Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 65

Online Crime Management System

Contents
CHAPTER 1. INTRODUCTION........................................................................................................................7
1.1 Topic of the system..........................................................................................................................8
1.2 Purpose of developing the system.........................................................................................................8
1.3 Project background................................................................................................................................9
1.4 Objective...............................................................................................................................................9
1.5 Scope Of Project:.................................................................................................................................10
1.6 Learning objectives..............................................................................................................................11
1.7 Challenges...........................................................................................................................................12
1.8 Functionality of the system.................................................................................................................13
1.8.1 Core functionality of the system:-....................................................................................................13
1.8.2 Enhanced Functionalities of System.................................................................................................14
1.8.3 Special Functionalities of System......................................................................................................14
CHAPTER 2. Project Research....................................................................................................................17
2.1 Literature Review/Secondary Research:-.............................................................................................17
2 .1.1 Information and Resources..............................................................................................................17
2.1.1.1 Information....................................................................................................................................17
2.1.2 Research on similar systems:-...........................................................................................................18
2.1.2.1 National Crime Record Bureau......................................................................................................18
2.1.2.2(B) Delhi Police :-............................................................................................................................19
2.2 Comparative Analysis..........................................................................................................................20
2.2.1 Existing System.................................................................................................................................20
2.2.2 Drawbacks of Existing System...........................................................................................................20
2.2.3 Proposed System..............................................................................................................................20
2.2.4 Expected Advantages of Proposed System.......................................................................................20
2.2.5 FEASIBILITY STUDY............................................................................................................................21
2.2.5.1 Technical Feasibility..................................................................................................................21
2.2.5.2 Operational feasibility...............................................................................................................23
2.2.5.3 Economical feasibility................................................................................................................23
2.2.5.4 Schedule feasibility....................................................................................................................24
2.2.6 Limitation of the system...................................................................................................................24
2.3 Primary Research.................................................................................................................................25

1|Page
APIIT SD INDIA
Online Crime Management System

2.3.1 Why do Primary Research Require?.................................................................................................25


2.3.2 Techniques used...............................................................................................................................26
2.3.2.1 Interviews......................................................................................................................................26
2.3.2.1. Why Interview?............................................................................................................................26
2.3.2.3 Questionnaires..............................................................................................................................27
2.4 Analysis and Conclusion:-....................................................................................................................30
2.4.1 Analysis.............................................................................................................................................30
2.4.1.1 Questionnaire and Interview Questions........................................................................................31
2.4.1.2 Quantitative Analysis..................................................................................................................33
2.4.2 Conclusion:-..................................................................................................................................34
2.4.2.1 Overall conclusion of Questionnaire........................................................................................34
2.4.2.2 Overall conclusion of Interview................................................................................................34
CHAPTER 3. Design of system....................................................................................................................36
3.1 Introduction.........................................................................................................................................36
3.1.1 Logical Design...................................................................................................................................36
3.1.2 Physical Design.................................................................................................................................36
3.2 Input Design.........................................................................................................................................36
3.3 Data Capturing.....................................................................................................................................37
3.4 Input Validation...................................................................................................................................37
3.5 Output Design......................................................................................................................................37
3.6 Use - Case Diagrams............................................................................................................................38
3.6.1 Use-Case Diagram for System (User).............................................................................................39
3.6.2 Use-Case Diagram for System (Admin)..........................................................................................41
3.6.3 Use-Case Diagram for System (Police Station)...............................................................................45
3.6.4 Use-Case Diagram for System (Court)............................................................................................47
3.7 Activity Diagram:-................................................................................................................................49
3.7.1Admin Activity diagram.....................................................................................................................50
3.7.2 Activity for Registered User..............................................................................................................51
3.7.3 Station Activity diagram....................................................................................................................52
3.8 Class Diagram:-....................................................................................................................................53
3.9 Sequence Diagram...........................................................................................................................54
3.9.2 Sequence for Admin user.................................................................................................................55
3.9.3 Sequence for police station user......................................................................................................56

2|Page
APIIT SD INDIA
Online Crime Management System

3.9.4 Sequence for Court user...................................................................................................................57


3.10 ER Diagram........................................................................................................................................58
3.11 Normalization:...................................................................................................................................59
3.11.1 First Normal Form:..........................................................................................................................59
3.11.2 Second Normal Form:.....................................................................................................................59
3.11.3Third Normal Form:.........................................................................................................................60

3|Page
APIIT SD INDIA
Online Crime Management System

List of Figure:-
Figure 3.6.1: Use Case for System (User) -------------------------------------------------------- 39
Figure 3.6.1: Use Case for System (Admin) ---------------------------------------------------------------- 41

Figure 3.6.3: Use Case for System (Police Station) -------------------------------------------------------- 44

Figure 3.6.4: Use Case for System (court) --------------------------------------------------------------------- 46

Figure 3.7.1Admin Activity diagram --------------------------------------------------------------------------- 49

Figure 3.7.2 Activity for Registered User ---------------------------------------------------------- 50

Figure 3.7.3 Station Activity diagram -------------------------------------------------------------- 51

Figure 3.8.1 Class Diagram of Webpage ------------------------------------------------- ----------- 52

Figure 3.9.1 Sequence for Login user ----------------------------------------------------------------- 53

Figure 3.9.2 Sequence for Admin user ---------------------------------------------------------------- 54

Figure 3.9.3 Sequence for police station user -------------------------------------------------------- 55

Figure 3.9.4 Sequence for Court user ------------------------------------------------------------------- 56

Figure 3.10.1 ER Diagram --------------------------------------------------------------------------------- 57

4|Page
APIIT SD INDIA
Online Crime Management System

CHAPTER-1
Introduction

List of Table

1.1 Topic of the system Purpose of

developing the system

1.2 Project background

1.3 Objective

1.4 Scope of Project

1.5 Learning objectives

1.6 Challenges

1.8 Functionality of the system

5|Page
APIIT SD INDIA
Online Crime Management System

CHAPTER 1. INTRODUCTION

The Online Crime Management System applies to Police Stations all across the country and
specifically looks into the subject crime prevention, detection, conviction of criminals depending
on a highly responsive backbone of Information Management. The efficiency of the Police and
the effectiveness with which it tackles crime depend on what quality of information it can derive
from its existing records and how fast it can have access to it.

Modules

 Station module:
Each of the station must first register with the Software. For the registration part each
station enter their details like station name, address, phone no, station in charge etc.
Once the prospective station registers with the software they can avail the existing
records.

