Criminal Records Information System A project submitted in partial fulfillment of the requirement for the award of bachelor of science in computer Science and technology. — By Nfally Daffeh A00162170 — COLLEGE OF MANAGEMENT AND INFORMATION TECHNOLOGY – CMIT AMERICAN INTERNATIONAL UNIVERSITY WEST AFRICA — March 2021 Declaration I the undersigned solemnly declare that the project report is based on my work carried out during my study under the supervision of Mr. Amir Hasimite and Mr.Ben. Sign: …………………………………………. Name: Nfally Daffeh ID: A00162170 Date: March 21, 2021 Final Year Project - CMIT PAGE 2 Acknowledgment First and foremost, all praises and thanks to God, the Almighty, for His showers of blessings throughout my research work to complete the research successfully. I would like to express my deep and sincere gratitude to my research supervisor, Mr. Armir Hasimite, Mr.Ben, and Mr. Olawale, Head of the Computer science Department, for allowing me to do research and providing invaluable guidance throughout this research. Their dynamism, vision, sincerity, and motivation have deeply inspired me. I am extremely grateful to my director General with his entire senior management and my parents for their love, prayers, caring and sacrifices for educating and preparing me for the future. I am very much thankful to my wife and my daughters and son for their love, understanding, prayers, and continuing support to complete this research work. Finally, my thanks go to all the people who have supported me to complete the research work directly or indirectly. Final Year Project - CMIT PAGE 3 Executive Summary This is an application system to be used for recording crime data, relating to drug information. It consists of a web-based application use to register a new case of drug and drug-related matters. This system is in three sections namely, Director section Commissioners Section Operative Section In all the above sections, each section is designed to perform a separate function. Director : This section consists of users that I refer to as the super admins of the system. They have the overall privilege to perform any task, which is the Director can create, edit, update, view and delete any information on the system. Commissioners; These are a group of users in the system that is responsible for creating a user group call the operative; they can edit any record that are inputted by the operatives. They have the privilege to assign cases to operatives. They are also able to change the status of cases from start to end but they cannot delete any case. Operatives; These comprise a group of users that has the least privileges in the system. They can register cases and be able to monitor the progress of their registered cases. Final Year Project - CMIT PAGE 4 Table of Content Declaration …………………………………………………………….2 Acknowledgment ……………………………………………………………. 3 Executive summary ……………………………………………………………. 4 Introduction ……………………………………………………………. 5 1.1. Background …………………………………………………………….7 1.2. Problem statement …………………………………………………………….7 1.3. Aims and objectives …………………………………………………………….7 1.4. Scope of the project …………………………………………………………….8 1.5. Hardware and software requirements ……………………………………….9 1.6. Significant of the project …………………………………………………….10 1.7. Constraints and assumptions …………………………………………………10 2.1. literature review ……………………………………………………………11 2.2. propose system ……………………………………………………………12 3.1. introduction …………………………………………………………13 3.2. feasibility ………………………………………………………… 13 3.3. Technical Feasibility ……………………………………………………………13 3.4. economic feasibility …………………………………………………………14 3.5. Behavioral feasibility ……………………………………………………………14 3.6. Proposed Solution with Reason ……………………………………………….14 3.7. function modeling of the system ……………………………………………15 4.1. Introduction …………………………………………………………….17 4.2. Design …………………………………………………………….18 4.3. Logical design …………………………………………………………….18 4.4. Physical design …………………………………………………………….19 4.5. Design/Specification Activities ………………………………………19 4.6. Module design ………………………………………………………….19 4.7. input design ………………………………………………………………………..20 4.8. Output Design……………………………………………………………………...20 5.1. System implementation .........................................................................21 5.2. Database Testing ………………………………………………………….21 5.3. System testing ………………………………………………………… 22 6.1. Summary ………………………………………………… …….. .. 23 7.1. conclusion 7.2. recommendation ……………………………………………………………24 ……………………………………………………… ……24 7.3. Reference 7.4. Appendix …………………………………………………….25 …………………………………………………………….26 Final Year Project - CMIT PAGE 5 List of Figures 8.1. Welcome homepage screenshot ………………………………………… 27 8.2. Commission home page screenshot ……………………………………… 28 8.3. Case status ………………………………………… 29 List of Table 1. 2. 3. 4. Function modeling of system ……………………………………………. 