0% found this document useful (0 votes)
59 views44 pages

Fyp Thesis

This document describes a proposed mobile application and website called "Crime Reporting" that aims to increase citizen awareness of crime in their areas and enable users to report crimes. The application and website would provide a platform for users to view crime data and statistics over time. Reported crimes would be added to a database to track crime rates. This could help security agencies monitor crime patterns. The project aims to make crime data more useful and accessible to citizens, and allow users and authorities to take appropriate safety measures based on reported crimes.

Uploaded by

Faaiza Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views44 pages

Fyp Thesis

This document describes a proposed mobile application and website called "Crime Reporting" that aims to increase citizen awareness of crime in their areas and enable users to report crimes. The application and website would provide a platform for users to view crime data and statistics over time. Reported crimes would be added to a database to track crime rates. This could help security agencies monitor crime patterns. The project aims to make crime data more useful and accessible to citizens, and allow users and authorities to take appropriate safety measures based on reported crimes.

Uploaded by

Faaiza Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Crime Reporting

Faaiza Bibi 13-SE-24


Zaineb Jamil 13-SE-40

Supervisor
Engr. Tasawer Khan
Lecturer, SED

DEPARTMENT OF SOFTWARE ENGINEERING


FACULTY OF TELECOMMUNICATION AND INFORMATION
ENGINEERING
UNIVERSITY OF ENGINEERING AND TECHNOLOGY
TAXILA

July, 2017
Abstract
Crime rate in different regions of Pakistan varies a lot now and then but there is
no such application or system in our country which can record or maintain that
crime data to make it useful in future for citizens belonging to different fields and
having priorities. The main purpose of this application is to provide a universal
platform for all sorts of persons to have a bird eye on conditions around them,
crime rate in their areas of interest and dynamic changes in the rate of crime.

Project aims to increase awareness among citizens about crimes happening


around them and enables them to take precautionary measures to stay safe.
Users reports all sorts of crimes occurring in a vicinity. Users will get the idea
about intensity of crimes occurring somewhere and can adopt measures
accordingly.

The project will also be helpful for the security bodies of country to monitor the
crime activities and take actions in red alert areas

i
.

Undertaking
We certify that research work titled “Crime Reporting” is our own work. The work
has not, in whole or in part, been presented elsewhere for assessment. Where
material has been used from other sources it has been properly acknowledged/
referred.

Faaiza Bibi (13-SE-24)

Zaineb Jamil(13-SE-40)

ii
Acknowledgment
We express our gratitude to everyone who supported us throughout the course
of this Final Year Project. We are thankful and sincerely grateful for their aspiring
guidance and sharing their illuminating views on issues occurred in our project,

We express our warms thanks to our supervisor Engr. Tasawer Khan for his
continuous support and guidance.

We place on record, our sincere thanks to Dr. Tabassam Nawaz, Chairman of


the Software Engineering department, for providing us all the necessary
facilities for the project.

We would also like to thank our Android Lecturer Engr. Kanwal Yousaf from the
UET Taxila for teaching us Android Programming which provided the basis for
our Final Year Project.

iii
Table of Contents
Chapter 1: Introduction ..................................................................................... 1

1.1 Project Goals....................................................................................... 1

1.2 Aims & Objectives ............................................................................... 1

1.3 Deliverables ........................................................................................ 2

1.3.1 Project Report............................................................................... 2

1.3.2 Android Application ....................................................................... 2

1.3.3 Monitoring Website ....................................................................... 2

Chapter 2: Literature Review ............................................................................ 3

2.1 Literature Survey ................................................................................. 3

2.2 Market Survey ..................................................................................... 4

Chapter 3: Methodology ................................................................................... 6

3.1 Detailed Methodology ......................................................................... 6

3.1.1 Users Hierarchy ............................................................................ 7

3.1.2 Project Architecture: ..................................................................... 9

3.1.3 Work Flow Diagram .................................................................... 10

3.1.4 Class Diagram ............................................................................ 11

3.1.5 Use Case Diagram ..................................................................... 12

3.2 Project Time-Line .............................................................................. 13

3.3 Experimental/ Simulation Setup ........................................................ 14

3.4 Details of Work packages completed/milestones achieved ............... 14

3.5 Evaluation parameters ...................................................................... 14

Chapter 4: Work Plan ..................................................................................... 16

iv
Utilization (End users/Beneficiaries) .................................................. 16