 User module:
Each of the user, who has a complaint to register, must first register with the Software.
For the registration part each person enter their details like name, address, phone no., E-
Mail ID etc. and get a User Id & password from the Software. Once the registration is
complete, the citizen can sign-in to the website & register their complaint.

 Administrators Module:
The module will be protected by user ID and password. Ordinary users of the
software will not be permitted to enter into this area of the software. The module
will be focusing on the maintenance like Master Data Maintenance, Removal of old
and outdated data from the software etc.

 Search module:
In this module we can search the crime in station wise and nature of crime
 Crime Module:

6|Page
APIIT SD INDIA
Online Crime Management System

This module is used for entering all details about the crime. It contains the date and
time. police station where it is recorded, place, Nature of Crime, Location of the
Crime etc.
 Court Module:

This Module deals with the Law and Judgment part of every Crime this module can used
by the magistrate of court

1.1 Topic of the system


Online Crime Management System

1.2 Purpose of developing the system


The overall System of Police Departments is manual .There are many problems in this manual
System all record of crimes and criminals are store in register which is very difficult for
administrative department to find the record of different crimes and criminals. In manual system
also find out the missing criminals and most wanted are very difficult for Police Department.
We want to computerize this manual system .we developed Online Crime Management System
for Police and public which is user friendly and allots of facility. For Police department it saves
the time and very easy for the admin as well as for users.

our police stations are still represents 19th century, nothing has changed nor upgraded if you go
there to register the compliant you will witness that same old constabulary system, same old
registers same old ways carbon papers kept between two for multiple copies and registering
compliant least takes an hour. later when the police forward the registered compliant to
designated investigation officer, he adds up more papers in it, in which he reviews the crime
scene and other technicalities, these takes days of duration for the investigation after which case
gets forwarded to the court or either ends up in the record room.

To ensure that after compliant has been registered informing onto the computerized data base
doesn’t exists by which all other police stations in other respective areas, cities , town across
India gets to know if they have any information regarding that issue or suspect?

Even if the government start upgrading the policing and compliant system one by one, I think
there will be a day when people would be able to know the status of their registered compliant

7|Page
APIIT SD INDIA
Online Crime Management System

online and if nothing has happened for far, forward the complaint to the courts, but unfortunately
nobody seems to be bothered about computerized compliant registration which is must
advantages. I wouldn’t be able to list down all but I am sure if you are educated person than you
know what is possible in this age when the data gets online.

1.3 Project background

The project is aimed to develop Online crime management system for maintain a computerized
records of all the crime. The system is Web based application that can be access throughout the
police department and user. This system can be used as an application for the online crime
management system of the police department to manage the records of different activity of
related to first information report .In such Online crime management system we will manage all
such activities (like registration of the complaint updating information, search of particular
viewing of the respective reports of crimes etc.) that will save time, manpower. This system will
provide better prospective for the enhancement of organization regarding to quality and
transparency.

1.4 Objective

The main objectives of this system can broadly be listed as follows:

 Make the Police functioning citizen friendly and more transparent by automating the
functioning of Police Departments.
 Improve delivery of citizen-centric services through effective usage of software.
 Provide the Investigating Officers of the Civil Police with tools, technology and
information to facilitate investigation of crime and detection of criminals.
 Improve Police functioning in various other areas such as Law and Order, Traffic
Management etc.
 Facilitate Interaction and sharing of Information among Police Departments, Districts,
State/ headquarters and other Police Agencies.
 Assist senior Police Officers in better management of Police Force

8|Page
APIIT SD INDIA
Online Crime Management System

 Keep track of the progress of Cases, including in Courts


 Reduce manual and redundant Records keeping
 Improve the storing and searching of criminal record
 Making a dynamics system for police consisting less effort

1.5 Scope Of Project:

The system ‘Online crime management system ’ will be a Reporting application that will be
used for automating the manual process of register different case in police Department .This
system will manage the details of all the crime who register themselves in police Department.
The system provides an interface to store the crime details of criminals or prisoners and allows
the user to search and view records. The system should have a login. System should support for
Data Entry module for Nominal Roll, Case register for each criminal. The system will greatly
simplify the overall procedure of online crime.

 Amin profile/User profile


 Admin registration/User registration
 Amin profile/User profile
 Police Station registration
 Admin registration/User registration
 View wanted Criminal
 Police Station registration
 View registered station
 Complaint registration  View wanted Criminal

 View Complaint status  View registered station

 Generate Report  Complaint registration


 Time Duration  View Complaint status
 View all Most wanted criminal  View all Most wanted criminal
 Views all Criminal record  Views all Criminal record
 Case History Details management
 Officer Assignment by admin
 View hot news

9|Page
APIIT SD INDIA
Online Crime Management System

1.6 Learning objectives

 We would be able to know the concepts of Human Computer Intraction


 Making deep research in crime
 Get to know SQL query
 Learning of Web services
 Learning and practices of the core java, html and CSS and JavaScript.
 Knowledge about DBMS or Databases
 Leaning for a development of Real time bug free system.
 Learning how to put multimedia objects to improve the design and navigation of
application.
 Implementing chatting facility
 To learn and apply various software engineering and human computer interaction design
principle.
 To learn and master advance java language.
 To develop a system that is safe and secure, and also helps in maintaining all the records
for the Criminals.
 To develop a system in such a way that targeted audience can easily understand the
concept for the system.

 Learning and practices of the advance JSP-servlet

 Learning web services to implement the web-services developer has to learn the web
services also

10 | P a g e
APIIT SD INDIA
Online Crime Management System

 Learning and practices of sql query to insert the data and fetch it SQL queries should be
learnt.
 Learning file handling in java

1.7 Challenges

As the system is too big and complex so it is more challenging task to understand the basic
requirement and the broad concept of online crime management system. To fulfill the all
requirement on the basis of researcher’s research for any registered police station and user are
the main challenge for this proposed system. It requires a foundation to make a building, and
here the deep analysis and deep knowledge about the system are foundation of the system. So
first it needs to be known for the proper development of the system.

Although this system is having a large number of functionality, it can have a large number of
user and this system is having almost complex tasks so the probability for the system will put up
some error or failure of the system is high as the complexity of the system. From station and user
side the communication barrier is the greatest risk in this system. Example like if you are in
village area where possibility of Internet connection is weak and if you want to make any
communication with the police station through this system at that time it is not possible.

The most challenging part was to execute the query on JSP page with the help of web
browser. A lot of errors were hampering the system to be completed. Most of them are defined in
implementation part of the system.

The major challenge is to Provide message (S.M.S) facility to user, this facility for the user to
check the status of complaint which is updated by the station and court.

