Crime File System for Police
Crime File System for Police
HAWASSA UNIVERSITY
Submitted by
NAME ID
MAY, 2021
HAWASSA, ETHIOPIA
1|Page
CRIME FILE MANAGEMENT SYSTEM 2013
Contents
ACRONYM ............................................................................................................................... 4
Acknowledgment ....................................................................................................................... 5
Abstract ...................................................................................................................................... 6
2|Page
CRIME FILE MANAGEMENT SYSTEM 2013
5.1 Conclusion...................................................................................................................... 84
APPENDEX ..................................................................................................................... 85
Reference .............................................................................................................................. 86
3|Page
CRIME FILE MANAGEMENT SYSTEM 2013
ACRONYM
4|Page
CRIME FILE MANAGEMENT SYSTEM 2013
Acknowledgment
First of all, we would like to thank our almighty God, who gives us, patience, wisdom and ability
to walk through all the problems and obstacles during the period of our study.
Our appreciation for our adviser Wogene A. for his valuable suggestion, moral support, and
constant encouragement in the documentation part and We also want to thank inspector Dejene
Assefa and inspector Sebsibe Karriso, who gave us information about Hawassa police station
that we are asking for our project.
Last but not least, we would like to express our love, thanks, appreciation, and respect for the
ongoing support of our parents and family members, for their Continues encouragement and
financial support. And also we would like to thank the teaching staffs of computing who have
contributed to the success of this project.
5|Page
CRIME FILE MANAGEMENT SYSTEM 2013
Abstract
In current competitive scenario every business/public establishment needs quality and systematic process
to increase their working efficiency as well as improve their productivity. It is keeping in mind this
Business philosophy that we propose Crime files Management System for Hawassa police station. Our
system will deal with all the aspects of Managing a Crime Report against any FIR lodged by citizen
starting from Citizen‟s FIR entry, investigation processing, case resolution, tracking of cases as well as
report generation.
6|Page
CRIME FILE MANAGEMENT SYSTEM 2013
CHAPTER ONE
1.1 Introduction
The crime file management system project is a web based application for Hawassa police station.
Hawassa police station has established in order to prevent crimes and sustain peace in the city
and around the city. This station has mainly two functions. Those are preventing crimes before
happening and investigation on different crimes after happening. Currently Hawassa police
station uses manual file handling system which is a very time consuming activity and unsecured.
There are crimes committed were unreported to the authorities because of the fear of getting
involved. Some people fail to report a crime due to the costs and time incurred in travelling to
police stations that are situated far from their homes and workplaces. This shows that the
distance is also a factor that influences greatly how crimes are being handled with many crimes
going unreported as a result. So, we come up with the idea of making a Crime file Management
System because of the awareness that nowadays, there‟s a lot of crime happens anywhere and
going to the police department and municipality hall is a very time consuming because they are
still using manual method and it takes a week or two to make an action on the said complaints.
Given this fact, we present the development of crime file management system So, with the use of
the system, residents would easily report the ongoing crimes and issues in their area. The system
would also lessen the fear of the resident who witnesses the crime, unfortunately, one of the
factors why some cases take too long to be solved.
After completed this project the proposed system will help the police department to manage
investigation files and FIRs (first information report), to generate fast reports, and to retrieve
criminal cases in efficient manner. Provides facility for reporting online crimes. The proposed
system specifically looks into the subject of Crime Records Management.
7|Page
CRIME FILE MANAGEMENT SYSTEM 2013
The system at any point of time can provide the details of evidence and their sequence. And this
system can provide the details of victims and the registered FIR‟s. Using this system any
Number of clients can connect to the server.
This system will also provide facility for reporting FIRs and missing persons online, and show
most wanted person details, will manage all such activities ( like registration of the criminal,
updating information, search of particular viewing of the respective reports of crimes) that will
save time, man power. This system will provide better prospective for the enhancement of
organization regarding to quality and transparency.
Generally the new system will change the existing manual system in to computerized system.
Technological advancement brings about development considering the fact that the computer
system is fast and accurate. In addition, it can store large volume of information there by
eliminating the need to record information traditionally with flat files. Law enforcement agencies
such as the police force has recognized the benefits of the computer system and the have adopted
it to facilitate their operations such as investigation of the crimes information that would have
ordinarily required much time can be achieved in a few seconds using the computer system it is
very important computer are applied in crime investigation as it will save time and the job faster.
As an authentic measure to show case and implement the application computers and in police
investigation, this project is carried out.
In Hawassa town there were security departments in order to prevent crimes. In 1972 Hawassa
police station was established newly as a police force. Its mission was keeping humans life, there
asset as well as their money from criminals. Hawassa police station has been used manual file
handling system since it was established. There were four big departments under the station that
were detection department, prevention department, traffic department and HRM department.