15 Operative registration …………………………………………….15 Commissioner registration …………………………………………….16 Director registration …………………………………………….16 Final Year Project - CMIT PAGE 6 INTRODUCTION 1.1. Background The present world is technology-driven as it is employ by many fields in the performance of their operation. In the case of law enforcement agencies, this is evident in the use of automated criminal record information systems (CRIS) worldwide to keep a record of crime and criminals involved. Crime being an act against the law of a society is a threat to the well-being of the populace and so, requires efficient and effective monitoring. For this reason, crime information systems has been develop to achieve this purpose. However, in Gambia Drug Law Enforcement Agency’s system employed is majorly manual, which is, the use of pen and paper. These records are therefore susceptible to destruction from pests and uncensored manipulation by both authorized and unauthorized personnel. This crude method has resulted in problems in the areas of authenticity, security, retrieval, storage, and exchange of information within and outside the agency. This project aims to design and implement a computerized real-time criminal record information system for the Drug Law Enforcement Agency, The Gambia. 1.2. Problem Statement The need for proper record keeping in an electronic system for ease of retrieving and save keeping of records is a very crucial thing to the agency. Information are said to be the new oil of the 21st century, therefore, there are is a need for proper recording keeping for any law Enforcement agency is necessary for posterity . For any law enforcement agency to keep up in this 21st century, there must be efforts to acquiring a state-of-the-art crime record information system. This project aims at building a solution that is take driven for the Drug Law enforcement agency of the Gambia to keep up with international standards and best practices. 1.3. Aims and objectives The proposed system aims to develop an improved data recording system to be standardized. The proposed system can overcome all the limitations of the existing system. Final Year Project - CMIT PAGE 7 The system provides proper security. The existing system has several disadvantages and many more difficulties to work with. The proposed system tries to eliminate or reduce these difficulties up to some extent. The proposed system will help the user to reduce the workload and mental conflict. The proposed system helps the user to work user-friendly and he can easily do his or her jobs without time lagging. This application system is to develop an application to improve the standard information record management system. This proposed system will help the agency with yearly statistic reports on all registered cases on all types of drugs and the outcome of all cases in that physical year. Added to these objectives are; To develop a database system that can be used to record criminal record To implement a system that can be used to easily find existing criminal record To develop a system that can aid the investigation of criminal records by querying the database based on specific criteria To present a system that will provide reports instantly of existing criminal records when needed. 1.4. Scope of project This project covers the design and implementation of a criminal record information system for the Gambia Drug Law Enforcement Agency. This project will examine all relevant areas of the Drug Law Enforcement Agency’s investigation, technology in use in the modern world such as computer forensics, online crimes, and trafficking. Final Year Project - CMIT PAGE 8 1.5. Hardware and software requirements Hardware Specification Processor: Pentium III/AMD Athlone XP / I series (i3, i5, i7) RAM: 2GB and Above Hard disk: 20 GB and Above FDD: 1.44MB Mouse: 3 Button scroll Keyboard: 108 keys Software Specification Operating System: Windows 2000/xp / osx/ Ubuntu etc. Backend Language: Php Front End: HTML, JavaScript, bootstrap Web Servers: Web Logic8.1/Tomcat 5.0 Backend DB: My SQL Browser Program: Internet explorer/Mozilla Fireworks/Chrome/safari Code Details The purpose of code is to facilitate the identification, retrieval of items and information. A code is an oriented collection of symbols design to provide unique identification of an entry or attribute. Code is built with manually exclusive features. Codes in all cases specify object which is physical or on performance characteristics. They used to give optimal distraction and other information. Codes is use for identifying, accessing, storing, and matching records. The codes ensure that only one value of the code with a single meaning is correctly apply to give entity or attribute as described in various ways. Code can also be design in a manner easily understood and applied by the user. Coding Standard The standard used in the development of the system is M. Programming standards. It includes naming conversions of variables, constants, and objects, standardized formats or labeling and commenting code, spacing, formatting, and indenting. Naming Convention Final Year Project - CMIT PAGE 9 Classes’ names and interface names will start with a capital letter. The function names will start with small letters and the first letter of each word in the function name will be in capital letter. Labels and Comments Sufficient labels and comments are included in the description of it for the benefit of the developer and other programmers who might examine it later. User Interface For all the entry screen frames are used which will show the type of the user who is currently logged in and the menus. Standard actions is use for standard actions. The same font is relate properties is use for similar screens. The method of implementation and the time scale to be adopts are found out initially. 