
Data Security: Measures taken to protect data from unauthorized access or
alterations.
Efficiency: The ability to accomplish a task with minimal time and
resources.
Encryption: The process of encoding data to prevent unauthorized access.
Implementation: The process of putting a system into operation.
Law Enforcement: Agencies and officers responsible for maintaining public
order and safety.
Manual System: A non-automated process relying on human effort and
paper records.
Operational Efficiency: The ability to deliver services in the most cost-
effective manner without compromising quality.
Proactive Measures: Actions taken in advance to prevent potential problems
or crimes.
Resource Allocation: The process of distributing available resources among
various projects or business units.
Strategic Planning: The process of defining an organization's direction and
making decisions on allocating resources to pursue this strategy.
System Architecture: The conceptual model that defines the structure,
behavior, and more views of a system.
System Downtime: Periods when a system is not operational or functioning
correctly.

6
User Satisfaction: The degree to which users are happy with the system and
its performance.

7
CHAPTER TWO

Two.1 THEORETICAL CONCEPT

The automation of crime record management has become an essential


component in modern law enforcement, providing numerous advantages over
traditional manual systems. Automated Crime Record Management Systems
(ACRMS) are designed to enhance the accuracy, accessibility, and security
of crime-related data, ultimately improving the efficiency and effectiveness
of police work. This section delves into the theoretical underpinnings of
ACRMS, examining the concepts and frameworks that inform their
development and implementation.Information Systems (IS) theory provides a
foundational framework for understanding the design and implementation of
ACRMS. According to IS theory, effective information systems should
improve the efficiency and effectiveness of organizational processes by
facilitating accurate data collection, processing, and dissemination (Alter,
2017). ACRMS apply these principles to the domain of law enforcement,
where the rapid and reliable exchange of information is critical. The theory
emphasizes the importance of system design that aligns with organizational
goals, user needs, and technological capabilities (Davis, 2018).Socio-
technical systems theory is also relevant in the context of ACRMS. This
theory posits that the success of an information system depends not only on
the technical components but also on the social environment in which it
operates (Bostrom&Heinen, 1977). For ACRMS, this means considering the
needs and behaviors of law enforcement personnel, the organizational
culture, and the broader social context. Effective implementation of ACRMS
requires addressing both technical challenges, such as system reliability and
data security, and social challenges, such as user acceptance and training
(Lyytinen& Newman, 2015). By integrating both social and technical

8
aspects, law enforcement agencies can ensure the system is both effective
and accepted by its users.Data quality is a critical concept in the theoretical
framework for ACRMS. High-quality data is accurate, complete, timely, and
relevant, which are essential characteristics for effective crime record
management (Wang & Strong, 1996). Poor data quality can lead to erroneous
conclusions and ineffective law enforcement actions. The principles of data
management theory emphasize the importance of robust data governance
practices, including data entry standards, validation processes, and regular
audits to maintain data integrity (Redman, 2018). Ensuring high data quality
helps in making informed decisions and enhances the overall reliability of the
crime record management system.
Human-Computer Interaction (HCI) theory is crucial in designing user-
friendly ACRMS. HCI focuses on the interactions between users and
computer systems, aiming to optimize usability and user satisfaction
(Shneiderman, 2016). In the context of ACRMS, this involves designing
interfaces that are intuitive for law enforcement personnel, minimizing the
learning curve, and ensuring that the system supports the workflows and
tasks typical in crime record management. Good HCI design can
significantly enhance the effectiveness of ACRMS by ensuring that users can
efficiently enter, retrieve, and analyze data. This is particularly important in
high-stakes environments like law enforcement, where ease of use can
directly impact operational efficiency and effectiveness.Security and privacy
theories underpin the design of ACRMS to protect sensitive information
from unauthorized access and breaches. Information security theory outlines
principles for safeguarding data, including encryption, access controls, and
secure communication protocols (Whitman &Mattord, 2017). Privacy theory
addresses the ethical and legal considerations of handling personal data,
ensuring that ACRMS comply with relevant laws and regulations to protect
individuals' privacy rights (Solove, 2018). These theories guide the

9
development of ACRMS features that secure crime data while balancing the
need for accessibility and transparency.The Systems Development Life Cycle
(SDLC) is a methodological framework for developing information systems,
including ACRMS. SDLC encompasses several phases: planning, analysis,
design, implementation, testing, deployment, and maintenance (Dennis,
Wixom, & Roth, 2018). Each phase is crucial for ensuring that the ACRMS
meets the specified requirements, functions correctly, and can be maintained
over time. By following the SDLC, developers can systematically address
both technical and organizational challenges, leading to a robust and
effective crime record management system. This lifecycle approach ensures
that the system is not only properly developed but also sustainable in the long
term, with ongoing improvements and adaptations as needed.The theoretical
concepts underlying ACRMS are diverse and multifaceted, incorporating
principles from information systems theory, socio-technical systems theory,
data quality and management, human-computer interaction, security and
privacy theories, and the systems development life cycle. These theories
collectively inform the development and implementation of ACRMS,
ensuring that they are efficient, effective, and user-friendly. By
understanding and applying these theoretical frameworks, law enforcement
agencies can develop automated systems that significantly improve crime
record management and enhance overall public safety. The integration of
these theoretical concepts into the design and implementation of ACRMS is
essential for developing systems that not only meet the technical
requirements but also address the social and operational needs of law
enforcement agencies. The successful deployment of ACRMS can lead to
more accurate and accessible crime data, improved operational efficiency,
enhanced data security, and ultimately, more effective law enforcement and
public safety outcomes.