8|Page
CRIME FILE MANAGEMENT SYSTEM 2013
As the existing system uses manual system there are a lot of problems, All criminal
information‟s are paper based which is cumbersome to maintain and ,improper resource
consumption like paper, pen, ledger, also it‟s more time consuming as regard of this Requires
lots of manual work. The existing system doesn‟t have system security in addition the files are
vulnerable for some kind of corruption in existing system retrieval of data in a desired way is so
difficult there is a Work load over police departments since investigation reports and
investigation files are manually operated.so Hard to generate report and Transferring neat
investigation files from generation to generation is so difficult because of improper record.
In other side happen Data redundancy and inconsistency and Unproductive use of storage space
generally Difficult to manage the overall system. Police stations are faced with challenge of
inability to investigate case properly. At many times it is difficult to catch the suspects and also
the wrong persons maybe arrested because of the bases and technique adopted for investigation.
The manual method adopted to investigate cases takes time and keeps cases pending and even
neglected with time. Consequently, the perpetrators of the crime are not apprehended at the end
of the day there by making the police force investigation ineffective, generally Difficult to
manage the overall system
9|Page
CRIME FILE MANAGEMENT SYSTEM 2013
The proposed system focused on Hawassa police station and covers only the management of
crime files in the station.
1.6 limitations
Limitation is element of factor or subsystem it restricts the system decision making from
achieving potential goal of the system. There are many constraints within our proposed system
that limit their effectiveness of performance. Our system is limited only in the process of crime
file management system of the Hawassa police station.
The above activities or subsystems are proposed system limitations because of the following
reasons:
The major limitation encountered is inadequate information as officers were not
forthcoming with information thereby making it complex to specify requirements of
the system.
It does not bring criminals to the court.
It does not work without connection except reading article book.
Not help to find perpetrators who abscond from the investigators.
1.7 Methodology
10 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Interview
To get the basic information and background information about the existing system, we have
asked the police officer of Hawassa Police station.
Document Analysis
This technique provides information on how the existing system works .There for we have
analyzed different forms in current manual system.
Observation
Our Team visits the client‟s organization or work place. We observe the actual working of police
station. And observe the workflow at the police station and how execution problems are dealt.
The team itself draws some conclusion, which aid to form requirements expected from the
organization.
Brainstorming
This is the phase where the team had spontaneous contribution of ideas and the process of
generating each creative ideas and solutions through intensive and freewheeling discussion.
In this project, our team will use object oriented system development methodology (OOSD) for
the design this technique has several phases some of them are:
During this phase the team uses to model the function of the system (use case modeling), find
and identify the business objects, organize the objects and identify the relationship between them
and finally model the behavior of the objects in detail.
11 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
During this phase our team uses Microsoft Visio software to refine the use case model and
rational rose for designing the sequence, collaboration, activity diagrams and to model object
interactions and behavior that support the use case scenario.
The reason why we have selected object oriented system analysis and design method specifically
UML (Unified Modeling Language) model is because of the following advantages:-
Unit testing
Each part of the System is separately tested by the team. The team tests every functionality by
applying some selection mechanism. Through this mechanism every modules got tested. At
12 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Anywhere when bugs appeared correction will be taken without changing functionality.
Integration testing
Using this testing technique the whole functionality is combined together and tested it for its
agreement with each other and with the systems functionality. At anywhere when bugs appeared
the team combined the modules and problem is identified and recombined together with all
functionality.
Deployment methodology
Once the functional and non-functional testing is done, the system is ready to deploy to the
beneficiary. This stage involves training of the assigned officials that will be given the privilege
of operating the system, populating the database with existing records, and converting such data.
I. Software Requirement
Operating System: Window 10 x64 (32 bits)
Programming language: HTML, CSS, JAVASCRIP, PHP
Database Development Tool: - MySQL
Visual paradigm /Edraw UML: - to draw diagrams
13 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Software requirement
Tool
Notepad++ : For editing Html, CSS, JavaScript and PHP files
XAMP server: For MySQL database and to run PHP files
Firefox Browser: to run files
EDraw max, astah community and visual paradigm: for drawing UML diagrams
MS word 2016: for documentation
Snipping tool: for screen shoot UML diagrams and interfaces
Language
Html, JavaScript, CSS: used to design front side of our system
PHP: used for back end of our system
Hardware requirements:
Computers: we used a computer which was operating system of Window 10
Flash disk: we used flash disk when we move our data from one machine to another.
Mouse, key board and monitor: was used for inputting and outputting of data.
External hard disk: was used to store our project date.
