Crime Automation & Reporting System 1
Crime Automation & Reporting System 1
Crime Automation & Reporting System 1
Chapter Title
Page no. Title page ..(i) Certificate .(ii) Copy of training certificate (iii) Declaration (iv) Acknowledgement (v) About Training ..(vi) Table of Contents (vii) List of Figures (ix) Abstract ..(x) Chapter1:Synopsis 1 Chapter2:Organization Profile Chapter3:Project Overview System Analysis Existing System Proposed System Feasibility Study Economic Feasibility Technical Feasibility Behavioral Feasibility Chapter4:Tools & Platforms Used Architectural Design Procedural Design Interface Design Software Maintenance Conclusion 26 26 27 28 2 3 6 8 10 12 13 13 13 15
SYNOPSIS
Synopsis is a general documentation tool. By means of a modular structure, it adapts to different styles of embedded documentation, different programming languages and various output formats. It scales well with the size of the project by allowing processing to be controlled by making files. The Crime Records Management System applies to Police Stations all across the country and specifically looks into the subject crime prevention, detection, conviction of criminals depending on a highly responsive backbone of Information Management.
ORGANIZATION PROFILE
ORGANIZATION PROFILE
Soft Solutions provides worldwide IT solutions for Global 1000 corporations to stay abreast of the changes in todays environment. Our areas of expertise include technology consulting, Application Development, Information Security and SAP. We are highly motivated, experienced professionals committed to our clients success. Our technical expertise enables us to innovate, develop, and implement cutting edge technology solutions, resulting in significant savings for clients. Here at Soft Solution, we are sincerely committed to making a difference. As part of our corporate social responsibility program, we donate a portion of our revenues to the 5H Program, a service project that is supported by the International Association Corporate Social Responsibility What distinguishes Soft Solution from its competitors is the work culture of excellence, which is the result of our commitment to a greater cause. Mr. Harish Ramachandran, CEO At Soft Solution, we know that success demands the highest standards of social, economic and environmental responsibility across our operations worldwide. Soft Solutions Services Working closely with our clients, we customize our solutions to fit each and every client's unique needs and marketplace. Listed are, but a few of Soft Solutions comprehensive suite of services: Application Development Information Security SAP Implementation
PROJECT OVERVIEW
PROJECT OVERVIEW
The Crime Records Management System applies to Police Stations all across the country and specifically looks into the subject crime prevention, detection, conviction of criminals depending on a highly responsive backbone of Information Management. The efficiency of the Police and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it. I had done this project using ASP.NET as front end and SQL Server as back end easing the effort of user.
2) Citizen module
Each of the citizens, who has a complaint to register, must first register with the Software. For the registration part each person enter their details like name, address, phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the registration is complete, the citizen can sign-in to the website & register their complaint.
3) Crime module
This module is used for entering all details about the crime. It contains the date and time, police station where it is recorded, place, Nature of Crime, Location of the Crime etc.
4) Search module
In this module we can search the crime in station wise, nature of crime.
5) Administrators Module
The module will be protected by user ID and password. Ordinary users of the software will not be permitted to enter into this area of the software. The module will be focusing on the maintenance like Master Data Maintenance, Removal of old and outdated data from the software etc. 6) Avocation Module This Module deals with the Law part of every Crime.
About VB.NET
Microsoft.net was formerly known as next generation windows services (NGWS for short).It is a completely new platform for developing the next generation of windows /web applications. These applications would transcend device boundaries and fully harness the power of internet. However, this new platform required a language, which could take its fully advantage; this is one of factors that led to the development of VB. VB has evolved from QBASIC language. The VB compiler is considered to be the most efficient compiler in the .net family and a major part of the .net based classes libraries, itself are written in VB.
SYSTEM SPECIFICATIONS
SOFTWARE SPECIFICATIONS The Crime Reporting System must use Microsoft SQL server 2000 as its database component.