11 | P a g e
APIIT SD INDIA
Online Crime Management System

1.8 Functionality of the system.


Functionality is actually the functions the system which introduce the basic functional activity
performed by the any type of user. Every system is having some functionality related to the function
they performs it is divided into three forms

 The core functionality


 Enhanced functionality
 Unique functionality
In the same way this proposed system is having these three functionality as given below, with their
explanation.

1.8.1 Core functionality of the system:-


Core feature of any project is the heart of that project or you can say the features without which
system is incomplete. In this project, developer is developing a complete interactive, user friendly,
effective, feature-rich, multimedia site. Core features are

 Add Complaint: This functionality help the user to report online complaints.
 Add Crime report: This functionality help the user to report online crimes.
 Add Missing person: This functionality help the user to report online missing persons
details also we have to add photos of missing person using heterogeneous database.
 View Missing persons: This functionality help the user to view all the missing person
details.
 View Most wanted persons: This functionality help the user to view all most wanted
persons which can be given by the administrator.
 Edit Complaint: This functionality help the user to edit his complaint details.
 Edit Account: This functionality help the user to update his or her profile.
 View complaint status: This functionality allows us to view the status of all complaint
that you have posted earlier.
 View crime status: This functionality allows us to view the status of the all crimes that
you have posted earlier.
 Add and View feedback: This functionality helps the user to add and view feedbacks

12 | P a g e
APIIT SD INDIA
Online Crime Management System

users.
 View and reply user complaint: This functionality helps the admin to view and reply
user’s complaint details
 View and reply user crimes: This functionality helps the admin to view and reply user’s
crimes details
 New admin: This functionality used for add new admin
 View and delete user’s feedback: This functionality helps the admin to add and delete
user’s feedback
 Add, delete and view most wanted persons: This functionality helps the admin to add,
delete and view most wanted person details
 Add, delete and view missing persons: This functionality helps the admin to add, delete
and view missing person details
 Add and view Criminal registration: This functionality helps the admin to add and
view criminal registrations
 Add and view complaint: This functionality helps the admin to add and view Fir reports
 View and delete all complaint reply: This functionality helps the admin to view and
delete complaint reply.
 Add and view criminal report: This functionality helps the admin to add and criminal
reports
 Change password: This functionality helps the admin to update his or her password
 Mobile: This functionality helps the user to send message to the user.
1.8.2 Enhanced Functionalities of System
To make user understand the system better, enhance features are used.

 Future Prediction
This functionality will predict the future savings time based upon the current time.

 Assign work to officer police by admin with deadline.


In this page admin have assign created work to the officer and fix deadline.
 Track status
This functionality will help user and track their compliant status through mobile number
and compliant id.

13 | P a g e
APIIT SD INDIA
Online Crime Management System

1.8.3 Special Functionalities of System


 Compliant status notification on user mobile number
 User can search criminal record
Based on the research and if developer has the time and ability, these are the advanced
features developer is going to attempt to implement in this system.

Note: EF =Enhanced Functionality, CF =Core Functionality, Note: SF=special


Functionality

14 | P a g e
APIIT SD INDIA
Online Crime Management System

CHAPTER-2
Project Research

2.1Literature Review/Secondary
Research
2 .1.1 Information and Resources
2.1.2 Research on similar systems

2.2 Comparative Analysis


2.2.1 Existing System
2.2.2 Drawbacks of Existing System
2.2.3 Proposed System
2.2.5 Feasibility study

2.3 Primary Research


2.3.1 Why do Primary Research Require?
2.3.2 Techniques used

2.4 Analysis and Conclusion:-


2.4.1 Analysis
15 | P a g e
APIIT SD INDIA 2.4.2 Conclusion
Online Crime Management System

CHAPTER 2. Project Research

2.1 Literature Review/Secondary Research:-


A literature review is a select analysis of existing research which is relevant to your topic,
showing how it relates to your investigation. It explains and justifies how your investigation
may help answer some of the questions or gaps in this area of research. It can be a text written
by someone to consider the critical points of current knowledge including substantive findings,
as well as theoretical and methodological contributions to a particular topic. Literature reviews
are secondary sources, and as such, do not report any new or original experimental work. Also,
a literature review can be interpreted as a review of an abstract accomplishment.

2 .1.1 Information and Resources


2.1.1.1 Information
For gathering information and user requirements, some technique have to be used which will
provide developer an idea and information about the needs of user. To do so there is a need of using
data gathering technique. Techniques are listed below:

 Interview
The interview session gives an outline of people response towards the system. Which type of
system they require? What should be the option in the expense field? The interview process will be held
for a group of users so that more and more opinions will come out for the system.

16 | P a g e
APIIT SD INDIA
Online Crime Management System

 Questionnaire
The short, structured and grouped questions according to purpose of the system was very
helpful in gathering usage statistics E.g. what and what not to be done. These questioners has been used
to collect both qualitative and quantitative data. The questionnaire were distributed to IT personnel
who were having some experience and insight into the development of such a web development as well
as to the users of the system. The main reason of the questionnaire was to seek and gather all the
necessary information that was beneficial for the development of proposed system.

 Books and data


 Crime Record Data and Statistics:- NCRB
 Crime Gazette Maharashtra police (2009)
 Crime Scene Investigation by T. Fish, Larry S Miller

2.1.2 Research on similar systems:-

2.1.2.1 National Crime Record Bureau

Content Description

System Name National Crime Record Bureau

Description of System NCRB was set-up in 1986 to function as a repository of information


on crime and criminals so as to assist the investigators in linking
crime to the perpetrators. It was set up based on the
recommendations of the National Police Commission and the
MHA’s (Ministry of Home Affairs) Task force.

NCRB also compiles and publishes National Crime Statistics i.e.


Crime in India, Accidental Deaths & Suicides and Prison Statistics.
These publications serve as principal reference points by policy
makers, police, criminologists, researchers and media both in India
and abroad

17 | P a g e
APIIT SD INDIA
Online Crime Management System

Functionality  Login
 Computer System
 Crime Record
 Center figure print bureau
 Training
 NCRB Data portal

2.1.2.2(B) Delhi Police :-

Content Description

System Name Delhi Police

Description of System Delhi Police is a web based application. This system provides
facility for reporting online crimes and complaints. Any Number of
clients can connect to the server. Each user first makes their login to
sever to show their availability. This System Can used by police
department and also by the public of Delhi.

