Fyp Thesis
Fyp Thesis
Supervisor
Engr. Tasawer Khan
Lecturer, SED
July, 2017
Abstract
Crime rate in different regions of Pakistan varies a lot now and then but there is
no such application or system in our country which can record or maintain that
crime data to make it useful in future for citizens belonging to different fields and
having priorities. The main purpose of this application is to provide a universal
platform for all sorts of persons to have a bird eye on conditions around them,
crime rate in their areas of interest and dynamic changes in the rate of crime.
The project will also be helpful for the security bodies of country to monitor the
crime activities and take actions in red alert areas
i
.
Undertaking
We certify that research work titled “Crime Reporting” is our own work. The work
has not, in whole or in part, been presented elsewhere for assessment. Where
material has been used from other sources it has been properly acknowledged/
referred.
Zaineb Jamil(13-SE-40)
ii
Acknowledgment
We express our gratitude to everyone who supported us throughout the course
of this Final Year Project. We are thankful and sincerely grateful for their aspiring
guidance and sharing their illuminating views on issues occurred in our project,
We express our warms thanks to our supervisor Engr. Tasawer Khan for his
continuous support and guidance.
We would also like to thank our Android Lecturer Engr. Kanwal Yousaf from the
UET Taxila for teaching us Android Programming which provided the basis for
our Final Year Project.
iii
Table of Contents
Chapter 1: Introduction ..................................................................................... 1
iv
Utilization (End users/Beneficiaries) .................................................. 16
v
List of figures
Figure 1: shows diverse types of users for this project. .................................... 8
Figure 2: Hierarchy of malicious user. .............................................................. 9
Figure 3: Project Architecture. .......................................................................... 9
Figure 4: Work Flow Diagram. ........................................................................ 10
Figure 5: Class Diagram................................................................................. 11
Figure 6: Use Case Diagram. ......................................................................... 12
Figure 7: Project Time Line. ........................................................................... 13
Figure 8: App Logo. ........................................................................................ 22
Figure 9: Sign Up Screen. .............................................................................. 23
Figure 10: Sign In Screen............................................................................... 23
Figure 11: Validation check. ........................................................................... 24
Figure 12: Sign in Loading Dialog. ................................................................. 24
Figure 13: Confirm Phone Number................................................................. 25
Figure 14: Verify Phone Number. ................................................................... 25
Figure 15: Confirmation Mail. ......................................................................... 26
Figure 16: Email Verified. ............................................................................... 26
Figure 17: Report Crime. ................................................................................ 27
Figure 18: Choose location to report crime. ................................................... 27
Figure 19: Choose Crime Main Categories. ................................................... 28
Figure 20: Choose Crime sub-categories. ...................................................... 28
Figure 21: Provide Detail Description of incident. ........................................... 29
Figure 22: Report Submission. ....................................................................... 29
Figure 23: Clustered Crime Map. ................................................................... 30
Figure 24: Colored Crime Map. ...................................................................... 30
Figure 25: Intensive crime Map. ..................................................................... 31
Figure 26: Crime statistics. ............................................................................. 31
Figure 27: Azure Database. ........................................................................... 32
Figure 28: Graphical Demonstration of Download Trend as per year............. 33
vi
List of tables
Table 1: Market Survey of Similar Apps. .......................................................... 5
Table 2: Detailed Work Plan including Work Packages.................................. 20
vii
Chapter 1: Introduction
This Project aims to create awareness in people about crimes being committed
around them, so that they can stay safe. It’s a community powered project.
Users will report different sorts of crimes occurring in their vicinity. This
information will be then mapped to give the idea about safety of a location. This
mapping will help the users to adopt measures accordingly.
1
1.3 Deliverables
1.3.1 Project Report
• Development Process
• Crime statistics
• Policies for reporting
• Impact and challenges
2
Chapter 2: Literature Review
In UK, US [4] and other developed world countries, there is a trend of reporting
crimes digitally to concerned authorities and then track its status online.
