Instant Download

Download your project material immediately after online payment.

Project File Details


Download the complete computer science project topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

 

3,000.00

100% Money Back Guarantee

Download the complete computer science project topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

 

PROJECT TOPIC AND MATERIAL ON DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY

The Project File Details

  • Name: DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY
  • Type: PDF and MS Word (DOC)
  • Size: [1995KB]
  • Length: [54] Pages

 

ABSTRACT

The complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime and aids crime prevention and assist investigation when positively utilized. Crime is today a salient fact, an integral part of the risk we face in everyday life. Crime is associated with harm and violence. A crime diary is an automated or manual periodic record or reports of crime. An automated crime diary is a similitude of a digital diary online diary and blog. This research work, Design and implementation of police crime diary is a web-based system, designed using visual studio 2008 (ASP.NET) as front end and MS SQL Management studio 2005 as its back end (data drum). This system fully automate the Nigeria Police Force (NPF) police crime diary with additional and a beneficial features.

TABLE OF CONTENTS

TITLE PAGES                                                                        i & ii

CERTIFICATION                                                                            iii

DEDICATION                                                                        iv

ACKNOWLEDGEMENT                                                       v

ABSTRACT                                                                            vi

TABLE OF CONTENTS                                                                  vii-ix

LIST OF FIGURES                                                                 x

LIST OF TABLES                                                                            x

CHAPTER ONE – Introduction                                                       1

1.1     Background of study                                                     2

1.2     Objectives of study                                                        4

1.3     Scope of the study                                                                   5

1.4     Motivation                                                                     6

1.5     Statement of Problem

1.6     Limitation of study

1.7     Methodology                                                                           6

CHAPTER TWO – Literature Review                                                        11

2.1     Introduction                                                                                      11

2.2     Review of verification systems                                                         11

CHAPTER THREE – System Analysis and Design                                   29

3.1     Introduction                                                                                      29

3.2     System analysis of the system                                                 29

3.3     Constraints of the existing system                                          31

3.4     Proposed system design                                                          33

3.4.1  System algorithm design                                                                   33

3.4.2  Input design                                                                                      39

3.4.3  Interface design                                                                       41

3.4.4  Output design                                                                          42

3.4.5  System database design                                                           43

3.5     Technology, tools and programming language used                         45

CHAPTER FOUR – Design and Implementation                                       48

4.0     Introduction                                                                                      48

4.1     System design                                                                         48

4.2     System description                                                                           49

4.3     System implementation                                                           52

4.4     Hardware requirement                                                             53

4.5     Software requirement                                                              53

4.6     System testing                                                                         54

4.7     System review and maintenance                                              54

4.8     Installation procedure                                                             55

4.9     User guide                                                                               55

CHAPTER FIVE – Summary and Conclusion                                 57

5.1     Summary                                                                                 57

5.2     Recommendation                                                                     58

5.3     Conclusion                                                                              58

REFERENCE                                                                                   60

APPENDIX (SOURCE CODES)                                                      62

 

LIST OF FIGURES

1.1     The SSADM Approach.                                                                   8

1.2     The RAD Model.                                                                     9

2.1     Credit/Debit Card – front and back view                                28

3.1     Input form to add Administrator                                            40

3.2     The main interface form                                                          41

3.3a   Verification Form                                                                    42

3.3b   The Verification Result form                                                   43

3.4     System’s database table for Admin                                         45

4.1     Use Case diagram for SVS                                                      51

LIST OF TABLES

2.1     Address Verification Service – the types                                 13

2.2     Address Verification Service – detail description                    17

3.1     Company Table                                                                       44

 

 

CHAPTER ONE

INTRODUCTION

A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.

According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.

In this modern age, computers have verified the cause of their existence. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment. The presence of computer on virtually every field of today’s fast life has proved the critic wrong as the invention of computers and new technologies continues to create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any fields of human endeavor.

According to Uzoka in Hampo, J.A. (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”

  • BACKGROUND OF STUDY

Technology and computer system has allowed us to track and report (analyze) every details of our live and environment. Technology has numerously helped in combating crime via divert measures. This is true only when technology and computer systems are positively used in our society. Moreover, the presence of increased computing technology and well-nurtured mind in the technological aspect of today’s world has automated almost every aspect of life.

According to Wikipedia, ”A discrete entries arranged by date, reporting on what has happen,(not what will happen) over the course of a day or a given period, is a diary” diary originally is in hand written formal. Diaries are for diverse type raging from personal diary, crime diary, economic diary and church diary as the case may be. A diarist is someone with the authority and responsibility of safekeeping a diary, or simply put, “a diarist is someone who keeps a diary” according to Wikipedia. Diary played a major role in human civilization as they are means of record-keeping and documentation.

Marrian-webster in Wikipedia, Says,” the word diary comes from the Latin word, diarium which means ‘daily allowance’. Below are examples of diaries.

  1. Personal diary – this include a person’s experience and thoughts or feeling. Comments on outsides events outside the person’s direct experience are inductive most times.
  2. War diary – A regularly updated official record of a military unit’s administration and activities diary wartimes.
  3. Economic diary: periodic record of economic activities
  4. Crime diary: a periodic report of crime in a particular geographical area or organization.

Automating the various form / types of diary has change the meaning of the term “diary” all together as they have more function then just recording or storing data. The continuous availability of Internet Services, technological and electronic gadgets has made many people to adopt to digitalize diary as a medium to chronicled events and life.” the term usual for a person who keeps a diary or journal via electronic means, and in particular, publishes their entries on the world wide web is ESCRIBITIONST. (Source: http:// on.wikipedia.org/wiki/online – diary; accessed on: 11th November, 2012)

The Nigeria police force NPF is designated by section 194 of the 1979 construction as the national police of Nigeria with executive jurisdiction throughout the country. However, the constitutional provision also exist for the establishment of separate NPF is under the general operational and administrative control of an inspector general of police (IGP) appointed by the present and responsible for the maintenance of law and order police law maintaining implementing agents. Thus, policing is to maintain and implement enacted and constitutional law. They are also security man meanwhile, in Nigeria we have different police namely NPF, air police, and military police.

When informal relationship and sanctions prove insufficient to establish and maintain a designed order, a government or a state may impose more formalized or stricter system of social control. With institutional and legal machinery at their disposal, agent of the state can compel the populace to conform to the code and can opt to punish or those who do not conform. Crime is the breaking of rules or laws for which some governing authority can ultimately prescribe a conviction. According to Wikipedia, the word crime is dived from the Latin root ‘cerno’, meaning I decide I give Judgment: crime ranges from political to religious to economical and many others types or forms.

1.2 OBJECTIVE OF THE STUDY

  1. To design a system that is a website that automates the manual crime diary of Nigeria Police force. The system is designed using ASP.net of visual studio 2008, as its front-end design and data drum was designed using Microsoft SQL server management studios 2005. This proposed website is an online diary that will:
  2. Help in the privacy of crime suspects, as they will not be pervaded and only the authorized officer’s and the reporter will know the superseded criminal.
  3. Totally reduce paper work and
  4. Promote record keeping via digital means.
  5. To explain the terms diary, Crimes and Online diary.
  6. To show the new feature of this automated police crime diary other manual police crime diary.

1.3 SCOPE OF STUDY

Crime is defined by violation of enacted law, which is in respect to graphical area. Hence this police crime diary is subject to Nigerian Laws particularly the police Act.

1.4 MOTIVATION

Deformation of character through lack of privacy causes a lot of concern to both suspected criminals and the reporters. Moreover, decision of NPF to stop parading suspect until they are found guilty is a plus to fundamental rights. Hence, security, privacy and enforcement of Nigeria fundamental human rights are the motivators to this research

1.5 STATEMENT OF PROBLEM

Suspects are treated like criminals and when they are found innocent, the previous treatment and publicity of the alleged crime has already stained their reputation, which cannot easily or can never be washed out. With advance technology and the presence of internet in every nocks and crannies has proliferation to the aforementioned problem of manual police crime dray.

 

 

1.6 LIMITATION OF STUDY

Availability of time to access and make do of viable resources / materials is a limitation to the study. Also the literature review and scope of the study is another. The available material and resources were optimized.

1.7 METHODOLOGY

A RAD (Rapid Application Development)and SSADM (Structured System Analysis and Design Methodology) approaches were applied. Meanwhile, relevant literature and authorities were referenced and reviewed. Papers on crime, digital diary, and online diary amongst others were critically study. The Graphic User Interface (GUI) was design using Microsoft visual studio 2008, with ASP.NET as its programming language. SQL Server management studio 2005 was used as its database.

 

 

 

 

 

 

 

 

 

Fig. 1.1 THE SSADM APPROACH

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Fig. 1.2 THE RAD MODEL

 

 

 

See more computer science project topics and materials

GET THE FULL WORK

DISCLAIMER: All project works, files and documents posted on this website, projects.ng are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Most of the project works are provided by the schools' libraries to help in guiding students on their research. Use it as a guidance purpose only and not copy the work word for word (verbatim). If you see your work posted here, and you want it to be removed/credited, please call us on +2348157165603 or send us a mail together with the web address link to the work, to hello@projects.ng. We will reply to and honor every request. Please notice it may take up to 24 or 48 hours to process your request.