Functionality  Login
 Citizen Services
 Police Services
 RTI
 Traffic unit
 Online FIR
 Criminal record tracking
 FIR Tracking

18 | P a g e
APIIT SD INDIA
Online Crime Management System

2.2 Comparative Analysis


2.2.1 Existing System

In the existing system only we can see the details of particular information about the
police stations in our state, the existing system has more workload for the authorized person, but
in the case of Proposed System, the user can registered in our site and send the crime report and
complaint about a particular city or person.

2.2.2 Drawbacks of Existing System


 More man power.
 Time consuming.
 Consumes large volume of pare work.
 Needs manual calculations.
 No direct role for the higher officials.
 Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system needs to be
computerized.

2.2.3 Proposed System


The aim of proposed system is to develop a system of improved facilities. The proposed
system can overcome all the limitations of the existing system. The system provides proper
security and reduces the manual work. The existing system has several disadvantages and many
more difficulties to work well. The proposed system tries to eliminate or reduce these difficulties
up to some extent. The proposed system will help the user to reduce the workload and mental
conflict. The proposed system helps the user to work user friendly and he can easily do his jobs
without time lagging.

2.2.4 Expected Advantages of Proposed System


The system is very simple in design and to implement. The system requires very low
system resources and the system will work in almost all configurations. It has got following
features

 Ensure data accuracy’s.

19 | P a g e
APIIT SD INDIA
Online Crime Management System

 Proper control of the higher officials.


 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

2.2.5 FEASIBILITY STUDY


Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study lets
the developer foresee the future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the organization, ability to meet
their user needs and effective use of resources. Thus when a new application is proposed it
normally goes through a feasibility study before it is approved for development.

The document provide the feasibility of the project that is being designed and lists various
areas that were considered very carefully during the feasibility study of this project such as
Technical, Economic and Operational feasibilities. The following are its features:

There are four types of feasibility that will be required to discussed are:

1. Operational feasibility
2. Economic feasibility
3. Schedule feasibility
4. Technical feasibility

2.2.5.1 Technical Feasibility


The technical feasibility considers the technical requirements of the proposed project. The
technical requirements are then compared to the technical capability of the organization. The
systems project is considered technically feasible if the internal technical capability is sufficient
to support the project requirements. If the internal technical capability cannot support the

20 | P a g e
APIIT SD INDIA
Online Crime Management System

project, the project still can be considered technically feasible if an outside entity could be
utilized to support the technical requirements and the costs associated with this outsourcing
would still be within the scope of the proposed budget and economic feasibility. In this type of
feasibility we considered only two types of resources they must have like:

The following are the list of those hardware resources that required for developing and
running the system -:

A. For developing the system:-

 CPU: Pentium IV with at least 1.6 MHz


 Hard Drive Space: At least 5GB Free space
 Memory: 500MB
 Monitor: Any Standard Monitor.
 Graphic Card: Intel Extreme Graphic with 64MB
.
The following listed of software resources that I would most probably look into that used for
developing the proposed system (but some of it still under my considerations):
Operating System : Windows 8.1/Window 10

Web Server: Apache Tomcat 9.1

Software Development Tools: Edit Plus, Netbens, Java JDK

Database Management Microsoft SQL Server 2008


System:
Developing and designing Java HTML CSS BOOTSTRAP
languages
Software Modeling Tools: Microsoft Visio.

Project Management Tools : Microsoft Project

System Documentation and Microsoft Office 2013


Presentation Tools:
Graphic Design Tools: Adobe Photoshop CS.

Web Browser: Any standard web browser.

21 | P a g e
APIIT SD INDIA
Online Crime Management System

Table 2.2.5.1:- Technical Feasibility

B. For running the system:

 Web Browser: Any Standard Browser.


 Handheld based Emulator: Microsoft Pocket PC 2007

2.2.5.2 Operational feasibility


Operational feasibility reviews the willingness of the organization to support the proposed
system. This is probably the most difficult of the feasibilities to gauge. In order to determine
this feasibility, it is important to understand the management commitment to the proposed
project. If the request was initiated by management, it is likely that there is management
support and the system will be accepted and used. However, it is also important that the
employee base will be accepting of the change.

2.2.5.3 Economical feasibility


The economic feasibility for this system (online crime management system) will review the
expected costs to see if they are in-line with the projected budget or if the project has an
acceptable return on investment. At this point, the projected costs will only be a rough
estimate. The exact costs are not required to determine economic feasibility. It is only required
to determine if it is feasible that the project costs will fall within the target budget or return on
investment.
Technical Description of items funding
Specification
-Hardware PC/mic./Webcam/modem/ 10,000
-Software OS/Adobe reader/MS Office 15,000

Other tools
Other 10000
-Internet 1000/months
-training 35,000 Rs.
Table 2.2.5.3 Economical Feasibility

22 | P a g e
APIIT SD INDIA
Online Crime Management System

2.2.5.4 Schedule feasibility


Similar to economic feasibility, a rough estimate of the project schedule is required to
determine if it would be feasible to complete the systems project within a required timeframe.
The required timeframe would need to be set by the organization.

2.2.6 Limitation of the system


The scope of developing such knowledge based tracking system is extremely wide since an
effective tracking solution is really much depending on what one’s business organization
needs. For that reason, the system is being developed as generic one which cater for any
business organization used with the most common feature implemented whereby in order to
fulfilled entire project requirement with such a given time duration

 Lack of user design: - The system is not going to provide the design as
the user want, it is only provide the design which cannot be changes ones
it is implemented.
 Less securable: -The data provided by faculty can be easily transferrable;
there is no any security or ban to transferring the data to the user.
 Learning Approach – It doesn’t appeal to all learning styles so some
learners will not enjoy the experience – especially strong activists and
pragmatists. It is still a challenge to make eLearning appeal fully to these
groups as different people learn better or worse using different styles.
Some may prefer images, some prefer just reading words and some prefer
to talk about or actually do a task in order to learn.
 More chances for error: - As the system we have is requires so many
external software and plugin, so it is more likely of chances to come error
in the system from both side.
 Virus effect :- This errors and problem has not been resolved till date so
many times we have seen that the error come due to regular effect due to
virus and sometimes it is having a large effect during implementation of
the system.
 Technology Issues – With heavy reliance on computers that tracking
brings, comes the potential risks that comes with it. Firstly, you need to
ensure that all learners have a device that is able to support the training

23 | P a g e
APIIT SD INDIA
Online Crime Management System

modules. Some eLearning tools require software such as Flash that


devices like iPads don’t support. So all requirements need to be set out at
the beginning. Poor internet connection and unavoidable general random
faults also can interrupt learning and so need to be planned around.

