Download the complete computer science project topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A POLICE CRIME DIARY here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.
The Project File Details
The complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime and aids crime prevention and assist investigation when positively utilized. Crime is today a salient fact, an integral part of the risk we face in everyday life. Crime is associated with harm and violence. A crime diary is an automated or manual periodic record or reports of crime. An automated crime diary is a similitude of a digital diary online diary and blog. This research work, Design and implementation of police crime diary is a web-based system, designed using visual studio 2008 (ASP.NET) as front end and MS SQL Management studio 2005 as its back end (data drum). This system fully automate the Nigeria Police Force (NPF) police crime diary with additional and a beneficial features.
TITLE PAGES i & ii
TABLE OF CONTENTS vii-ix
LIST OF FIGURES x
LIST OF TABLES x
CHAPTER ONE – Introduction 1
1.1 Background of study 2
1.2 Objectives of study 4
1.3 Scope of the study 5
1.4 Motivation 6
1.5 Statement of Problem
1.6 Limitation of study
1.7 Methodology 6
CHAPTER TWO – Literature Review 11
2.1 Introduction 11
2.2 Review of verification systems 11
CHAPTER THREE – System Analysis and Design 29
3.1 Introduction 29
3.2 System analysis of the system 29
3.3 Constraints of the existing system 31
3.4 Proposed system design 33
3.4.1 System algorithm design 33
3.4.2 Input design 39
3.4.3 Interface design 41
3.4.4 Output design 42
3.4.5 System database design 43
3.5 Technology, tools and programming language used 45
CHAPTER FOUR – Design and Implementation 48
4.0 Introduction 48
4.1 System design 48
4.2 System description 49
4.3 System implementation 52
4.4 Hardware requirement 53
4.5 Software requirement 53
4.6 System testing 54
4.7 System review and maintenance 54
4.8 Installation procedure 55
4.9 User guide 55
CHAPTER FIVE – Summary and Conclusion 57
5.1 Summary 57
5.2 Recommendation 58
5.3 Conclusion 58
APPENDIX (SOURCE CODES) 62
LIST OF FIGURES
1.1 The SSADM Approach. 8
1.2 The RAD Model. 9
2.1 Credit/Debit Card – front and back view 28
3.1 Input form to add Administrator 40
3.2 The main interface form 41
3.3a Verification Form 42
3.3b The Verification Result form 43
3.4 System’s database table for Admin 45
4.1 Use Case diagram for SVS 51
LIST OF TABLES
2.1 Address Verification Service – the types 13
2.2 Address Verification Service – detail description 17
3.1 Company Table 44
A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.
According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.
In this modern age, computers have verified the cause of their existence. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment. The presence of computer on virtually every field of today’s fast life has proved the critic wrong as the invention of computers and new technologies continues to create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any fields of human endeavor.
According to Uzoka in Hampo, J.A. (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”
Technology and computer system has allowed us to track and report (analyze) every details of our live and environment. Technology has numerously helped in combating crime via divert measures. This is true only when technology and computer systems are positively used in our society. Moreover, the presence of increased computing technology and well-nurtured mind in the technological aspect of today’s world has automated almost every aspect of life.
According to Wikipedia, ”A discrete entries arranged by date, reporting on what has happen,(not what will happen) over the course of a day or a given period, is a diary” diary originally is in hand written formal. Diaries are for diverse type raging from personal diary, crime diary, economic diary and church diary as the case may be. A diarist is someone with the authority and responsibility of safekeeping a diary, or simply put, “a diarist is someone who keeps a diary” according to Wikipedia. Diary played a major role in human civilization as they are means of record-keeping and documentation.
Marrian-webster in Wikipedia, Says,” the word diary comes from the Latin word, diarium which means ‘daily allowance’. Below are examples of diaries.
Automating the various form / types of diary has change the meaning of the term “diary” all together as they have more function then just recording or storing data. The continuous availability of Internet Services, technological and electronic gadgets has made many people to adopt to digitalize diary as a medium to chronicled events and life.” the term usual for a person who keeps a diary or journal via electronic means, and in particular, publishes their entries on the world wide web is ESCRIBITIONST. (Source: http:// on.wikipedia.org/wiki/online – diary; accessed on: 11th November, 2012)
The Nigeria police force NPF is designated by section 194 of the 1979 construction as the national police of Nigeria with executive jurisdiction throughout the country. However, the constitutional provision also exist for the establishment of separate NPF is under the general operational and administrative control of an inspector general of police (IGP) appointed by the present and responsible for the maintenance of law and order police law maintaining implementing agents. Thus, policing is to maintain and implement enacted and constitutional law. They are also security man meanwhile, in Nigeria we have different police namely NPF, air police, and military police.
When informal relationship and sanctions prove insufficient to establish and maintain a designed order, a government or a state may impose more formalized or stricter system of social control. With institutional and legal machinery at their disposal, agent of the state can compel the populace to conform to the code and can opt to punish or those who do not conform. Crime is the breaking of rules or laws for which some governing authority can ultimately prescribe a conviction. According to Wikipedia, the word crime is dived from the Latin root ‘cerno’, meaning I decide I give Judgment: crime ranges from political to religious to economical and many others types or forms.
1.2 OBJECTIVE OF THE STUDY
1.3 SCOPE OF STUDY
Crime is defined by violation of enacted law, which is in respect to graphical area. Hence this police crime diary is subject to Nigerian Laws particularly the police Act.
Deformation of character through lack of privacy causes a lot of concern to both suspected criminals and the reporters. Moreover, decision of NPF to stop parading suspect until they are found guilty is a plus to fundamental rights. Hence, security, privacy and enforcement of Nigeria fundamental human rights are the motivators to this research
1.5 STATEMENT OF PROBLEM
Suspects are treated like criminals and when they are found innocent, the previous treatment and publicity of the alleged crime has already stained their reputation, which cannot easily or can never be washed out. With advance technology and the presence of internet in every nocks and crannies has proliferation to the aforementioned problem of manual police crime dray.
1.6 LIMITATION OF STUDY
Availability of time to access and make do of viable resources / materials is a limitation to the study. Also the literature review and scope of the study is another. The available material and resources were optimized.
A RAD (Rapid Application Development)and SSADM (Structured System Analysis and Design Methodology) approaches were applied. Meanwhile, relevant literature and authorities were referenced and reviewed. Papers on crime, digital diary, and online diary amongst others were critically study. The Graphic User Interface (GUI) was design using Microsoft visual studio 2008, with ASP.NET as its programming language. SQL Server management studio 2005 was used as its database.
Fig. 1.1 THE SSADM APPROACH
Fig. 1.2 THE RAD MODEL