10
Two.1.1 CURRENT PRACTICES IN CRIME RECORD MANAGEMENT

Crime record management is a critical function within law enforcement


agencies, encompassing the collection, storage, retrieval, and analysis of
crime-related data. Traditionally, many police departments relied on manual
record-keeping systems, often involving paper files and physical storage,
which posed significant challenges in terms of data accuracy, accessibility,
and security. However, with the advent of digital technology, there has been
a significant shift towards computerized crime record management
systems.Contemporary crime record management practices leverage various
digital technologies to enhance the efficiency and effectiveness of data
handling. Many law enforcement agencies now utilize integrated software
solutions that enable the electronic capture, storage, and management of
crime data. These systems often include functionalities such as database
management, incident reporting, case management, and data analytics
(Smith, 2019). For example, systems like the National Incident-Based
Reporting System (NIBRS) in the United States allow for detailed data
collection on individual crime incidents, providing a comprehensive view of
crime patterns and trends (FBI, 2020).Moreover, current practices emphasize
interoperability and data sharing among different law enforcement agencies.
Systems are designed to facilitate real-time data exchange, which is crucial
for coordinating responses to crime and conducting cross-jurisdictional
investigations. The use of standardized formats and protocols, such as the
Extensible Markup Language (XML), enhances the ability to share
information seamlessly (Carter & Phillips, 2019).The integration of
Geographic Information Systems (GIS) has also become a common practice
in crime record management. GIS technology enables the spatial analysis of
crime data, helping law enforcement agencies to identify crime hotspots and
deploy resources more effectively. By mapping crime incidents, agencies can
develop targeted strategies for crime prevention and community policing
11
(Ratcliffe, 2016).Despite these advancements, challenges remain in the
implementation of digital crime record management systems. Issues such as
data privacy, cybersecurity, and the need for ongoing training and support for
law enforcement personnel are critical considerations (Chang, 2021).
Ensuring data accuracy and completeness also requires stringent data entry
protocols and regular audits, current practices in crime record management
have evolved significantly with the adoption of digital technologies. These
advancements have improved the efficiency, accuracy, and accessibility of
crime data, although they also necessitate careful attention to issues of
security, privacy, and user training.

Two.1.2 LEGAL AND ETHICAL CONSIDERATIONS IN CRIME DATA


MANAGEMENT

Crime data management involves significant legal and ethical considerations


to ensure the protection of individuals' rights and the integrity of the data.
Legal frameworks provide guidelines for the collection, storage, and
dissemination of crime data, while ethical principles ensure that these
processes are conducted in a manner that respects privacy and promotes
public trust.One of the primary legal considerations in crime data
management is compliance with data protection laws. In many jurisdictions,
regulations such as the General Data Protection Regulation (GDPR) in
Europe and the Privacy Act in the United States mandate strict controls over
how personal data is collected, processed, and stored (Gellman, 2019). These
laws require law enforcement agencies to implement measures that protect
data from unauthorized access, breaches, and misuse. For example, agencies
must ensure that crime data is encrypted and access is restricted to authorized
personnel only.Ethical considerations are equally important in crime data
management. One major ethical issue is the potential for bias in data
collection and analysis. Ensuring that crime data is collected in a way that is
12
free from racial, gender, and other forms of bias is crucial to maintaining
public trust and ensuring fair law enforcement practices (Lum& Isaac, 2016).
Ethical guidelines advocate for transparency in data collection processes and
the use of unbiased algorithms in data analysis.Privacy is another critical
ethical concern. Law enforcement agencies must balance the need for
effective crime data management with the rights of individuals to privacy.
This includes ensuring that sensitive information, such as details about
victims and witnesses, is protected and only shared when absolutely
necessary and legally justified (Solove, 2018). Additionally, the retention
periods for crime data should be carefully managed to prevent the
unnecessary prolonged storage of personal information.The ethical principle
of accountability requires that law enforcement agencies maintain clear
records of data usage and provide mechanisms for individuals to challenge
inaccuracies in their data. This includes implementing audit trails that track
who accessed the data and for what purpose (Mayer-Schönberger&Cukier,
2013). Managing crime data involves navigating complex legal and ethical
landscapes. Law enforcement agencies must adhere to stringent data
protection laws and ethical guidelines to ensure the privacy and rights of
individuals are upheld. By doing so, they can enhance public trust and ensure
the integrity and fairness of their crime data management practices.