Software Requirements
The software requirements include the software that is required for working. Software requirements are as follows:
Developments Tools ASP .NET uses the new ADO .NET. ASP .NET supports full Visual Basic, not VBScript. ASP .NET supports C# (C sharp) and C++.ASP .NET supports JScript as before. Database SQL Server
HARDWARE SPECIFICATION
Hardware interfaces specifies the logical characteristics of each interface between the software product and the hardware components of the system. Many business type applications will not have hardware interfaces, since Crime Reporting System is an application it too will not require any particular hardware interface. Hardware Requirements
The hardware for the project should be selected in such a way that it should give the maximum optimal result .Hardware requirements are as follows: Server Side Processor :Intel Pentium (II) or higher 128 MB RAM 2 GB Hard Disk or more SVGA Color Monitor 104 Keyboard Any Mouse Any modem
Client Side Processor :Intel Pentium (II) or higher 128 MB RAM 2 GB Hard Disk or more SVGA Color Monitor 104 Keyboard Any Mouse Any Modem
SYSTEM ANALYSIS
SYSTEM ANALYSIS
System Analysis works with users to identify goals and build systems to achieve them. System analysis is an important phase of any system development process. The system is studied to the minutest details and analyzed. The system analyst plays the role of an interrogator and dwells deep in to the working of the present system. In analysis, a detailed study of these operations performed by a system and their relationships within and outside of the system is done. A key question considered here is, what must be done to solve the problem? One aspect of analysis is defining the boundaries of the system and determining whether or not the candidate system should be considered. The system is viewed as a whole and the inputs to the system are identified. The outputs from the system are traced through the various processing that the input phases through in the organization. During analysis, data are collected on available files, decision points, and transaction handled by present system. Once analysis is completed the analyst has a firm understanding of what is to be done.
EXISTING SYSTEM
In the existing crime management system, most of the operations are done manually like send complaints, taking actions against crimes, view status etc. So with the existing system if anybody wants to complaint against crimes he must do it through the police. If we are doing the system manually, so many minor errors will occur. Error detection in the previous entries made and data cross verification is another important function. These are done manually, and it would take time. Drawbacks of the existing system can be concluded as follows: The existing system is time consuming and not very user friendly. The FIR brought by a person hailing from a family beyond poverty, the existing system shows ignorance for the same
The officer dealing with a particular case cannot take decision by himself even when he is having the first hand knowledge/information about the case and he can expect obstructions from higher authorities/officials. Even an efficient officer cannot/may not able to handle more than one case at a time. As we all know, a covered truth, Bribery plays an important role in the existing system. Many cases are pilled up in the corners, which are not proved, due to lack of commitment in the job. In most of the cases, the innocent are accused in the existing system. As per our jurisdiction, Let thousand criminals escape-not a single innocent be punished . As a result of this and other factors that influence investigation, such as bribery, the innocent becomes accused in several situations in the eyes of Justice. The existing system could provide only investigation and there is no Advocating, Counseling facilities etc. hence no contact or control or co-ordination on these cell. They criticized it for being inefficient, time consuming, poorly managed, disparate and lacking flexibility. Evaluation requires monitoring crime before, during and after the initiative. Facts other than these initiatives may also impact on crime levels which makes evaluation particularly difficult. Because of the amount of serious crime, lesser crime goes unchecked. Many crimes become regarded as antisocial activities.
PROPOSED SYSTEM
Our mission statement directs us to promote the public interest while balancing the Law. Obviously well not rush to judgment, but will look at the facts and render a thoughtful decision based on these facts. Organization is an independent statutory body which was created to maintain an effective an effective and efficient police service for the public. Its primary task includes securing continuous needs of the public in an efficient manner. As part of the responsibility, our committee is responsible for performance monitoring (performance planning and review formerly professional standards and performance monitoring) decided to look at the contribution and effectiveness of the organization within the public. We need the whole hearted support of each and every individual member of the site and cooperation of the users. The administrator, along with the investigators, lawyers, counselors, and other authorities statutory partners in our organization. Given their key role in these partnerships, we felt that an overview of strength and Weakness of the organization is needed. The aim of the project is to bring about improvement to the organizations contributions; this report necessarily concentrates on overcoming weakness and raising standards. To avoid conducting and unfair evaluation efforts which are made to put this contribution into this context. It believes that partnership work is highly beneficial to the organization and that partnership work is the way forward to reduce crime and disorder. Advantages of the Proposed System: The scrutiny was carried out through the collection of written and oral evidence. Better communication, better leadership, better training, more defined roles Working with partners. Reducing crime and disorder.
