You are on page 1of 41

CHAPTER ONE

INTRODUCTION
1.1

BACKGROUND OF THE STUDY

With the advance in technology, more in particular in the field of computer organizations a lot of
things are now automated. Web based activities have in recent past replaced virtually every form
of transactions. This is because of the advent of the internet, which provides a global network
connection for all such activities. In line with this trend, the police force needs to join the band
wagon of the global community in shearing the benefits of internet.
A crime diary is a record of a person's criminal history, generally used by police, security
agencies, potential employers, lenders etc. to assess his or her trustworthiness. The information
included in a crime diary varies between countries and even between jurisdictions within a
country. In most cases it lists all non-expunged criminal offenses and may also include traffic
offenses such as speeding and drunk-driving. In some countries the record is limited to actual
convictions (where the individual has pleaded guilty or been declared guilty by a qualified court)
while in others it also includes arrests, charges dismissed, charges pending and even charges of
which the individual has been acquitted. The latter policy is often argued to be a human rights
violation since it works contrary to the presumption of innocence by exposing people to
discrimination on the basis of unproven allegations.
The Federal Investigation and Intelligence (FIIB), is a special outfit of the Nigeria police
force, as a role similar to that of the FBI (Federal Bureau of intelligence) of the United States
(US) information they say is an indispensable force, and if we should go by this maxim, it
buttresses the need at which classified information is to this outfit. Over the years, this outfit had

made tremendous impact in combating crime, but in recent times, there has been an avalanche of
crime wave in the country leading to insecurity of life and properties close investigation
concerning crime activities reveals that this special outfit of the police force is bedeviled with
obsolete equipment.
Despite the glint strides taken by this outfit over the years changing their investigation
and recording equipment to tape storage using cassette as recorder, there are still a lot of
problems which has hitherto, reduced the efficiency of Ebonyi State division police Head
Quarter Abakaliki and other divisions of the outfit throughout Nigeria. The panacea to this may
no doubt; lie in the introduction of a properly designed Web Base Crime Diary System which
will bring the much-desired automation hence, a prerequisite for being a member of the new
world order vis--vis information technology.
1.2

STATEMENT OF THE PROBLEM

The statutory duty of Ebonyi State Police is crime prevention and intelligence network which is
solely based on information. This information received from conducted investigations, which
should be supplied to the Bureau within minutes using information and communication
technology. But this takes days or weeks and sometimes months if the investigation is carried in
a distant area. The storage medium currently at disposal for information is susceptible to
unauthorized access and damage. Most often, the recorded information is usually not within the
reach when needed. Going by this high level of graft in the country, officers can easily remove
recorded information of a very serious crime activity by mere bribe offer. In view of the above
problems there is a need for a web based system which will correct these abnormalities.
1.3

AIM AND OBJECTIVES OF THE STUDY

The aim of this project work is to design a Web Based Crime Diary System that will manage the
crime information of Ebonyi State Division Police Headquater, Abakaliki. The objectives
include:
I.

To build a module that will facilitates the collection of detailed information about the

II.
III.
IV.

history of crime and criminals and store them in the central database.
To build a module that will generate a report of a recorded crimes and criminals.
To build a module where crime record could be queried by the date.
To build a module where police officers from other headquarters can submit crime reports
from their area.

V.
VI.

To upgrade the information network system of the Nigeria police force.


To enhance speedy and reliable information retrieval in crime diaries.

1.4

SIGNIFICANCE OF THE STUDY

With the growth of information technology, the study offers numerous values not only to the
police but also to the society in general. The study will offer the following benefits:

Help the police in Planning by easy access to information and real time statistics
generation

Optimum Staffing of men by deploying them for core tasks.

Effective Direction and Control by higher offices.

Improved Coordination between various offices.

Customized Reporting by generation of a wide range of reports.

Reduction in paper work and manual register maintenance.

1.5

SCOPE OF THE STUDY

This research work is limited to a Web Based Crime Diary of Ebonyi State Division Police Head
Quarter, Abakaliki. There is a web site with a centralized database to allow for a real-time
information access and retrieval. The database will capture all the information needed about the
criminal, the time of the crime, location of the crime and information about the police officer
prosecuting the case.