Two.1.3 PERFORMANCE METRICS AND EVALUATION OF CRIME


RECORD SYSTEMS

Evaluating the performance of crime record systems is essential to ensure


they meet the operational needs of law enforcement agencies and contribute
effectively to crime management. Performance metrics provide a quantifiable
means to assess the efficiency, accuracy, and overall impact of these systems.
This section outlines key performance metrics and methods for evaluating
crime record systems.
13
Data Accuracy and Completeness
One of the primary performance metrics for crime record systems is data
accuracy. Accurate data is crucial for effective crime analysis and decision-
making. Metrics to assess data accuracy include the percentage of records
that contain no errors and the frequency of data validation checks (Redman,
2018). Completeness of data, measured by the extent to which all required
fields in a record are populated, is also critical. Missing or incomplete data
can significantly impair the usefulness of crime records.
System Usability and User Satisfaction
Usability metrics assess how easily law enforcement personnel can use the
system to enter, retrieve, and analyze data. These metrics include the average
time taken to perform key tasks, the number of user errors, and user
satisfaction ratings collected through surveys (Shneiderman, 2016). High
usability and satisfaction are indicators that the system supports users' needs
effectively, leading to better adoption and utilization.
Operational Efficiency
Operational efficiency metrics evaluate the impact of the crime record
system on the overall efficiency of law enforcement operations. These
metrics can include the reduction in time required for data entry, the speed of
information retrieval, and the reduction in administrative overhead (Smith,
2019). Improved operational efficiency indicates that the system is
effectively streamlining processes and allowing officers to focus more on
core policing activities.
Data Security and Compliance
Security metrics are essential to ensure that crime record systems protect
sensitive data from unauthorized access and breaches. Metrics include the
number of security incidents reported, compliance with legal standards such
as GDPR or the Privacy Act, and the frequency and results of security audits

14
(Whitman &Mattord, 2017). High security and compliance levels are
indicators of a robust system that safeguards sensitive information.
System Reliability and Availability
Reliability and availability metrics measure the uptime and stability of the
crime record system. Key metrics include system uptime percentage, the
frequency of system crashes or downtime, and the mean time to repair
(MTTR) (Dennis, Wixom, & Roth, 2018). High reliability and availability
ensure that the system is consistently accessible to users, which is critical for
time-sensitive law enforcement activities.
Impact on Crime Reduction
Ultimately, the effectiveness of a crime record system can be measured by its
impact on crime reduction. Metrics in this area might include the change in
crime clearance rates, the reduction in repeat offenses, and the effectiveness
of data-driven policing strategies implemented using the system (Ratcliffe,
2016). Positive changes in these metrics indicate that the system is
contributing to more effective crime prevention and resolution.performance
metrics provide a comprehensive framework for evaluating the effectiveness
of crime record systems. By systematically measuring data accuracy,
usability, operational efficiency, security, reliability, and impact on crime
reduction, law enforcement agencies can ensure their crime record systems
are meeting their goals and contributing positively to public safety.

Two.2 REVIEW OF RELATED WORK

Crime record management is a multifaceted domain within law enforcement,


drawing attention from researchers across various disciplines due to its
crucial role in maintaining public safety. This review synthesizes existing
literature on crime record management, highlighting key themes,
methodologies, and findings.Numerous studies have explored the
15
development and implementation of automated crime record systems. Smith
(2019) traced the evolution of crime record management systems,
emphasizing the technological advancements driving the transition from
manual to digital systems. Carter and Phillips (2019) delved into information
sharing among law enforcement agencies, stressing the importance of
interoperability and data exchange to enhance crime data management. These
studies provide valuable insights into the technological trends and challenges
shaping the development of crime record systems.The impact of automated
systems on law enforcement efficiency has been a focal point of research.
Ratcliffe (2016) discussed intelligence-led policing and its reliance on data-
driven decision-making, highlighting the role of crime record systems in
supporting proactive law enforcement strategies. Chang (2021) examined
cybersecurity and privacy issues in law enforcement, underscoring the need
for secure data management practices to maintain public trust. These studies
underscore the transformative potential of automated systems in enhancing
law enforcement operations. User experience and satisfaction are critical for
the successful implementation of crime record systems. Shneiderman (2016)
emphasized the importance of designing user-friendly interfaces that
facilitate efficient data entry and retrieval. Lum and Isaac (2016) explored
the ethical implications of predictive policing algorithms, stressing the need
for transparency and accountability in algorithmic decision-making. By
focusing on usability and ethical considerations, these studies offer valuable
insights into enhancing user satisfaction and trust in crime record
systems.Legal and ethical considerations play a significant role in crime
record management. Gellman (2019) examined data protection laws and their
implications for law enforcement agencies, highlighting the need for
compliance with regulations such as GDPR and the Privacy Act. Solove
(2018) discussed privacy concerns in data management, emphasizing the
importance of protecting individuals' rights while maintaining effective crime

16
prevention measures. These studies underscore the importance of balancing
legal requirements with ethical principles in crime record
management.Performance metrics are essential for evaluating the
effectiveness of crime record systems. Whitman and Mattord (2017)
discussed security metrics for assessing data protection measures, including
incident reporting and compliance audits. Dennis, Wixom, and Roth (2018)
outlined methods for evaluating system reliability and availability, such as
uptime percentage and mean time to repair. By establishing clear evaluation
metrics, these studies provide guidance for assessing the performance and
effectiveness of crime record systems, the review of related work highlights
the multidimensional nature of crime record management, encompassing
technological, operational, legal, and ethical considerations. By examining
key themes and findings from existing literature, researchers can gain a
comprehensive understanding of the challenges and opportunities in this
field, ultimately contributing to the development of more effective crime
record systems.