1.6. Significance of the project The significance of the project is that it will provide a system that will aid the Drug Law Enforcement Agency in the process of information recording about drug dealers and the investigations. Besides, it will also bring to light the application of computers in the Gambia Drug Law Enforcement Agency investigations. In addition, the Gambia Drug Law Enforcement Agency will find this project useful in retrieving information that will enable them to handle the investigation of cases at a globally acceptable standard. 1.7. Constraints and Assumptions Throughout this project work, the major limitation encountered was; inadequate information was the management has no clue about mordent information and technology system to change from manual to automated system it was thought to explained it to the management and the senior command about the ideas was not forthcoming ,up to a time I came with information prototype for them to understand and give go ahead to develop the propose system, thereby making it complex to specify requirements of the system. Inconsistency of data due to the manual system in place. The inability of information interchange between units of different locations. Final Year Project - CMIT PAGE 10 2.1. Literature Review Criminal Record Information System is designed to transform the manual way of searching, sorting, keeping, and accessing crime information (files) into the design of record will be a solution to the problem being experienced by the current The manual method of keeping. Existing System In the existing system only we can see the details of particular information about the accused person but the information is not collaborating in our full query when finding information on the particular accused person, the existing system has more workload for the authorized person, but in the case of Proposed System, the user can be registered in the web application when he or she is giving access right to register a case of an accused person and send the crime report and about a particular accused person. The Problem under the Investigation of Existing System More workforce. Time-consuming. Consumes a large volume of paring work. Needs manual calculations. No direct role for the higher officials. Damage of machines due to lack of attention. To avoid all these limitations and make the working more accurate the system needs to be computerized. 2.2. Proposed System The proposed system aims to develop a system of improved data collection and collating information for the Drug Law Enforcement of the Gambia. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces manual work. The existing system has several disadvantages and many more difficulties to work well. The proposed system tries to eliminate or reduce these difficulties up to some extent. The proposed system will help the user to reduce the workload and mental conflict. The proposed system helps the user to work user-friendly and he can easily do his jobs without time lagging. Project Report Online Crime file Management Final Year Project - CMIT PAGE 11 Expected Advantages of Proposed System The system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features Ensure data accuracy. Proper control of the higher officials. Reduce the damages to the machines. Minimize manual data entry. Minimum time needed for the various processing. Greater efficiency. Better service. User-friendliness and interactive Minimum time required. 3.1. Introduction 3.2. FEASIBILITY STUDY The feasibility studies was made to see if the project upon completion would serve the purpose of the Organization for work. Effort and time spent on it, and to foresee the future of the project and its usefulness, the feasibility study of this proposed application system is to see its workability, which will have a good impact on the agency, ability to meet their user needs and effective use of resources. Thus, when a new application is proposed, it normally goes through a feasibility study before it is approve. Final Year Project - CMIT PAGE 12 3.3. TECHNICAL FEASIBILITY The system is evaluate from the technical point of view first. The assessment of this feasibility based on an outline design of the system requirement in the terms of input, output, programs, and procedures by the agency during the feasibility research. Having identified an outline system, the investigation was on to suggest the type of equipment, required method developing the system, of running the system once it has been design. Technical issues raised during the investigation are: Does the existing technology sufficient for the suggest one? Can the system expand if developed? The project is to develop such that the necessary functions and performance has achieved within the constraints. The project is develop with the latest technology. Through the technology may become obsolete after some period, because never version of same software supports older versions, the system may still be used. Therefore, there are minimal constraints involved with this project. The system has been develop by using PHP VERSON4, MYSQL DATABASE; CSS &HTML5, BOOTSTRAPE the project is technically feasible for development. 