ABSTRACT
In this project work, Web Based crime diary is an online central data filing and organizational
system for police offices. It is a web based application with the capabilities for storing basic
information about crimes, criminals and other parties that may be involved in crimes and crime
scenes. In the manual system of crime record management, the method of information storage is
poor; the system is not capable of handling cases where other police stations can seamlessly take
over cases that was not registered in their own station when the particular police officer/station
handling the case is not available. And information is prone to unauthorized access and damage.
All these problems have been analyzed and a web based solution provided. The database will
capture all the information needed about the criminal, the time of the crime, location of the crime
and information about the police officer prosecuting the case. There is a module for reporting,
uploading crime and tracking crime. There is a wide network environment for shearing real-time
crime and criminal information across. There is also a module where crime record could be
queried by the date. Some modules of the system are only accessible by authorized system
administrator to ensure the integrity of information. All in all, a web based crime diary system
was developed with MySql for the back end which includes mainly the database and php for the
front end.

CHAPTER TWO
REVIEW OF RELATED LITERATURE
2.1

COMPUTER AND CRIME INVESTIGATION

Much aspect of crime investigation and intelligence is achievable with little or no assistance of
the computer. But on issues bothering on information retrieval, storage and general information
management, the application of the computer is indispensable the computer posses some rare
attributes like speed and accuracy, which is an invaluable tool in information retrieval. To
enhance fruitful investigation, and good decision making, reliable information is needed. In
view of this above, we shall in turn x-ray some of the contributions made so far by some eminent
computer scientist including corporate individuals as it bothers on information retrievals and
management.
Reiston (1978) stated computer that computer information retrieval is concerned with the
structure, analysis, organization storage, searching and dissemination of information.

An

information retrieval system operates on one hand with a stored collection of information, and on
the other, with a used investigation deserving to obtain access to the stored item. He further
stated that for a good computer based information retrieval system there is need for designing the
system to extract from the files those items that mostly nearly correspond to existing needs as
reflected in request submitted by the user investigation.
2.2

INFORMATION RETRIEVAL SYSTEM BASED ON THE COMPUTER

Sage (1968) In his article Development of information retrieval system, stated that information
retrieval system based on computer involves collection of people, procedure and equipment
designed to collect record, process, store retrieve and display information.

He further

highlighted that only system that contains digital computers as integral parts are considered, so

that there could be a distinction between a manual system and a computer based information
retrieval system (CBIRS). It is important to retrieval at this point that information retrieval
system does not only bother on storage, searching but also involves information management for
proper decision making.
In view of the above assertion, Benjamin (1991), in his article Computer Industry
challenges in information system described management information as a network of computer
based data processing procedures developed in organization and integrated as necessary with
other manual, mechanical and other electronic procedures for the purpose of providing timely
and effective information to support decision making and other necessary management function.
Ezeano (1995) supported Benjamin by stating that database in centrally located file
involving the operational data of an organization and through which good decision based for
any organization to keep abreast with current events, such organization must have a solid data
based so that the organization will stand firmly in management.
2.3

MAINTENANCE OF POLICE STATION RECORDS

Proper maintenance of Police Station records is a pre-requisite for the smooth functioning of a
Police Station. These records are of immense help in the prevention and detection of crime and in
keeping track of the movements of criminals. Since these records are of paramount importance, it
is the duty of an Officer Incharge of a Police Station to ensure that these reocrds are safely kept
and do not deteriorate from damp, vermin or other causes. Every Police Station register is
required to be paged in English. No page should be torn out of a register. Any correction required
to be made should be made by drawing a line through the mistake so as to leave the words erased
and by writing the corrected words afterwards or in the margin. A piece of paper should not be

pasted over a mistake. All entries should be neatly and clearly written and all the corrections
should be attested by the signature of the officer making them.
2.4

SETBACKS OF COMPUTER APPLICATION

However, in an attempt to define the wonders of computer and the implication of using a
computerized system in information retrieval, Becker (1963), in his book Information storage
and retrieval using computer tools elements, theories pointed out that a computer is very fast, it
can perform in a single second the amount of work that a human being would require one full
year to achieve. He further cleared that a computer is not a magical device. It has to be
instructed on what to do and in what sequence. If the officers supply incurred information to a
computer, the computer will definitely give an incorrect output (GIGO), thus supporting the
theory of Garbage in garbage out.