2.3 Primary Research


Primary research is any type of research that we go out and collect the information by our self.
Examples might be including surveys, interviews, observations, and ethnographic research. A good
researcher knows how to use both primary and secondary sources in her writing and to integrate them in
a cohesive fashion. Conducting primary in researcher’s system is a useful skill to acquire as it can
greatly supplement for our research work in secondary sources, such as journals, magazines, or books.
We can also use it as the focus of your writing project. Primary research is an excellent skill to learn as
it can be useful in a variety of settings including business, personal, and academic. For completing the
research, researcher decided to go with three research procedure among all available methodologies that
are given below:

 Interviews:
 Questionnaires:
 Work Shop or focus Group
 Naturalistic Observation
 Study documentation
Developer has gone for Interview, Focus Group and questionnaire method to gather the information
from various users. Because as the system we have, according to that it is not possible to gather almost
all the information from a single source. It required to involvement of all types of use like students.

2.3.1 Why do Primary Research Require?


Primary research helps developer to gather the actual data information of users. Actually what
developer has observed from the problem context and literature review is believed to change at times.
So user consent it quite required. With the help of data gathering techniques through primary
research, developer can honestly do the designing of the system keeping in mind the data given by
users. Developer has chosen Questionnaire and Interview processes for data gathering techniques.

24 | P a g e
APIIT SD INDIA
Online Crime Management System

2.3.2 Techniques used


In order to gather the data techniques used in this system are already defined and they
are questionnaire, interview and by observations.

2.3.2.1 Interviews
It is an important way to collect facts, e.g. information about people's place of work, age, etc., but such
questions are usually no more than opening items which precede the main substance. The bulk of
interview questions seek to elicit information about attitudes and opinions, perspectives and meanings,
the very stuff of much of both psychology and sociology. Interviews are also in common use as a
means of selection - for entry to school or college, getting a job or obtaining promotion. They
are widely used because they are a powerful means of both obtaining information and gaining
insights. We use them because they give us an idea of 'what makes people tick', of the
personality and the motivations of the interviewee. And hare I have taken into consideration of
only two instance of user one is students and other is travel agency.

2.3.2.1. Why Interview?


 It provides us with immediate an response which saves the developer’s precious time
 It allows participants to express themselves in their own words
 It allows the collection of a large volume of rich data
 It allows discussion, probing and unexpected insights
 It is best for investigating problems

So I have created interview questions for user only which is given below as:

a) Which language to be used in this application?


Ans. --------------------------------------------------------------------------------------------------------

b) Why you use this language for making this types of application?

Ans.--------------------------------------------------------------------------------------------------------

c) Why it is different from other types of system?

Ans.--------------------------------------------------------------------------------------------------------

25 | P a g e
APIIT SD INDIA
Online Crime Management System

d) Which concept to be used in the application for tracking the Criminal record?

Ans.---------------------------------------------------------------------------------------------------------

e) How it is beneficial for user?

Ans.--------------------------------------------------------------------------------------------------------

f) What challenges coming in the development of such type of application?

Ans.--------------------------------------------------------------------------------------------------------

Thank you for providing me such support to answer me this important question. To answer this
question researcher got some data for their research. And finally researcher give you thanks for
your kind response as well as to provide prior information to them.
2.3.2.3 Questionnaires
It is a research methodology consisting of a series of questions and other prompts for the
purpose of gathering information from respondents. Although they are often designed for
statistical analysis of the responses, this is not always the case.

Questionnaires have advantages over some other types of surveys in that they are cheap, do not
require as much effort from the questioner as verbal or telephone surveys, and often have
standardized answers that make it simple to compile data for this system. However, such
standardized answers may frustrate users as well as the researchers. These are also sharply
limited by the fact that respondents must be able to read the questions and respond to them.
Thus, for some demographic groups conducting a survey by questionnaire may not be practical.
And here I have conducted questionnaire for users which is given below:

2.3.2.4 Questionnaires for users


Initially or till date we are generally having a proper way of learning and we are following the
same traditional way of fir, but as the system developer has supposed to develop for
researcher’s project is basically an online tracking system called online crime management
system. This system is going to provide the user a well-defined environment for online
compliant and tracking compliant status. And application contains a lot form generally all type
of user whether they are , police and public as per the researcher’s work he has firstly decide to
gather the data from users to estimate and start researcher’s working with the projects.

26 | P a g e
APIIT SD INDIA
Online Crime Management System

Researcher has a student of APIIT SD INDIA Panipat and his intake number is 8615138, and
currently continuing with the final year of his education curriculum. So kindly fill the form as
per your choice questions.

2.3.2.5 Why Questionnaires?


As this application is targeting a large number of persons who are going to use the
proposed system, so they are enormous in number, so it is not possible to take interview of them
because it will be very time consuming. These are some reasons for using Questionnaires-

 The analysis of questionnaire is most efficient than other techniques as we can draw
the graphs and analyse the data.
 It can reach a vast number of people regardless of physical location or geographical
dispersion.
 It can be distributed quickly and cheaply.

1. What is your Age?


a) Below 20 b) 20-35 c) 35-50 d) More then 50

Justification: Which age group you are belong?

2. What is your Gender?


a) Male b) Female

Justification: Declare your gender

3. What is your occupation?


a) Student b) Employed c) Homemaker d) Retired person

Justification: In this section developer ask to your occupation .

4. Do you feel need to online crime management system?


a) Yes b) No c) Sometimes d) Never
Justification: In this section developer ask to you, have you felt sometime really need such
types of system..

5. Have you ever used any online crime management system with phone log?

27 | P a g e
APIIT SD INDIA
Online Crime Management System

a) Yes b) No c) Sometimes d) Never


Justification: Have you ever used any online crime management system

6. Which of the following features should be there in the online crime management system?
a) online compliant ) b) compliant tracking c) search criminal d) All the above
Justification: developer ask to you some suggestion of extra feature which you want in the
application.

7. Do you feel the need of notification of complaint record in phone notification bar?
a) Yes ) b) No Y
Justification: have you ever feel some notification in the smartphone for remembering case
details

8. Do you feel the need for online fir Registration?


a) Yes ) b) No Y
Justification: you want to know the online fir registration.
9. How frequently do you use the online crime management application?
a) Frequently )
b) Never )
Justification: how much use such types of the application.

10. Are you misbehaved by police man?

a) Yes ) b) No Y
Justification:-in this section developer behavior of police man.