3.4. ECONOMIC FEASIBILITY This developing project application system is justified by cost and benefit. Criteria to ensure that effort is concentrated on the project, which will give best, return at the earliest. One of the factors, which was a concern on the development of a new system, is the cost it would require but it solved by the agency during feasibility studies. The following are some of the important financial questions asked during the preliminary investigation: The costs conduct a full system investigation. The cost of the hardware and software. The benefits in the form of reduced costs or fewer costly errors. Since this project application system is develop for final project work, there is no manual cost to spend for the proposed system. In addition, all the resources are already available, which indicates the system is economically possible for development and operational. 3.5. BEHAVIORAL FEASIBILITY This includes the following questions: Is there sufficient support for the users? Final Year Project - CMIT PAGE 13 Will the proposed system cause harm? The project would be beneficial because it satisfies the objectives when developed. The behavioral aspects is considered very carefully and conclude that the project is behaviourally feasible. 3.6. PROPOSE SOLUTION WITH REASON The proposed solution for this new system has undergone a lot of critical thinking to able to solve all the problem the existing has, that why before developing the proposed system I made a lot of consultation with lots of our unit heads and asked the question about the proposed system and I got a lot of feedback how the system should be, with the directive from the entire management which I was giving a go-ahead develop .because the agency has a problem in proper data record keeping and with this twenty-first century many agencies have limited paperwork because is time-consuming and many more. Evaluation of the tool The advantage of the tools are as follows Structuring the data so that there is no repetition of data helps in saving. To permit simple retrieval of data in response to query and report request. To simplify the maintenance of the data through updates, insertions, Deletions To reduce the need to restructure or reorganize data which new application Requirements arise. The disadvantage of the tools are as follows Sometimes structuring data, you need to make specifying your coding if not it will still make some repetition or duplicates of data. In retrieval of data sometimes, you need to put the specific accused personal details like name or station in other to have correct data information. Sometimes when deleting it will be asked your question to be are certain of the action you want to perform if not hardly find that deleted information in the backup Final Year Project - CMIT PAGE 14 The reason of the selecting those tools are because if you know how to work with the PHP, HTML BOOSTRAPING CSS then you can develop any application and make your correlation so that all the function work that why in used this tools in developing my web application. 3.7. Function Modelling of the system (Data flow Diagrams) TABLE NAME: LOGIN Field name Data Type Length Key Username Varchar 25 Primary Key Password Varchar 20 - Status Varchar 10 - Table Name: Operative Registration Field name Data Type Length Key Name Varchar 20 - Username Varchar 25 Primary Key password Varchar 20 - Email Varchar 25 - Contact Varchar 10 - Status Varchar 10 - Employment ID Varchar 4 - Table Name: Commissioner Registration Field name Data Type length Key Name Varchar 20 - Username Varchar 25 Primary key password Varchar 20 - Email Varchar 25 - Contact Varchar 10 - Status Varchar 10 - Date Varchar 6 - length Key Table Name: Director Registration Field name Data Type Final Year Project - CMIT PAGE 15 Name Varchar 20 - Username Varchar 25 Primary key password Varchar 20 - Email Varchar 25 - Contact Varchar 10 - Status Varchar 10 - Date Varchar 6 - Table Name: Accused Registration Field name Data Type length Key Name Varchar 20 - Last-named Varchar 25 - Address Varchar 20 - Station Varchar 25 - Contact Varchar 10 - Status Varchar 10 - Date of arrest Date 6 - Place of arrest Varchar 20 - Time of arrest Date/Time 10 - Arresting Officer Varchar 40 - Quantity Varchar 10 - Concealment Varchar 20 - Conveyance Varchar 10 - Drug Types varchar 20 - Region Varchar 15 - Case Number ID Digit 12 Primary key Methods Final Year Project - CMIT PAGE 16 4.0. ANALYSIS 4.1. INTRODUCTION System analysis is a process of gathering and interpreting facts, diagnosing