Business times publication (February 1987) however

concluded that information retrieval cannot be based only on storage and up updating rather there
is need for information security so that collected information can be protected. Applying this to
Nigeria police force investigation conducted concerning a particular case or issue if not protected
can not be retrieval when such investigation are needed. The paper defined information security
as the protection of information from accidental or disclosure to unauthorized person from
unauthorized modification.
2.5

OVERVIEW OF WEB BASED ACTIVITIES

The power and usefulness of internet is its application in the diverse area of human endeavor.
And there is great belief that web based application is changing the organizational operations.
Many writers have helped to bring on the uses and application of computer system as well as the
problem they have planned to solve in any user environment.

According to Mbam (2009) to lack the knowledge of internet is as bad as not knowing
how to read and write. Internet is translating individuals and organizations ways of doing things.
It has come to stay. In view of the above, internet can be applied in the police crime management
and processing system for speed and efficiency
In his own rendering, Mbam (2009) opined that from the impact of internet, it is obvious
that the world would be a different place today if the internet never existed. The internet has
tremendously transformed the world into a global village. Its effect has made life very easy, and
complex tasks can now be accomplished at a click of a mouse button. It is therefore difficult to
find someone who has not heard about the word internet before. Its effect and popularity have
spread among individuals like a rampaging tropical storm. From this, the application of a web
based system in the management crime investigation and processing will produce accurate result.
2.6

CREATING AND DESTROYING A CRIMINAL RECORD

Goldberg (2010), a criminal record will be created after sentencing because of a violation or
crime. The record will exist for 5 years in case of violations or 20 years for crimes. If the
sentence is three years of imprisonment or longer, 30 years will be added at the time the criminal
record will be stored. A traffic violation will not be stored in a criminal record, unless there will
be a trial. Normally the traffic fine is given by a police officer, and the payment is generally done
by banking. There won't be a trial, nor an addition in a criminal record. In case of sexual crimes
the criminal record will be destroyed after 80 years.
2.7

FORENSIC SCIENCE LAB (FSL)

FSL is the testing laboratory of the police department with its laboratories at national and state
levels which conducts various tests on the requests coming from the police department and other

Government departments. This module captures the administrative functionality of the FSL Unit
as a whole. This involves capturing and maintaining the information of the cases registered in
FSL on request from police station or otherwise, flow of the case through the different sections in
FSL, status of the case at each point of time till its final disbursement back to the requested unit.
It also captures the various other day-to-day activities of FSL like scene of crime requisition,
court duty attendance and ammunition and equipment usage.

CHAPTER THREE
METHODOLOGY AND SYSTEM ANALYSIS
Research methodology is the specification of the procedures for collecting data and analyzing
data necessary to define or solve the problem for which the research is intended to. The system
under investigation is the Abakaliki Police Divisional Headquarters and this involves how the
crime data are collected and other processing activities that go on in the police station.
3.1

TOP-DOWN DESIGN METHODOLOGY

Top-down decomposition requires identifying the major higher-level system requirements and
functions, and then breaking them down in successive steps until function-specific modules can
be designed. Thus, top-down design is a level-oriented design approach. Top-down design directs
designers to start with a top-level description of a system and then refine this view step by step.
With each refinement, the system is decomposed into lower-level and smaller modules. Topdown design reduces the scope and size of each module, and focuses more on specific issues.
For the purpose of this study top down will be used because of its numerous values such
as: modularization, easy debugging and program modules can act as a building block for
developing other programs.
3.2

FACT FINDING

Fact finding is the process of identifying the application and implication of the system for the
bureau. To the successful actualization of this, approval was given by the inspector in-charge of
the police division command. With regards to collection of relevant facts, which are reliable and
unbiased, the researcher employed the following methods:

interview method

observation

examination of documents

INTERVIEW METHOD

This method has widely been employed by most authors and in fact, the most productive
technique. It is a technique, which involves collecting facts through discussion the interview
session between the researcher and the higher and lower officers of the police. This method did
however, offer the author the opportunity of having a face to face communication with the
people concerned.

It also provided the much needed response as regards the areas under

investigation.

OBSERVATION

This method makes room for confirmation on the interview granted, and possibly, creates the
opportunity for conclusions to be made as operations are observed. It is imperative to point out
that this method is best, if employed in conjunction with other techniques as implemented by the
researcher. Officers were seen carrying files, and transferring files from one office to another.
Movement of files could also lead to loss of important documents.

