SlideShare une entreprise Scribd logo
1  sur  4
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
E-PoliceOfficer
ABSTRACT
AIM:
The objective of this application is to maintain a centralized repository of
information related to various crimes that may happen across the country. The
purpose is to enable law enforcement agencies to quickly access the information
and take appropriate measures and steps.
EXISTING SYSTEM:
The present system maintains crime related information manually across
registers and files. This makes information sharing a slow and time consuming task.
Often the information passed on may become obsolete and irrelevant and may not
be helpful to deal with the situation.
PROPOSED SYSTEM:
The proposed system applies to Police Institutions all across the country. It
is well understood that Crime Prevention, Detection and Conviction of criminals
depend on the highly responsive backbone of information management. It is
proposed to centralize Information Management in Crime for the purposes of fast
and efficient sharing of critical information across all Police Stations across the
territory. The System would also be used to generate information for pro-active
and preventive measures for fighting crime.
MODULES:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1. Administrator module
2. Investigation module
3. Writer module
4. Registration module
5. FIR module
6. Evidence module.
1. Administrator module:
The administrator has all access rights on this application. Administrator can
register new police station details, register new victims, register new F.I.R, register
crime charge sheet, and register investigation details. Also he can delete all the
details of victims and crimes.
2. Investigation module:
This module is related to Investigation. In this module Investigation Officer
can view F.I.R details, victim’s details, witness details, evidence details, and charge
sheet details.
3. Writer module:
This module is related to Writer. In this module the duty of writer in the
police station is presented. The write can add victim details, investigation details,
witness details, evidence details, crime nature details, and Charge Sheet.
4. Registration module:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
This module maintains the information about all the police stations that are
registered as per the jurisdiction of the system. It also gets integrated with the
employees who are working in these stations along with their designation.
5. F.I.R module:
This module maintains the information related to the First Investigation
Report of the crimes that have taken place. The F.I.R registers all data that is
necessary for the investigation to take place in proper length. It identifies the crime
category and the crime nature.
6. Evidence module:
This module makes a collection of information related to the evidences that
are important under the normal sequence of the investigation. This module
dynamically concentrates upon the changes that take place while the system of
investigation is under process.
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Database : Oracle
Java Version : J2SDK1.5
4.4 HARDWARE REQUIREMENTS:
Hardware : Pentium
RAM : 1GB
Additional Tools:
HTML Designing : Dream weaver Tool
Development Tool kit : My Eclipse

Contenu connexe

Tendances

Tendances (9)

Review of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackReview of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attack
 
Chkbck demo
Chkbck demoChkbck demo
Chkbck demo
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
 
E-Police Android APP
E-Police  Android APPE-Police  Android APP
E-Police Android APP
 
Obj
ObjObj
Obj
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Police Management System
Police Management SystemPolice Management System
Police Management System
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 

En vedette

En vedette (8)

Android app devolopment
Android app devolopmentAndroid app devolopment
Android app devolopment
 
E - Police Officers
E - Police OfficersE - Police Officers
E - Police Officers
 
Fir registration system
Fir registration systemFir registration system
Fir registration system
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Bus tracking application in Android
Bus tracking application in AndroidBus tracking application in Android
Bus tracking application in Android
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similaire à 65.e police officer

Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profilingJourneying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
eSAT Journals
 
Crime record automation
Crime record automationCrime record automation
Crime record automation
Rishitha Reddy
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistan
Salam Shah
 

Similaire à 65.e police officer (20)

Crime record
Crime recordCrime record
Crime record
 
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profilingJourneying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
 
Ijcta2012030301
Ijcta2012030301Ijcta2012030301
Ijcta2012030301
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Crime record automation
Crime record automationCrime record automation
Crime record automation
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistan
 
Crime report
Crime reportCrime report
Crime report
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
3.exposure of suspicious email
3.exposure of suspicious email3.exposure of suspicious email
3.exposure of suspicious email
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
Cis second draft
Cis second draftCis second draft
Cis second draft
 
Project PPT sem 2.pptx
Project PPT sem 2.pptxProject PPT sem 2.pptx
Project PPT sem 2.pptx
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification system
 
Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year project
 
sdReport
sdReportsdReport
sdReport
 
KSP-New beat system
KSP-New beat systemKSP-New beat system
KSP-New beat system
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 

Plus de Pvrtechnologies Nellore

Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 

Plus de Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

65.e police officer

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 E-PoliceOfficer ABSTRACT AIM: The objective of this application is to maintain a centralized repository of information related to various crimes that may happen across the country. The purpose is to enable law enforcement agencies to quickly access the information and take appropriate measures and steps. EXISTING SYSTEM: The present system maintains crime related information manually across registers and files. This makes information sharing a slow and time consuming task. Often the information passed on may become obsolete and irrelevant and may not be helpful to deal with the situation. PROPOSED SYSTEM: The proposed system applies to Police Institutions all across the country. It is well understood that Crime Prevention, Detection and Conviction of criminals depend on the highly responsive backbone of information management. It is proposed to centralize Information Management in Crime for the purposes of fast and efficient sharing of critical information across all Police Stations across the territory. The System would also be used to generate information for pro-active and preventive measures for fighting crime. MODULES:
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 1. Administrator module 2. Investigation module 3. Writer module 4. Registration module 5. FIR module 6. Evidence module. 1. Administrator module: The administrator has all access rights on this application. Administrator can register new police station details, register new victims, register new F.I.R, register crime charge sheet, and register investigation details. Also he can delete all the details of victims and crimes. 2. Investigation module: This module is related to Investigation. In this module Investigation Officer can view F.I.R details, victim’s details, witness details, evidence details, and charge sheet details. 3. Writer module: This module is related to Writer. In this module the duty of writer in the police station is presented. The write can add victim details, investigation details, witness details, evidence details, crime nature details, and Charge Sheet. 4. Registration module:
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 This module maintains the information about all the police stations that are registered as per the jurisdiction of the system. It also gets integrated with the employees who are working in these stations along with their designation. 5. F.I.R module: This module maintains the information related to the First Investigation Report of the crimes that have taken place. The F.I.R registers all data that is necessary for the investigation to take place in proper length. It identifies the crime category and the crime nature. 6. Evidence module: This module makes a collection of information related to the evidences that are important under the normal sequence of the investigation. This module dynamically concentrates upon the changes that take place while the system of investigation is under process. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Database : Oracle Java Version : J2SDK1.5 4.4 HARDWARE REQUIREMENTS: Hardware : Pentium RAM : 1GB Additional Tools: HTML Designing : Dream weaver Tool Development Tool kit : My Eclipse