TIME BREAKDOWN
NO Activities April May June-July
1 System proposal
2 Requirement analysis
3 System design
4 Implementation
14 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Chapter Two
In this chapter the existing system of Hawassa police station is clearly defined by answering how
existing system was working? In what way the FIRs (first information report) are managed?
What are techniques being used to handle investigation files? What are the business rules of the
station? And what are the problems in the existing system? After studying the existing system it
is possible to understand that how the proposed system can solve the existing system problems.
In the existing system of Hawassa police station, the police department accepts FIRs in three
ways that are by phone, by letter and by face to face. For these purpose there are polices placed
at the station for 24 hours. After accepting FIRs, the police identifies whether the FIR is crime or
not. If it is crime, the FIR will send to the police officer and investigation team will be organized.
This investigation team list announces to investigative officers with FIRs, and then the
investigation process starts, the detector collect the data from peoples, blood strain, and hair on
that place. Based on thus data the detector and other police start the working to gain information
then present in front of the court. Others are when compliant is wanted to complain someone he
has to come the police officer bureau and start fills the compliant forms manually. To call
suspected person the print out the form then manually fill that form after that send the form with
the help of other person. After completed investigation process, the progress files closed and
recorded by the person who is hired for this purpose. Hawassa police station manages all FIRs
and investigation files by writing all information on ledge. In case of this manual system
Hawassa police station cant accomplished its mission in a manner of efficiency.
15 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
An actor is anyone or anything that must interact with the system or a role that user place with
respect to the system. Each actor set of goals in our Case WE classified the actor that is found in
the existing system into primary actor and secondary actor.
Primary actor
These are actors who directly initiate the system to run. Who can classify this actor as the Main
actor who plays the main role the system in the existing system these actors interact with each
other to fulfill the required tasks. Those actors are listed below:
Secondary actor
Those actors are who works under the primary actors they do only what main actor order them to
do those actors are
Crime detector
Community policy
The report generated in the existing criminal management system is somewhat in different
manner. Those concerning numbers of comminuting police and society are always generated
annually once. Those coming criminal generated weekly. That means the report in the existing
system are not computer based but they written by using paper, pen, as well pencil and other
material used for drawing writing.
16 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Totally there will be three types of privilege on the system with administrator those are
investigative polices, and polices and also communities (users) are actors to the system.
The administrator Hawassa police station crime file management system has a permission to add
account when polices are transferred from another region, and inactive or update police account
when needed. On the admin page the administrator can view and easily manage the reports, can
assign investigation team for each case, can easily identify which criminal case is investigated
by whom, which cases are closed and which are in progress and also can easily retrieve criminal
cases.
In the proposed system, investigative officers can register and update progress case
information‟s, can easily retrieve criminal‟s case for investigation purpose, can generate
investigation reports, and post wanted criminal information.
In proposed system polices can accept FIRs online and organizes them to generate FIR report,
can post safety tips and missing persons, can generate reports and can easily search criminals
case.
In Hawassa police station crime file management system, the users can send FIRs online, can
view wanted criminals, missing persons and safety tips.
Since crime file management system is actually a serious process, even a simple error lead to big
problems. So the proposed Hawassa police station crime file management system should be error
free.
17 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
The aim of proposed system is to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system. The system provides proper security and
reduces the manual work. The existing system in police station has several disadvantages and
many more difficulties to work well. The proposed system tries to eliminate or reduce these
difficulties up to some extent. The proposed system helps the police station employees to work
user friendly.
Greater efficiency for recording investigation file:Since the proposed system uses
database system, registering investigation files, and updating of progress files from
the database will be easy and also there will not be loose of data.
Security: since the proposed system requires verification of logon form, sensitive
information‟s will not be accessed or modified by unauthorized users.
Better service: since the proposed system allows users to register FIR online without
a need of going to police station, there will be fast response for crimes. Users will
also view all posted information‟s from anywhere.
Efficient retrieval of criminal files: since the proposed system record each and
every criminal file on the data base, retrieval of criminal files from the database at
any time will be a very easy process.
Efficient FIR management: in the proposed system polices can view and easily
identify whether the FIR is crime and report FIR in efficient and organized way.
18 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Increase Operational Efficiency: The proposed system should help in reducing the
repetitive paperwork/records and making the back-office functions more efficient.
The existing system is time consuming and not very user friendly.
The existing system Consumes large volume of paper work
The existing system doesn‟t have system security
Because of the large number of serious crimes, minor FIRs may be ignored.
Retrieval of data in a desired way is difficult
The existing system has work load for police department
The existing system does not maintain most wanted criminals with respect to area wise
and age wise also.
In the existing system generation of report is bulky activity
The existing system does not support online case registrations
To avoid all these limitations and make the workflow more efficient the system needs to be
computerized.