EXAMINATION OF DOCUMENTS

This is the most essential area whose need is required as to ascertain the specific area where
computer services could be needed. To this end, the researcher examined some of the documents
used in the entering of conducted investigation manually, the heap of wasted material as a result

of poor storage. The author also took a closer examination of the intelligent report form. This
examination helped the author to fathom the possible procedures for each operation. The
questionnaire was not used in the cause of investigation for the research work, due to the
following reason.
The time schedule for the study was so short hence the researcher could not meet up with
the necessary preparations involved in the presentation of the questionnaire.
3.3

ANALYSIS OF THE EXISTING SYSTEM

System investigation and analysis is concerned with the study of the existing system with a view
to discovering its strength and weakness and possible make strategies to eliminating such
weakness in the new system design. The area investigated upon was the Ebonyi State Police
Divisional Headquarter which is in charge of information. The operates based on manual
approach. It is a system whereby the officers incharge of crime record it manually in a register
and anytime the station needs to make reference to any particular record, they will bring the
registers and search for the case manually. This method is stressful and information is prone to
damage and attack.
3.4 INPUT, PROCESS, OUTPUT
Analysis of the input process and output of the existing involves examining the document which
serves as input into the send and finally, what is the out of this processing (investigation /
confirmation) upon which a decision can be acted upon.

INPUT

The input into the current system is the intelligent report form, which is used in collecting data
from conducted investigation an surveillance by officers of the system.

This information

collected serves as raw for the intelligence department for effective processing.

PROCESS

The current system is entirely bereft of the numerous benefits of computerization, as information
collected is rather processed manually. This is the duty of the intelligent department. What they
do is to study facts and analyze the information (report) collected from investigation depending
on the nature of the crime.

OUTPUT

The output from the current system is dependent on the facts drawn from the analysis of the
information derived from conducted investigation by the intelligence department. This could be
of two types:
OUT PUT of an investigation with suspect Output of an investigation without suspect Output
for the former includes the following: name, address, sex, date occupation signature, and
investigation base and report confirmation.

3.5 INFORMATION FLOW DIAGRAM

This information flow diagram shows how information is being disseminated within the system.
This also depicts the information requirement of each department that makes up the system.

DIRECTIVE FROM STATE COORDINATOR TO DIVISIONAL COORDINATOR

INVESTIGATION INITIATED AND CARRIED OUT BY OFFICERS

COLLECT DATA FROM CONDUCTED INVESTIGATION

PROCESSING AND ANALYSIS HAVE THE DATA COLLECTED FROM THE CONDUCTED INVESTIGATION

INFORMATION VERIFICATION AND STORAGE OF THE INFORMATION

FIG. 1

3.6 PROBLEM OF THE EXISITING SYSTEM

From thorough investigation, the current system has been observed to be bedeviled with the
following teething problems, which need re-modification. The manual system involved in file
processing and management seems tedious due to the long procedure involved.
-

There is delay in retrievals of output from the system

Error prone

Some vital information get lost due to over handling of files by hand.

There are no backups in situations where important files or records get lost.

Some amounts of difficulties are encountered in trying to update records due to


mistakes in documentation.

3.7

Hours are spent in doing jobs that a computer will do in seconds.

The officers need good education in the areas of file management.

JUSTIFICATION OF THE NEW SYSTEM

From all the revelation of the inherent problems in current system, it becomes obvious that for
such a very sensitive outfit of the police force there is the need for its entire system to be
revitalized, to keep abreast with the time and subsequently, reap the numerous benefits offered
by fantastic features of information technology, which is lacking in the current system. Hence a
computerized information retrievals system is proposed. This proposed new system would
achieve the following:
-

To eliminate manual delays in operation

Provision of information which are more accurate, timely and readily available at
any point in time for bureau analysis

To serve as a means of providing an already programmed input media, which will


enhance processing

Enhance analysis of investigation carried out in a certain area

It will provide storage for large volumes of information without occupying space.

DIVISIONAL INSPECTOR

INSPECTOR INCHARGE FEDERAL


OF ACCOUNT
INSPECTOR IN CHARGE OF ADMINISTRATION
INTELLIGENCE BUREAU COORDINA

JUNIOR COURIER JUNIOR


PERSONNEL
OFFCER
OFFICE
IN CHARGECLERICAL
OF DRIVING
OFFICER

ACCOUNTS STAFF

IN CHARGEINSPECTOR
FOR CRIME IN CHARGE OF FRAUD
INSPECTOR IN CHARGE OFINSPECTOR
INTELLIGENCE

3.8

ORGANIZATIONAL STRUCTURE

CRIME INVESTIGATIONFRAUD
STAFF INVESTIGATION STAFF
INTELLIGENCE STAFF

Fig 2
The figure above represents the organizational structure of Ebonyi state divisional police
headquarter.