The proposed system has control over all its cells and is perfectly coordinated. Also the cells can act individually. To take our organization to heights we need the wholehearted co-operation of the public.
FEASIBILITY STUDY
A feasibility study is a test of system proposal according to its workability, impact on the organization, ability to meet user needs and effective use of resources. Apart from these, an initial investigation is launched to study the present system, evaluate the possible application of computer based of methods. Selecting a tentative system, evaluate the cost and effectiveness of the proposed system, evaluate the impact of the proposed system, existing personal and ascertain the need of new personal. To define an improved information system, the study group must understand the information requirements of the organization. This understanding may be obtained by determining what is currently being done and of investigating through interviews and analysis what information is needed to be provided that is not being furnished by the existing system . Data on the cost of operating the current system needs to be collected in order to make a cost benefit for a new system. The objective of feasibility study is not to solve the problem, but to acquire a sense of its scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined, consequently costs and benefits are estimated with greater detail at this stage. The result of the feasibility study is a system formal proposal. This is a simply a form of documenting or detailing the nature and scope of proposed solutions. The proposal summarizes what is known and what is going to be done. Three key considerations involved in the feasibility analysis: Economic feasibility Technical feasibility Behavioral feasibility
ECONOMIC FEASIBILITY:
Economic analysis is the most frequently used method for comparing the cost In the existing system, many people are involved in the process but in the
with the benefit or income that is expected from developed system. proposed system, number of persons involved be reduced drastically. So the proposed system is economic. In the existing system, storage of all these records should be arranged and security should be provided for the records. In the proposed system, separate security arrangement is not needed since the software provides security and maintenance is simply and hardly needs one or two person to operate the system.
TECHNICAL FEASIBILITY:
The feasibility center on the existing computer system (software, hardware) and In the proposed system, data can be easily stored and managed in database The results for various queries can be generated easily.
to what extend it can support the proposed addition. management system software. Therefore, the system is technically feasible
BEHAVIORAL FEASIBILITY:
People are inherently resistant to change and computer has known to facilitate
change. An estimate should be made of how strong a reaction the user staff likely to have towards the developments of computerized system.
In the existing system more manpower is required and time factor is more but in the proposed system, manpower and time factors are reduced .So, the remaining numbers are engaged with some other important works. An SRS is basically an organization's understanding (in writing) of a customer or potential client's system requirements and dependencies at a particular point in time (usually) prior to any actual design or development work. It's a two-way insurance policy that assures that both the client and the organization understand the others requirements from that perspective at a given point in time.
Computing Model
Windows 2003 Server operations are based on a client-server computing model. This is a model in which the computing workload is shared between the server and the client. It is a co-operative relationship that divides the workload evenly between machines or processes on a single machine.
Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding each control to the Web Form programmatically, it helps to add these controls by using toolbox, saving programming efforts.
Visual Studio .Net supports custom and composite controls. Can create custom controls that encapsulate a common functionality that might need to use in a number of applications. Visual Studio .Net does a wonderful job of simplifying the creation and
consumption of Web Services. Mush of the programmer-friendly stuff (creating all the XML-based documents) happens automatically, without much effort on the programmers side. Attribute-based programming is a powerful concept that enables Visual Studio .Net to automate a lot of programmer-unfriendly tasks. .NET programming languages: The .NET Framework provides a set of tools that help to build code that works with the .NET Framework. Microsoft provides a set of languages that are already .NET compatible. BASIC is one of those languages. ASP.NET environment: Active Server Pages were released by Microsoft to enable the creation of dynamic pages based on user input and interaction with a Web site. ASP.NET improves upon the original ASP by providing code-behind. With ASP.NET and code-behind, the code and HTML can be separated. ASP.NET Web services are XML-based services that are exposed on the Internet that can be accessed by other Web services and Web service clients.