19 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
CHAPTER THREE
System features
3.1 Introduction
This chapter of the project document which provides a system features of the project. This
chapter contains and describes about functional requirement, and non-functional requirement,
Use case diagram, use case description, and analysis Model (Activity diagram and Sequence
Diagram).This new system removes the existing problems, which usually occurred in manual
Crime file management system. The major purpose of the new system is to automated paper
based system to computerized system.
4. After entering the required information the various validation checks are performed. The
updated information is reflected in the stored database.
20 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
6. If the specified database is stored then the posted information‟s display. The data displayed is
updated and accurate information.
10. If the entered information is correct, the required information will be displayed.
21 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Analysis modeling uses a combination of text and diagrammatic forms to depict requirements for
data, function, and behavior in a way that is relatively easy to understand, and more important,
straightforward to review for correctness, completeness, and consistency. The analysis model
must achieve three primary objectives: To describe what the customer requires, establishing a
basis for the creation of a software design, to define a set of requirements that can be validated
once the system is built.
In the proposed system a use case describes a sequence of action that provides a
measurable value to an actor and draw as a horizontal ellipse.
An actor is a person in the proposed system that plays a role in one or more interactions
with the system.
Relationships between actors of Hawassa police station crime file management system and use
cases exist whenever an actor is involved with.
I. Actor identification
The purpose of actor analysis is to identify all of the actors that interact with the system. An
actor has a role in that interacting with the system. The actors that interact with the system are:-
Administrator: administrator is who interact in the proposed system that has full
control over the system. After login to the system whose responsibility is manage staff
(add, update and inactive user), assign investigation team, and generate charge sheet.
22 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Investigative officer: investigative officer is an employee who has a roll (account type)
of investigative officer in the system. Whose responsibility is manage investigation
files (register new case, update progress file, and post wanted criminals), and generate
investigation report. He/she can retrieve closed criminal files and view assigned team
by login in to the system.
Front line officer: front line officer is a police whose responsibility is managing FIRs
(view and identify, delete, and post missing persons), and generate FIR report for
administrator.
User: user in this system represents all communities who interact to the system in order
to add FIRs and view posting information‟s.
Identifying the activities that are mainly performed on the proposed system is the basic thing in
analyzing a new system. The following use cases have been identified from the system
specification.
Login
Manage staff
Manage investigation files
View report
Manage FIRs
Post wanted criminals
Post missing persons
Add FIR
View posted information‟s
Retrieve criminal cases
View assigned team
Use case diagrams graphically describe system behavior (use cases). These diagrams present a
high level view of how the system is used as viewed from an outsider‟s (actor‟s) perspective.
23 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
From the identified use cases and actors the use case diagram of Hawassa police station crime
file management system is shown below.
The business rules of the Hawassa police station crime file management system are listed as
follow:-
Br1: New crime reports (first information reports) have to received and organized by front line
police officer
Br2: FIRs should get fast response as much as possible if and only if the FIR is crime case
Br4: The crime should be happened in Hawassa city or around the city, in order to start
investigation process.
Br8: National army staff military can‟t ask by polices for his crime.
Br9: police officers should work for 24 hours to accept crime reports
Br10: In case of disagreements between husband and wife, the FIR should be submitted by him
or herself in order to get response from police.
Br11: Investigation officer cannot use force and other illegal methods to do their investigation.
Br12: Victims should qualify whatever asked by officer In order to record their case
Br13: since investigation processes completed, progress files should be recorded as closed
criminal cases.
24 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Br14: Closed criminal cases should be recorded on the data base for only retrieval purpose.
Figure 3.1: use case diagram for Hawassa police station management system.
This section describes the most important activates that the actors of HAWASSA POLICE
STATION CRIME FILE MANAGEMENT SYSTEM do experience to make use of the system.
25 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Basic flow 1: Administrator, investigative officer or front line officer has to activate the system.
2: The System responses by displaying the login interface and allow the user for the user
name and password.
3: they select account type and fill his or her username and password.
4: he/she select login button.
5: System verifies username and Password.
6: the User get authentication and access the system.
7: System displays its main window.
8: Use case ends.
26 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
description This use case is done by investigative officer while the investigation process
27 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
28 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
29 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
2: the Administrator inserts account _type, username, password, and other user
information.
3: the administrator submits the data.
4: the system checks the new account information with the existing account in the
database.
5: the system save the new account to the database.
6: the updating process ends
Alternate flow
5.1: the system doesn‟t save the new account to the system database
5.2: it displays a fill again message.
Basic flow
About inactivate the account:
1: the administrator wants to inactivate the account and he/she login to the system.
