1. ABSTRACT
I
t is an era of computerization and data security.to combat with increasing rate of crimes
and criminals CRMS is introduced. This is web based application that provides managing the data and various information about the criminals and their crimes. Not only this but also it provides the information and current status about the police stations, courts to their respective administrator. Using HTML, CSS, PHP, MY-SQL, AJAX, J-QUERY the system is designed. It stores the GD, FIR, no. of cases, the current status and each and every details of the criminal as well as the common people of any particular area. This system also provides a search facility to know about if there any criminal record about any people. The future scope of the project is to adding thumb recognition, face detection technology and generating random no id with brain mu with the help of cellular automata.
1
2. INTRODUCTION
I
n modern days crime is increasing day by day. To combat such crimes and to provide safety to citizens,
police department plays a vital role. It always is a vital responsibility arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment. The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department as well as Indian govt. in order to increase their efficiency and to save their time. In our Project we are going to implement a CRMS (Criminal Report Management System). This is an online web application with database system in which police will keep the record of Criminals who have been arrested, to be arrested or escaped. This will help the Police department to manage their records easily. In police system when an incident occurs, a Petitioner reports an FIR (First Information Report). Police starts investigation according to law on this FIR. An investigation Officer supervises the investigation process. The main concerning people in the whole process are Petitioner (The person who files an FIR), Victim, Accused/Criminal, investigation officer.
2
3. PROJECT OVERVIEW
T
his Synopsys documents the process of designing, building and testing this web based
application system to be used for marketing. The “Criminal Report Management System “ is a web based application .This application provides facility for reporting, crimes, complaints, show most wanted person details online. Any number of clients can connect to the server. Each user first makes their login to sever to show their availability. There are 4 types of users in our system.1st one is super administrator. This post is allotted for higher authority of ministry. 2nd one is allotted for officer in-charge of any police station. And the 3rd one is allotted for chief justice of any district court. And the final one is allotted for civilian to acknowledge them about criminal activities. The duty of the super administrator is to authenticate police stations and courts. He can also search for any information regarding this system.2nd user i.e. the police station can maintain the local area`s citizen information database .and he can generate fir and gd. 3rd user is the court.it can update the status of suspects and hearing date of the suspect and can also update the final decision of court .and the 4th user i.e. citizen able to search for criminal activities .In present manual system the total process of criminal report generation is not so fast and friendly for the officials.to solve this kind of problem we have proposed for better and automated system i.e. CRIMINAL REPORT MANAGEMENT SYSTEM(CRMS). The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails; the application produced by this project exceeded expectations and would be suitable to be used in industry.
3
4. PURPOSE OF THE SYSTEM
T
his Web based application is for automation in managing the criminal record. The 4
types of users in our system will monitor this whole process.1st one is super administrator. This post is allotted for higher authority of ministry. 2nd one is allotted for officer in-charge of any police station. And the 3rd one is allotted for chief justice of any district court. And the final one is allotted for civilian to acknowledge them about criminal activities. .In present manual system the total process of criminal report generation is not so fast and friendly for the officials.to solve this kind of problem we have proposed for better and automated system i.e. CRIMINAL REPORT MANAGEMENT SYSTEM(CRMS). In present manual system there three types of terms 1st one is GD (general diary).2nd one is FIR (First information report). And 3rd one is charge-sheet.gd is taken when for storing preliminary information about any crime. FIR is launched when murder, rape, vandalism like crime is happened. And the final charge sheet is produced after investigation and submitted in court. But in our system to we proposed to taken GD for any kind of preliminary criminal activities. And FIR will be launched after investigation and it will directly submit to court to complete the rest of the process. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails; the application produced by this project exceeded expectations and would be suitable to be used in industry.
4
5. DRAWBACKS OF PRESENT MANUAL SYSTEM
I
n our present system there are three types of terms for generation of criminal report. 1st
one is GD (general diary).2nd one is FIR (First information report). And 3rd one is charge-sheet. Step 1: A GD is taken as storing any preliminary information of any crime. Step 2: FIR is launched with respect to any existing GD no. or also is taken directly for sever crime. Step 3: Then a charge-sheet is produced after investigation and submitted in the court for further proceeding.so the drawbacks of this present manual system are the following: I. II. III. IV.