ASP.NET
ASP.NET is more than the next version of Active Server Pages (ASP); it is a unified Web development platform that provides the services necessary for developers to build enterprise-class Web applications. While ASP.NET is largely syntax compatible with ASP, it also provides a new programming model and infrastructure for more secure, scalable, and stable applications. ASP.NET is a compiled, .NET-based environment; you can author applications in any .NET compatible language, including VisualBasic.NET, BASIC, and
JScript.NET.
Additionally,
the
entire
.NET
Framework
is
available
to
any ASP.NET application. Developers can easily access the benefits of these technologies, which include the managed common language runtime environment, type safety, inheritance, and so on. ASP.NET has been designed to work seamlessly with WYSIWYG HTML editors and other programming tools, including Microsoft Visual Studio .NET. Not only does this make Web development easier, but it also provides all the benefits that these tools have to offer, including a GUI that developers can use to drop server controls onto a Web page and fully integrated debugging support. Developers can choose from the following two features when creating an ASP.NET application, Web Forms and Web services, or combine these in any way they see fit. Web Forms allows you to build powerful forms-based Web pages. When building these pages, you can use ASP.NET server controls to create common UI elements, and program them for common tasks. These controls allow you to Rapidly build a Web Form out of reusable built-in or custom components, simplifying the code of a page. An XML Web service provides the means to access server functionality remotely.
As
the
illustration
shows,
all
Web
Administrators
communicate
with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the request. If Anonymous is turned on, no authentication occurs. IIS also finds the requested resource (such as an ASP.NET application), and, if the client is authorized returns the appropriate resource. In addition to the built-in ASP.NET security features, an ASP.NET application can use the low-level security features of the .NET Framework. Features Reliable Interoperability Employ code to call native Windows APIs, use pre-built COM components, and leverage existing ActiveX controls to seamlessly integrate existing applications and components. Modern, Component-Oriented Language Take advantage of inherent support for properties, indexers, delegates, single and multidimensional arrays, advanced inheritance, attributes, versioning, and XML comments. Powerful Debugging and Testing Tools ASP .NET includes a powerful remote and multi-language debugger, enabling developers to test applications and build reliable multi-tier solutions that span process boundaries and are written in multiple programming languages. NET Framework Class Library Gain mature and powerful, built-in functionality, including a rich set of collection classes, networking support, multithreading support, string and regular expression classes, and broad support for XML, XML schemas, XML namespaces, XSLT, XPath, and SOAP.
Robust Web Development Environment Create Web-based solutions in VB using the shared Web Forms Designer and XML Designer. Developers can also use IntelliSense features and tag completion or choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web applications. Integrating with IIS IIS is the web server is used here. IIS 5.0 or above is essential for the ASP.NET for the environment. This release of ASP.NET uses IIS 5.0 as the pre Kim host environment. When considering ASP.NET authentication, you should understand the interaction with IIS authentication services. IIS always assumes that a set of credentials maps to a Windows NT account and uses them to authenticate a user. There are three different kinds of authentication available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication (NTLM or Kerberos). You can select the type of authentication to use in the IIS administrative services. If you request a URL containing an ASP.NET application, the request and authentication information are handed off to the application.. Web Service Web service is arguably the most exciting and innovate features of Microsofts. NET initiative and they are likely to profoundly affect the way business interact using computer application. List of possible Web services is as varies as the list of possible business opportunities. Web service would typically perform a core business service such as user authentication, credit card validation, pricing a derivates security, placing a purchase order for a stock or pricing a same-day shipment. A web service is a component that performs a function or service. A component is a piece of software that has a well-defined interface, hidden internals, and the capability of being discovered. By discovered means that you can determine what the component does without needing to see the code within it. A component is similar to a
method since we can call it with arguments that fit a set of parameters, and it has the capability of returning results. A web service may also return information to the caller. This service resides somewhere on the Web and can be accessed from other locations on the Web. For this service to be called, there are a number of elements that must be in place. First, the caller must know how to call the service. Second, the call must be made across the Web. Finally, the web service must know how to respond. Introduction to VB. NET Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to create a user interface than writing several lines of code. The predecessor of Visual BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid Application Development tool. This is the main reason why Visual BASIC. Net is widely used as a prototyping language. VB. Net is object oriented, whereas each object possesses some properties like size, position, color, appearance etc. This means that we can compartmentalize different aspects of our application as object and develop test those object independently of the rest of the application. By modifying certain properties and invoking the methods of these objects, we exert a great deal of control over the users interaction with the VB.net program we have written. Each object has its own event handling procedures. Visual BASIC.net is a member of Visual Studio. One of the merits of VB.Net is that it insulates the user from having to deal with lowlevel message handling. This allows as to quickly creating powerful applications without having dealing with unnecessary data. Microsoft has developed VB. NET as a complete Windows applications development system.
Back end
About MS SQL Server 2005 SQL Server 2005 exceeds dependability requirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the enterprise data management platform your organization needs to adapt quickly in a fastchanging environment. With the lowest implementation and maintenance costs in the industry, SQL Server 2000 delivers rapid return on your data management investment. SQL Server 2005 supports the rapid development of enterprise-class business applications that can give your company a critical competitive advantage. Benchmarked for scalability, speed, and performance, SQL Server 2000 is a fully enterprise-class database product, providing core support for Extensible Markup Language (XML) and Internet queries.
Easy-to-Use Business Intelligence (BI) Tools Through rich data analysis and data mining capabilities that integrate with familiar applications such as Microsoft Office, SQL Server 2005 enables you to provide all of your employees with critical, timely business information tailored to their specific information needs. Every copy of SQL Server 2005 ships with a suite of BI services.
Self-Tuning and Management Capabilities Revolutionary self-tuning and dynamic self-configuring features optimize database performance, while management tools automate standard activities. Graphical tools and wizards simplify setup, database design, and performance monitoring, allowing database administrators to focus on meeting strategic business needs.
Data Management Applications and Services Unlike its competitors, SQL Server 2005 provides a powerful and comprehensive data management platform. Every software license includes extensive management and development tools, a powerful extraction, transformation, and loading (ETL) tool, business intelligence and analysis services, and new capabilities such as Notification Services. The result is the best overall business value available.
SQL Server 2005 Enterprise Edition (64 bit) Enterprise Edition (64-bit) provides the most scalable data platform to take advantage of the class of Intel Itanium-based servers. Addressing more memory than any other edition of SQL Server, it scales to the performance levels required to support the largest Data warehousing and analysis applications, ecommerce websites and Enterprise business systems. Supporting up to 8 nodes in failover clustering, SQL Server 2005 (64-bit) provides a high level of reliability and availability for your mission-critical applications.
SQL Server 2005 Enterprise Edition Enterprise Edition includes the complete set of SQL Server data management and analysis features and is uniquely characterized by several features that make it the most scalable and available edition of SQL Server 2005. It scales to the performance levels required to support the largest Web sites, Enterprise Online Transaction Processing (OLTP) systems and Data Warehousing systems. Its support for failover clustering also makes it ideal for any mission critical line-of-business
application. Additionally, this edition includes several advanced analysis features that are not included in SQL Server 2005 Standard Edition. There are four main areas in which the additional features of SQL Server 2005 Enterprise Edition are most evident: Scalability Availability/uptime Performance Advanced analysis.
SQL Server 2005 Standard Edition Standard edition is an affordable option for small and medium-sized organizations. It includes the core functionality needed for non-mission-critical ecommerce, data warehousing, and line-of-business solutions. For instance, all of the XML features present in Enterprise Edition are also included in Standard Edition. And while a handful of advanced OLAP features are reserved for Enterprise Edition, all data mining features and the core OLAP functionality are included in SQL Server 2005 Analysis Services in Standard Edition. Similarly, components that other database vendors charge
for as separate add-on products for their highest-end editions are included in Standard Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and merge) Full-Text Search English Query Stored procedure development and debugging tools SQL Profiling and performance analysis tools.
SQL Server 2005 Replication Overview SQL Server offers three types of replication:
1. Snapshot. It copies an entire view of data to another computer. The destination database view is overwritten with the new version. Snapshot replication distributes data exactly as it appears at a specific moment in time and does not monitor for updates to the data. Snapshot replication is best used as a method for replicating data that changes infrequently or where the most up-to-date values, low latency, is not a requirement. When synchronization occurs, the entire snapshot is generated and sent to Subscribers.