Detailed Work Plan ........................................................................... 17

Work Packages .......................................................................... 17

Budget Requirements ....................................................................... 21

Chapter 5: Results and Discussions............................................................... 22

1.4 Simulation results .............................................................................. 22

1.5 Product Demo / Screen Shot............................................................. 22

1.5.1 App Logo: ................................................................................... 22

1.5.2 User Login and Authentication.................................................... 23

1.5.3 Report Crime: ............................................................................. 27

1.5.4 Crime Maps and statistics:.......................................................... 30

1.5.5 Azure Database .......................................................................... 32

1.6 Results and Discussion ..................................................................... 32

1.7 Budget Used /Unit Cost ..................................................................... 32

1.8 Market forecasting ............................................................................. 33

Chapter 6: Conclusion .................................................................................... 34

v
List of figures
Figure 1: shows diverse types of users for this project. .................................... 8
Figure 2: Hierarchy of malicious user. .............................................................. 9
Figure 3: Project Architecture. .......................................................................... 9
Figure 4: Work Flow Diagram. ........................................................................ 10
Figure 5: Class Diagram................................................................................. 11
Figure 6: Use Case Diagram. ......................................................................... 12
Figure 7: Project Time Line. ........................................................................... 13
Figure 8: App Logo. ........................................................................................ 22
Figure 9: Sign Up Screen. .............................................................................. 23
Figure 10: Sign In Screen............................................................................... 23
Figure 11: Validation check. ........................................................................... 24
Figure 12: Sign in Loading Dialog. ................................................................. 24
Figure 13: Confirm Phone Number................................................................. 25
Figure 14: Verify Phone Number. ................................................................... 25
Figure 15: Confirmation Mail. ......................................................................... 26
Figure 16: Email Verified. ............................................................................... 26
Figure 17: Report Crime. ................................................................................ 27
Figure 18: Choose location to report crime. ................................................... 27
Figure 19: Choose Crime Main Categories. ................................................... 28
Figure 20: Choose Crime sub-categories. ...................................................... 28
Figure 21: Provide Detail Description of incident. ........................................... 29
Figure 22: Report Submission. ....................................................................... 29
Figure 23: Clustered Crime Map. ................................................................... 30
Figure 24: Colored Crime Map. ...................................................................... 30
Figure 25: Intensive crime Map. ..................................................................... 31
Figure 26: Crime statistics. ............................................................................. 31
Figure 27: Azure Database. ........................................................................... 32
Figure 28: Graphical Demonstration of Download Trend as per year............. 33

vi
List of tables
Table 1: Market Survey of Similar Apps. .......................................................... 5
Table 2: Detailed Work Plan including Work Packages.................................. 20

vii
Chapter 1: Introduction

1.1 Project Goals


Crime rate in different regions of Pakistan varies a lot now and then but there is
no such application or system in our country which can record or maintain that
crime data to make it useful in future for citizens belonging to different fields and
having priorities. The main purpose of this application is to provide a universal
platform for all sorts of persons to have a bird eye on conditions around them,
crime rate in their areas of interest and dynamic changes in the rate of crime.

This Project aims to create awareness in people about crimes being committed
around them, so that they can stay safe. It’s a community powered project.
Users will report different sorts of crimes occurring in their vicinity. This
information will be then mapped to give the idea about safety of a location. This
mapping will help the users to adopt measures accordingly.

1.2 Aims & Objectives


By using the app, Users can:

• Report a crime (Robbery, pickpocketing, suspicious activity etc.)


• View crimes on a map to get an idea of what’s happening around.
• Take secure path/route for travelling.
• Choose a secure Path to a certain location, Parking lot, Shopping
area, Residency location etc.
• Share mishap on social media.
Monitoring Website help the admins to approve/ reject a crime report submitted
by user. It also provides graphical statistics and demoes utilizing crime reporting
database. This project works its level best to make the people aware of their
security risks and issues.

1
1.3 Deliverables
1.3.1 Project Report
• Development Process
• Crime statistics
• Policies for reporting
• Impact and challenges

1.3.2 Android Application


• Crime Reporting Module
• Crime Mapping module
• Choose secure location module
• Choose secure travelling route module
• Sharing on social media module

1.3.3 Monitoring Website


• Admin dashboard
• Graphical demos

2
Chapter 2: Literature Review

2.1 Literature Survey


With the advancement of technology, mobile phones have become very
common. There is also a need for people being aware of incidents happening
around them. So, due to high availability and usage, mobile phones are helpful
source for collecting figures and data about crimes [1] and then sharing this data
with community [2, 3].