problems and the information to recommend improvements on the system. A problem-solving activity requires intensive communication between the system users and system developers. System analysis or study is an important phase of any system development process. The system is studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator and dwells deep into the working of the present system. The system is viewed as a whole and the input to the system is identified. The outputs from the organizations are traced to the various processes. System analysis is concerned with becoming aware of the problem, identifying the relevant and decisional variables, analyzing and synthesizing the various factors, and determining an optimal or at least a satisfactory solution or program of action. A detailed study of the process must be made by various techniques like interviews, questionnaires, etc. The data collected by these sources must be scrutinized to conclude. The conclusion is an understanding of how the system functions. This system is call the proposed system. Now the existing system is subjected to close study and problem areas are identified. The designer now functions as a problem solver and tries to sort out the difficulties that the agency faces. The solutions given as proposals. The proposal is then weigh with the existing system analytically and the best one is select. The proposal is present to the agency for endorsement by the agency senior management. The proposed is review on agency request and suitable changes is made. This loop ends as soon as the agency is satisfied with the proposal. A preliminary study is a process of gathering and interpreting facts, using the information for further studies on the system. The preliminary study is a problem-solving activity that requires intensive communication between the system users and system developers. It does various feasibility studies. In the studies a rough figure of the system activities can be obtain, from which the decision about the strategies to be followed for effective system study and analysis can be taken Final Year Project - CMIT PAGE 17 4.2. DESIGN: Design is the first step into the development phase for any engineered product or system. Design is a creative process. A good design is key to an effective system. The term “design” is defined as “the process of applying various techniques and principles to define a process or a system in sufficient detail to permit its physical realization”. It may be defined as a process of applying various techniques and principles for defining a device, a process, or a system in sufficient detail to permit its physical realization. Software design sits at the technical kernel of the software engineering process and applies regardless of the development paradigm that is used. The system design develops the architectural detail required to build a system or product. As in the case of any systematic approach, this software has undergone the best possible design phase fine-tuning all efficiency, performance, and accuracy levels. The design phase is a transition from a user-oriented document to a document to the programmers or database personnel. System design goes through two phases of development: Logical and Physical Design. 4.3. LOGICAL DESIGN: The logical flow of a system and define the boundaries of a system. It includes the following steps: Reviews the current physical system – its data flow, file content, volumes, Frequencies, etc. Prepares output specifications – that is, determines the format, content, and Frequency of reports. Prepares input specifications – format, content, and most of the input functions. Prepares edit, security, and control specifications. Specifies the implementation plan. Prepares a logical design walk-through of the information flow, output, input, Controls, and implementation plan. Reviews benefits, costs, target dates, and system constraints. Final Year Project - CMIT PAGE 18 4.4. PHYSICAL DESIGN: The physical system produces the working systems by defining the design specifications that tell the programmers exactly what the developer must do. It includes the following steps. Design the physical system. Specify input and output media. Design the database and specify backup procedures. Design physical information flow through the system and a physical design Plan system implementation. 4.5. DESIGN/SPECIFICATION ACTIVITIES: Concept formulation. Problem understanding. High-level requirements proposals. Feasibility study. 4.6. MODULE DESIGN Operatives Commissioner Director The operatives module include, View criminal information: This module helps the operative to see the latest updates by the director Register new cases assigned to them. The commissioner user module includes, Add operatives: This module helps the operatives to register cases of the accused. Final Year Project - CMIT PAGE 19 Assign cases to an operative. View updates of all cases that have been registered. The Director modules include View crime status: This module allows the director to view the status of the all crimes that you have posted earlier. Add and View feedback: This module helps the user to add and view feedbacks Create user like commissioner and view all users profile He is the administrator who can edit, close, or cancel any cases register View and reply user crimes: This module helps the director the admin to view and reply user’s crimes details New admin: This module used to add new admin Change password: This module helps the admin the director to update his or her password 4.7. INPUT DESIGN The input design is the link between the information system and the user. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data into a usable form for processing can be achieve by inspecting the computer to read data from a written or printed document or it can occur by having people keying the data directly into the system. The design of input focuses on controlling the amount of input required, controlling the errors, avoiding delay, avoiding extra steps, and keeping the process simple. The input is design in such a way so that it provides security and ease of use with retaining privacy. Input Design considered the following things: What data should be given as input? How the data should be arranged or code? The dialog to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when errors occur. Final Year Project - CMIT PAGE 20 4.8. OUTPUT DESIGN Quality output is one, which meets the requirements of the end-user and presents the information. In this system, the results of processing are communicate to the users and another system through outputs. In output design, it is determined how the information is to be displace for immediate need and the hard copy output. It is the most important and direct source of information to the user. Efficient and intelligent output. 5.1. SYSTEM IMPLEMENTATION, TESTING, AND RESULTS System implementation uses the structure created during design and the results of system analysis to construct system elements that meet the stakeholder requirements and system requirements developed in the early life cycle phase. It is the realization of an algorithm as a program or software through computer programming. This infers the physical development of the system through coding. The software testing was categorized into three sections namely database testing; interface testing, and system testing. 5.2. DATABASE TESTING: A database is a repository of data of various types. Because of this, many types of integration and implementation errors may occur in large database systems, which influence the system operation negatively. It is therefore of pivotal importance to test the database to achieve a database that satisfies the ACID (atomicity, consistency, isolation, durability) properties of a database management system. Normalization carried out to eliminate redundancy. Below are some of the screenshots of some tables in the database of the proposed system Final Year Project - CMIT PAGE 21 Table 2 shows the crime table that holds information on the crime. It contains the crime id as the primary key and crime specification such as; name and section of the constitution. 5.3. SYSTEM TESTING This involves testing the various modules of the system individually, integrating the various components into one, and testing the CRIS (criminal records information system) as a whole. The CRIS consists of various modules. Some of them are. 5.4. LODING MODULE: This is also known as the authentication module. This module is responsible for logging users into the system. This is done by providing a correct and already registered user id and password, without which the user is denied access to the system Final Year Project - CMIT PAGE 22 6.1. SUMMARY The project titled “Criminal Records Information System” is a web-based application. This software provides a facility for keeping records of drug dealers. This software is develop with scalability in mind. Additional modules can be easily added when necessary. The software is develop with a modular approach. All modules in the system have been teste with valid data and invalid data and everything work successfully. Thus, the system has fulfilled all the objectives identified and can replace the existing system. The project has been complete successfully with the maximum satisfaction of the organization. The constraints are met and overcome. The system is design as it was decide in the design phase. The project gives a good idea of developing a full-fledged application satisfying the user requirements. The system is very flexible and versatile. This software has a user-friendly screen that enables the user to use it without any income Lenience. Validation checks induced have greatly reduced errors. Provisions been made to upgrade the software. The application has been teste with live data and has provided a successful result. Hence, the software has proved to work efficiently. In the proposed system, the user is provide with a choice of data screen, which are similar in formats to the source documents. Data entry errors can be minimize through validity checks. After the verification, only the data is place in the permanent