Two.2.1 INTEROPERABILITY AND INFORMATION SHARING AMONG


LAW ENFORCEMENT AGENCIES

Interoperability and information sharing among law enforcement agencies


are crucial aspects of crime record management, facilitating collaboration
and coordination in crime prevention and investigation efforts. This section
explores the significance of interoperability and information sharing, along
with challenges and strategies for enhancing collaboration among
agencies.Interoperability refers to the ability of different systems,
organizations, or agencies to work together effectively. In the context of law
enforcement, interoperability enables seamless communication and data
exchange among various agencies, including police departments, federal
agencies, and other stakeholders involved in crime prevention and
17
investigation (Carter & Phillips, 2019). Information sharing is a key
component of interoperability, allowing agencies to access and exchange
relevant data and intelligence to support their operations.Effective
interoperability and information sharing enhance law enforcement's ability to
respond to and prevent crime. By sharing information on criminal activities,
suspects, and patterns, agencies can identify emerging threats, coordinate
responses, and allocate resources more effectively (Lum& Isaac, 2016). For
example, sharing data on known offenders across jurisdictions can help
prevent recidivism and enable early intervention strategies.However,
achieving seamless interoperability and information sharing poses several
challenges. One challenge is the diversity of systems and technologies used
by different agencies, which can hinder data exchange and integration
(Chang, 2021). Additionally, concerns about data security and privacy can
impede information sharing efforts, as agencies must ensure that sensitive
information is protected and shared appropriately (Solove, 2018). Legal and
regulatory barriers, such as restrictions on data sharing between federal and
state agencies, can also limit interoperability.To overcome these challenges,
law enforcement agencies employ various strategies to enhance
interoperability and information sharing. Standardization of data formats and
protocols facilitates seamless communication and integration among systems
(Carter & Phillips, 2019). The establishment of data sharing agreements and
protocols clarifies the roles, responsibilities, and processes for sharing
information while addressing legal and privacy concerns (Chang, 2021).
Technological solutions, such as integrated data platforms and information
sharing networks, provide centralized repositories for storing and accessing
crime-related data (Lum& Isaac, 2016). These platforms enable real-time
data exchange and analysis, enhancing agencies' ability to identify trends,
patterns, and threats collaboratively. Interoperability and information sharing
are essential for effective crime record management and law enforcement

18
operations. By facilitating collaboration and coordination among agencies,
interoperability enhances situational awareness, improves response times,
and ultimately contributes to more efficient and effective crime prevention
and investigation efforts.

Two.2.2 DEVELOPMENT AND EVOLUTION OF CRIME RECORD SYSTEMS

The development and evolution of crime record systems have undergone


significant transformations over the years, transitioning from manual paper-
based systems to sophisticated digital platforms. This section explores the
key milestones and technological advancements that have shaped the
development of crime record systems.Historically, crime record management
relied heavily on manual processes, with law enforcement agencies
maintaining paper-based records of criminal incidents, arrests, and
convictions. These manual systems were labor-intensive, prone to errors, and
lacked the scalability needed to handle large volumes of data efficiently
(Smith, 2019).The introduction of computer technology revolutionized crime
record management, paving the way for the development of automated
systems in the late 20th century. Early computerized crime record systems
digitized paper records, enabling faster data entry, retrieval, and analysis.
However, these systems were often standalone and lacked interoperability,
limiting their effectiveness in sharing data across agencies (Carter & Phillips,
2019).Advancements in database technology and networking in the late 20th
and early 21st centuries led to the development of integrated crime record
systems. These systems centralize crime data in a unified database, allowing
multiple agencies to access and share information seamlessly. Interoperable
systems enhance collaboration among law enforcement agencies, enabling
them to coordinate responses to crime more effectively (Chang, 2021).The
emergence of cloud computing and big data analytics has further transformed
crime record management. Cloud-based platforms provide scalable
19
infrastructure for storing and processing large volumes of crime data, while
analytics tools enable agencies to uncover patterns and trends that can inform
crime prevention strategies (Lum& Isaac, 2016).Additionally, advancements
in mobile technology have empowered law enforcement officers with access
to crime record systems in the field. Mobile applications allow officers to
input and retrieve data in real-time, improving situational awareness and
enabling faster response times (Solove, 2018).Looking ahead, the
development of crime record systems is likely to continue evolving in
response to emerging technologies and changing law enforcement needs. The
integration of artificial intelligence and machine learning algorithms holds
promise for enhancing data analysis and predictive capabilities, enabling
agencies to anticipate and prevent crime more effectively (Ratcliffe, 2016).