CHAPTER FOUR

SYSTEM DESIGN
Having looked at and studied critically the old system with its deficiencies, then a system
specification and a design which was developed to meet the user requirement for an efficient web
based Crime Diary system is developed.
4.1

GENERAL SYSTEM FUNCTION

The system will generally perform the following function:


I.
II.
III.
IV.
V.
VI.
VII.

Add a new suspect into the system.


Update suspects data into the system
Update activities in the system
Search and print suspect/individual details.
View suspect by offence
View all the suspects.
Logout of the system.

4.2

SYSTEM SPECIFICATION

This section shows the requirement of the system and what it is supposed to contain for effective
design.
4.2.1

Home Page Specification

Add new suspect: to display a form that enables a new suspect to be added to the system.
Administrator login: to login an administrative staff or the CEO admin to perform

administrative functions.
Update suspect: enables a suspect information to be updated in the system.
Search/Print: enables the administrator to search and print report s in the system.
View: to view a suspect based on the offence or to view all the suspects in the system.
Logout: enables the admin to logout of the system.

4.2.2

User Interface Specification

It is the specification for the user interface which is also path of the software that the user
interacts with, whether it is for input or output purposes.
4.2.2.1

Input Form Specification

The input form and their specification are shown below


a) Add Suspect Form: this form enables the system admin to add new suspect to the system
database. The fields here include:
Fullname
Nickname
Offence
Native
Age
Phone no.
Date of activities
Activities
Date of status
Picture
save
b) Update suspect form: this form allows suspects data /information to be updated in the
system. The fields here include:
Enter name
search
c) Update activities: this form allows other activities that occurred to be recorded in the
system. The fields here include:
Enter name
search
d) Search/Print: this form allows the admin to and print individuals data in the system. The
fields here include:
Enter name
Search
4.2.2.2 Output Form specification

The output form here is the form that shows the details of the input processed by the Web Based
Crime Diary. The output form is the View All Suspects; which allows all the suspects recorded in
the system to be viewed. The field here includes:

4.2.3

Fullname
Nick Name
Offence
Date of Status
Database specification

There is a database named Crimediary to handle all the details of the Web Based Crime Diary
system. The database will be stored in Wamp server which will contain MySql as the database
management system. It has three tables, they includes:
a. Admin: this table has the information needed for any admin staff to login. The fields in it
includes:
Id
Int(11)
Username
varchar(20) null
Password
varchar(20) null
b. Activities: this table contain all the information concerning any crime and suspects that is
recorded in the system. The fields here include:
Id
int(11)
Fullname
varchar(200)
Nickname
varchar(200)
Offence
varchar(200)
Age
varchar(3)
Phone_no
varchar(20)
Date of activities
varchar(200)
Activities
varchar(2000)
User_Id
Int(10)
Image
varchar(2000)
Year
varchar(200)
Date
Int(3)
Day
Int(5)

null
null
null
null
null
null
null
null
null

Month
Int(5)
c. Bh: this table contains the details of a recorded suspect. The fields here are:
Id
int(11)
Fullname
varchar(200) null
Nickname
varchar(200) null
group
Offence
varchar(200) null
Age
varchar(3)
null
Phone_no
varchar(20) null
Date of activities
varchar(200) null
Image
varchar(2000) null
4.2.4

Program Module Specification

The program module specification describes the specification of what the program would do to
enhance good design guide during the process. As it concerns this particulars application
package, it describes different activities involved in the program modules. The classifications of
the modules are vividly described under the subsections below.
There are total of five modules in this system specified according to their functions. They
include:
i.

view: this enables the system administrator to view a suspect or all the people registered

ii.

in the system.
Search/Print: this module allows suspects information to be searched and printed in the

iii.
iv.
v.

system.
Update Activities: this module allows activities to be updated in the system.
Update Suspect: this module allows the suspects information to be updated in the system.
Add New Suspect: this module allows the admin to register new suspect in the system.