In UK, US [4] and other developed world countries, there is a trend of reporting
crimes digitally to concerned authorities and then track its status online.
Gathered crime data is useful in many ways. Analysis is performed on data to
catch a criminal by identifying his pattern of committing crime, to predict safety
of an area and location of next crime hotspot [5]. According to a research
conducted for Philippines’ National police [6], community based crime
prevention also helps in improving performance of police department.

In South Asia, some apps were developed during past few years including FIR,
Citizen Cop, Mobile Citizen, Crime Reports, and Rescue 15 Lahore [7]. In all the
above applications, there are certain major flaws due to which none of the above
is fully successful in creating an impact on the community and is so not adopted
by citizens.

“Crime Reports” Application doesn’t have enough data in its database, data is
not updated with time and bears certain technical issues. “Citizen Cop” doesn’t
have any dashboard or platform for user to view previous record of his reports
and its idea is stick to COP and not common people. “Rescue 15 Lahore” is a
simple Police application for reporting police and dealing with police work. It
doesn’t involve community. In Our Crime Reporting Application, all the flaws will

3
be nullified depending upon what user finds attractive or interesting and what
makes user feel more concerned and useful.

Mimicries [8], a Brazilian website which maps crimes collaboratively, allow users
to report crimes socially and provides access to community to this info through
maps and different graphical demos.

The Geographic Analysis Machine helps in crime analysis. It finds out cluster of
data without need of detailed location info of crimes. Geographical Explanation
Machine then elaborates results of clusters formed by Geographic Analysis
Machine [9].

Data for crime analysis apps is crucial. So, more and more data is collected from
various sources e.g. community reporting, authority’s databases, online
newspapers [10] etc. Authorities databases lack of common day-to-day crimes
because in most cases, peoples don’t bother to report to police [11]. Especially
keeping in view, the typical case handling context of concerned authorities of
Pakistan, people find reporting useless and just wastage of time. That’s when
community power’s come into play. People finds themselves more useful and
feel good when they become involved in social crime reporting. Similarly, online
newspapers are also a source in collecting crime data by applying different text
mining techniques [10]

Our project is a bit different than typical crime reporting applications in


perspective of reporting to authorities. As it’s community oriented project. Basic
purpose of reporting is to gather data and figures of crimes for the sake of public
awareness only, not to track a crime or manage its official record.

2.2 Market Survey


Table 1 shows market value in terms of downloads and rating of few android
apps on Play store like crime reporting [7]

4
Table 1: Market Survey of Similar Apps.

# App Name Downloads Rating V Last Updated


1 Citizen Cop 100K – 500K 4.3 4.1.4 Dec 8, 2016
2 Crime Bot 5K -- 10K 4.3 1.25 Apr 2, 2015
3 Punjab Crime Mapping 5K – 10K 4.2 3.6 Nov 16, 2016
4 Greater Manchester Police 5K – 10K 3.8 2.0.3 Apr 15, 2016
5 Lahore Police 15 5K – 10K 4.4 0.4 May 12, 2015
6 Multan Police 1K – 5K 4.6 1.1 Jun 29, 2016
7 Spot Crime+ Crime Map 1K – 5K 4.2 1.0.7 Dec 7, 2016
8 Crime Reports by Motorola 1K – 5K 3.7 0.3.0 Oct 8, 2016

5
Chapter 3: Methodology

3.1 Detailed Methodology


Our project comprises of an android application and a monitoring website. We
made an Android Application that support all the android versions above
Honeycomb (3.0 - API Level 11 and above). In this application, Google Maps
API, accesses locations and perform any operation on those accessed
locations. Recorded and reported data is saved in database. We have used
cloud database (Firebase for android) for security and safety purposes as this
is our priority. One of the biggest challenge for this application to be successful
is ‘authentic data’. At first data, was mainly collected from popular news
resources like famous news channels and newspapers. We have saved crimes
firstly in categories like incidents, Financial Crimes, Traffic Incidents,
Surveillance activities and Terrorist attempt followed by sub categories of each
main category. Incidents category include murder, child abuse, women abuse,
transgender harassment, kidnapping and suspicious activity. Financial crimes
category includes robbery, purse snatching, phone snatching, theft, fraud,
smuggling etc. Traffic incidents include road blocks and accidents. Surveillance
activities comprises of martyrs, arrests and raids. Terrorist Attempts include
bomb blasts and massacre etc. Then this actual data was utilized for measures
to declare a place, route or area safe or unsafe for users to stay aware.