2: the administrator selects the inactivate button.
3:The system display a form
4:the administrator enters the account type and username of the user
5: the system checks the entered information with the existing account in the database
6: the system sends message “Do you want to inactive?” to the administrator
7: the administrator selects the yes option
8: the system inactivated the account from the system.
9 the use case ends
Alternate flow
5.1: the system displays try again message.
5.2: the system displays empty form
7.1: the system ends if he/she selects no.
30 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Alternate flow 7.1: if the file doesn‟t exist in the database the system displays „there is no criminal file
record this name‟ message
7.2: use case ends
31 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Pre-condition The administrator has to login to the system and the reports have already been in database.
Alternate flow 3.1: the system does not display the report.
3.2: the report process ends
32 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
UC_ID UC_07
33 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
34 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
35 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Basic flow
1:the front line officer want to manage the FIR
2: the front line officer clicks FIR button
3: The system displays the FIR page
4: the front line officer view the FIR and identify which is a crime
5:the police select and organize new crime cases and sends to the admin
6: the system posts the crime case on the admin page
7: displays the successful message
8: the use case ends
36 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Alternate flow
7.1: if the user clicks cancel button, the use case ends
37 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Alternate flow
7.1: if there is an error, the system displays an error message
7.2: the use case ends
38 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
39 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Login
UC# 01 Main Login Login Login Database
: administrator/investigative
window link form controller
officer/ police
1: activate UI()
40 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Retrive
crime case View retrive Search case retrival Databas
: administrator/investigative
UC# 04 case link page controller e
officer/ police
1:he/she select
retrival case link()
1: select retrival case link()
2: the system Send
message to search
2: Send message()
page()
3:the system
Displays search
page() 3: display search page()
4:he/she Enters
requested 4: Enter requested information()
information ()
5:he/she Clicks on
search button() 5: Click search button()
6: the system
sends message to 6: send message()
case retrival
controler()
7: chek to database()
7: the system
checks to
database()
8: check() 8: check()
9:the system
responce message 9: send message()
to case retrival
controler
10: the system 10: Display not found message()
Displays not found
message() 11: Display requested information()
11: the system
displays
requested
information()
41 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
View report
UC# 05 View report Report type Report Database
:
link controller
adminstrator
1:select view report link()
1:the
administrator
selects view report 2: send message()
link()
2:the system send
message() 3:display report type()
3:the system
displays report
type()
4: the 4: select report type()
administrator
select report type()
5: the
administrator 5: click on view button()
clicks on view
button()
6:the system send 6:send message()
message to report
controller()
7:the system
fetchs the report 7:fetch()
from the database
()
8: the system
displays reports()
8: display reports()
42 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Manage FIR
UC# 09 View FIR FIR page Administr Database Database
: Police
link ator page controler
1:select FIR link()
2:send message()
1:the police select FIR
link
2:the system send 3:display FIR page()
message to FIR page
3:the system displays
FIR page 4:view and identify FIR()
4:the police view FIR
and identify wheather it
is a crime
5:he/she organize crime 5: organize crime FIRs()
FIRs 6: send message()
6: the system send
message to database
controller
7:the system checks 7:check()
the data
8: if it is not
correct,system displays
8: not successful message()
not successful
message 9: add to database()
9: if it is correct, the
system adds the data to
database 10: check()
10: the system check
data in database()
11: the system sends 11: send message to admin page()
message to
administrator page()
12: the system displays 12: display successful message()
successful message()
43 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Update user
UC# 03 Update Update user Update User Database
: user link form controller
administrator
1: click update user link ()
1: administrator
select on update user
2: send message ()
link ()
2: send message to
update user form ()
3: the system display
update user form () 3: Display update user form ()
4: administrator fills
user information ()
5:an administrator 4: Edit user detail ()
Clicks on update
button ()
6: update user form
transfers the filled 5: Click update button ()
form into update user
controller() 6: send message ()
7: the system validate
the data ()
8: if it is not correct
it displays not 7: validate ()
succesful message ()
9: if he/she fills
correctly the system
updates a database () 8: display not successful message ()
10: the system checks
the data wheather it 9: update data ()
is updated correctly ()
11: the system
display response ()
10: check ()
44 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Update
progress file View update Search Progress Progress file Database
: Investigative
UC# 02 link box file controller
officer
1: select update link()
1: the investigative
officer select update 2: send message()
link()
2: the system send
3: display search box()
message to search
box()
3: the system display 4:fill case No()
search box()
4:investigative
officer fill case No() 5: click on search button()
5: he/she clicks on
search button()
6: send message()
6: the system send
case no to progress
file controler()
7: the system search 7: search from database()
from database()
8:the system check it
from database()
9:if the case no not 8:check()
exist, the system
displays not found
message()
10:if it is found, the 9:display not found message()
system send message
to progress file()
11:the system
display progress file() 10:send message()
12:investigative
officer Edits progress
file()
13:investigative
officer clicks on 11: display progress file()
update button()
14:the system
validate edited
information() 12:Edit progress file()
15:if it is invalid, the
system display not
sucessful message()
16:if it is valid the
system updates the 13:click update button()
database()
17:check()
18:check()
18:the system
displays succesful 13:send message()
message()
14:validate()
16:update database()
17:check()
45 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Posting
Uc# 07 Post Post post Database
: Investigative View
post link type form contro...