4.3

SYSTEM DESIGN

4.3.1

Home Page Design

This subsection is responsible for contents in the main menu interface. Based on the fulfillment
of this project application package software, the main menu was designed to have a link to all the
form interfaces within the application. The figure below has a descriptive explanatory diagram of
the sketch of the main menu design. Different information that will enable the user, understand
the procedure as well as a guide for the software.

CRIME DIARY HOMEPAGE

ADD NEW SUSPECT


UPDATE NEW SUSPECT
UPDATE ACTIVITIES SEARCH/PRINT

PRINT INDIVIDUAL DETAILS

PRINT INDVIDUAL ACTIVITIES

VIEW

SUSPECT BY OFFENCE

ALL SUSPECTS

Fig3. Home Page Design

4.3.2

User Interface Design

4.3.2.1 Input Form Design


This sub-section deals with the various designs of individual forms in which a user will enter
data and a click event to allow a procedure to happen. Below are the individual input forms.
Add New Suspect Form

Fig. 4 Add New Suspect

Update Suspect Form

Fig 5 Update Suspect


Update Activities Form

Fig. 6 Update Activities

Fig. 7 Search/Print Form

4.3.2.2 Output Form Design


The output form design is the form that shows the details of the input processed by the Web
Based Crime Diary System.

Fig. 8 Crime Diary Output Form


4.3.3

DATABASE DESIGN

We have one database know as Crimediary. Our database constitutes of tables that is made up
of fields of different field types and sizes. They include:
Table 1Admin table
S/N
1
2

FIELDNAME
USERNAME
PASSWORD

FIELDTYPE
VARCHAR
VARCHAR

SIZE
20
20

CONSTRAINT
-

NULL
NULL

ID

INT

11

FIELDTYPE
INT
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
INT
INT
INT
INT

SIZE
11
200
200
200
200
200
200
2000
200
200
3
5
5
5

CONSTRAINT
-

NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL

FIELDTYPE
INT
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR

SIZE
11
200
200
200
200
200
200
2000
200
200
11

CONSTRAINT
-

NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL

Table 2Activity Table


S/N
1
2
3
4
5
6
7
8
9
10
11
12
13
14

FIELDNAME
ID
FULLNAME
NICKNAME
GROUPS
DATE
MONTH
YEAY
IMAGE
NATIVE
AGE
A_DAY
A_YEAR
A_DATE
USER_ID

Table 3Bh Table


S/N
1
2
3
4
5
6
7
8
9
10
11

FIELDNAME
ID
FULLNAME
NICKNAME
GROUPS
DATE
MONTH
YEAY
IMAGE
NATIVE
AGE
PHONE

4.3.4.1 System Flowchart


CRIME INVESTIGATION
SYSTEM
DOCUMENT

DOCUMENT

PROCESS

VISUAL DISPLAY

DOCUMENT

Fig. 9 System Flowchart


DATABASE

Start

Enter User Name & Password

4.3.4.2 PROGRAM FLOWCHART

DISPLAY MENU

Is Password
Correct?
(1) search
(2)view
(3)add new
suspec
(4)update

End

YES

display search form

IF OPTION = 1

YES

display view report form

IF OPTION =2

YES

display add new suspect form

IF OPTION =3

YES
IF OPTION =4
END

Display update form

FIG.10 PROGRAM FLOWCHART


CHAPTER FIVE
SYSTEM IMPLEMENTATION, TESTING AND DEPLOYMENT
5.1

SYSTEM IMPLEMENTATION

Here, we proceed from the design of the new system to a working version of the fundamental
program solving techniques. The software is structured in such a way that each subsystem is
selected and executed independently. The tasks is divided into several sub tasks, which comes
together to give the solution to the problem.
This section also went ahead to explain vividly the implementation of the designed
system and the code that achieve the actual instruction. Pseudo codes are used to show the
structure of the coding while actual coding are done using the chosen programming language
(Hypertext Preprocessor) in the implementation of every module of the project.
The following can be used by the system to fulfil its functions:1) Use of Microsoft windows operating system (Window XP and above).
2) Use of HyperText Preprocessor

3) MySql
5.1.1

LANGUAGE OF IMPLEMENTATION

To implement the specification already mentioned, we would use a programming language,


which is window based. The language is Hypertext Preprocessor it is event driven and very
flexible to use. Because the current system will have a data store that will hold information about
the registration details, the use of database management system is utilized. And the software used
here is MySql. The researcher has a good working knowledge of Fireworks 8. So Macromedia
fireworks 8 were used in designing of the pictures used.
5.1.2

Main Menu Implementation

The main menu design is implemented as shown below:


Table 5.1

Pseudo Code for Main Menu Design

PROCEDURE

ACTION-PSEUDO CODE

LinkAddNewSuspect_Click

Displays the add new suspect form.