Gathered crime data is useful in many ways. Analysis is performed on data to
catch a criminal by identifying his pattern of committing crime, to predict safety
of an area and location of next crime hotspot [5]. According to a research
conducted for Philippines’ National police [6], community based crime
prevention also helps in improving performance of police department.
In South Asia, some apps were developed during past few years including FIR,
Citizen Cop, Mobile Citizen, Crime Reports, and Rescue 15 Lahore [7]. In all the
above applications, there are certain major flaws due to which none of the above
is fully successful in creating an impact on the community and is so not adopted
by citizens.
“Crime Reports” Application doesn’t have enough data in its database, data is
not updated with time and bears certain technical issues. “Citizen Cop” doesn’t
have any dashboard or platform for user to view previous record of his reports
and its idea is stick to COP and not common people. “Rescue 15 Lahore” is a
simple Police application for reporting police and dealing with police work. It
doesn’t involve community. In Our Crime Reporting Application, all the flaws will
3
be nullified depending upon what user finds attractive or interesting and what
makes user feel more concerned and useful.
Mimicries [8], a Brazilian website which maps crimes collaboratively, allow users
to report crimes socially and provides access to community to this info through
maps and different graphical demos.
The Geographic Analysis Machine helps in crime analysis. It finds out cluster of
data without need of detailed location info of crimes. Geographical Explanation
Machine then elaborates results of clusters formed by Geographic Analysis
Machine [9].
Data for crime analysis apps is crucial. So, more and more data is collected from
various sources e.g. community reporting, authority’s databases, online
newspapers [10] etc. Authorities databases lack of common day-to-day crimes
because in most cases, peoples don’t bother to report to police [11]. Especially
keeping in view, the typical case handling context of concerned authorities of
Pakistan, people find reporting useless and just wastage of time. That’s when
community power’s come into play. People finds themselves more useful and
feel good when they become involved in social crime reporting. Similarly, online
newspapers are also a source in collecting crime data by applying different text
mining techniques [10]
4
Table 1: Market Survey of Similar Apps.
5
Chapter 3: Methodology
Application’s key features which we are offering are reporting crime, viewing
any area/location and its safety level, searching for a safe route to any certain
place. First a user must register himself as an authenticated user. Once a user
is registered now he can report any crimes that are occurred around him.
Authentication of reported crimes is another challenge. Authentication of any
reported crimes is checked and verified by moderators who monitor the reports
from monitoring website. They analyze the reported crime based upon its
6
content and other factors. Other factors may include authenticity and status of
user who have reported the crime. If a user has reported enough numbers of
right crimes his reports will be accepted and marked true reports. If someone
reports any single spam or fake crime his crime reporting feature of the
application will be blocked for any specific time interval. As it is a social
application, for the people and by the people so it is managed and used by
people. Social citizens will be using the app and some specific citizens will be
moderating it soon. If user reports 50 correct crimes, he can be upgraded to
moderator level. Now he can analyze and moderate crimes reported by other
persons. A user can always see his current location on the home screen of his
application. He can also search any location. Safety level of the location and its
near-by areas which are visible on the map will be marked by markers. User
can also find a safe path/route for any desired home location to destination
location.
7
• A user who haven’t yet logged in
Un-Registered
User
• A user who as reported no less than 50 crimes and is not banned even
once can be applied to moderator level as desired by user and will now
monitors other crimes reported by users along with reporting crimes by
Moderator himself.
• Admin will be an upgraded moderator who will keep a check on all the
moderators.
Admin
8
Un-Registered
• A user who haven’t yet logged in
User
• A user if once being banned still reports any bogus crime after
Blocked User his banned time than he is blocked permanently.
9
Entity framework. Data is retrieved and accessed using JSON Parsing
Library “Volley”.
10
3.1.4 Class Diagram
Figure shows the Class diagram of our system. All the major classes are
shown in the figure with their attributes and operations.
11
3.1.5 Use Case Diagram
Figure shows the Use Case diagram of our system. All the major users and
their functions are shown in the figure.
