secure crime identification system

22
Secure Crime Secure Crime Identification System Identification System Mini Project Presentation Mini Project Presentation Prepared by : T.SAMEER H.T.No:10BE1A05A3 Dept Of Computer Science & Engg 2012-2013 Under the guidance of Mr.N.Ashok Asst.Prof ,CSE Dept.

Upload: sameer-kumar

Post on 28-Nov-2014

2.028 views

Category:

Technology


0 download

DESCRIPTION

Secure Crime Identification System is a resourceful project which has the key elements of investigating the crime scene online and updating,tracking the details of the victims through system generated charge sheets, FIR and all. The flexibility the application provides is the modules for separate users. This intuitive project is being developed in such a way that it will be projected before the CBI and APP Committees and gain acknowledgement to completely work on the integration of this project.

TRANSCRIPT

Page 1: Secure crime identification system

Secure Crime Identification Secure Crime Identification SystemSystemMini Project PresentationMini Project Presentation

Prepared by : T.SAMEER

H.T.No:10BE1A05A3

Dept Of Computer Science & Engg

2012-2013

Under the guidance of

Mr.N.Ashok Asst.Prof ,CSE Dept.

Page 2: Secure crime identification system

Vision & MottoVision & Motto To provide high quality and transparent To provide high quality and transparent

policing in the state.policing in the state. To build a deep sense of trust in the police To build a deep sense of trust in the police

force and the citizens.force and the citizens. To instill security in the public, especially to To instill security in the public, especially to

the victims.the victims. To build a podium where the police and To build a podium where the police and

public can have a mutual interaction. public can have a mutual interaction. To integrate this application throughout the To integrate this application throughout the

country for establishing a gateway.country for establishing a gateway.

Page 3: Secure crime identification system

Objectives Objectives Detection & Conviction of criminals by Detection & Conviction of criminals by

Information Management Systems.Information Management Systems. Computerize the attempt of taking complaints Computerize the attempt of taking complaints

and records and establishing a communication and records and establishing a communication gateway among other police stations.gateway among other police stations.

Transferring the cases or complaints to Transferring the cases or complaints to appropriate police station by its ID & Locality.appropriate police station by its ID & Locality.

Assign police officials for cases and enlosing all Assign police officials for cases and enlosing all the details of the victims to them.the details of the victims to them.

Update the case details timely to ensure that fast Update the case details timely to ensure that fast action strategy is applied.action strategy is applied.

Provide the flexibility to victims to register a Provide the flexibility to victims to register a complaint at any police station nearest, complaint at any police station nearest, neverthless the locality of crime.neverthless the locality of crime.

Provide a complaint ID to vicitms to track their Provide a complaint ID to vicitms to track their complaint details timely.complaint details timely.

Page 4: Secure crime identification system

Need for Secure Crime Identification?Need for Secure Crime Identification? To have a mechanism of computerized

charge sheets and complaints which cannot be tampered or missed.

To provide security to the case details and victim details.

To ensure that speedy action is being taken by updating the case.

To have a secure communication between police officials through all the police stations.

Page 5: Secure crime identification system

Future ImprovementsFuture Improvements

Integrated Crime Management SystemIntegrated Crime Management System

Image Pattern Recognition SystemImage Pattern Recognition System

Bio Metric Recognition SystemBio Metric Recognition System

Page 6: Secure crime identification system

RequirementsRequirements

Functional Requirements

Administrator Module Content Management & Organization Report Generationa) List Of Casesb) Result Of Casesc) FIR & Chargesheetsd) Police Station Details

Page 7: Secure crime identification system

Requirements contd...Requirements contd...

Non-Functional Requirements

Performance Requirements Safety Requirements Security Requirements Maintenance Requirements Software Quality Attributes

Page 8: Secure crime identification system

Technical RequirementsTechnical Requirements

Hardware Requirements

P IV Processor & Above, Min 512 MB Memory, 80 GB Hard disk or above, LAN

Software Requirements

JDK 1.5, Oracle 10g Database, SQL Server, Apache Tomcat 7.0, Windows XP SP 3 / 7 or higher

Page 9: Secure crime identification system

Development & DeploymentDevelopment & Deployment

Easy to use, user-friendly GUI Interface. Flexible and simple navigation options. Java as Front End & Oracle as Back End Contains three major modules:-a) Police Station Registration Moduleb) Victims FIR Registration Modulec) Investigation Evidence Registration Module

Page 10: Secure crime identification system

Design Strategies

Employee Information Can

Have

Police Station Master

Designation Master

Has

Department Master

Can Wok for

E-R Diagram

Page 11: Secure crime identification system

UML DiagramsUSE CASE DIAGRAM FOR INVESTIGATING OFFICER

Page 12: Secure crime identification system

USE CASE DIAGRAM FOR ADMINISTRATOR MODULE

Page 13: Secure crime identification system

USE CASE DIAGRAM FOR WRITER MODULE

Page 14: Secure crime identification system

SEQUENCE DIAGRAM FOR ADMINISTRATOR MODULE

Page 15: Secure crime identification system

SEQUENCE DIAGRAM FOR INVESTIGATOR MODULE

Page 16: Secure crime identification system

SEQUENCE DIAGRAM FOR WRITER MODULE

Page 17: Secure crime identification system

SCREEN SHOTS

Page 18: Secure crime identification system

SCREEN SHOTS

Page 19: Secure crime identification system

SCREEN SHOTS

Page 20: Secure crime identification system

SCREEN SHOTS

Page 21: Secure crime identification system

Bibilography & ReferencesCharles Petzold,2002Addison-Wesley Publishing CompanyRoger S.PressmanProgramming WindowsJava Server Pages by Nick ToddJDBC by Patel Mosswww.w3schools.comwww.defensewiki.ibj.orgwww.coj.net

Page 22: Secure crime identification system

Thanks

I extend my sincere vote of thanks to all my professors and faculty, friends for their encouragement and constant assistance.

I would like to thank our Head of the Department (CSE), Associate Professor - Mr.N.M.S Desai, and my Internal Guide Mr.N.Ashok ,Krishna Murthy Institute Of Technology & Engineering, for their indefatigable inspiration, guidance, cogent discussion, encouragement, constructive criticisms, and co-operation for the successful completion of my project work.

T. SAMEER (10BE1A05A3)