Fast report generation is not possible. Tracing a suspect is difficult. Information about criminal and common people is not properly maintained. No central database can be created as information is not available in database.
5
6. PROPOSED SYSTEM
T
his Web based application is for automation in managing the criminal record. The 4
types of users in our system will monitor this whole process.1st one is super administrator. This post is allotted for higher authority of ministry. 2nd one is allotted for officer in-charge of any police station. And the 3rd one is allotted for chief justice of any district court. And the final one is allotted for civilian to acknowledge them about criminal activities. .In present manual system the total process of criminal report generation is not so fast and friendly for the officials.to solve this kind of problem we have proposed for better and automated system i.e. CRIMINAL REPORT MANAGEMENT SYSTEM(CRMS). In present manual system there three types of terms 1st one is GD (general diary).2nd one is FIR (First information report). And 3rd one is charge-sheet.gd is taken when for storing preliminary information about any crime. FIR is launched when murder, rape, vandalism like crime is happened. And the final charge-sheet is produced after investigation and submitted in court. But in our system to we proposed to taken GD for any kind of preliminary criminal activities. And FIR will be launched after investigation and it will directly submitted to court to complete the rest of the process. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails; the application produced by this project exceeded expectations and would be suitable to be used in industry.
6.1. Major components: I. II. III.
Web based Criminal report management (each and every needful detail) Searching any one with their various attributes. Online Generation of GD and FIR Reports.
6.2 Proposed system provides with following solutions: I. II.
It provides "better and efficient" service to the victim as well as the police. Reduce the workload of police. 6
III. IV. V.
Faster retrieval of information about the suspect. Provide facility for proper monitoring reduces paper work and provide data security. All details will be available on a click.
6.3 ER-Diagram
ER diagram of the whole system
7
6.4 Data Flow Diagram: DFD NOTATIONS:NAME
NOTATION
DESCRIPTION
EXTERNAL
Represents the source or destination of
ENTITY
data within the system. Represents the movement of data from its source to destination within the
DATAFLOW
system. Indicate the place for storing information within the system.
DATA STORE
Shows a transformation or manipulation of data within the system. Also known as bubble. PROCESS
8
Administrator level 0 diagram
Administrator level 1 diagram 9
Administrator level 2 diagram
10
Court level 1 diagram
11
Court level 2 diagram
12
General people level 1 diagram
General people level 2 diagram
13
Police station level 1 diagram
14
Police station level 2 diagram
15
7. FEASIBILITY STUDY A feasibility study is a test of system proposal according to its workability, impact on the organization, ability to meet user needs and effective use of resources. The objective of feasibility study is not to solve the problem, but to acquire a sense of its scope .During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined, consequently costs and benefits are estimated with greater detail at this stage .The result of the feasibility study is a system formal proposal. This is simply a form of documenting or detailing the nature and scope of proposed solutions. The proposal summarizes what is known and what is going to be done. Three key considerations involved in the feasibility analysis: I.
Economic feasibility
II.
Technical feasibility
III.
Behavioral feasibility
7.1 ECONOMIC FEASIBILITY: Economic analysis is the most frequently used method for comparing the cost with the benefit or income that is expected from developed system. In the existing system, many people are involved in the process but in the proposed system, number of persons involved be reduced drastically. So the proposed system is economic. In the existing system, storage of all these records should be arranged and security should be provided for the records. In the proposed system, separate security arrangement is not needed since the application provides security and maintenance is simply and hardly needs one or two persons to operate the system.
16
7.2 BEHAVIORAL FEASIBILITY: People are inherently resistant to change and computer has known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have towards the developments of computerized system. In the existing system more manpower is required and time factor is more but in the proposed system, manpower and time factors are reduced .So, the remaining numbers are engaged with some other important works 7.3 TECHNICAL FEASIBILITY: The feasibility center on the existing computer system (application, hardware) and to what extend it can support the proposed addition. In the proposed system, data can be easily stored and managed in database management system application. The results for various queries can be generated easily. Therefore, the system is technically feasible.