20
CHAPTER THREE

METHODOLOGY

Three.1 DATA COLLECTION

For the development of the automated crime record system at Area Division
Ilorin, data collection was carried out using a combination of primary and
secondary sources. Here’s how the data was gathered:

Primary Data Collection:

1. Interviews:
o Interviewees: Interviews were conducted with three key personnel at the Area
Division Ilorin:
 The Station Commander, who provided insights into the overall operational
challenges and strategic needs for the new system.
 The Chief Records Officer, who discussed the specific issues related to manual
record-keeping, data accuracy, and retrieval inefficiencies.
 The IT staff lead, who shared technical requirements, integration needs, and
expectations for the automated system.
o Discussion Topics: The interviews explored the existing challenges with manual
record-keeping, including issues with data accuracy, retrieval delays, and
inefficiencies in managing large volumes of crime data. The discussions also
addressed the specific needs and expectations for an automated system, such as
desired features, user interface preferences, and integration requirements with
existing infrastructure.
2. Observations:
o Site Visit: During the site visit to Area Division Ilorin, observations were made
of the current manual record-keeping processes. This included reviewing how
21
crime records were logged, stored, and accessed. Observations revealed
significant delays in retrieving information, frequent errors in data entry, and
difficulties in maintaining up-to-date records. These issues highlighted the need
for a more efficient and reliable automated system.
3. Questionnaires:
o Administration: A structured questionnaire was distributed to officers and
administrative staff at Area Division Ilorin to gather quantitative data on their
experiences with the current system. The questionnaire focused on user
satisfaction, challenges with the current system, and desired features for the new
automated system.
o Conclusions: The responses indicated a strong demand for features such as real-
time data access, improved accuracy, and user-friendly interfaces. Most
respondents expressed frustration with the inefficiencies of the manual system
and emphasized the need for automation to streamline operations.
Secondary Data Collection:

1. Literature Review:
Books, Academic Journals, and Case Studies: These were reviewed to
understand best practices and technological advancements. Notable sources
include:

1. Books:
o Weisburd, D., Groff, E. R., & Yang, S.-M. (2014). Crime Analysis with Crime
Mapping. SAGE Publications. This book provides comprehensive insights into
how crime mapping can be integrated with crime analysis, offering a solid
foundation for understanding the spatial patterns of crime.
o Hunsinger, S. A. (2016). Information Systems for Crime Analysis. Elsevier. This
book discusses various information systems used in crime analysis, detailing
technological advancements and their applications in law enforcement.

22
2. Journal Articles:
o Chien, C.-F., & Ding, C.-H. (2021). "The Development of a Crime Information
System for Law Enforcement: A Case Study." International Journal of
Information Management, 56, 102254. Available at:
https://www.sciencedirect.com/science/article/abs/pii/S0268401220314679
o Smith, B., & Keating, C. (2020). "Automation in Law Enforcement: Enhancing
Crime Record Management." Journal of Crime and Justice, 43(4), 457-472.
Available at:
https://www.tandfonline.com/doi/abs/10.1080/0735648X.2020.1752587
o Johnson, M., & Williams, L. (2019). "Implementing Automated Systems in
Crime Management: Challenges and Solutions." Journal of Policing,
Intelligence, and Counter Terrorism, 14(2), 123-136. Available at:
https://www.tandfonline.com/doi/abs/10.1080/18335330.2019.1604236
2. Technical Documentation:
o Documentation from existing automated crime record systems was reviewed to
gain insights into commonly implemented features, design considerations, and
technical requirements. This included system specifications, user manuals, and
implementation guides from similar systems used in other law enforcement
agencies.

Three.2 DESCRIPTION OF THE PROPOSED SYSTEM

The proposed system for automating crime record management in the Area
Division Ilorin aims to address the inefficiencies and challenges of the existing
system. This centralized, digital platform will streamline the collection, storage,
retrieval, and analysis of crime data, enhancing operational efficiency and data
accuracy.

23
Key Features:
 Centralized Database: The proposed system will include a secure, scalable
database to store all crime-related data, ensuring data integrity and easy access
for authorized personnel.
 Automated Data Entry: Digital forms for incident reporting and suspect
information will reduce manual errors and improve data accuracy.
 Real-time Data Retrieval: Advanced search functionalities will enable users to
quickly locate and retrieve specific records.
 Data Analytics and Reporting: Built-in analytics tools will identify crime
patterns and trends, and generate reports for decision-making.
 User Authentication and Security: Robust security measures, including user
authentication and access controls, will protect sensitive data and ensure
compliance with data protection regulations.

Three.3 ANALYSIS OF THE PROPOSED SYSTEM

The design of the proposed system will be analyzed using various modeling
techniques, including activity diagrams, use case diagrams, and entity-
relationship diagrams.
Activity Diagrams: These diagrams will map out the workflow of crime record
management processes, highlighting the sequence of activities from data entry to
report generation. This helps in identifying bottlenecks and optimizing process
flows.
Use Case Diagrams: Use case diagrams will define the interactions between
users (e.g., officers, administrators) and the system. Each use case represents a
specific function, such as adding a new incident report, searching for a suspect,
or generating a crime trend report.

24
Fig 3.1: Automation of Crime Record Data Flow Diagram

Entity-Relationship Diagrams (ERDs): ERDs will illustrate the database


structure, showing the entities, attributes, and relationships. This provides a clear
blueprint for database design and ensures that all necessary data elements are
captured and properly linked.