LinkUpdate_Click

Display the Update form.

linkUpdateActivities_click

Displays the update activities form.

linkHome_Click

Displays the default page

BtnRegister_click

Registers a new suspect into the system.

BtnLogin_Click

Enables the admin to login into the system.

5.1.3

USER INTERFACE IMPLEMENTATION

The user interface implementation is subdivided into two:

The Input Form Implementation


The Output Form Implementation

5.1.3.1 The input form interface


The input form is the main medium for user interaction as it draws out information from users,
responds to it, works with the existing store of data, queries and writes back to the database and
finally registers to the local computer. In order to make the form easy to use for the user, the
window form was implemented using controls like labels, text fields, list menu, buttons etc. all
these work together to generate an interactive input interface.
5.1.3.2 The output form interface
These forms present data that has been processed to the user. Text fields and labels are used to
specify the search fields and buttons are used to call up event used to present data. The tools help
in development of an interactive user interface.
5.1.4

Database Implementation

The database is implemented using MySql statement in the query analyser tool in the wamp
server application. The database implementation contains all the sql data manipulation language
(DML) that is used to modify the data present in the database.

SELECT Extracts data from database table.


UPDATE - Updates data in the database.
DELETE Deletes data from the database.
INSERT inserts new data into the database table.

5.1.5

Module Implementation

The modules were implemented using hypertext preprocessor (PHP) programming language and
it was done using top-down methodology. The pseudo codes below represent the structure of the
coding.
Module Administration
There are different sub-systems but the one that would be discussed here is the student
registration centre procedure, this only show the structure of the coding.
1. Admin home page shows
2. Load the login form
IF the admin enters incorrect username or password, then an error message shows.
User has the choice to go back to step 2 or close the page.
3. Open the home page of the system page.
4. perform administrative functions.
If the admin wants to edit any particular field , then click on edit

If the admin wants to perform any other administrative functions, he goes on


If the admin doesnt want to make any other changes, then move to step 5

8. Admin user then logout.

5.2

SYSTEM TESTING

Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. In this section we will discuss software testing
fundamentals and techniques used in the test plan and test data required for the performance and
evaluation of such test.
5.2.1

Test Plan

The test plan used in this project testing and integration was to test the modules, followed by the
subsystems and the main menu separately. Integrating the whole parts i.e main menu, subsystems
and modules together followed by the individual testing. Generally, the testing was done in three
parts; unit testing, integration testing and final testing.
5.2.2

Test Data

The data collected from the students as specified in the system analysis section were used to
produce the test data used in this system. The table below shows the test data of the system.
Table 5.2

Expected and Actual Data

Test data
Add new Suspect

Expected result
Actual result
Expected to see the add new The add new suspect form was

Admin Login

suspect form
displayed.
Expected to see administrator Administrator access area was

Update Suspect

restricted area
displayed
Expected to see the update Update suspect

Update activities

suspect form
displayed
Expected to see the update The update activities form was
activities form

displayed.

form

was

Search/Print

Expected to see the search The

search

form

View

suspect area
displayed.
Expected to see area that Suspects information

was
was

enables one to view a recorded viewed


data in the system.

5.2.3

Test Result

The test results were gotten based on the values supplied to the system. The accuracy of the
program was tested with some varying data. This gives the assurance that the new system with
achieve its purpose and objectives.
5.3

SYSTEM DEPLOYMENT

This stage is also known as crossover stage. This is the stage in which all theories are turned into
practice. It is a means of changing from the manual system to the automated system. There are
various methods of crossover process, they include:
5.3.1

Parallel Change over


This is a method in which both systems (i.e. manual and computerized systems) are

implemented simultaneously for a certain defined period and their outputs/results are compared
periodically and likely differences are fixed on the new system until all users are satisfied. The
old system has to be discontinued when differences are seen to have seized arising. Its advantage
is that is that it builds users confidence especially during the parallel run. The disadvantage is
that it is expensive running the manual and computer-based system simultaneously for a defined
period of time.