17
8. SYSTEM SPECIFICATION I.
APPLICATION CONFIGURATION for the Development of this System
FRONT END –HTML, CSS, AJAX, JAVA SCRIPT BACK END –PHP, J-QUERY , MS SQL ,APACHE SERVER OPERATING SYSTEM -WINDOWS 7 ULTIMATE BROWSER –*GOOGLE CHROME, FIREFOX, MS INTERNET EXPLORER (* N.B.- WE HAVE TESTED IN ALL 3 BROWSER IN ABOVE MENTIONED.BUT IN FIREFOX AND MS EXPLORER SOME JAVASCIPRT, FLASH,NAD OTHER CODES ARE NOT RUNNING PROPERLY.SO IT WILL BE BEST TO USE GOOGLE CHROME LATEST VERSION.)
II.
Basic requirements to avail the system’s facility
Standard machine configuration (PC/Tablet/mobile) is needed to run this application. A standard network connection (internet/Ethernet) is needed to run this system smoothly.
18
9. APPLICATION SCOPE Extensibility: This web based application is extendable. The following principles enhances extensibility like hide data structure, avoid traversing multiple links or methods, avoid case statements on object type and distinguish public and private operations. Reusability: Reusability is possible as and when require in this application. We can update it whenever it is needed. Reusable application reduces design, coding and testing cost by amortizing effort over several designs. Reducing the amount of code also simplifies understanding, which increases the likelihood that the code is correct. We follow up both types of reusability: Sharing of newly written code within a project and reuse of previously written code on new projects. Understandability: A method is understandable if someone other than the creator of the method can understand the code (as well as the creator after a time lapse). We use the method, which small and coherent helps to accomplish this. Cost-effectiveness: Its cost is under the budget and make within given time period. It is desirable to aim for a system with a minimum cost subject to the condition that it must satisfy the entire requirement.
19
10. SCOPE OF THE PROJECT
T
he Department of Police is an independent statutory body which was created to
maintain an effective and efficient police service for the public. Their primary task includes securing continuous needs of the public in an efficient manner. We need the whole hearted support of each and every individual member of the site and cooperation of the users. There are two major advantages of the proposed system 1. Reducing crime and disorder. 2. Confidentiality and anonymity issues. In the fast moving world, if people lack something it is time. All are busy in their world. It will be welcomed if services are provided at their will. With this above mentioned qualities and features this application can simplifies the working procedure of present manual system. As well as it will lessen the working load. So the main objective of the application is reducing crime and disorder etc. The product provides a framework within which a user can easily work with. So it should be user friendly. The product provides a framework, which is error free. We know a crime management system is actually a serious process. So even a simple error lead to big problems. So it should be error free and our objective is to build error free application.
20
11. OBJECTS These are the main objects of CRMS Major objects a. b. c. d. e.
General people Administrator (Police station) General Diary FIR Court
Minor objects a. b. c. d. e. f. g.
Victim Released person Most wanted Accused Case Investigation Officer Criminal
11.1. Brief Description Of The Objects Victim- Victims are those people who may or may not be (he may be the observer of that illegal activity) suffer from any kind of activity of others and seeking help form police and who can launch a GD against certain incident. GD- General Diary is the written document given by the police station to the victim confirming that they will take action regarding this matter.
21
FIR- Almost same as GD. First Information Report (FIR) is a written document prepared by the police when they receive information from the Petitioner about the commission of a cognizable offence. Case- Case is the issue to be investigated by the police and resolved by the court. Investigation Officer- Investigation officer is the police officer who investigates the case. There may be more than one investigation officers in one police station. Accused – Accused means a person(s) who is charged with an offence or crime. Criminal- Criminals are the persons whose guilt/ offence are proven in court And given punishment by court. Released Persons-They are released by court as the charge against them not proved Suspect-The person(s) may or may not be involved in a particular offence or crime. Most-wanted- These criminal are still not arrested or they flee away from police custody and police are searching for them.
22
11.2. DISCUSSION OF THE MAJOR OBJECTS Attributes Of General People
First name Last name Father`s/Mother`s name Gender (male/female/others) Occupation Blood group Caste Identity preference type (voter card/pan card/passport card...) Identity card no Street no Identification mark Physical challanged (Y/N) Contact no DOB Mother tounge Image
Role of general people Each and every person`s above mentioned details will be stored by the police station. If any kind of crime is happed then police can track and get the details of the suspect or the criminal. By the help of local police in charge they can update/edit their above mentioned details by showing valid and the respective documents.