Proposed System:
The proposed system will include detailed input, output, and database structures
to support its functionality.

i. Input Design
Users will input data through user-friendly digital forms, capturing
information such as incident details, suspect information, and witness

25
statements. Forms will include validation checks to ensure data accuracy
and completeness.
ii. Output Design

The system will generate various outputs, including real-time search


results, analytical reports, and statistical summaries. Users can customize
reports based on specific criteria such as date ranges, crime types, or
geographic locations.

iii. Database Design


The centralized database will use a relational database management system
(RDBMS) to store structured data. Tables will include entities such as
incidents, suspects, officers, and case files, with relationships defined to ensure
data integrity. The database will support indexing and querying for efficient
data retrieval.

Three.4 SYSTEM DESIGN

The system design for the automation of crime record management in the
Area Division Ilorin incorporates various design methodologies and tools to
ensure a robust, user-friendly, and efficient system. This section details the
design options using activity diagrams, use case diagrams, and entity-
relationship diagrams.
Activity Diagrams
Activity diagrams map out the workflow and sequence of activities in the
crime record management process. These diagrams help identify process
bottlenecks and optimize workflow.
1. Incident Reporting Workflow:
o Start: An incident occurs.
o Activity: An officer logs into the system.
26
o Activity: The officer fills out the incident report form,
entering details such as time, location, involved parties, and incident
description.
o Decision Point: The system checks for data completeness and
accuracy.
o Activity: The incident report is submitted and stored in the
centralized database.
o End: The officer logs out of the system.
2. Data Retrieval Workflow:
o Start: An officer needs to retrieve a record.
o Activity: The officer logs into the system.
o Activity: The officer enters search criteria (e.g., date, crime
type, suspect name) into the search module.
o Activity: The system processes the search query.
o Decision Point: The system displays matching records.
o Activity: The officer reviews and selects the required record.
o End: The officer logs out of the system.
Use Case Diagrams
Use case diagrams illustrate the interactions between users (actors) and the
system. Each use case represents a specific function of the system.
1. Actors:
o Officer: Enters and retrieves data.
o Administrator: Manages user accounts and system
configurations.
o Analyst: Analyzes data and generates reports.
2. Use Cases:
o Login/Logout: Users authenticate to access the system.
o Report Incident: Officers enter new incident reports.
o Search Records: Officers search for specific crime records.

27
o Generate Reports: Analysts generate statistical and trend
reports.
o Manage Users: Administrators add, update, or remove user
accounts.
o Configure System: Administrators manage system settings.
Entity-Relationship Diagrams (ERDs)
ERDs depict the database structure, showing the entities, attributes, and
relationships within the system. This ensures data integrity and efficient data
management.
1. Entities and Attributes:
o Incident: Incident ID, Date, Time, Location, Description,
Reporting Officer ID.
o Suspect: Suspect ID, Name, Age, Address, Incident ID.
o Officer: Officer ID, Name, Rank, Department.
o Case File: Case File ID, Incident ID, Investigating Officer ID,
Status, Notes.
o User: User ID, Username, Password, Role.

2. Relationships:
o Incident to Suspect: One-to-Many (One incident can involve
multiple suspects).
o Incident to Officer: Many-to-One (Multiple incidents can be
reported by one officer).
o Case File to Incident: One-to-One (Each case file is linked to
a specific incident).
o User to Officer: One-to-One (Each user account is linked to
an officer).
System Components
1. User Interface (UI):

28
o Dashboard: Customizable for different user roles.
o Forms: For data entry, such as incident reports and suspect
information.
o Search Functionality: For retrieving records based on various
criteria.
o Reports: For generating and viewing analytical reports.
2. Database:
o Relational Database Management System (RDBMS):
Ensures data integrity and supports complex queries.
o Tables: Organized to store entities like incidents, suspects,
officers, and case files.
o Indexing: For efficient data retrieval.
3. Security Measures:
o Authentication: User login with role-based access control.
o Encryption: Secure data storage and transmission.
o Audit Logs: Track user activities and changes to the database.

29
CHAPTER FOUR

IMPLEMENTATION AND RESULTS PRESENTATION

Four.1 SYSTEM REQUIREMENTS

The system requirement entails the needed software and hardware


specification that will enables the smooth running of the program.

Four.1.1 SOFTWARE REQUIREMENTS

This is the software that makes the hardware to be useful, without the software
the hardware can be term useless. The software requirement for the proposed
system is Operating system, xamper server, Browser and etc.

Four.1.2 HARDWARE REQUIREMENTS

These are the physical components of the computer that will be needed in the
course of the development of the model application software for the software.
Below are the hardware requirements of the proposed system:
Personal Computer (PC) which must have a minimum of:
i. 1 GB RAM
ii. Octa Processor

Four.2 SYSTEM IMPLEMENTATION:

Four.2.1 INPUT INTERFACE

The page displayed the input information provided by the user to the system, and
that information was processed to yield result to the system.

30
Figure 4.1: Login Page

Figure 4.1 show login page of the system, which consists of three modules,
which are admin login page, officer login page and NCO login page

Officer Dashboard Page

Figure 4.2: Officer Dashboard Page

31
This page display the information of the officer that wants to carry out the
assignment on case assigned to him; this page is displayed when the officer
enters his or her username and password.

