Vous êtes sur la page 1sur 8

RAJASTHAN TECHNICAL UNIVERSITY, KOTA

CERTIFICATE
This is to certify that SURBHI GOYAL, ROHIT KHANDELWAL,
RAVINDRA VARMA, VINIT SAINI student of B.Tech. Final Year VIII
Semester (INFORMATION TECHNOLOGY) has submitted theirMinor
Project Report entitled CRIME CONTROL under my guidance.

SIGNATURE:

SIGNATURE:

Mrs. VINEETA MISHRA

Mr. RAJ KUMAR SAIN

HEAD OF THE DEPARTMENT

LECTURER

CS/IT, MITRC ALWAR

CS/IT, MITRC ALWAR

ACKNOWLEDGEMENT
This to sincere acknowledge and mention the people whose cheesless cooperation made
our project study possible, and whose constant guidance and encouragement crown all
efforts with success.
First and Foremost we would thank the Almighty for his beautiful gift of life. The very next
we would like to thank our project mentor Mr. Sushil Kumar Rai (Dept. CS & IT),Mrs.
Vinita Mishra(Head of dept.),Mr. Raj kumar Sain(Ass. Professor of CS/IT),All faculty
members,my colleague and my friends who not only guided us all through the project but
also kept on giving us suggestions regarding the betterment of the project.
Finally, sincere thanks to the college management for providing us such a learning
environment and resources.

DATE: 17.04.2013

SUBMITTED BY:

PLACE: MITRC, ALWAR

RAVINDRA VERMA
ROHIT KHANDELWAL
SURBHI GOYAL
VINIT SAINI
(IT VIII SEM)

ii

ABSTRACT
Crime, we are told, is today a salient fact, an integral part of the risks we face in everyday
life. In both scholarly and public opinion crime is associated with harm and violence; harm
to individuals, destruction of property, and the denial of respect to people and institutions.
It is clear that we face pressing problems of a practical and scholarly nature in
understanding crime. Crime statistics by the home office, police reports, British crime
survey, legal reports of the courts, national victimization surveys, local surveys and many
others. Although all of them contribute in the process of analyzing and defining crime,
however, as validity and reliability are not in balance always, all these methods have their
criticisms, and the true extent of crime remains unknown to a large degree so we also need
to control the crime than we control the crime by applying the act and rules according to
the crime.
In this project we are providing some facility for reporting online crimes, complaints,
missing persons, and show most wanted persons details via mail. Some more functionality
like:1. Can file a complaint.
2. Add a crime report.
3. Upload the details of missing person and also view all further updates by the other.
4. The details of particular information about police station in your state.
5. The user can registered in our site and send the crime report and complaint about
Particular city and person.

iii

Requirement:
1. Software requirement: ASP .Net and C# .Net
2. IDE : MS-Visual Studio .Net 2008
3. Hardware requirement: Computer System with 1GB ram and Dual Core Processor
System
4. Any other requirement: LAN Cable, Internet Connection

Tools and Technologies involved:


Database: MS-SQL server 2005

iv

TABLE OF CONTENT
TITLE

PAGE NO.

Certificate--------------------------------------------------------------------------------i
Acknowledgement----------------------------------------------------------------------ii
Abstract----------------------------------------------------------------------------------iii-iv

Chapter-1:
1

Introduction---------------------------------------------------------1
1.1

Modules---------------------------------------------------1
1.1.1 The visitor module include----------------------2
1.1.2 The registered user module includes-----------2
1.1.3 The administrator module includes-------------2

Chapter-2:
2

Use Case Diagram------------------------------------------------4


2.1

Use Case Entities----------------------------------------4


2.1.1 Admin----------------------------------------------4
2.1.2 Public-----------------------------------------------4
2.1.3 Police-----------------------------------------------4

2.2

Extended Use Case Diagram---------------------------6

Chapter-3:
3

Data Flow Diagrams---------------------------------------------7


3.1

DFD-0 Entities-------------------------------------------7

3.2

DFD-1 Entity-------------------------------------------9

Chapter-4:
4

Entity-Relationship Diagram------------------------------------13
4.1

E-R Diagram Entities------------------------------------13

Chapter-5:
5

Table structure----------------------------------------------------15
5.1

Admin Table----------------------------------------------15

5.2

FIR Table--------------------------------------------------15

5.3

Acheivement Table---------------------------------------16

5.4

Helplines or Resource Table----------------------------16

5.5

Law & Guidelines Table---------------------------------16

5.6

Most Wanted list Table----------------------------------17

5.7

News Table------------------------------------------------17

5.8

Police Table-----------------------------------------------17

Chapter-6:
6

Implementation--------------------------------------------------18
6.1

Implementation Procedures------------------------------------------19
6.1.1 User Training---------------------------------------19
6.1.2 Training on the Application Software----------------------19
6.1.3Operational Document------------------------------------------20
6.1.4 System Maintenance--------------------------------------------20

vi

Chapter-7:
7

Testing-------------------------------------------------------------21
7.1

Test plan------------------------------------------------------------------22
7.1.1 Unit testing------------------------------------------22
7.1.2 Integration testing-----------------------------------23
7.1.3 Validation testing or system testing-----------------23
7.1.4 Output test ing or user acceptance testing--------24

Chapter-8:
Snap-Shots of Project--------------------------------------------25
8.1

Admin Homepage----------------------------------------25

8.2

Admin Registration --------------------------------------26

8.3

User Homepage----------------------------------------------------27

8.4

User Registration--------------------------------------------------28

8.5

Visitors Homepage------------------------------------------------29
8.6

Admin Login----------------------------------------------30

8.7

Forget Password -----------------------------------------31

8.8

Continue Forget Password -----------------------------32

8.9

User Login------------------------------------------------33

Conclusion------------------------------------------------------------------------------34
Future------------------------------------------------------------------------------------35
Reference--------------------------------------------------------------------------------36

vii

LIST OF FIGURE
TITLE

PAGE NO.

Figure 2.1.Use case Diagram---------------------------------------------------------5


Figure 2.2.Extended Use case Diagram---------------------------------------------6
Figure 3.1.DFD level-0----------------------------------------------------------------7
Figure 3.2.DFD level-1----------------------------------------------------------------12
Figure 4.1.E-R Diagram---------------------------------------------------------------14
Figure 8.1.Snap-shot of Admin Homepage-----------------------------------------25
Figure 8.2.Snap-shot of Admin Registration---------------------------------------26
Figure 8.3.Snap-shot of User Homepage-------------------------------------------27
Figure 8.4.Snap-shot of User Registration------------------------------------------28
Figure 8.5.Snap-shot of Visitors Homepage----------------------------------------29
Figure 8.6.Snap-shot of Admin Login-----------------------------------------------30
Figure 8.7.Snap-shot of Forget Password------------------------------------------31
Figure 8.8.Snap-shot of Confirm Forget Password--------------------------------32
Figure 8.9.Snap-shot of User Login-------------------------------------------------33

viii