International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
CRIMINAL RECORD MANAGEMENT SYSTEM
Nilay Patil*1, Manish Parikh*2, Abhishek Sawant*3, Yash Shelar*4, Prof. Priyanka Kinage*5 *1,2,3,4Student, Computer Dept., Smt. Kashibai Navale College Of Engineering, Pune, Maharashtra, India. *5Faculty, Computer Dept., Smt. Kashibai Navale College Of Engineering, Pune, Maharashtra, India. ABSTRACT In addition to other technologies, other systems have made use of blockchain to maintain criminal data records. The concept of the research is based on the confidentiality of criminal data and maintenance from the local Police Officers' perspective. The aim of the study is to use blockchain technology to improve the security protocol for criminal record data. The work focuses on both the security protocols and the system architecture from both the user and implementers’ sides. Criminal records are highly sensitive public records. The authenticity and rigidity of records can be upheld by including criminal records in a blockchain, which also helps to protect the data from enemies. Each nation's ability to develop is directly hampered by rising crime rates, so it is and has always been a top priority for all countries to prevent or at least curtail current and potential criminal activity. The decentralization of data is made possible through a peer-to-peer cloud network. It assists in preventing unauthorized data alterations. In order to achieve integrity and security, this article offers a system for storing criminal records that uses blockchain technology. While high-level criminals seek to avoid attention, low-level criminals who carry out the grunt labor in a criminal organization are more likely to be apprehended. Keywords: Blockchain, Criminal, Decentralization. I. INTRODUCTION The graph of crime rates is gradually rising due to rapid urbanization and urban and rural development. Blockchain can replace such piled-up criminal records with a network where papers are freely available and could not be tampered with, keeping them safe and Secure. Blockchain is a P2P (peer-to-peer network) that helps decentralize data. This system will be based upon the immutability characteristic of the blockchain to ensure the integrity and security of data. This blockchain-based approach can reduce corruption risk factors by making it easier for third parties to monitor tamper-evident transactions and provide improved impartiality and consistency, consequently boosting criminal record openness and accountability. Also, timely access to legitimate criminal records by different administrative bodies will make law enforcement effective. II. LITERATURE SURVEY Nowadays crime rates are increasing and the public is facing many security problems in society. When this happens, individuals feel vulnerable and require assistance to be protected. Even though many technologies have been introduced for Crime control systems. This application will overcome these concerns and provide a database for storing data. Criminal records are now maintained via manual procedures, which is a less-than-efficient data system. There are chances of losing data. This application will resolve these issues and also offers a database for data storage. The current system utilized by the police department for prisoner information stores the name of the prisoners, information about the crime, the date of the FIR, the criminal's background, and the duration of the prison. III. LIMITATIONS OF THE EXISTING SYSTEM 1. System is not for everyone. 2. In the current method, time management is a problem. 3. Consumes a large volume of paperwork.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2018] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com IV. METHODOLOGY Crime Record Management System is a system used for statistical purposes to categorize different types of criminal activity. It provides a standardized framework for collecting and analyzing data related to crime. The purpose of categorizing crimes is to facilitate the comparison and analysis of crime statistics across different countries and jurisdictions. Various authorities such as police, prosecution, courts, and prisons collect data on crimes for their own purposes. These authorities use their own methods and techniques for recording and reporting crime data, which may vary depending on their operational requirements and legal systems. For example, police may collect data on reported crimes, prosecutions may track convictions, and prisons may record data on inmate populations. The Crime Record Management System categorizes crimes into different types or categories based on their nature and characteristics. Common categories include violent crimes (such as homicide, assault, and sexual offenses), property crimes (such as theft, burglary, and arson), drug offenses, fraud, and other types of crimes (such as traffic offenses, public order offenses, and cybercrimes). By grouping crimes into categories, the system enables the collection of data on crime trends, patterns, and prevalence at a macro level. This data can be used for policy-making, resource allocation, and evaluation of crime prevention strategies. However, it's important to note that the Crime Record Management System is a statistical framework and does not necessarily align with legal definitions of crimes in different jurisdictions, as legal definitions and classifications may vary across countries and legal systems. V. PROPOSED SYSTEM
Figure 1: System Architecture.
This is a police dashboard where the police can accept the absolute information using a login password. To access the online criminal management system, we need to Add on users (police office bearers along with the background screening agencies) and allocate their various levels of entitlements. Verify user login particulars and also make sure user level prerogatives to data. Stock as well as recover all the data about crime and criminals. Execute search tasks on the grounds of some defined standards. Execute crime inspection and analysis along with the statistics to generate adequate reports.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2019] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com Mathematical Model Let S be Whole system S= {I, P, O} I-input P-procedure O-output Input(I)- I = {Criminal Data} Where, Procedure (P)- P = {I, Using I System perform operations and Using PHP} Output(O)- O = {system adds criminal records in the database and handles the case} Block Diagrams Use Case Diagram
Figure 2: Use Case Diagram.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2020] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com Activity Diagram
Figure 3: Activity Diagram
VI. CONCLUSION In this paper, we will overcome the problem of the communication gap between the police during their investigation. We will also provide solutions to bridge the communication gap between police and the general user. Also, criminal information will be readily accessible to police officials as it is stored on the cloud. The problem of reporting fake crimes will be overcome as this application will need the verification of police to report incidents reported by the users to broadcast it to other users using the same application. In the future, some other security algorithms can be used to provide better security measures for the criminal database. Future research can be dedicated to these challenges. VII. REFERENCES [1] T. Mohana Priya, Dr. M. Punithavalli & Dr. R. Rajesh Kanna, Machine Learning Algorithm for Development of Enhanced Support Vector Machine Technique to Predict Stress, Global Journal of Computer Science and Technology: C Software & Data Engineering, Volume 20, Issue 2, No. 2020, pp 12-20 [2] Ganesh Kumar and P.Vasanth Sena, “Novel Artificial Neural Networks and Logistic Approach for Detecting Credit Card Deceit,” International Journal of Computer Science and Network Security, Vol. 15, issue 9, Sep. 2015, pp. 222-234 [3] Gyusoo Kim and Seulgi Lee, “2014 Payment Research”, Bank of Korea, Vol. 2015, No. 1, Jan. 2015. [4] Chengwei Liu, Yixiang Chan, Syed Hasnain Alam Kazmi, Hao Fu, “Financial Fraud Detection Model: Based on Random Forest,” International Journal of Economics and Finance, Vol. 7, Issue. 7, pp. 178-188, 2015. [5] Hitesh D. Bambhava, Prof. Jayeshkumar Pitroda, Prof. Jaydev J. Bhavsar (2013), “A Comparative Study on Bamboo Scaffolding And Metal Scaffolding in Construction Industry Using Statistical Methods”, International Journal of Engineering Trends and Technology (IJETT) – Volume 4, Issue 6, June 2013, Pg.2330-2337. [6] P. Ganesh Prabhu, D. Ambika, “Study on Behaviour of Workers in Construction Industry to Improve Production Efficiency”, International Journal of Civil, Structural, Environmental and Infrastructure Engineering Research and Development (IJCSEIERD), Vol. 3, Issue 1, Mar 2013, 59-66 www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [2021]