officer/ police
1: select post link ()
1: he/she select post
link () 2: send message ()
2:the system send
message()
3: the system
Displays post type () 3: Display post type ()
4: he/ she select post
type() 4: select post type ()
5: the system send
message to post form 5: send message ()
()
6: the system 6: display form ()
displays form ()
7: he/she fill the
form () 7: fill the form ()
8: he/she clicks on
post button()
9: the system 8: click post button ()
transfers message ()
10: check ()
11: if it is incorrect 9: send message ()
display not
successful message()
12: if it is correct
,add to database () 10: check ()
13: check ()
14: the system
Displays response () 11: display not successful message ()
13: check ()
46 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
47 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Activity diagram is another important diagram in UML to describe dynamic aspects of the
system. Activity diagram is basically a flow chart to represent the flow form one activity to
another activity. The activity can be described as an operation of the system. So the control
flow is drawn from one operation to another. This flow can be sequential, branched or
concurrent. Activity diagrams deals with all type of flow control by using different elements
like fork, join etc. The purposes of activity diagram can be described as:
In order to login to the system the admin, investigative officer and police browses the system and
view home page. Then he/she enters user name, password and user type to login form and click
48 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
on login button. If the entered information is valid, he/she views available page that can be
displayed based on their user type, unless he/she views try again message and home page.
An investigative officer first browses the system and view the home page. Then the officer fills
the displayed login form and clicks login button. If the login information is invalid, the system
displays home page again, otherwise main menu displays. Then investigative officer selects on
manage investigation file and click register new. Then investigative officer fills displayed
victims, witness and criminals form, then the system checks whether the filled information is
correct. If it is correct, successful message will display otherwise main menu page displays
49 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Figure 3.12: activity diagram for posting safety tips and missing persons.
In order to post missing persons and safety tips, the front line officer browses the system and
view home page. Then he/ she fill the login form. If the entered information is in valid, the home
page will be displayed and he/she tries to login again, else he/she views front line page and select
post button. Then he/she select the post information type either safety tips or missing persons.
After this the front line officer fills necessary information‟s requested by the form then clicks on
post button. If the entered information is correct, displays successful message. Otherwise police
officer views unsuccessful message and police officer page.
50 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
In order to generate charge sheet, the administrator browses the system and fill login form. If the
entered information is invalid, the home page will be displayed and he/she tries to login again,
else he/she views administrator page and select charge sheet button then the admin fills the
charge sheet form. Then the admin clicks on submit button. If the entered information is
incorrect, he/she views empty charge sheet form else he/she views successful message.
51 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Since the administrator is the only privileged person to view reports, he/she browses the system
and fills login form. If the login information is invalid, the home page will be displayed and
he/she tries to login again. Unless admin can view admin page will be displayed. Then admin
clicks on view report button and select and view report type either investigation report prepared
by investigative officer or FIR report prepared by police officers.
52 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
click on
login button
invalid
valid
display
investigative
officer page
incorrect
correct display
successfull
message
In order to post want criminals information‟s, investigative officers browses the system and fill
login form. If the filled information invalid, he/she views empty login form else investigative
officer views investigative officer page. Then investigative officer click post button and fill
wanted criminals form and clicks on post button. If the entered information is incorrect, he/she
views empty form, else view successful message.
53 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
In order to add new user the administrator browses the system and view home page. After
inserting the login information on login form, administrator clicks login button and the system
validates login information. If it is invalid, the home page will be displayed and he/she tries to
login again. Unless admin can view admin page, then he/she selects add new user button and
enter new user information and clicks on submit button. The system validates/ checks whether
the new information is correct. If it is correct the system displays successful message else admin
page displayed again.
54 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
In order to update user account administrator should perform the above activities. First he/she
browses the system and view home page. Administrator fills login form and clicks login button
then the system validates entered information. If it is invalid, the home page will be displayed
and he/she tries to login again, else admin can view administrator page. He/she selects manage
staff and update user then enters user detail. If it is not found, admin page displays again unless
he/she enters the needed information and clicks update button. If the entered information correct,
successful message displayed. Otherwise admin page displayed again.