23
Attribute Of Police Station
Police station name User name State District Officer-in-charge name Mail id Officer-in-charge id Date of registration
Role of police station Police station (in charge of the police station) cans entry values for the general database. Police station can update the general database. If any people come to the station to report against any crime, police station can launch GD against the suspect or FIR against the criminal. They will manage entire data base for the common people. They can search for any criminal with respect to certain details. They can change only the password and e mail id of their own station.
24
GD record attribute Document type & no. Detail of complain Name of officer Role of GD With the above mentioned details one can launch a GD with the help of respective police officials. After launching the diary a “GD no” is provided by the police station to the people who reported against the suspect about the crime. The GD can be downloaded in .doc format.
25
FIR record attributes
Document type and no Suspect fault details GD no Type of FIR FIR no Employee id of the officer
Role of FIR There are two kind of FIR 1. General fir (report against certain suspect) 2. Special fir (report against mob) FIR is launched when murder, rape, vandalism like crime is happened. In our system we proposed that FIR will be launched after investigation and it will directly submitted to court to complete the rest of the process.
Court attribute Name Username Chief justice registration no. Password State District Mail id Date of registration 26
Role of Court : In the basis of FIR(first information report) report judge of the court will verify that the suspect is criminal or not. In the court section employee can update and allocate the status of the suspect, hearing date and the final status of the suspect.
27
12. SPECIAL FEATURES (what`s new?) Our project deals with some special features. The followings are the special features of our project: A mailing system is introduced to notify the activities of user. This mailing system works like notification. The users can see their log in times, used browsers, and the respective machine IP address for security purpose. i.e. 1. IP address tracing is possible. 2. Browser info can be stored in database. 3. Log in time can be stored in database for security purpose. The changes of respective in charge of any police station can be made online by the administrators. The hearing date of any case and the next dates of hearing can be allocated by the employee of the court with the help of this system. A filter based advance search is introduced for users. An AJAX based simple search for the police station. Reported GD (general diary) can be downloaded as customized document format (.doc). Password changing duration can be seen in the system in refreshing time rate.(5 sec.) An encoded mailing system is introduced to authenticate police station.
28
13. DATABASE DESIGN DATABASE
TABLE NAME
ATTRIBUTES
DESCRIPTION
Admin
name
VARCHAR
username
VARCHAR,PRIMARY- KEY
password
VARCHAR
Registration_id
VARCHAR,PRIMARY-KEY
name
VARCHAR
position
VARCHAR
State
VARCHAR
district
VARCHAR
name
VARCHAR,PRIMARY-KEY
uname
VARCHAR,UNIQUE-KEY
pswrd
VARCHAR
Chief_justice
VARCHAR
Reg_id
VARCHAR,UNIQUE-KEY
Date_of_reg
TIMESTAMP
NAME
Cemployee
Court
29
Criminaldbreg
Mail_id
VARCHAR,UNIQUE KEY
Document_type
VARCHAR
Card_no
VARCHAR
image
TEXT
name
VARCHAR
Gd_no
VARCHAR
Fir_no
VARCHAR,PRIMARY-KEY
Fir_date
TIMESTAMP
Ps_name
VARCHAR
Emp_id
VARCHAR
district
VARCHAR
Govt_lawyer
VARCHAR
Against_lawyer
VARCHAR
Court_name
VARCHAR
judge
VARCHAR
judgereg
VARCHAR
30
Diary
courtemp
VARCHAR
Hearing_date
VARCHAR
fault
TEXT
punishment
TEXT
Start_of_punishment
DATE
dateofrelease
DATE
status
VARCHAR
name
VARCHAR
image
TEXT
Document_type
VARCHAR
Card_no
VARCHAR
Gd_date
TIMESTAMP
Details
TEXT
Gd_no
VARCHAR,PRIMARY-KEY
Name_of_officer
VARCHAR
31
Gendbreg
Emp_id
VARCHAR
Ps_name
TEXT
name
VARCHAR
Parents_name
VARCHAR
Gender
VARCHAR
Occupation
VARCHAR
Bloodgroup
VARCHAR
caste
VARCHAR
Document_type
VARCHAR
Card_no
VARCHAR,PRIMARY-KEY
Physically_handicapped
VARCHAR
Indentification_mark
TEXT
State
VARCHAR
District
VARCHAR
Address
TEXT
Contact_no
DOUBLE
dob
DATE
Mother_tounge
VARCHAR
32
Hierarchy
Ps_name
VARCHAR
image
VARCHAR
Id
INT
P_id
INT VARCHAR
State_city Pemployee
Police
name
VARCHAR
E_id
VARCHAR,PRIMARY-KEY
position
VARCHAR
state
VARCHAR
District
VARCHAR
Name
VARCHAR,PRIMARY-KEY
Uname
VARCHAR,UNIQUE-KEY
Pswrd
VARCHAR
Oic_name
VARCHAR
Emp_id
VARCHAR,UNIQUE -KEY
Date_of_reg
TIMESTAMP
33
Storage
Mail_id
VARCHAR,UNIQUE-KEY
passworddate
TIMESTAMP
Ip_address
VARCHAR
Time_date
TIMESTAMP
username
VARCHAR
browser
VARCHAR
34