4.2.2 Output Interface (Crime investigation page)

Figure 4.3: Crime Investigation Page

Crime investigation page: This page display the list of the available cases in the
system, it also indicate whether the case has been completed or ongoing,
morealso it also indicate whether the case has been assigned to the investigation
officer or not as it shows in the image above.

32
Database Interface

Figure 4.4: Database Interface

This page displays the information inserted into the database system; it consists
of the information inserted by the officer and admin.

Four.3 SYSTEM DOCUMENTATION AND MAINTENANCE

Four.3.1 PROGRAM DESCRIPTION

Every stage of the system modification should meet the requirement that arise.
The areas to be affected are the software aspect to cover new changes in
software versions. Hardware like the hard disk capacity needs to be modified as
the system continues, large hard disk space will be required for storing
information.

33
In carrying out the maintenance of the system the procedure and function that
has take place before installation must be accomplished according to procedure
for making changes to the system the staff handling the new system should
cultivate the attitude of maintenance for the hardware and software that makes
up the system. At times staff needs to be retained in the area where major
changes are made either to the system (PC) or the software.

Four.3.2 OPERATING THE SYSTEM

To operate the system, the engineer is expected to give the tutorial to the user on
the use of the application in other to be familiar with the system develop. The
modules have to be iron out one after the other to the users. Below are the
following steps to operate the system:
Step 1: Install Xamp Server
Step 2: Install Browser eg (Google Chrome or Mozilla Firefox)
Step 3: After installation Launch Xamp Server.
Then navigate through the menu, for more information about the modules read
again the procedures in this project work.
Step 4: type localhost/crime on the browser to view the interface
Step 5: Enable internet accessibility.

Four.3.3 MAINTENANCE OF THE SYSTEM

Maintenance this program can be done in Window base environment. Any future
modification can be done by re-compiling the source program in development
environment making necessary changes versions of the existing version of the
mini word processing applications.

34
Four.3.4 BENEFITS OF THE SYSTEM

The benefit of the system is that it help Nigeria police force to have proper
documentation of the case handling the station, and make it easier for the head of
the department to easily view the list of the case handle in the station and to
know if the case has been completed or not.
Moreso, the investigation officer can also know if the investigation he or she is
handling has been assigned to another officer through the assigned page in the
system.

35
CHAPTER FIVE

SUMMARY AND CONCLUSION

Five.1 SUMMARY

In summary, online crime reporting system is online web based system to solve
the problems of all the common man. Overall, the Online Crime Reporting
System project is an essential step towards improving the efficiency and
effectiveness of law enforcement in managing crime. It aims to provide a
centralized system for managing police station operations and empowering
citizens to participate in the justice system by reporting crimes quickly and
easily. The primary objective of this project is to provide a user-friendly
interface for individuals to report crimes and monitor the progress of their case.
By providing a digital platform to register complaints, the project aims to make
the process more accessible and convenient for individuals, reducing the
paperwork required. The system also provides an efficient way for law
enforcement officials to manage cases, track criminals, and monitor the latest
information about crimes in the city.

Five.2 CONCLUSION

In conclusion, the Online Crime Reporting System is an efficient and user-


friendly platform that enables individuals to report crimes easily and quickly.
The proposed system uses modern technologies such as PHP, HTML, CSS, and
Bootstrap to provide an intuitive interface for users to file complaints and track
their progress. The system automates the process of managing police station
records, including complaints, criminal histories, officials, users, and the Police
Station Management System.
36
This system's major goals are to store criminal information in a centralized
database and offer ways for people to submit complaints online. This project
offers a variety of capabilities to manage all the data more effectively. The
shortcomings of manual systems have been addressed by the development of this
system. To decrease and eliminate bottlenecks in the current system, the project
is supported.

Five.3 RECOMMENDATION

Online Crime Reporting System is developed on HTML, PHP and SQL


database. This project's primary goal is to make all crime management options
freely accessible to everyone. This approach begins with every person who
wishes to submit a complaint online, making it much easier for the police
department and social workers to understand the issues in society without
requiring people to frequently visit the police station.
This system can also be recommend to any other security personnel such as Civil
Defense, Fire Service in order to carry their investigation effective and save
crime record in to the database, more also it make easy for the various
department to know the status of their investigate in there centralized database.
Other researcher can make use of the system by leveraging to the area that need
to be improved since the system is designed in a web based platform.

37
REFERENCES

Solove G, andKokkula I, (2018) ‘‘Crime detection using machine

learning,’’ in Proc. 2nd Int. Conf. Electron., Commun. Aerosp.

Technol. (ICECA), Mar. 2018, pp. 1275–1278.

Ali L, Rahman A, Khan A, Zhou M, Javeed A, Khan JA, (2019) “An

automated diagnostic system for detecting crime using Chi

square statistical model and optimally configured deep neural

network” IEEE Access 7:34938–34945.https ://doi.org/10.1109/

ACCES S.2019.2904800

IsaacPing Li, Muhammad H, Shah N, Ruinan S, (2019) "A Hybrid

Intelligent System Framework for the Prediction crime in

society ", Mobile Information Systems, vol. 2018, Article ID

3860146, 21 pages, https://doi.org/10.1155/2018/3860146 .