Application’s key features which we are offering are reporting crime, viewing
any area/location and its safety level, searching for a safe route to any certain
place. First a user must register himself as an authenticated user. Once a user
is registered now he can report any crimes that are occurred around him.
Authentication of reported crimes is another challenge. Authentication of any
reported crimes is checked and verified by moderators who monitor the reports
from monitoring website. They analyze the reported crime based upon its

6
content and other factors. Other factors may include authenticity and status of
user who have reported the crime. If a user has reported enough numbers of
right crimes his reports will be accepted and marked true reports. If someone
reports any single spam or fake crime his crime reporting feature of the
application will be blocked for any specific time interval. As it is a social
application, for the people and by the people so it is managed and used by
people. Social citizens will be using the app and some specific citizens will be
moderating it soon. If user reports 50 correct crimes, he can be upgraded to
moderator level. Now he can analyze and moderate crimes reported by other
persons. A user can always see his current location on the home screen of his
application. He can also search any location. Safety level of the location and its
near-by areas which are visible on the map will be marked by markers. User
can also find a safe path/route for any desired home location to destination
location.

Averaging techniques or algorithms are generated by using crimes reported


by different users to declare a place safe or unsafe and safety level of any area
is dynamic and will change depending upon the rate of crimes reported. Same
goes for same routes, shopping areas, parking lots etc. More the number of
specific crimes in certain areas lesser the safety level of that area. User can also
view a detailed crime report of any area using the application. Number and types
of a crimes that have occurred and reported by people.

3.1.1 Users Hierarchy

7
• A user who haven’t yet logged in
Un-Registered
User

• A logged in user and login confirmed by an email id or phone number. But


haven’t yet reported any crime.
Registered User

• A user who have reported at least 3 authentic crimes and no fake


crime/incident
Trusted User

• A user who have reported at least 15 authentic crimes. He is trusted user


Authentic and can know report crimes or incidents other than his current location.
Reporter

• A user who as reported no less than 50 crimes and is not banned even
once can be applied to moderator level as desired by user and will now
monitors other crimes reported by users along with reporting crimes by
Moderator himself.

• Admin will be an upgraded moderator who will keep a check on all the
moderators.
Admin

Figure 1: shows diverse types of users for this project.

8
Un-Registered
• A user who haven’t yet logged in
User

• A logged in user and login confirmed by an email id or phone


Registered User number. But haven’t yet reported any crime

• A user who have reported 1 bogus or unauthenticated crime.


Banned User he can no longer report a crime for specific period.

• A user if once being banned still reports any bogus crime after
Blocked User his banned time than he is blocked permanently.

Figure 2: Hierarchy of malicious user.

3.1.2 Project Architecture:


Figure 3 the architecture of our project depicting different modules of our
project. Front end is an android application providing different functionality
to the user. It is connected to azure’s SQL Database built using .NET MVC

Figure 3: Project Architecture.

9
Entity framework. Data is retrieved and accessed using JSON Parsing
Library “Volley”.

3.1.3 Work Flow Diagram


Figure 4 shows the work flow of our application running through different
screens starting from login till logout.

Figure 4: Work Flow Diagram.

10
3.1.4 Class Diagram
Figure shows the Class diagram of our system. All the major classes are
shown in the figure with their attributes and operations.

Figure 5: Class Diagram.

11
3.1.5 Use Case Diagram
Figure shows the Use Case diagram of our system. All the major users and
their functions are shown in the figure.

Figure 6: Use Case Diagram.

12
3.2 Project Time-Line
Starting from: Mon 10/17/16 and ending on: Tue 4/25/17

Figure 7: Project Time Line.

