Home / Computer Science / Computerized crime tracking information system (case study of nigeria police)

Computerized crime tracking information system (case study of nigeria police)

 

Table Of Contents


<p> Cover pageCaritas logoTitle pageCertification page- – – – – – – – – -iDedication page- – – – – – – – – -iiAcknowledgement- – – – – – – – – -iii6Abstract- – – – – – – – – – -ivTable of content- – – – – – – – – -vList of tables – – – – – – – – – -xList of figures – – – – – – – – – -xiList of appendixes- – – – – – – – -xiiCHAPTER ONEINTRODUCTION1.1 Background of the project- – – – – – – -11.2 statement of problem- – – – – – – – -31.3 purpose of the project- – – – – – – – -41.4 Justification- – – – – – – – – -51.5 scope of the project – – – – – – – -51.6 limitation of the project- – – – – – – -61.7 project report organization- – – – – – – -61.8 Definition of terms- – – – – – – – -77CHAPTER TWOLITERATURE REVIEW2.1 Brief history of Nigeria police- – – – – – -82.2 Review of natural law theory– – – – – – -112.3 Review of crime history- – – – – – – -142.4 Tracking system- – – – – – – – -192.5 Reasons for the failure of some criminal tracking system- – -21CHAPTER THREESYSTEM ANALYSIS AND DESIGN3.1 Methodology- – – – – – – – – -223.2 Data collection- – – – – – – – – -223.2.1 Methods of Data Collection – – – – – – -233.2.2 Input analysis- – – – – – – – – -233.2.3 Witness / Suspect Statement Input System- – – – -243.2.4 Case File Input System- – – – – – – -2483.2.5 Crime Diary Input System- – – – – – – -253.2.6 Output Analysis – – – – – – – – -253.2.7 Crime Register Output System- – – – – – -263.2.8 Output System Form CR. 2- – – – – – -263.2.9 System Output Form CR.8- – – – – – – -273.2.10 System Output Form CR 14- – – – – – -273.2.11 Charge Sheet – – – – – – – – -273.2.12 Files and Records – – – – – – – – -273.3 Analysis of the Existing System- – – – – – -283.4 Limitations of the Existing System- – – – – – -3193.4.1Justification for the new system- – – – – – -323.5 System Design- – – – – – – – – -333.5.1 Output Specification and Design- – – – – – -333.5.2 Input Design and Specification- – – – – – -343.6 Database Design- – – – – – – – -383.7 Program Design and Specification – – – – – -433.7.1 Criminal Registration – – – – – – – -453.7.2 Suspect Registration – – – – – – – -.45 3.7.3 Report – – – – – – – – – – -453.7.4 Change Password – – – – – – – -463.7. Complainant Registration – – – – – – – -46103.8 System Flowcharts- – – – – – – – -463.9 Top down design- – – – – – – – -48CHAPTER FOURIMPLEMENTATION, TESTING AND INTEGRATION4.1 Choice of Development Tools- – – – – – -504.2 System Requirement- – – – – – – – -514.2.1 Software Requirements – – – – – – –514.2.2 Hardware Requirements- – – – – – – -514.2.3 People Ware (Personal Requirements) – – – – – -524.3 system Implementation – – – – – – – -524.4 Program Flowchart- – – – – – – – -53114.5 Testing – – – – – – – – – – -544.5.1Unit testing- – – – – – – – – -544.5.2 System testing – – – – – – – – -56CHAPTER FIVESUMMARY, CONCLUSION AND RECOMMENDATIONS5.1 Summary of findings- – – – – – – – -575.2 limitations of the study/project – – – – – – -585.3 Recommendation- – – – – – – – -585.4 BEME (Bill of engineering measurement and evaluatio) – – -595.5 Conclusion- – – – – – – – – -60BIBLIOGRAPHY – – – – – – – – -6112GLOSSARY – – – – – – – – – -65References- – – – – – – – – – -61Glossary- – – – – – – – – – -65Appendix A- – – – – – – – — – -66Appendix B- – – – – – – – – – -76Appendix C- – – – – – – – – – -78LIST OF TABLESTABLE 3.1 Criminal file- – – – – – – – -39TABLE 3.2 suspect file- – – – – – – – -40TABLE 3.3 Complainant File – – – – – – – -41TABLE 4.1- – – – – – – – – -54TABLE 5.1 BEME- – – – – – – – – -5913LIST OF FIGURESFig.2.0 organizational structure of Nigeria police- – – – -10Fig 3.1 A sample of Witness/Suspect form- – – – -24Fig 3.2 Information Flow- – – – – – – – -30Fig 3.3 login page- – – – – – – – -43Fig 3.4 main menu- – – – – – – – – -44Fig 3.5 system flow chart- – – – – – – – -4614Fig 3.6 Top down design- – – – – – – -48Fig 4.1 program flow chart- – – – – – – -53LIST OF APPENDIXESAPPENDIX A- – – – – – – – – -66APPENDIX B- – – – – – – – – -76APPENDIX C- – – – – – – – – -7815 <br></p>