55 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
In order to inactive user account administrator first browses the system and fills login form. If
the login information is invalid, the home page will be displayed and he/she tries to login again.
Unless admin view administrator page will display. Then admin clicks on manage staff and
select inactive user. Then she/he enters user detail. If the user detail not found on the database,
unsuccessful message will displayed unless successful message will displayed.
56 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
The above diagram shows all the activities needed to retrieve criminal cases. First
administrator/investigative officer /front line officer browse the system and view home page.
He/she fills login information to login form and clicks on login button. If login information is
invalid, the home page will be displayed and he/she tries to login again. Otherwise available
page will be displayed. in order to retrieve crime cases he/she have to click retrieve info button
and fills needed criminal name, then clicks on search button. The system then checks whether the
needed file exist in the database. If it is found, the system displays case information unless
displays unsuccessful message and available main page displayed again.
57 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
UML class diagram represents the static view of an application. Not only used for visualizing,
describing and documenting different aspects of a system but also for constructing executable
code of the software application.
Figure 3.20: class diagram for Hawassa police station crime file management system.
58 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
59 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
60 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
61 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
62 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
63 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
64 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Figure 3.27: User Interface Design for send and view report.
65 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
66 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
67 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
68 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
69 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
CHAPTER FOUR
SYSTEM DESIGN
4.1. Introduction
System design is the transformation of the analysis model into a system design model. System
design is the first part to get into the solution domain in a software development. This chapter
focuses on transforming the analysis model into the design model that takes into account the
non-functional requirements and constraints described in the problem of the statement and
requirement analysis sections discussed earlier.
The purpose of designing is to show the direction how the system is built and to obtain clear and
enough information needed to drive the actual implementation of the system. It is based on
understanding of the model the software built on. The objectives of design are to model the
system with high quality. Implementing of high quality system depend on the nature of design
created by the designer. If one wants to change to the system after it has been put in to operation
depends on the quality of the system design. So if the system is design clearly, it will be easy to
make changes to it. In this project design the team will try to show:
How the project is designed
What are tasks done under the whole project
The different modules and their way of functioning are described here
70 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
The purpose of design is to model the system with high quality. The design goals are derived
from non-functional requirements that means non-functional requirement is the description of the
feature characteristics and attribute of the system as well as any constraints that may limit the
boundary of the proposed solution.
Design goals describe the qualities of the system that the developers should consider.
71 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
of use. From the end users‟ perspective the proposed system should be designed in such a
way that it is easy to learn and use, efficient and having few errors if any.
Readability: - The system code can be viewed by clicking on the current web page and
choose “view the source code” option.
Robustness: - Since the system is a web-based system, that mainly use a menu driven entry
there would not be an input problem by the user side. However, for the server side there
might be an error during the process of entering a data. In this time the system will provide
an error page and the system will continue without failure or crash.
Availability: - As long as there is an internet connection, the system will be available 24/7.
Portability: - The system is developed to be viewed and retrieved from any web browser
regardless of their version and platform it resides in it.
4.3 Scope
The scope for the system design will involve in user, admin, front line officer and investigation
officer while the user Add FIR then admin, front line officer and investigation officer view the
report then front line officer retrieve crime case. Manage fir, assign investigation officer, then
investigation officer manage investigation file and generate report .The officer finally enable
exchange information across in the police station.
System design is the first of the three technical activities design, code and test that is required to
build and verify software. The importance can be stated with a single word “Quality”. Design is
the place where quality is fostered in software development. We will see architecture design,
deployment view, logical view, and process view, purpose of system design document and
database design.
72 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
The system will be built on a layered architecture. A layered architecture makes it easier to
maintain or modify one part of the system without affecting the others. For example if the
developer need a modification on the User interface, they could get it without affecting the rest
of the system.[6]
73 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
User Interface Layer: -This layer wraps access to the business logic of our system. For instance
in our system the User interface (UI) provides the user to access the system easily.
Business Logic Layer: - The business logic layer implements all the functional requirements
which implements the concepts relevant to our business logic
Persistence Layer: - Persistence layers encapsulate the capability to store, retrieve, and delete
objects/data permanently without revealing details of the underlying storage technology in the
system. Our system uses MySQL database.
Database: - The system will be using a relational database for its persistent data storage. The
layer at the bottom of architecture will be database system
By this Diagram, components of the system will be wired showing that there is relation among
components; management of the system, database and operations performed on databases such
security issue. This in some extent shows which component or objects will be accessed by whom
and what type of security infrastructures it is using.[1] The component diagram of Hawassa
police station crime file management system is displayed below.