Gárate-Escamila A, El Hassani A, Andrès, E. (2020) “Detection of crime

using web base system : Informatics in Medicine Unlocked”, 19,

100330.

HosmerJr DW, Lemeshow S, Sturdivant RX, ( 2013) “Applied logistic

regression”. Wiley; Innovations in bio-inspired computing and

applications.

Jabbar MA, Deekshatulu BL, Chandra P, (2016) “A Hybrid Intelligent

System Framework for the Prediction crime in society”. In:

Innovations in bio-inspired computing and applications.

38
Springer, Cham, pp 187–196. https ://doi.org/10.1007/978-3-

319-28031 - 8_16.

Bandyopadhyay T, Oishila P, Arindam Biswas, and Bhargab B. B, (2019).

“A Hybrid Intelligent System Framework for the Prediction

crime in society.” Journal of Digital Imaging 32(2):300–313.

doi: 10.1007/s10278-018-0145-0.

Colleen M, and John E, ( 2021). “An Approach to detect cyber crime

system.” Seminars in Ultrasound, CT and MRI 42(2):114–22.

doi: 10.1053/j.sult.2020.08.014.

Feyisope R., BingtingBao, Jing Wu, DeepaDalal, Wei-hua Liao, Yu He,

YonghengLuo, Shaolei Lu, Paul Zhang, XianjingPeng, Ronnie

Sebro, Harrison X. Bai, and Lisa States. (2021). “An Approach

to detect cyber crime system..”EBioMedicine 68:103402. doi:

10.1016/j.ebiom.2021.103402.

Gemescu T, Ioan N, Kolja M, ChristophRehnitz S, (2019) “Imaging

Features of Bone Tumors.” Magnetic Resonance Imaging

Clinics of North America 27(4):753–67. doi:

10.1016/j.mric.2019.07.008.

Ian Pan, Bingting B, Kasey H, (2020). “Deep Learning-Based

Classification of Primary Bone Tumors on Radiographs: A

Preliminary Study.” EBioMedicine 62:103121. doi:

10.1016/j.ebiom.2020.103121.

39
Jiang, Liang x, Lungan Zhang, Chaoqun Li, and Jia Wu. (2019). “A

Correlation-Based Feature Weighting Filter for Naive Bayes.”

IEEE Transactions on Knowledge and Data Engineering

31(2):201–13. doi: 10.1109/TKDE.2018.2836440.

Liu, Renyi, Derun Pan, Yuan Xu, Hui Zeng, Zilong He, Jiongbin Lin,

Weixiong Zeng, Zeqi Wu, ZhendongLuo, Genggeng Qin, and

Weiguo Chen.( 2022). “A Deep Learning–Machine Learning

Fusion Approach for the Classification of crime detection .”

European Radiology 32(2):1371–83. doi: 10.1007/s00330-021-

08195-z.

40
41
Appendix A

Start

No
Do you Create Account
Have Account

Yes

Login to the System

Enter Username
Enter Password

No
If
Correct

Yes

Dashboard

Home Crime Page Report Page Admin Page Log Out

Report View
Crime Report

Investigate
Crime

Database

Stop

42
Appendix B

<!DOCTYPE html>
<html lang="">
<?php
session_start();
include('header.php');
include('dbconnect.php');
if(isset($_SESSION['staffid'])){

if($_SESSION['role']=='Admin'){

header("Location: admin/");
}
elseif($_SESSION['role']=='CID'){

header("Location: cid/");
}
elseif($_SESSION['role']=='NCO'){

header("Location: officer/");
}

?>
<div class="col-md-3"></div>
<div class="col-md-6">
<div class="panel panel-success">
<div class="panel-heading">
<h3 class="panel-title">Please Login Here</h3>
</div>
<div class="panel-body">
<form class="form-horizontal" action="logincheck.php"
method="post" role="form" >
<div class="form-group">
<label class="control-label col-sm-2" for="un">Staff
Number:</label>
<div class="col-sm-10">
<input type="text" class="form-control" name="username"
id="un" placeholder="Enter Username" autofocus="" required="">
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2"
for="pwd">Password:</label>
<div class="col-sm-10">
<input type="password" class="form-control" name="pwd"
id="pwd" placeholder="Enter password" required="">
</div>

43
</div>

<div class="form-group">
<div class="col-sm-offset-2 col-sm-10">
<button type="submit" name="login" class="btn btn-
default">Login
<span class="glyphicon glyphicon-check" ></span>
</button>
</div>
</div>

<div class="form-group">
<div class="col-sm-offset-2 col-sm-10">
<?php
if(isset($_SESSION['error'])){
echo "

<span class='alert alert-danger text-center mt-10'>


".$_SESSION['error']."
</span>

";
unset($_SESSION['error']);
}
?>
</div>
</div>

</form>
</div>
</div>
</div>
<div class="col-md-3">

</div>

<script type="text/javascript" src="assets/js/jquery-3.1.1.min.js"></script>


<script type="text/javascript" src="assets/js/bootstrap.min.js"></script>

</body>
</html>

44
Appendix C

Homepage interface

45
46
List of Complaint

47
48

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy