Download the complete computer science project topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.
PROJECT TOPIC AND MATERIAL ON DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY
The Project File Details
- Name: DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY
- Type: PDF and MS Word (DOC)
- Size: [1995KB]
- Length:  Pages
The complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime and aids crime prevention and assist investigation when positively utilized. Crime is today a salient fact, an integral part of the risk we face in everyday life. Crime is associated with harm and violence. A crime diary is an automated or manual periodic record or reports of crime. An automated crime diary is a similitude of a digital diary online diary and blog. This research work, Design and implementation of police crime diary is a web-based system, designed using visual studio 2008 (ASP.NET) as front end and MS SQL Management studio 2005 as its back end (data drum). This system fully automate the Nigeria Police Force (NPF) police crime diary with additional and a beneficial features.
TABLE OF CONTENTS
TITLE PAGES i & ii
TABLE OF CONTENTS vii-ix
LIST OF FIGURES x
LIST OF TABLES x
CHAPTER ONE – Introduction 1
1.1 Background of study 2
1.2 Objectives of study 4
1.3 Scope of the study 5
1.4 Motivation 6
1.5 Statement of Problem
1.6 Limitation of study
1.7 Methodology 6
CHAPTER TWO – Literature Review 11
2.1 Introduction 11
2.2 Review of verification systems 11
CHAPTER THREE – System Analysis and Design 29
3.1 Introduction 29
3.2 System analysis of the system 29
3.3 Constraints of the existing system 31
3.4 Proposed system design 33
3.4.1 System algorithm design 33
3.4.2 Input design 39
3.4.3 Interface design 41
3.4.4 Output design 42
3.4.5 System database design 43
3.5 Technology, tools and programming language used 45
CHAPTER FOUR – Design and Implementation 48
4.0 Introduction 48
4.1 System design 48
4.2 System description 49
4.3 System implementation 52
4.4 Hardware requirement 53
4.5 Software requirement 53
4.6 System testing 54
4.7 System review and maintenance 54
4.8 Installation procedure 55
4.9 User guide 55
CHAPTER FIVE – Summary and Conclusion 57
5.1 Summary 57
5.2 Recommendation 58
5.3 Conclusion 58
APPENDIX (SOURCE CODES) 62
LIST OF FIGURES
1.1 The SSADM Approach. 8
1.2 The RAD Model. 9
2.1 Credit/Debit Card – front and back view 28
3.1 Input form to add Administrator 40
3.2 The main interface form 41
3.3a Verification Form 42
3.3b The Verification Result form 43
3.4 System’s database table for Admin 45
4.1 Use Case diagram for SVS 51
LIST OF TABLES
2.1 Address Verification Service – the types 13
2.2 Address Verification Service – detail description 17
3.1 Company Table 44
A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.
According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.
In this modern age, computers have verified the cause of their existence. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment. The presence of computer on virtually every field of today’s fast life has proved the critic wrong as the invention of computers and new technologies continues to create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any fields of human endeavor.
According to Uzoka in Hampo, J.A. (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”
- BACKGROUND OF STUDY
Technology and computer system has allowed us to track and report (analyze) every details of our live and environment. Technology has numerously helped in combating crime via divert measures. This is true only when technology and computer systems are positively used in our society. Moreover, the presence of increased computing technology and well-nurtured mind in the technological aspect of today’s world has automated almost every aspect of life.
According to Wikipedia, ”A discrete entries arranged by date, reporting on what has happen,(not what will happen) over the course of a day or a given period, is a diary” diary originally is in hand written formal. Diaries are for diverse type raging from personal diary, crime diary, economic diary and church diary as the case may be. A diarist is someone with the authority and responsibility of safekeeping a diary, or simply put, “a diarist is someone who keeps a diary” according to Wikipedia. Diary played a major role in human civilization as they are means of record-keeping and documentation.
Marrian-webster in Wikipedia, Says,” the word diary comes from the Latin word, diarium which means ‘daily allowance’. Below are examples of diaries.
- Personal diary – this include a person’s experience and thoughts or feeling. Comments on outsides events outside the person’s direct experience are inductive most times.
- War diary – A regularly updated official record of a military unit’s administration and activities diary wartimes.
- Economic diary: periodic record of economic activities
- Crime diary: a periodic report of crime in a particular geographical area or organization.
Automating the various form / types of diary has change the meaning of the term “diary” all together as they have more function then just recording or storing data. The continuous availability of Internet Services, technological and electronic gadgets has made many people to adopt to digitalize diary as a medium to chronicled events and life.” the term usual for a person who keeps a diary or journal via electronic means, and in particular, publishes their entries on the world wide web is ESCRIBITIONST. (Source: http:// on.wikipedia.org/wiki/online – diary; accessed on: 11th November, 2012)
The Nigeria police force NPF is designated by section 194 of the 1979 construction as the national police of Nigeria with executive jurisdiction throughout the country. However, the constitutional provision also exist for the establishment of separate NPF is under the general operational and administrative control of an inspector general of police (IGP) appointed by the present and responsible for the maintenance of law and order police law maintaining implementing agents. Thus, policing is to maintain and implement enacted and constitutional law. They are also security man meanwhile, in Nigeria we have different police namely NPF, air police, and military police.
When informal relationship and sanctions prove insufficient to establish and maintain a designed order, a government or a state may impose more formalized or stricter system of social control. With institutional and legal machinery at their disposal, agent of the state can compel the populace to conform to the code and can opt to punish or those who do not conform. Crime is the breaking of rules or laws for which some governing authority can ultimately prescribe a conviction. According to Wikipedia, the word crime is dived from the Latin root ‘cerno’, meaning I decide I give Judgment: crime ranges from political to religious to economical and many others types or forms.
1.2 OBJECTIVE OF THE STUDY
- To design a system that is a website that automates the manual crime diary of Nigeria Police force. The system is designed using ASP.net of visual studio 2008, as its front-end design and data drum was designed using Microsoft SQL server management studios 2005. This proposed website is an online diary that will:
- Help in the privacy of crime suspects, as they will not be pervaded and only the authorized officer’s and the reporter will know the superseded criminal.
- Totally reduce paper work and
- Promote record keeping via digital means.
- To explain the terms diary, Crimes and Online diary.
- To show the new feature of this automated police crime diary other manual police crime diary.
1.3 SCOPE OF STUDY
Crime is defined by violation of enacted law, which is in respect to graphical area. Hence this police crime diary is subject to Nigerian Laws particularly the police Act.
Deformation of character through lack of privacy causes a lot of concern to both suspected criminals and the reporters. Moreover, decision of NPF to stop parading suspect until they are found guilty is a plus to fundamental rights. Hence, security, privacy and enforcement of Nigeria fundamental human rights are the motivators to this research
1.5 STATEMENT OF PROBLEM
Suspects are treated like criminals and when they are found innocent, the previous treatment and publicity of the alleged crime has already stained their reputation, which cannot easily or can never be washed out. With advance technology and the presence of internet in every nocks and crannies has proliferation to the aforementioned problem of manual police crime dray.
1.6 LIMITATION OF STUDY
Availability of time to access and make do of viable resources / materials is a limitation to the study. Also the literature review and scope of the study is another. The available material and resources were optimized.
A RAD (Rapid Application Development)and SSADM (Structured System Analysis and Design Methodology) approaches were applied. Meanwhile, relevant literature and authorities were referenced and reviewed. Papers on crime, digital diary, and online diary amongst others were critically study. The Graphic User Interface (GUI) was design using Microsoft visual studio 2008, with ASP.NET as its programming language. SQL Server management studio 2005 was used as its database.
Fig. 1.1 THE SSADM APPROACH
Fig. 1.2 THE RAD MODEL
All project works, files and documents posted on this website, projects.ng are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a guidance purpose only and not copy the work word for word (verbatim). Projects.ng is a repository of research works just like academia.edu, researchgate.net, scribd.com, docsity.com, coursehero and many other platforms where users upload works. The paid subscription on projects.ng is a means by which the website is maintained to support Open Education. If you see your work posted here, and you want it to be removed/credited, please call us on +2348159154070 or send us a mail together with the web address link to the work, to [email protected] We will reply to and honor every request. Please notice it may take up to 24 - 48 hours to process your request.