14. TESTING After the implementation phase the testing part begins. Testing of the application determines the correctness, completeness and the quality of the application. Being a developer, the main objective of us is to detect the bug as well as the other errors in an application. Error prevents to produce the correct output/desired output. There are mainly three kinds of error in a system. Requirement error Design error Programming error Once the testing is done, the application is ready to be performed and delivered the correct outputs. There are six kind of testing is done in our project: Unit testing Performance testing Beta testing Security testing Load testing Acceptance testing 14.1 Unit testing: Unit testing is performed to test individual units of an application. Since, the application compromises the various unit and modules, detecting errors in this units is simple and consumes less time, as they are small in size. However it is possible that the output produced by one unit becomes the input for another unit .hence if the incorrect output produced by one unit is provided as input to the 2nd unit then it also produces wrong output. If this process is not corrected, the entire application may produce unexpected outputs.to avoid this all the units in application are tested independently using unit testing. The unit testing is not just performed once during the application development but is repeated whenever the application is modified or used in a new environment. Some other points that kept in mind are 35
Each unit is tested separately regardless of other unit of the application. The developers themselves perform this testing. The method of white box testing is done in this testing. In addition unit testing performs the following functions. It ensures that all statements in the unit have been executed at least once. It tests data structures that represents relationships among individual elements. It ensures that the data entered in variables is of the same data type as defined in the unit It checks all arithmetic calculations present in the unit with all possible combinations of the input values. In our project , we test each unit or module. Hence , administrator is the first module of our project so the entire project is based on the output of the first unit. Suppose for an example we generating a random sequence that is used as username ,so if there is any error exist in our application then the total system may be produce expected outputs and errors. After completion of unit testing we successfully avoid this types of problem.
14.2 Security testing: System with sensitive information are generally the target of improper or illegal Use therefore protection mechanism are required to restrict unauthorized access to the system to avoid any kind of improper usage , security testing is performed which identifies and removes the flaws from the application that can be exploited by the intruders and thus results in security violation. Security testing focuses on the following areas of security: Application security: To check whether the user can access only those data and functions for which the system developer or the user of the system has given permission this kind of security is referred to authorization. System security: To check whether only the users who have permissions to access the system are accessing it this security is referred to as authentication. Security is the main objective of any project. The importance of security testing is to stop unauthorized usages of data, means to ensure that the users only can access the data that is permitted by system developer.in our system we uses encryption, decryption and session for security purpose. 36
14.3 Load testing: Load testing is the process of putting demand on a system or device and measuring its response. Load testing is performed to determine a system’s behavior under both normal and anticipated peak load conditions. It helps to identify the maximum operating capacity of an application as well as any bottlenecks and determine which element is causing degradation. When the load placed on the system is raised beyond normal usage patterns, in order to test the system's response at unusually high or peak loads, it is known as stress testing. The load is usually so great that error conditions are the expected result, although no clear boundary exists when an activity ceases to be a load test and becomes a stress test. The term load testing is used in different ways in the professional application testing community. Load testing generally refers to the practice of modeling the expected usage of a application program by simulating multiple users accessing the program concurrently. As such, this testing is most relevant for multi-user systems; often one built using a client/server model, such as web servers. However, other types of application systems can also be load tested. For example, a word processor or graphics editor can be forced to read an extremely large document; or a financial package can be forced to generate a report based on several years' worth of data. The most accurate load testing simulates actual use, as opposed to testing using theoretical or analytical modeling. Hence our project is an online web based multi user application so load testing is so important to state that our application can work smoothly in any critical condition. The server hit of our system is high because of in each and every step our application compare the input with the attribute of the database that resides in the server side. But at the time of testing we observed that the load testing is successfully passed by our application.