11. Do you think that police keeps a record of people are criminal?

a) Yes ) b) No Y
Justification: Developer wants to know is public data is secure
12. Do this system is helpful for public and police?

a) Yes ) b) No Y

Justification: Developer wants to know is system is helpful


13. Do you know your fundamental rights for security and safety?

28 | P a g e
APIIT SD INDIA
Online Crime Management System

a) Yes ) b) No Y
Justification: is people know their fundamental rights

14..Are you went police station for any reason?


a) Yes b) No
Justification: Developer wants to know experience.

15. Shear you experience with police or criminals.

Thanks for filling in this questionnaire. This questionnaire will be used to help select learners
for the online crime management project and it is based on what you get up to online and with
your technology. The contents of this questionnaire are absolutely confidential and no other
learners will be able to see your data.

2.4 Analysis and Conclusion:-

2.4.1 Analysis
Analysis is basically the systematic examination and evaluation of data or information, by breaking it
into its component parts to uncover their interrelationships. It can also be an examination of data and
facts to uncover and understand cause-effect relationships, thus providing basis for problem solving and
decision making. Here for this system some of the final conclusion of the respective research method
has been given below

29 | P a g e
APIIT SD INDIA
Online Crime Management System

2.4.1.1 Questionnaire and Interview Questions


Refer to section of primary research

 Analysis of Questionnaire and

30 | P a g e
APIIT SD INDIA
Online Crime Management System

31 | P a g e
APIIT SD INDIA
Online Crime Management System

2.4.1.2 Quantitative Analysis


Primary Research Analysis
QA1 Customization 40% of user wants to filter the data, so developer analyzes
searching facility should be provided
QA2 Notification 40% of user wants to receive notification, so developer
analyzes Notification facility should be provided
QA3 Reports 100% of the users wants to have a medium by which they
can easily analyzes the data so developer analyzes Report
functionality should be included
QA4 Task Management 40% users face difficulty in managing tasks so developer
analyzes the problem and included Task Manager.
QA5 Future Prediction 60% of users wants to know the future saving, developer
analyzes the problem and decided to include Future
Prediction functionality
QA6 Web Application 40% users wants to view the reports and save the expenses
on web also, so the developer has developed web
application .
QA7 Send Report 80% users wants to send their reports and status through
message and email.

32 | P a g e
APIIT SD INDIA
Online Crime Management System

2.4.2 Conclusion:-
..
2.4.2.1 Overall conclusion of Questionnaire
Overall conclusion means what developed has decided on the basis of their research he did.
They got so many new requirement, new thoughts, new ideas, addition view and one most
important thing i.e. the concepts and problem they have with online crime management
system . Some of those conclusions are given below:

 Users want some new changes in crime registration so that users can get more
relax..
 They really want sophisticated way of online compliant registration
 80% of the people wants to track their complaint status
 Users are really in need of such technology which save both time and money

 As per the population of India very difficult to maintain criminal record in register

So finally developer has got his required action that they had chosen the right track on which
they have to run. And he has decided to come on with the new ides and it is online crime
management system

2.4.2.2 Overall conclusion of Interview


By doing interview from the different type of users developers has really got imaging
information. More than 70 % of the people are supporting, online crime management system
and 10 are even confused to understand what actually it is. But from this time taking session
they finally got the real time result and user requirements in this filed. And it became very clear
to understand what should be included and what should not be.

33 | P a g e
APIIT SD INDIA
Online Crime Management System

CHAPTER-3
Design

3.1 Introduction

3.1.1 Logical Design

3.1.2 Physical Design

3.2 Input Design

3.3 Data Capturing

3.4 Input Validation

3.5 Output Design

3.6 Use - Case Diagrams

3.7 Sequence Diagram

3.9 ER Diagram

3.9 Normalization

34 | P a g e
APIIT SD INDIA
Online Crime Management System

CHAPTER 3. Design of system

3.1 Introduction
The design is a solution, the translation of requirements into center ways of meeting. The design
is actually the process of analyzing, organizing and developing a database model that accurately
reflects the organization functioning in the real world and implementing that model by creating a
database requires an appropriate methodology. System can be divided into two phases:
1. Logical Design
2. Physical Design

3.1.1 Logical Design


The logical design describes the detail specification for the proposed system. We can say that it
describes its own feature. Input, output, file (table) and database in manner that meets the project
needs. In logical design work with users is done to develop general design, choose best design,
develop system flow charts, identify hardware, software and personal needs and revise estimates
etc.

3.1.2 Physical Design


The purpose of physical design is to translate the logical description of data into the technical
specification for storing and retrieving data. The goal is to create design for storing data that will
provide adequate performance and ensure database integrity, security and recovery.
Physical database design does not include implementing files and databases (i.e. creating them
and loading data into them).

35 | P a g e
APIIT SD INDIA
Online Crime Management System

3.2 Input Design


The input design specifies the number in which the user enters the data to the system for
processing at later stage. Input design can insure the reliability of the system and provide an
accurate result. The input determines whether the user interacts with the system efficiently or
not. The input design can also be explained as a link between the user and the world. Input
design consists of those steps necessary to put transactions data into usable form of processing
While designing the input for the Online Crime Management System for police departments of
the following objectives were kept in mind as guidelines.
 Reducing the amount of input
 Avoiding errors in data
 Keeping extra steps
 Keeping the process simple
 Avoiding delays

3.3 Data Capturing


In input design only those items are captured which must actually be the subject of input
while designing the input, following points were kept in mind.
 Crime information
 Complaint record
 Admin information
 User information

3.4 Input Validation


Input validation is general term given to method, aim for detecting errors in the input. The main
thing, which is considered in the input, is that what the chances of error are? Following are input
validation used for centralized system for Online Crime Management System for police
department.
 Empty entry Control
 Data Type Validation
 Not Null

36 | P a g e
APIIT SD INDIA
Online Crime Management System

3.5 Output Design


A system is considered to be successful or unsuccessful on the basis of output design. The term
“output” means that after compilation of physical design what errors come out of the computer
system for the user. The output in project is considered as the backbone of the project. All
managerial design is actually made through these reports. Basically the reports are very
important aspect of the output. The user creates various reports in response to queries.

3.6 Use - Case Diagrams


Use cases are a way to capture the functionality and system requirements in UML use case
diagrams are composed of pieces named of functionality (use cases), the persons or things who
invokes the functionality (actors) and possibly the elements responsible for the execution of the
use cases (subjects).

A use case is a methodology used in system analysis to identify, clarify, and organize system
requirements. In this context, the term "system" refers to something being developed or
operated, such as a mail-order product sales and service website. Use case diagrams are
employed in UML (Unified Modeling Language), a standard notation for the modeling of real-
world objects and systems.