Project Abstract

This project work intends to automate the existing criminal records of the Nigeria police using Enugu criminal investigating department. The essence was to produce durable criminal records and avoidable lost of criminal records. Structural database management system (DBMS) was used in its development in other to eliminate redundancy in the compilation, its friendliness in responding to the user exhibits and also its reliability and efficiency in tracking down criminals. Another important feature of this system was that it provides user with the facilities for having the hard copies or print out of any relevant5document as well as the facilities to communication with the system. Tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support.

Project Overview

INTRODUCTION1.1 Background of The StudyMan by nature is social, gregarious and cannot live in isolation. To maintain peace and harmony in the society, man has to fashion out conduct and some laws to govern the conduct of members of the society. When people appreciate these codes of conduct and laws, protection of lives and properties are guaranteed.Generally tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability.The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. Crime Tracking Information System uses computer-generated records as an interface for integrating and accessing massive amounts of location-based information.16Crime tracking system allows police personnel to plan effectively for emergency response, determine mitigation priorities, analyses historical events, and predict future events. Crime tracking system helps identify potential suspects to increase investigators suspect base when no leads are evident. The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate resources quickly and more effectively. In the Γ’mission-criticalβ€˜ nature of law enforcement, information about the location of a crime, incident, suspect, or victim is often crucial to determine the manner and size of the response. Crime tracking software helps co-ordinate vast amounts of location-based data from multiple sources. It enables the user to layer the data and view the data most critical to the particular issue or mission.

It is used world over by police departments, both large and small, to provide solutions for crime analysis, criminal tracking, traffic safety, community policing, Intranet/Internet mapping, and numerous other tasks.Crime tracking system helps crime officers determine potential crime sites by examining complex seemingly unrelated criteria and displaying them all in an interface. It also helps them map inmate populations, fixtures, and equipment to provide for the safety of inmates by separating gang members, identifying high-risk or potentially violent inmates, and identifying hazardous locations in an area. It reduces the potential for internal violence17by providing better command and control. Traditionally, these activities have been supported by paper and pen. Police officers now have the ability to immediately generate crime report directly relevant to the situation at hand. Police agencies collect vast amounts of data from many sources including called-for-services, arrests, first information reports and daily report. The same information provides a powerful decision making tool for investigators, supervisors, and administrators.



Blazingprojects Mobile App

πŸ“š Over 50,000 Project Materials
πŸ“± 100% Offline: No internet needed
πŸ“ Over 98 Departments
πŸ” Software coding and Machine construction
πŸŽ“ Postgraduate/Undergraduate Research works
πŸ“₯ Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Computer Science. 2 min read

Predicting Disease Outbreaks Using Machine Learning and Data Analysis...

The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...

BP
Blazingprojects
Read more β†’
Computer Science. 3 min read

Implementation of a Real-Time Facial Recognition System using Deep Learning Techniqu...

The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Applying Machine Learning for Network Intrusion Detection...

The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Analyzing and Improving Machine Learning Model Performance Using Explainable AI Tech...

The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...

BP
Blazingprojects
Read more β†’
Computer Science. 2 min read

Applying Machine Learning Algorithms for Predicting Stock Market Trends...

The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems...

The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...

BP
Blazingprojects
Read more β†’
Computer Science. 3 min read

Anomaly Detection in Internet of Things (IoT) Networks using Machine Learning Algori...

Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...

BP
Blazingprojects
Read more β†’
Computer Science. 2 min read

Anomaly Detection in Network Traffic Using Machine Learning Algorithms...

Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Predictive maintenance using machine learning algorithms...

Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...

BP
Blazingprojects
Read more β†’
WhatsApp Click here to chat with us