12
3.2 Project Time-Line
Starting from: Mon 10/17/16 and ending on: Tue 4/25/17
13
3.3 Experimental/ Simulation Setup
Both application and website were tested using a sample data set of crimes for
mapping purposes. All this sample data was collected from valid and authentic
data sources like news channels, newspapers and news reporters. Up to 200
crimes were reported and saved in backend database. These crimes can be
viewed as multi specific colored markers on google maps. It was also displayed
in the form of heat maps and clustered maps. Clustered maps are maps that
display combined markers of more than a specific number of crimes collectively.
This reduces the number of markers at a single place thus keeping the map
neat. Android smart phone with API 22 will be used for simulation. Firebase is
used for reporting and user login purposes.
14
• Usable for person having intermediate experience of android
phone
• Proper error information to user and its handling
• Core three modules ready on time
• Authenticity of crimes reported
• A properly build and functional database with appropriate amount
of data
15
Chapter 4: Work Plan
• Crime reporting will help to record street crimes that usually are
not reported.
• Checking safety level of an area will give an idea about how much
secure a place is.
• Crime mapping and demos will help to get a quicker over view of
security.
• Common people want to be updated about what’s happening
around.
• Tourist from outside/ inside the country.
• Insurance companies.
• Person looking for a secure plot location for their house.
• Person looking for a secure parking location.
• Person looking for a secure shopping plaza etc.
• Security and surveillance bodies of country and who so ever
concerned with security issues.
Application’s Reporting module can be launched at any time in the time of crises
to see intensity of an activity in an area. i.e. Kidnappings, flood, earthquake,
blast, security operation etc.
16
Detailed Work Plan
Work Packages
• Work Package 1: Complete Documentation
Scope of project is provided with important level description of proposed
project. Main Aims and objectives are described. Detailed background
Study with market value and literature survey is conducted. Time line is
also designed in this work package.
17
happening there. Test cases for testing crime mapping module is
developed. It is tested whether a person can see crimes happening
around him or not. Use cases for searching crime maps of a location will
also be developed.
18
• Work package 9: Testing
All the major features of the android application and Monitoring website
is thoroughly tested and any corrections/changes is applied accordingly.
We can add so more trifle features in this phase to gain users and
audience attraction. Thus, a completely working Application and a
monitoring website is ready to use. Website will provide fully confidential
platform for moderators to analyze reported crimes and maintain integrity
of the crimes data being saved. We can add so more trifle features in this
phase to gain users and audience attraction.
19
Table 2: Detailed Work Plan including Work Packages.
20
3.4. Build Module Crime Mapping
3.5. Execute test cases and debug Module,
3.6. Update Documentation Updated Document,
3.7. Mapping Module Ready
Budget Requirements
We need the following for this project:
21
Chapter 5: Results and Discussions
22
5.2.2 User Login and Authentication
User can sign up using social accounts e.g. Facebook and google as well
as using app local account. Sign up view is shown in figure:9. Sign in form
is shown in figure:10 having fields of email, password and confirm password.
Forgot password link helps when user has already been registered to system
but can’t remember his/her password anymore. It is used to reset password
by prompting user for a new password twice.
23
Validation checks are added in sign up and sign in fields. If user leaves a
field blank, it gives an error message to enter the required information field,
as shown in figure:11. There is also a check for password minimum length.
After entering credential, when user press the signup/ sign in button. After
verifying credentials from database, user is asked to enter and verify phone
After entering phone number, user presses verify button and a confirmation
message is sent to that number.
24
Figure 13: Confirm Phone Number. Figure 14: Verify Phone Number.
After receiving text, user enters confirmation code. If code matches to that
one sent to user, user is asked to verify email address previously provided.
25
Figure 15: Confirmation Mail. Figure 16: Email Verified.
26
Report Crime:
User reports an incident using a form as shown in Figure:17. First user
chooses a place where user wants to report incident.
Figure 17: Report Crime. Figure 18: Choose location to report crime.
User chooses incident type by main category and then by choosing sub
category respectively.
27
Main category includes financial crimes, incident, financial crimes, traffic
incident and other.
Figure 19: Choose Crime Main Categories. Figure 20: Choose Crime sub-categories.
security situation.
28
User provides some description related to incident happened. After providing
description, user submits report by clicking on submit button. If everything
goes smoothly, user is informed about successful submission of report.
Figure 21: Provide Detail Description of incident. Figure 22: Report Submission.
29
5.2.3 Crime Maps and statistics:
Diverse types of crimes are shown on map to get a bird eye view. Figure:23
shows a clustered crime map. While Figure:24 shows all crimes separately,
each marker representing a different type of crime depending on its color.
Figure 23: Clustered Crime Map. Figure 24: Colored Crime Map.
30
Figure:26 shows a collective crime ratio donut graph. Different color shows
a different crime type.
31
5.2.4 Azure Database
32
• An Android Play Store account for Application hosting.
5000 5000
4000 4000
3000 3000
2000 2000
1000 1000
0 0
1st 2 3 5
YEAR
33
Chapter 6: Conclusion
This project will be helpful in visualizing security and crime incidents in an area.
Currently, in Pakistan there is no such application working and being used.
Current apps are supposed to collect crime data from users. Many useful
information can be extracted from databases of such applications that can help
a lot of citizens around us including insurance companies, foreign tourists as
well as local community in changing their mind set about safety of any area
around their vicinity or anywhere they go. Such applications if deployed in any
country can lead to immense awareness and a positive reaction of citizens and
native people towards incidents or crimes and safety concerns of the country. It
changes their approach of how they are dealing with such scenarios and
ultimately leading to a more safe and aware community. Working for a
community, will ultimately pay back in a positive manner.
34
References
[1] N. Vatanasuk, A. Chomputawat, S. Chomputawat, and W.
Chattriya, "Mobile Crime Incident Reporting System using UX
dimensions guideline," in 2015 Asian Conference on Defence
Technology (ACDT), 2015, pp. 187-192.
[2] M. Saravanan, R. Thayyil, and S. Narayanan, "Enabling Real
Time Crime Intelligence Using Mobile GIS and Prediction Methods," in
2013 European Intelligence and Security Informatics Conference, 2013,
pp. 125-128.
[3] S. M. Raza and L. Rajamanickam, "A Proposed Solution for Crime
Reporting and Crime Updates on Maps in Android Mobile Application,"
International Journal of Computer Applications, vol. 124, 2015.
[4] D. Weisburd, S. D. Mastrofski, A. M. McNally, R. Greenspan, and
J. J. Willis, "REFORMING TO PRESERVE: COMPSTAT AND
STRATEGIC PROBLEM SOLVING IN AMERICAN POLICING*,"
Criminology & Public Policy, vol. 2, pp. 421-456, 2003.
[5] Z. Wang, J. Wu, and B. Yu, "Analyzing spatio-temporal distribution
of crime hotspots and their related factors in Shanghai, China," in 2011
19th International Conference on Geoinformatics, 2011, pp. 1-6.
[6] B. G. T. Ledesma, C. R. G. Lim, J. L. J. Miranda, and M. S.
Tangkeko, "CRIME INTELLIGENCE SYSTEM," 2013.
[7] "Google Play srore", Play.google.com, 2016. [Online]. Available:
https://play.google.com/store. [Accessed: 15- Dec- 2016].
[8] "WikiCrimes", Wikicrimes.org, 2016. [Online]. Available:
http://www.wikicrimes.org/. [Accessed: 15- Dec- 2016].
[9] M. Ahmadi, A. Sharifi, and M. Valadan, "Crime mapping and
spatial analysis," International institute for geo-information science and
earth observation, Enschede, Neatherlands, 2003.
35
[10] D. V. Rohini and P. Isakki, "Crime analysis and mapping through
online newspapers: A survey," in 2016 International Conference on
Computing Technologies and Intelligent Data Engineering (ICCTIDE'16),
2016, pp. 1-4.
[11] H. Goudriaan, Reporting crime: Effects of social context on the
decision of victims to notify the police: Heike Goudriaan, 2006.
36