database. The software can be develop further to include a lot of modules because the proposed system is develop on the view of the future, for example, we should develop the system as a database-independent using JDBC so we can connect it to any other database, Now the proposed system is based on PC and intranet but in the future, if we need to convert it into internet then we need to change the front end only because we are developing this based on OOP technology and most of the business logic’s are bounded in the class files and module like reusable components. Final Year Project - CMIT PAGE 23 7.1. CONCULSION Nowadays everything is being computerize thanks the advent of technology. Manual work usually consumes a lot of time and is error-prone. To make complaining easy and manage crime records this application is very helpful. Thus, Criminal Records information System overcomes most of the limitations of the existing system along with being a very user-friendly application that will take the Drug law enforcement of the Gambia to next level in proper and standing report keeping save and secure for posterity. 7.2. RECOMMENDATION This project work is done on PHP verson4, MySQL database, Bootstrap, Css & Html5, with the use of this application this program is running fully and I tested it and okay for operational and it can go for a long way with proper maintenance, the best thing of this application is user friendly and easy to operate in any environment. The user wants a convenient set of commands to manage files of data or input information, copy and run the application. No matter where you are working, your computer will be easier to use and manage, because these applications are user-friendly and easy to used and reliable powerful, and durable. The main feature of this application it’s very easy when working with it when it has an issue, you can use this platform like Php verson4 MySQL Database, bootstrap CSS &html to resolve the issue without time-wasting that why I recommend this application when I was developing this project because I know their functionality and effectiveness Final Year Project - CMIT PAGE 24 7.3. Reference [1] Steven Holzner, “HTML Black Book”, Jon Skeet,” C# in depth [2]Shiju Sathyadevan, Crime analysis, and prediction, IEEE,25Sept2014,10.1109/CNSC.20 14.6906719. [3]Wikipedia-SQL Server Express – https://en.wikipedia.org/wiki/SQL_Server_Expr ess. [4]Anil Jaiswal, Neeta Gunjal, PoojaLondhe, Shikha Singh, Ramesh Solanki, “Crime Automation & Reporting System”, International Journal of Science and Modern Engineering (IJISME), Volume1, Issue-11, October 2013. [5] http://en.wikipedia.org/wiki/Criminal_record. [6] http://thinknext.co.in/rupali/homepage.aspx. [7] Anil Jaiswal, Neeta Gunjal, PoojaLondhe, Shikha Singh, Ramesh Solanki, “Crime Automation & Reporting System”, International Journal of Science and Modern Engineering (IJISME), Volume1, Issue-11, October 2013. [8] http://topicideas.org/how-to-online-crime-reporting-and-managementsystem-pdf 7.4. Appendix This is an application system to be use for recording crime data, relating to drug information. It consists of a web-based application use to register a new case of drug and drug-related matters. This system is in three sections namely; o Director and Assistant Director Section o Commissioners Section o Operative Section In all the above sections, each section is design to perform a separate function. Final Year Project - CMIT PAGE 25 Director and Assistant Director: this section consists of users that I refer to as the super admins of the system. They have the overall privilege to perform any task, that is the Director can create, edit, update, view, and delete any information on the system. Figure 1This shows the homepage of the Director. its shows the role the director plays. Final Year Project - CMIT PAGE 26 Commissioners; are a group of users in the system that is responsible for creating a user group call the operatives, they can edit and delete any record that is inputted by the operatives. They have the privilege to assign cases to operatives. They are also able to change the status of cases from start to en Operatives; comprise a group of users that has the least privileges in the system. They Figure 2This screenshots represents the homepage of the Commissioners. it displays the roles and functions the commissioners perform Figure 3This shows the operative homepage. it shows the privileges of operatives. can register cases and be able to monitor the progress of their registered cases. Final Year Project - CMIT PAGE 27 Screenshots of the proposed system Figure 4this screenshot represents the home page of the propose system. it shows the logo of the DLEAG with the menu items and a login button Final Year Project - CMIT PAGE 28 Figure 6This shows the part login mordal for the three sections of the application which consist of the director section, the commissioner section and the operative section. Figure 5This screenshot shows the three stages of a case. the stages are; Uprocess cases, Pending cases, and closed cases, Final Year Project - CMIT PAGE 29