2. Transactional. Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are replicated to another computer. With transactional replication, an initial snapshot of data is applied at subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers. Transactional replication is helpful when: Incremental changes need to be propagated to subscribers as they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and
Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the Publisher.
3. Merge. Updates on any computer will be replicated to another computer at a later time. Merge replication is the process of distributing data from Publisher to Subscribers, allowing both the Publisher and Subscribers to make updates while connected or disconnected, and then merging the updates between sites when connected. Merge replication allows various sites to work autonomously. At a later time, merge updates produce single, uniform result. The initial snapshot is applied to Subscribers, and then you have tracked changes to published data at the Publisher and at the Subscribers. The data is synchronized between servers continuously, at a scheduled time, or on demand. Because updates are made at more than one server, the same data may have been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur when updates are merged. Merge replication includes default and custom choices for conflict resolution that the user can define while configuring a merge publication. When a conflict occurs, a resolver is invoked by the Merge Agent and determines which data will be accepted and propagated to other sites. Merge replication is helpful when: Multiple Subscribers need to update data at various times and propagate those changes to the Publisher and to other Subscribers. Subscribers need to receive data, make changes offline, and later synchronize changes with the Publisher and other
Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is because the data is filtered into partitions and then published to different Subscribers, or due to the uses of the application. However, if conflicts do occur, violations of ACID properties are acceptable.
ARCHITECTURAL DESIGN a) Program Structure The product entitled Crime Reporting System follows bottom up program structure. Description about bottom up approach:In a bottom-up approach the individual base elements of the system are first specified in great detail. These elements are then linked together to form larger subsystems, which then in turn are linked, sometimes in many levels, until a complete top-level system is formed. This strategy often resembles a "seed" model, whereby the beginnings are small, but eventually grow in complexity and completeness. However, "organic strategies", may result in a tangle of elements and subsystems, developed in isolation, and subject to local optimization as opposed to meeting a global purpose. PROCEDURAL DESIGN Procedural design occurs after data, architectural, and interface designs must be translated in to operational software. The procedural design for each component, represented in graphical, tabular or text based notation, is the primary work product produced during component level design. Begin If ((User name is valid)) and corresponding password is correct) then The user is an authorized person & can access the system Else Display invalid user End If End
INTERFACE DESIGN External machine interface:- We need a high quality modem to connect to the internet. NIC i.e. network interface card is also required to access the internet.TCP/IP and http are the protocols used. If we want some hard copy of any receipts, we need a printer for that. External system interface:- Since Crime Reporting System requires a database and is working as online, the client machines requires proper connection with the server machine. Human interface:- In project work entitled Crime Reporting System the user will interacts with product through Graphical User Interface (GUI) which will be developed in front pages. Since GUIs are the interface, workings with GUIs are very simple and not at all complicated. So any user who had no knowledge about softwares and computers can use this Crime Reporting System very simply. The input and output forms of Crime Reporting System are provided in Appendix C.
CONCLUSION
CONCLUSION
The Software developed is found to be working efficiently and effectively. It results in regular and timely action against crime reported. It can be observed that the information can be obtained easily and accurately. The Software is made user friendly to the maximum so that any lay man can run the software provided he could access to the system via the login password. It believes that partnership work is highly beneficial to the organization and that partnership work is the way forward to reduce crime and disorder Hence, we wish to remind that its culture should fully endorse partnership work; we urge to ensure the attention they require.
request
crimereport
response
details
admin
request
details
registration
login
username
password
login
details
station processe s
request
station
complaints
details details
crimedescription assignstation
citizen
request
details
registration
login
username
password
login
complaints
details
crimedescription
station
request
details
registration
login
username
password
login
details
crime processe s
request
witness
close crime
details crimedescription
advocate crimeclose
admin
request
station approval
details
station
response
view complaints
complaints
crimedescription
details
assign station
crimeid
assignstation
citizen
request
send complaints
details
crimedescription
details
response crimeid
crime status
crimeclose
station
request
view complaints
details
crimedescription
criid response
criminaldetails advocate
avocation processes
details
close crime
crimeid
crimedescription assignstation