Académique Documents
Professionnel Documents
Culture Documents
Table of Contents
CHAPTER ONE ............................................................................................................................. 1
1. Introduction ............................................................................................................................. 1
1.1. Background Information .................................................................................................. 1
1.1.1. Strength and weakness of current system ................................................................. 2
1.2. Background of the projects .............................................................................................. 2
1.3. Statement of the Problem ................................................................................................. 3
1.4. Objective of Project .......................................................................................................... 3
1.4.1. General Objective ..................................................................................................... 3
1.4.2. Specific Objective ..................................................................................................... 3
1.5. Scope and Limitation of the Project ................................................................................. 4
1.5.1. Scope ......................................................................................................................... 4
1.5.2. Limitation .................................................................................................................. 4
1.6. Feasibility Analysis .......................................................................................................... 4
1.6.1. Operational /Organizational Feasibility .................................................................... 5
1.6.2. Technical Feasibility ................................................................................................. 5
1.6.3. Economic Feasibility ................................................................................................ 5
1.7. Significance of the Project ............................................................................................... 5
1.8. Beneficiaries of the System .............................................................................................. 6
1.9. Methodology of the Project .............................................................................................. 6
1.9.1. Data collection .......................................................................................................... 6
1.9.2. Data Analysis ............................................................................................................ 7
1.9.3. Tools to Use .............................................................................................................. 7
1.10. Risk and Constraints ..................................................................................................... 8
1.10.1. Risk........................................................................................................................ 8
1.10.2. Action Taken ......................................................................................................... 8
1.10.3. Constraints............................................................Error! Bookmark not defined.
CHAPTER TWO ............................................................................................................................ 9
2. DESCRIPTION OF THE EXISTING SYSTEM ................................................................... 9
2.1. Description of the existing system ................................................................................... 9
2.1.1. Players of the existing system ................................................................................... 9
2.2. Major functions of Existing System with clear Inputs, Outputs and Process ................ 10
CHAPTER ONE
1. Introduction
1.1. Background Information
In Ethiopia there is no any computer based method to handle day to day activities of crimes happen.
Since now we are trying to develop a system that conveys good ways to handle those things. The
Crime Management System (CrimeManSys) provides optimal as possible as plan for crime reports
and managements. So many countries are faced with these problems of crime reporting and
managements of handlings. Now days the members of peoples make crime are highly developed
and educated than police officers. To make more peoples are concerned to this and help to stop
crimes this system can improve knowledge methods of all citizen become crime fighter.
CrimeManSys is designed and implemented as an interactive program that
1. Enables entering data like:
Data of police officer
Data of comminuting police
Data of suspected person
Data of guest registrations and other constraints related to
the Crime Management System
2. Enables automatic sending of data to the server
3. Makes it possible of automatic updates of data’s
4. Automatic generating of the reports at the end of the week
Making all this possible the system make good life with of crimes and reduce the crime happening
day to days. In our country there is so many problems that the police officer may face with. Some
of them are:
Lack of quickly reaching incident place on times
Lack of technology to identify the crimes
Lack of economy and others
Because of all this we come up with an idea of creating android based CrimeManSys using MySQL
for database purpose and PHP, Java, XML, other programming languages. So, this system will
provide automatic sending of crime data’s to the police officer when the server is running and the
manual labor killing will be reduced and time and lack of transportation have been conserved.
The system we are developing will take these strong sides of the current system and some new
features to these functionalities.
Lack of technology.
Lack of transportations.
Criminals have high knowledge of technology.
Hard to gather information concerning crimes.
Lack moderated materials.
Collecting the crime effect is very hard.
Lack of evidences to justify conviction of the perpetrator.
Use file based system that consume time and labor.
Unable to generated automatic crime report.
On other hands, as a graduated students this kind of project which requires the implications of
many course we studied which will help us to know more about the course and how they are
practiced in the real world. So we decide to develop this system which is classy one.
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements systems it doesn’t
include the following
It doesn’t bring the criminals to the court.
It doesn’t work without connection except reading article book.
It doesn’t upload videos or image but capture and send online.
Not help to find perpetrators who abscond from the investigators.
Police office can access their daily working zones easily using their mobiles.
The placement of police officer will be effective.
Minimize wastage of resources including energy.
It speeds up communication and cooperation between peoples and police
Automatically send message to the suspected person.
It will capture time, date and place where incidence (crime) happen.
Automatically send message for calling witness “Ragaa ማማማማ”.
Helps the investigating police officer to get fresh information.
The system is portable.
Helps to initiate investigation on priority basis.
Enhances accuracy of information to be collected for effective use.
Helps to perform the speedy trials.
Microsoft office 2007, 2013 for the purpose of writing the documentations
Microsoft office VISIO professional 2007 for the purpose of drawing the use-
case, class, activity and other drawing.
1.10.1. Risk
While we are developing our projects we may encounter different problems among:
The computer virus and failures are some of them.
Power fluctuations and loss in the laboratories if computer is desktop and online laptop.
CHAPTER TWO
Crime detector
Comminuting police
Difficulty in report
The officer dealing with a particular case cannot take decision by himself even when
he is having the firsthand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.
Even an efficient officer cannot/may not be able to handle more than one case at a time.
As we all know, a covered truth, Bribery plays an important role in the existing system.
Many cases are piled up in the corners, which are not proved, due to lack of commitment
in the job.
In most of the cases, the innocent are accused in the existing system.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
They criticized it for being inefficient, time consuming, and poorly managed, disparate
and lacking flexibility.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.
2.7.1. Strength
The whole community and police officers are very cooperative or eager for their
duties performed even if it is a tiresome duty.
2.7.2. Weaknesses
Lack of data integrity.
High exposure to record error.
Difficulty in managing information, poor or corrupted filing system and
difficulty to get the required information easily as possible.
To have a way that allow customers use different facilities provided by the
system being online.
Developing system that assign police officer to different zone.
Storing updated information on the system.
Better communication, better leadership, better training, and more defined roles
in terms of contribution to the society.
Working with partners.
Develop system that send message to suspected and witness.
CHAPTER THREE
3. MODELING
3.1. Use-case Diagram
A use case is an interaction between users and a system. It captures the goal of the users and
the responsibility the system to its users. It is the functionality of the system or the service
provided by the system.
2. Name: Member
Description: A members those who are voluntary engaged to protect the
crimes and send different information concerning the crimes to the police officer.
They have right to:
Manage their own View article book
account, and other
View crime detail, responsibility in the
Give report, system.
View station,
Give feedback,
The police officers have full responsibility on each and every thing that
concern polices.
4. Name: Visitor
Description: A visitor is a people who is guest for the system but he/she want
to view the system. So, they have some right to see what the system do and works.
Those are:
View article book
Report crime
Include: login
Extends: validate user
3.2.2.6.1. Flow of Events
3.2.2.6.1.1. For creating new account
7. The authenticated user wants to create new account
8. The authenticated user load account page
9. The authenticated user click on option create new account
10. The form will be displayed
11. The user will fill all the form clearly
12. The user click on create account
13. Ask user for verification of email or phone
[Alternative]
[Alternative]
[Alternative]
[Alternative]
[Alternative]
1. If the complaint not found
2. The system display message “The complaint you
searched is not found. Please try again!”
3. The system ask actor whether he/she search again
4. The use case end
3.2.2.8.1.3. For updating complaint files
1. The authenticated actor wants to modify complaint files
2. The actor login to the system
3. The actor goes to complaint page
4. The actor click on modify complaint
5. The system ask actor to search complaint he/she wants
to modify
6. The actor enter complaint to be updated [Alternative]
7. The actor changes what he/she wants to change
8. The actor click on apply change button
9. The use case end
Post condition: The complaint data is successfully changes.
[Alternative]
1. If complaint searched is not found
2. The system display message “The complaint you
searched is not found. Try again!”
3. The system ask whether he/she wants to search again
or not
4. The use case end
[Alternative]
[Alternative]:
Include: login
[Alternative]
[Alternative]
Description: Member can create, delete and modify their own account
Include: login
[Alternative]
[Alternative]
[Alternative]:
The system works if and only if the required data are inserted.
The member can’t create the double account using the same username and phone number
The system work connection based.
It may increase false accusation unless the awareness creation is made.
Physical presence of the person reporting a crime or the victim is required to complete the
investigation and frame a charge against the suspect. This is because the Ethiopian
Criminal Procedure Code requires a witness to give his/her testimony in person; the
testimony should be read to the witness and finally signed by the witness.
CHAPTER FOUR
4. SYSTEM DESIGN
4.1. Introduction
Project design is the general approach given to develop the software to solve the problem of
a particular organization. Project design is the stage at which description of project
development is given and how the project is designed. The purpose of design is to determine
how to build the system and to obtain information needed to drive the actual implementation
of the system. The focus is particularly on the solution domain rather than on the problem
domain. Object oriented design consists of transforming the analysis model into the design
model. It describes the system in terms of its architecture.
2. Control/process layer
(Application, controller)
-Validate System User
3. Domain (Business)
-Feedback screen ()
-Crime reporting screen ()
-View Article screen ()
-Crime Info screen ()
Data Sources
1. Interface: This layer wraps access to the system and system interface. There are two
categories of interface classes: user interface (UI) classes that provide people access to the
system and system interface (SI) classes that provide access to external systems to the
system. However, the above-mentioned classes are among user interface (UI) elements of
the system. E.g. Log in Form Screen ().
2. Control/process layer: This layer represents controller/process class that implements
business logic that involves collaborating with several business or domain classes or even
other process classes.
3. Domain: This layer implements the concepts pertinent to your business domain such as
customer focusing on the data aspects of the business objects, plus behaviors specific to
individual objects.
4. Persistence layer: This layer is used to encapsulate the capacity to store, retrieve and delete
objects permanently without revealing details of the under laying storage technology.
5. System layer: This layer is used to represents system class that provides operating system
specific functionality for the applications, isolating the software from the operating system
(OS) by wrapping OS specific feature.
the hardware for the system, the software that is installed on that hardware, and the middleware
used to connect separate machines on one another.
Manage Member
Mobile
Manage Report
<<App>>
DB Server MYSQL
Manage Police
Persistence
Client: Browser
Manage Feedback
<<AppLication>> CrimeManSys
Database
Manage Complaint
User Account
Manage Station
Persistence layer encapsulate the capability to store, retrieve, and delete objects/data permanently
without revealing details of the underlying storage technology. In the current database system we
have used different tables as object and each object is related to each other and enforced by
referential integrity by the use of foreign key and primary key. This schema enables as data
manipulation activity such as select, search, delete, update on the database.