74 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
manage
staff
generate
chargesh
eet
view
report
Administr manage
ator investigat
ion file
generate
Investiga report
tive
officer retrieve security
closed
file
frontline post
officer wanted
person database
post
missing
user person
manage
fir
view
posted
info
add fir
Figure 4.2: component diagram of Hawassa police station crime file management system.
75 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Login
This includes admin, investigative officer and police login. There will be account type, user
name and password to login into the system to use all the facilities.
76 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Manage staff
This module helps the admin to add new user accounts, update and inactive existed account.
This module helps the admin, investigative officers and police to view the details of closed crime
cases.
FIR management
This module helps polices to view, identify and organize FIRs and users to add FIRs.
This module helps investigative officers and polices to post wanted persons, and missing persons
and hot news with safety tips respectively. This module also helps users to view posted
information‟s.
This module helps the investigative officers to register new criminal files and to update progress
files if necessary. Witness information‟s, criminal information detail and witness‟s information‟s
are registered in this module.
Generate report
This module helps the investigative officers to prepare investigation reports and polices to
prepare FIR reports.
View report
This module helps the admin to view both FIR and investigation reports.
77 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Deployment diagrams model the physical architecture of a system, and it shows the relationships
between the software and hardware components in the system and the physical distribution of the
processing.[4]
HTTP Application
request sever SQL
Client Databse
browser User server
controller
login
controler
Investigative
officer Persistance
progress
file
controler
front line
officer post
controler
User
database
FIR
controler
new case
controler
case
retrival
HTTP controler
response
Figure 4.4: deployment diagram for Hawassa police station crime file management system.
78 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
witness_id word
Pro_id Id_no First_Name Middle Last_Name age job sex phone kebele
_Name
village Status Case_id Role Witness_id2 Suspect_id Vict
im_i
d
79 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
NORMALIZATION FOR
User profile table
Pro_i Id_n First_Na Middle_Na Last_Nam age job se kebe
d o me me e x le
villag Stat Case_id Role Witness_i Suspect Victim_
e us d2 _id id
User profile phone table
Pro_id phone
Normalization form
Users table
fir_id first_n middle_na Last_ age job sex Phone_n kebel villag nation
ame me name o e e
religion Id_no Education Crime_ti Crime_ Victim User view Inv_v Progress
_level me place _word _id iew case_id2
80 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Normalization form
Fir table
fir_id first_ middle_ Last_n age job sex kebele village nation
name name ame
religio Id Crime Crime User view Inv_view Progress case_id2
n _n _time _place _id
o
Normalization form
News table
id_no date
Normalized form
Safty_tips table
id_no date
81 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Id_no Cloth_style
Normalized form
Missing table
id_no missing_date religion Hair_style height Face_color
Normalized form
Pm table
id message timestamp
82 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Figure 4.5: database design for Hawassa police station crime file management system.
83 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
CHAPTER FIVE
5.1 Conclusion
Crime File Management System allows police department to store department‟s case details,
Complaint Details, FIR Details, etc. This Software Package allows Police Departments to store
all the details related to the department and use them whenever necessary. This project will also
be able to provide reports of various cases, FIR report, charge sheet report, and progress file
report , and also be able to upload and view wanted criminals, missing persons and hot news.
The implementation of the system in the organization will considerably reduce manual data
entry, time and also provide readily calculated reports.
5.2 Recommendation
The proposed system that we are trying to develop involves only automate investigation/criminal
files that are managed in police station. But there are still areas that may be considered as a
further and important area to improve on, and our suggestion go thus.
There is the need for the magistrate segments and prison record to be automated.
The development of DNA database stores criminal fingerprint.
There is a need for human resource management records in police station to be automated
Therefore, others who are interested to develop a new system on police station file management
system or other related systems can get some initial idea about the system. By focusing on the
limitation and functional areas of the system they can also develop a better police station
management system that automates all files managed in police station.
84 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
APPENDEX
Symbol Description
Actor
System boundary
Decision
Use case
class
Deployment diagram
85 | P a g e
CRIME FILE MANAGEMENT SYSTEM 2013
Reference
[1]. Arbaz Khan, MayankDangand Nikhil Pangarkar - November 17, 2012 - STUDYING
CRIME INCIDENTS FOR SAFETY ANALYSIS - Indian Institute of Technology, Kanpur,
India
[2]. Sumit R. Farsole, Shreyas B. Kene, Prof. V. V. Bhujade -March 2014- E-POLICE
POLICE RECORD MANAGEMENT SYSTEM -Wardha, India.
[6]. Sumi Thomas PainumkaL - March 2009 - CRIME MANAGEMENT AND REPORTING
SYSTEM - Cochin University of Science and Technology
86 | P a g e