5.3.2

Pilot Change over


In this method, the new system is installed first and executed successfully for a

considerable period of time. When the outputs are found suitable, then another part is
implemented. Its advantage is that it allows easy tracing of errors and debugging since
installation are done in parts. Major disadvantage here is that it takes a long time to complete the
installation of the various parts of the system.
5.3.3

Direct Change over

This is where the manual or old system is completely replaced by the new system. One of the
major advantages here is that it saves cost in the sense that it is only the automated that runs at a
particular point in time. It is also easy to directly change over to the new system. This is the
method that will be adopted in this system.

CHAPTER SIX
SUMMARY AND CONCLUSION
6.1

SUMMARY OF ACHIEVEMENTS

The system will generally perform the following function:


I.
II.
III.
IV.
V.
VI.
VII.

Add a new suspect into the system.


Update suspects data into the system
Update activities in the system
Search and print suspect/individual details.
View suspect by offence
View all the suspects.
Logout of the system.

The success of all these operations was based on the analysis of the current system and testing
processes carried out during the system process.
6.2

PROBLEMS ENCOUNTERED AND SOLUTION ADOPTED

During the feasibility study, Analysis and designing of this application package, a lot of sets back
were encountered. But after a much head long way, the solutions were found. The table below
gives the summary of the problems and the solutions adopted
Table 6 Problems Encountered and Solution Adopted
PROBLEM ENCOUNTERED
The

most

difficult

was

the

SOLUTION ADOPTED
hiding

of This problem was resolved by Identifying with

information by the various units of the the Head of Departments and had an
departments that I encountered. Some, if not agreement that I must not publish any
all, believe that the success of investigative information on papers outside my project
work is based on secret.

work.

Some of the officers believed that their job is This problem was resolved by briefing these
at risk if the management implements the new individuals about their state of job and
system after its creation, so they refused to educating them about the importance of being
corporate with me as at when due.

VI.3

computer literate.

CONCLUSSION

The need for achieving efficiency and consistency information processing and analysis for every
organization can not be over emphasized. The manual method employed by this outfit over the
years has been bedeviled with problems ranging from inefficient processing, loss of information,
inaccurate computation, poor storage and authorized access to stored information. These
irregularities however, call for immediate implementation of a computer based system, which
has effective.
The software has been designed to address issues of irregularities if followed and handled
properly. However in implementing the system, adequate strategies and role perception might be
adopted by those responsible for implementing the new system. This is necessary so as to
forestall hostility and antagonism by the users of the old system. Since the new system is built
around these users the benefit of computer in many aspects and organization are therefore
necessary to abolish the misconception that the computer is a displacement of man, but rather his
complete.
Therefore, for quick decision making in Ebonyi state Division Police Head Quarter,
Abakaliki, the application of a computer based information retrieval approach is a must.

REFERENCES
Becker, R. (1963). Testing the leading crime theories: an alternative strategy focusing on motivational
processes. Journal of research in crime and delinquency, 32, 363-398.

Bbenjamin, r. (199). The Psychology of Criminal Conduct: Theory, Research and Practice. Toronto:
John Wiley & Sons Publications.

Ezeano, a. (1995). The Changing Definition and Image of Crimes in Popular Discourse. International
Journal of the Sociology of Law, 24, 229-251.

Goldberg, s. (1996). Computer Crime Diary in the Global Village: Strategies for Control and
Regulation- in Defence of the Police Force. International Journal of the Sociology of Law, 24,
221-228.

Mbam, chukwuma (2009). Internet Made Easy. Enugu: Our Saviour Press Limited

Reiston, p. (1978). The Psychology of Crime a Social Science Textbook. Cambridge: Cambridge
University Press.

Sage, j. (1997). Analysis of Security Incidents on the Internet. Unpublished Doctoral Dissertation,
Carnegie Mellon University, Pennsylvania.

Tandels, d. (1994). Recombinant Culture of Police Investigation Processes: Crime in the Digital
Network. Available http: www.cpsr.org/privacy.

Uttman, j. (1997). The Watchman: the Twisted Life and Crimes of Serial Hacker Kevin Poulsen.
Toronto: Little Brown & Company Intl.

Vizrach, s. (1997). Is There a Controlled Crime Management System for the 90s? Available Http:
Hostname: Infowar.Com.

You might also like