The proposed system
applies to all Police stations across the country and specifically looks into
the subject of Crime Records Management. It is well understood that Crime
Prevention, Detection and Conviction of criminals depend on a highly responsive
backbone of Information Management. The efficiency of the police function and
the effectiveness with which it tackles crime depend on what quality of
information it can derive from its existing records and how fast it can have
access to it.
It is proposed to centralize Information Management in Crime for
the purposes of fast and efficient sharing of critical information across all
Police Stations across the territory. Initially, the system will be implemented
across Cities and Towns and later on, be interlinked so that a Police detective
can access information across all records in the state thus helping speedy and
successful completion to cases. The System would also be used to generate
information for pro-active and preventive measures for fighting crime.
The
project has been planned to be having the view of distributed architecture,
with centralized storage of the database. The application for the storage of
the data has been planned. Using the constructs of SQL server and all the user
interfaces have been designed using the DOT Net technologies. The standards of security and data
protective mechanism have been given a big choice for proper usage. The
application takes care of different modules and their associated reports, which
are produced as per the applicable strategies and standards that are put
forwarded by the administrative staff.
Existing
project:
The existing
system contains the about all the police stations that are registered as per
the jurisdiction of the system. It also gets integrated with the employees who
are working in these stations along with their designation.
Purpose
of the system:
Police provides safety to citizens. It always
remains steady for arresting any
criminal who is a threat for the safety of society. After registering the FIR
from any citizen, police starts its work and on that basis it arrests the
criminals if proofs are found against them. Once the criminals are arrested,
police starts investigation from them. After getting all the proofs against the
criminal, it is the duty of the police to present all the proofs honestly to the
court so that the right man can get right punishment. The true and right
information provided by the people to police helps a lot in arresting the
criminals who try to spoil the peaceful environment of society.Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time.
criminal who is a threat for the safety of society. After registering the FIR
from any citizen, police starts its work and on that basis it arrests the
criminals if proofs are found against them. Once the criminals are arrested,
police starts investigation from them. After getting all the proofs against the
criminal, it is the duty of the police to present all the proofs honestly to the
court so that the right man can get right punishment. The true and right
information provided by the people to police helps a lot in arresting the
criminals who try to spoil the peaceful environment of society.Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time.
In our Project we are going to implement a CRMS (Criminal
Record
Management System). This is a database system in which police will keep
the record of Criminals who have been arrested, to be arrested or escaped.
This will help the Police department to manage their records easily. In police
system when an incident occurs, a Petitioner reports an FIR (First Information
Report). Police starts investigation according to law on this FIR. An
investigation Officer supervises the investigation process. The main
concerning people in the whole process are Petitioner (The person who files
an FIR), Victim, Accused/Criminal, investigation officer.
Management System). This is a database system in which police will keep
the record of Criminals who have been arrested, to be arrested or escaped.
This will help the Police department to manage their records easily. In police
system when an incident occurs, a Petitioner reports an FIR (First Information
Report). Police starts investigation according to law on this FIR. An
investigation Officer supervises the investigation process. The main
concerning people in the whole process are Petitioner (The person who files
an FIR), Victim, Accused/Criminal, investigation officer.
PROPOSED
SYSTEM
The system after careful analysis has been identified to be
presented with the following modules:
Ø Police
stations registration module: This module maintains
the information about all the police stations that are registered as per the
jurisdiction of the system. It also gets integrated with the employees who are
working in these stations along with their designation.
Ø Victims
FIR registration module: This module maintains the
information related to the first investigation report of the crime sequences
that have taken place. The Fir registers all that a data that is necessary for
the investigation to take place in proper length. It identifies the crime
category and the crime nature.
Ø Investigating
evidence registration module: This module makes a
collection of information related to all the evidences that become
categorically important under the normal sequence of the investigation, this
module dynamically concentrates upon the changes that take place while the
system of investigation is under process.
Ø MAC
Enabled: This website is MAC Enabled website. That means,
the user can access the website in that system only, so that we can avoid the
information leakage problem. Media Access Control address (MAC address)
is a unique identifier assigned to most network adapters or network interface
cards (NICs) by the manufacturer for identification, and used in the Media
Access Control protocol sub-layer. If assigned by the manufacturer, a MAC
address usually encodes the manufacturer's registered identification number. It
may also be known as an Ethernet
Hardware Address (EHA), hardware
address, adapter address,
or physical address.
The standard format for printing MAC-48
addresses in human-friendly form is six groups of two hexadecimal digits,
separated by hyphens (-) or
colons (:), in
transmission order, e.g. 01-23-45-67-89-ab,
01:23:45:67:89: ab.
This form is also commonly used for EUI-64. Another convention commonly used by
Cisco and Cisco-like networking equipment uses three groups of four hexadecimal
digits separated by dots (.),
e.g. 0123.4567.89ab;
again in transmission order.
System
Requirement Specification:
Hardware
Requirements:
• I2 Processor and Above
• RAM 1GB and Above
• HDD 20 GB Hard Disk Space and Above
Software
Requirements:
• WINDOWS OS (XP service pack 2
/windows 2007 Server)
• Visual Studio .Net 2008(according
requirement)
• Visual Studio .Net Framework (Minimal
for Deployment)
• SQL Server 2008(according
requirement) Enterprise Edition
No comments:
Post a Comment