37 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.1 Use-Case Diagram for System (User)

Register

Complaint register

<<include>>
Edit complaint
<<include>>

<<include>>

login <<include>>
Track status

<<include>>

View stations
<<include>>

<<extend>>

User
Complaint Status

Logout

Figure 3.6.1: Use Case for System (User)

38 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.1.1 Use-Case Description

UC.I Use Case Name Description


D
1 Login Authenticate user to use the system.
2 Register This module will be used by the user to register all the
crime.
3 Complaint Register This function will help to register all crime.
4 Edit Register This function will help to edit complaint register.
5 Track Status This will help to Track the complaint status of the progress
of the complain crime.
6 View Station This function will choose the nearest station of crime.

7 Logout Allows to user to logout of the system.

Table 3.6.1.1 : Description of Use case for System(user)

3.6.1.2 Use-Case Specification

Use Case Name System (user)


Actor(s): User
Purpose: Complaint registration and view status.
Overview: User can complaint registration.

Table 3.6.1.2 : Specification of Use case for System(user)

39 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.2 Use-Case Diagram for System (Admin)

Register Officer assign

<<include>>
Register station
<<include>>

<<include>>

View user complaint


login <<include>>

<<include>>

Track complaint
<<include>>

<<include>>
<<extend>>

Admin Add New admin

View mostwanted criminal


Logout

Figure 3.6.2: Use Case for System (Admin)

40 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.2.1 Use-Case Description

UC.ID Use Case Name Description


1 Login Authenticate admin to use the system.

2 Register This module will be used by the admin to register all the
crime.

3 Officer assign This module will be used to assign the officer of the
complain register of the case.

4 Register station This function will help to register all the police station.

5 View user This function will be used to check all complaint of the
complaint admin to complaint by the user.

6 Track complaint This will help to Track the complaint status of the progress of
the complaint crime.

7 Add admin This function will be used to add new admin of the admin.

8 View most This will help to assign to mostwanted criminal by the


wanted criminal police.

9 Logout Allows to admin to logout of the system.

Table 3.6.2.1 : Description of Use case for System(admin)

41 | P a g e
APIIT SD INDIA
Online Crime Management System

6.1.2.2 Use-Case Specification

Use Case Name System(admin)

Actor(s): admin

Purpose: View complaint details by complaint by user.

Overview: Admin can action the complaint and arrest the criminal.

Table 6.1.2.2 : Specification of Use case for System(admin)

42 | P a g e
APIIT SD INDIA
Online Crime Management System

43 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.3 Use-Case Diagram for System (Police Station)

Register

Logout

<<include>>

<<extend>>

Police Station Login

<<include>>
View complaint

<<include>>

<<include>>
Police
<<include>> Update status

View criminal

Arrest criminal

Figure 3.6.3: Use Case for System (Police Station)

44 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.3.1 Use-Case Description

UC.I Use Case Name Description


D
1 Login Authenticate user to use the system.
2 Register This module will be used by the police station to register
all the crime.
3 View Complaint This function will be used to view all complaint on the
police station.
4 Update Status This will help to update the complaint status of the
progress of the complaint crime.
5 View Criminal This function will be check all criminal record on the
police station.
6 Arrest Criminal This function will be help to arrest all the criminal.
7 Logout Allows to police station to logout of the system.

Table 3.6.3.1 : Description of Use case for System(Police Station)

3.6.3.2 Use-Case Specification

Use Case Name System(Police station)


Actor(s): Police station
Purpose: View all complaint details by complaint by police station.
Overview: Police station can arrest all the criminal.

Table 3.6.3.2 : Specification of Use case for System(Police Station)

45 | P a g e
APIIT SD INDIA
Online Crime Management System

3.6.4 Use-Case Diagram for System (Court)

Register

View criminal

<<include>>

<<include>>
Update case

<<include>>

<<include>>
Solved case
Login
<<include>>

<<include>> Punishment

<<include>>

<<extend>>
Court History case

Pending case

Logout

Figure 3.6.4: Use Case for System (Court)

3.6.4.1 Use-Case Description

46 | P a g e
APIIT SD INDIA
Online Crime Management System

UC.I Use Case Name Description


D
1 Login Authenticate user to use the system.
2 Register This module will be used by the court to register all the
crime.
3 View Criminal This function will be check all criminal record on the
court and testimony.
4 Update Case This will help to update the complaint status of the
progress of the complaint crime.
5 Solved Case This function will be help to check all verdict by the
court.
6 Punishment This function will be check all criminal record on the
court and punishment the criminal.
7 History Case This will help to check all criminal history on the court.
8 Pending Case This function will be check all criminal record on the
court and solve the pending case on the court.
9 Logout Allows to court to logout of the system

Table 3.6.4.1 : Description of Use case for System(Court)

3.6.4.2 Use-Case Specification

Use Case Name System(court)


Actor(s): Court
Purpose: check all criminal record on the court and
testimony.
Overview: Verdict by the court.

3.7 Activity Diagram:-


Activity diagram is another important diagram in UML to describe the dynamic aspects of the
system.

Activity diagram is basically a flowchart to represent the flow from one activity to another
activity. The activity can be described as an operation of the system.
47 | P a g e
APIIT SD INDIA
Online Crime Management System

The control flow is drawn from one operation to another. This flow can be sequential, branched,
or concurrent. Activity diagrams deal with all type of flow control by using different elements
such as fork, join, etc

3.7.1Admin Activity diagram

48 | P a g e
APIIT SD INDIA
Online Crime Management System

Registered Admin

Login

Login fail

Login success

change
view profile station view FIR add criminal officer assign
password

view
station
Save data

Check by server

Update fail

view report

Figure 3.7.1Admin Activity diagram

49 | P a g e
APIIT SD INDIA
Online Crime Management System

3.7.2 Activity for Registered User

user

Login

Login fail

Login success

reg.compl search change


view profile Notification view status
aint criminal password

Save data

Check by server
Update fail

view report

Figure 3.7.2 Activity for Registered User

50 | P a g e
APIIT SD INDIA
Online Crime Management System

3.7.3 Station Activity diagram

Registered Admin

Login

Login fail

Login success

change
view profile station view FIR add criminal officer assign
password

view
station
Save data

Check by server

Update fail

view report

Figure 3.7.3 Station Activity diagram

51 | P a g e
APIIT SD INDIA
Online Crime Management System

3.8 Class Diagram:-

Class Diagram of Webpage:

<<Interface>>
HTTPServelet
-METHOD_HEAD
-METHOD_POST
+doGet()
+doPOST() viewAllUser
+doHead()
+doPut +viewAllUser()
+doPost()
+doGet()
Realization
Directed
Association

<<Enumeration>> searchUser
getLocation
index
-fUserid -userid:String
+username +latitude -fname:String
+password +longitude -lname:String
+form +newLat() +searchEmp()
+usertype +newLong() +onItemClick()

validateUser saveProgress
-username:String -milestone_id:String
-password:String -remark:String
+getList()

getUserLeave
getWork
-leave_id
-work_id:String -leave_type
-work_name:String
+getleave()
+getlist()

Figure 3.6 :-Class diagram of web page

52 | P a g e
APIIT SD INDIA
Online Crime Management System

3.9 Sequence Diagram

3.7.1 Sequence for Login user

User Login Server

Send data(mobile number,password)

Check validation

check login

Success

LoggedIn

Figure 3.9.1 Sequence for Login user

53 | P a g e
APIIT SD INDIA
Online Crime Management System

3.9.2 Sequence for Admin user

Figure 3.9.2 Sequence for Admin user

54 | P a g e
APIIT SD INDIA
Online Crime Management System

3.9.3 Sequence for police station user

Figure 3.9.3 Sequence for police station user

55 | P a g e
APIIT SD INDIA
Online Crime Management System

3.9.4 Sequence for Court user

Figure 3.9.4 Sequence for Court user

3.10 ER Diagram

56 | P a g e
APIIT SD INDIA
Online Crime Management System

tbuser

PK userid
tbcompliant
tbstation
user name
PK compliant id
PK station area
password
station area
city
Address
compliant type
Address mobile no
suspect
pin email
city
mobile no district

attribute name

state

tbAdmin tbcriminal

PK username PK criminaid

password
name

mobile no
Age

Address
crime type

Email
Address

Figure 3.10.1 ER Diagram

57 | P a g e
APIIT SD INDIA
Online Crime Management System

3.11 Normalization:
As the name implies, it denoted putting things in the normal form. The application developer via
normalization tries to achieve a sensible organization of data into proper tables and columns and where
names can be easily correlated to the data by the user. Normalization eliminates repeating groups at
data and thereby avoids data redundancy which proves to be a great burden on the computer
resources. These includes:

 Normalize the data.


 Choose proper names for the tables and columns.
 Choose the proper name for the data.

3.11.1 First Normal Form:


The First Normal Form states that the domain of an attribute must include only atomic values and
that the value of any attribute in a tuple must be a single value from the domain of that attribute. In
other words 1NF disallows “relations within relations” or “relations as attribute values within tuples”.
The only attribute values permitted by 1NF are single atomic or indivisible values.

The first step is to put the data into First Normal Form. This can be donor by moving data into
separate tables where the data is of similar type in each table. Each table is given a Primary Key or
Foreign Key as per requirement of the project. In this we form new relations for each non atomic
attribute or nested relation. This eliminated repeating groups of data.

A relation is said to be in first normal form if only if it satisfies the constraints that contain the primary
key only.

3.11.2 Second Normal Form:


According to Second Normal Form, for relations where primary key contains multiple attributes, no
nonkey attribute should be functionally dependent on a part of the primary key.

In this we decompose and setup a new relation for each partial key with its dependent attributes.
Make sure to keep a relation with the original primary key and any attributes that are fully functionally
dependent on it. This step helps in taking out data that is only dependant on apart of the key.

58 | P a g e
APIIT SD INDIA
Online Crime Management System

A relation is said to be in second normal form if and only if it satisfies all the first normal form
conditions for the primary key and every non-primary key attributes of the relation is fully dependent on
its primary key alone.

3.11.3Third Normal Form:


According to Third Normal Form, Relation should not have a non key attribute
functionally determined by another non key attribute or by a set of non key attributes. That is,
there should be no transitive dependency on the primary key.

In this we decompose and set up relation that includes the non key attributes that functionally
determines other non key attributes. This step is taken to get rid of anything that does not depend
entirely on the Primary Key.

A relation is said to be in third normal form if only if it is in second normal form and more
over the non key attributes of the relation should not be depend on other non key attribute.

59 | P a g e
APIIT SD INDIA
Online Crime Management System

3.11.4 Tables structure

Fieldname Data Type Length Key

Mobile no Varchar 20 Primary key

Password Varchar 25 -

Table 3.11.4.1 : Login

Fieldname Data Type Length Key

Name Varchar 20 -

Username Varchar 20 Primary key

Password Varchar 20 -

Address Varchar 50 -

Pincode Integer 9 -

Mobile no Integer 10 -

Email Varchar 30 -

Village Varchar 15 -

District Varchar 15 -

State Varchar 15 -

Table 3.11.4.2: User Registration

60 | P a g e
APIIT SD INDIA
Online Crime Management System

Fieldname Data Type Length Key

Username Varchar 20 Primary key

Password Varchar 20 -

Confirm password Varchar 20 -

Name Varchar 20 -

Official Address Varchar 25 -

Phone Integer 11 -

Residential Address Varchar 25 -

Pincode Integer 10 -

Phone Integer 10 -

Email Varchar 30 -

Table 3.11.4.3: Admin Registration

61 | P a g e
APIIT SD INDIA
Online Crime Management System

Fieldname Data Type Length Key

Complaint id varchar 10 Primary key

Station location Varchar 10 -

Complaint discription Varchar 50

Type of complaint varchar 20 -

city Varchar 10 -

area Varchar 15 -

Alternate mobile no varchar

Table 3.11.4.4: Complaint registration

62 | P a g e
APIIT SD INDIA
Online Crime Management System

Fieldname Data Type Length Key

Criminal no Varchar 10 Primary key

Name Varchar 15 -

Age Varchar 10 -

Occupation Varchar 15 -

Crimetype Varchar 15 -

Address Varchar 15 -

Table3.11.4.5: Criminal Register

63 | P a g e
APIIT SD INDIA
Online Crime Management System

Fieldname Data Type Length Key

Complaintno Varchar 10 Primary Key

Viewstatus Varchar 20 -

Table 3.11.4.6: Complaint status

Fieldname Data Type Length Key

Name Varchar 10 -

Age Varchar 10 -

Address Varchar 15 -

Type of crime Varchar 10 -

Complexion Varchar 10 -

Built Varchar 20 -

Passport no Varchar 12 -

Casede scription Varchar 12 -

Table 3.11.4.7: Most wanted

64 | P a g e
APIIT SD INDIA
Online Crime Management System

65 | P a g e
APIIT SD INDIA

You might also like