Professional Documents
Culture Documents
Android Based Crime Manage System Indust
Android Based Crime Manage System Indust
ANDROID BASED
CRIME
Advisor: Mr. Mulgeta Baru
MANAGEMENT
SYSTEM
INDUSTRIAL
PROJECT I
Wollega University, Nekemte, Ethiopia
2017 G.C or 2009 Ethiopian Calendar
Table of Contents
CHAPTER ONE..............................................................................................................................1
1. Introduction..............................................................................................................................1
1.1. Background Information...................................................................................................1
1.1.1. Strength and weakness of current system..................................................................2
1.2. Background of the projects...............................................................................................2
1.3. Statement of the Problem..................................................................................................3
1.4. Objective of Project..........................................................................................................3
1.4.1. General Objective......................................................................................................3
1.4.2. Specific Objective......................................................................................................3
1.5. Scope and Limitation of the Project..................................................................................4
1.5.1. Scope..........................................................................................................................4
1.5.2. Limitation..................................................................................................................4
1.6. Feasibility Analysis...........................................................................................................4
1.6.1. Operational /Organizational Feasibility.....................................................................5
1.6.2. Technical Feasibility..................................................................................................5
1.6.3. Economic Feasibility.................................................................................................5
1.7. Significance of the Project................................................................................................5
1.8. Beneficiaries of the System...............................................................................................6
1.9. Methodology of the Project...............................................................................................6
1.9.1. Data collection...........................................................................................................6
1.9.2. Data Analysis.............................................................................................................7
1.9.3. Tools to Use...............................................................................................................7
1.10. Risk and Constraints......................................................................................................8
1.10.1. Risk........................................................................................................................8
1.10.2. Action Taken..........................................................................................................8
1.10.3. Constraints............................................................Error! Bookmark not defined.
CHAPTER TWO.............................................................................................................................9
2. DESCRIPTION OF THE EXISTING SYSTEM....................................................................9
2.1. Description of the existing system....................................................................................9
2.1.1. Players of the existing system....................................................................................9
2.2. Major functions of Existing System with clear Inputs, Outputs and Process.................10
The system we are developing will take these strong sides of the current system and some new
features to these functionalities.
Lack of technology.
Lack of transportations.
Criminals have high knowledge of technology.
Hard to gather information concerning crimes.
Lack moderated materials.
Collecting the crime effect is very hard.
Lack of evidences to justify conviction of the perpetrator.
Use file based system that consume time and labor.
Unable to generated automatic crime report.
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements systems it doesn’t
include the following
Usually new systems established in order to overcome the technical illness of the previous
system. In the same way, this system is technically big enough to be applied easily to the
problem identified in the existing system. In addition, the both hardware’s and software’s for
this system are highly available and can be owned with small cost. Therefore, it can be
concluded that the system is technically feasible.
The beneficiaries of our system can be the whole our country community. Those can be
The community: - people can learn about rule and regulations from this system
and make them to respect the Law and Culture.
Crime Authority: - Those are Police, court and etc.
Data collection is the most important part of the project to find the main requirement of the
system and to understand how the system works. We are going to use different methods to
collect data. Among the methods, we use the following:
Observations:- to analyze the organization the previous crime management system
Document analysis: - to get information about ways of crime managements from 2nd
district (ወረዳ) police office at Nekemte town.
Interview:- for gathering direct information from the Commanders and other polices
We are going to use object oriented approach and UML for the purpose of analyzing the data.
The main reason behind using OOA and UML is:
The tools we are going to use for documents analysis in our projects are:
Microsoft office 2007, 2013 for the purpose of writing the documentations
Microsoft office VISIO professional 2007 for the purpose of drawing the use-
case, class, activity and other drawing.
Android Studio version 2.2 is best IDE tools for android development than
others like eclipse, Itellij IDEA or etc.
JDK for java and android SDK for android developing.
JavaScript for the purpose of client side validation.
WAMP server is used for the purpose of writing online internet programming.
and others
1.10.1. Risk
While we are developing our projects we may encounter different problems among:
The computer virus and failures are some of them.
Power fluctuations and loss in the laboratories if computer is desktop and online laptop.
As a problems exist the solution as well be exist. Some solutions for problems are:
Scanning the computer with antivirus and recovering the files.
Using additional laptop and working with them.
Always using backup after changing data of files.
Crime detector
Comminuting police
Difficulty in report
The officer dealing with a particular case cannot take decision by himself even when
he is having the firsthand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.
Even an efficient officer cannot/may not be able to handle more than one case at a
time.
As we all know, a covered truth, Bribery plays an important role in the existing
system.
Many cases are piled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.
2.7.1. Strength
The whole community and police officers are very cooperative or eager for
their duties performed even if it is a tiresome duty.
2.7.2. Weaknesses
To have a way that allow customers use different facilities provided by the
system being online.
Developing system that assign police officer to different zone.
Storing updated information on the system.
Better communication, better leadership, better training, and more defined
roles in terms of contribution to the society.
Working with partners.
Develop system that send message to suspected and witness.
Develop system that store data of complaint.
Develop system that register new Police.
Reducing crime and disorder.
Confidently and anonymity issues.
The functional requirements are functions or features that the system must include to satisfy the
system need and to be acceptable by the user. The functional requirements for the new system
that will replace the existing system include:
2. Name: Member
Description: A members those who are voluntary engaged to protect the
crimes and send different information concerning the crimes to the police
officer. They have right to:
The police officers have full responsibility on each and every thing that
concern polices.
4. Name: Visitor
Description: A visitor is a people who is guest for the system but he/she
want to view the system. So, they have some right to see what the system do and
works. Those are:
View article book
Report crime
Include: login
Extends: validate user
3.2.2.6.1. Flow of Events
3.2.2.6.1.1. For creating new account
7. The authenticated user wants to create new account
8. The authenticated user load account page
9. The authenticated user click on option create new account
10. The form will be displayed
11. The user will fill all the form clearly
[Alternative]
[Alternative]
[Alternative]
[Alternative]
[Alternative]
[Alternative]:
Include: login
[Alternative]
[Alternative]
Description: Member can create, delete and modify their own account
Include: login
[Alternative]
The system works if and only if the required data are inserted.
The member can’t create the double account using the same username and phone number
The system work connection based.
It may increase false accusation unless the awareness creation is made.
Physical presence of the person reporting a crime or the victim is required to complete
the investigation and frame a charge against the suspect. This is because the Ethiopian
Criminal Procedure Code requires a witness to give his/her testimony in person; the
testimony should be read to the witness and finally signed by the witness.
2. Control/process layer
(Application, controller)
-Validate System User
3. Domain (Business)
-Feedback screen ()
-Crime reporting screen ()
-View Article screen ()
-Crime Info screen ()
Data Sources
Fig4th4.4.1.
Wollega University year Component modeling
Computer science of CrimeManSys project
student Page 63
4.5. Deployment Modeling
A UML deployment diagram depicts a static view of run time configuration of processing
nodes and the components that run on those nodes. In other words deployment diagrams
show the hardware for the system, the software that is installed on that hardware, and the
middleware used to connect separate machines on one another.
Manage Member
Mobile
Manage Report
<<App>>
DB Server MYSQL
Manage Police
Persistence
Client: Browser
Manage Feedback
<<AppLication>> CrimeManSys
Database
Manage Complaint
User Account
Manage Station