14.4 Acceptance testing: In engineering and its various sub disciplines, acceptance testing is a test conducted to determine if the requirements of a specification or contract are met. It may involve chemical tests, physical tests, or performance tests. 37
In systems engineering it may involve black-box testing performed on a system (for example: a piece of application, lots of manufactured mechanical parts, or batches of chemical products) prior to its delivery. Application developers often distinguish acceptance testing by the system provider from acceptance testing by the customer (the user or client) prior to accepting transfer of ownership. In the case of application, acceptance testing performed by the customer is known as user acceptance testing (UAT), end-user testing, site (acceptance) testing, or field (acceptance) testing. 14.5 Beta testing: Application testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Application testing can also provide an objective, independent view of the application to allow the business to appreciate and understand the risks of application implementation. Test techniques include, but are not limited to, the process of executing a program or application with the intent of finding application bugs (errors or other defects). Application testing can be stated as the process of validating and verifying that a computer program/application/product: • meets the requirements that guided its design and development, • works as expected, • can be implemented with the same characteristics, • And satisfies the needs of stakeholders.
38
15. FUTURE SCOPE There are various scope of improvement of our project CRMS which we could not implement due to lack of time. Following points can be improved to optimize this system and several features can be added to improve this application. III.
Future feature
1. Face detection or face recognition technology can be added. 2. Thumb recognition system can be added. IV.
Future Improvement
1. Searching technique can be more optimized. 2. More validation checking can be added.
39
16. CONCLUSION The project entitled “CRIMINAL REPORT MANAGEMENT SYSTEM” will be very useful for police department. It is designed, implemented and tested successfully. This application, developed by us found to be working effectively and efficiently. It can be observed that the information can be retrieve successfully, accurately and easily. The project provides much security. The simplicity and the friendliness are the advantages of this application. The Application is made user friendly to the maximum so that anyone can run the application provided he could access to the system via the login password. This project manages all details without any risk. All the objectives were met with satisfaction. The performance of the system is found to be satisfactory. From a proper analysis of positive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component. This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems.
40
17. BIBLIOGRAPHY 17.1 Books: Beginning PHP & My-sql (Apress publication) Php and my sql (wrox publication)
17.2 Web Sites: www.W3schools.org www.Stack overflow.org www.Php-manual.net www.kiranbedi.com/feature.html
41
18. SNAPSHOTS OF THE WEBPAGES Fig.1 HOME PAGE
Fig.2 LOGIN PAGE
42
Fig.3 ADMINISTRATOR’S PROFILE PAGE
Fig.4 OIC AUTHENTICATION PAGE(ADMINISTRATOR)
43
Fig.5 COURT AUTHENTICATION PAGE(ADMINISTRATOR)
Fig.6 UPDATE NEW OIC FOR POLICE STATION(ADMINISTRATOR)
44
Fig.7 UPDATE NEW JUDGE FOR COURT(ADMINISTRATOR)
Fig.8 OIC’S PROFILE PAGE
45
Fig.9 GENERAL CITIZENS DATABASE UPDATE FORM
Fig.10 GENERAL DIARY LAUNCHING
46
Fig.11 F.I.R LAUNCHING:
Fig.12 INFORMATION REGARDING GENERAL DIARY
47
Fig.13 INFORMATION REGARDING F.I.R
Fig.14 FILTER SEARCH
48
Fig.15 HEARING DATE UPDATION PAGE FOR COURT
Fig.16 SUSPECT’S FINAL STATUS UPDATION FROM COURT
49
Fig.17 LOGIN INFORMATIONS FOR USERS
Fig.18 PASSWORD CHANGE DURATION CALCULATOR
50
Fig.19 GENERAL CITIZEN’S PORTAL
Fig.20 PASSWORD RECOVERY FOR USERS USING MAIL ID
51
Fig.21 SECURE USERNAME AND PASSWORD SENDER
52