13
3.3 Experimental/ Simulation Setup
Both application and website were tested using a sample data set of crimes for
mapping purposes. All this sample data was collected from valid and authentic
data sources like news channels, newspapers and news reporters. Up to 200
crimes were reported and saved in backend database. These crimes can be
viewed as multi specific colored markers on google maps. It was also displayed
in the form of heat maps and clustered maps. Clustered maps are maps that
display combined markers of more than a specific number of crimes collectively.
This reduces the number of markers at a single place thus keeping the map
neat. Android smart phone with API 22 will be used for simulation. Firebase is
used for reporting and user login purposes.

3.4 Details of Work packages completed/milestones


achieved
• Initial Proposal
• Detailed Proposal
• App Reporting Module Use Case writing
• Website Reporting Module Test Case writing
• Database Building and Setup
• Mapping Module Use Case writings
• Crime Mapping Module Development
• Crime Analysis Module Use Case Writing
• Crime Analysis Module Development
• Final Year Project Report Writing

For details of these work packages, see section 4.2.1.

3.5 Evaluation parameters


• Intensity level of crimes of a type in an area

14
• Usable for person having intermediate experience of android
phone
• Proper error information to user and its handling
• Core three modules ready on time
• Authenticity of crimes reported
• A properly build and functional database with appropriate amount
of data

15
Chapter 4: Work Plan

Utilization (End users/Beneficiaries)


This app is an easy to use app for:

• Crime reporting will help to record street crimes that usually are
not reported.
• Checking safety level of an area will give an idea about how much
secure a place is.
• Crime mapping and demos will help to get a quicker over view of
security.
• Common people want to be updated about what’s happening
around.
• Tourist from outside/ inside the country.
• Insurance companies.
• Person looking for a secure plot location for their house.
• Person looking for a secure parking location.
• Person looking for a secure shopping plaza etc.
• Security and surveillance bodies of country and who so ever
concerned with security issues.

Application’s Reporting module can be launched at any time in the time of crises
to see intensity of an activity in an area. i.e. Kidnappings, flood, earthquake,
blast, security operation etc.

Application’s Reporting module or Data can be sold to different companies


according to their interests for any purpose.

16
Detailed Work Plan
Work Packages
• Work Package 1: Complete Documentation
Scope of project is provided with important level description of proposed
project. Main Aims and objectives are described. Detailed background
Study with market value and literature survey is conducted. Time line is
also designed in this work package.

• Work package 2: Reporting Module Use Case Writing


Behavior of user interaction with app is predicted and use cases are
developed accordingly. These cases are used later to develop and test
Crime Reporting module of app. Behavior of user interaction with website
is predicted and use cases is developed accordingly. These cases are
used later to develop and test Crime Reporting module of website.

• Work package 3: Crime Reporting Module


Development
In this work package, reporting interface for user is implemented. It is
designed so as a person with basic android phone knowledge can easily
interact with it. Crime reported data is saved into database. Module built
in will then be tested thoroughly to avoid any problems in future. It is
tested whether crimes are successfully reported into database or not.

• Work package 4: Database Building and Setup


In this work package, a complete database for android application and
website is maintained. By using which user can query any information
and on the administrator side, an admin can manage and access whole
data.

• Work package 5: Mapping Module Use Case writing


Use cases for mapping scenario is written. User can either view crimes
happening around him or can search for a location to see crimes

17
happening there. Test cases for testing crime mapping module is
developed. It is tested whether a person can see crimes happening
around him or not. Use cases for searching crime maps of a location will
also be developed.

• Work package 6: Crime Mapping Module Development


In this work package crimes reported and saved in database is mapped
using google map API and is view to the user if he searches for any
location. It will also help user to locate any safe routes and places on
map. In this package crime mapping module, is thoroughly tested and
checked to see if it works accurately and properly. It will check that all the
crimes are mapped correctly on their locations and their density changes
along with the change in rate of crimes in any area.

• Work package 7: Analysis Module Use Case writing


Different scenarios are considered for a user who wants to analyze crime
database regarding an area or a crime’s occurring rate. Test cases is
written to check whether a user can successfully find safety level of a
place or not. Module is tested using different crime database for same
location.

• Work package 8: Crime Analysis Module Development


In this package, the data of all the reported crimes will finally be analyzed.
Data mined in the database is manipulated using averaging algorithms
to access any area and declare a safety level using rate of crime in that
area. Graphs and percentages of crimes for a location in a time span is
shown to user in the form of summary. Purpose of this package is to test
the graphical summaries and analysis reports built during work package
12 and to test if Crime Analysis Module is working properly and
accurately because this is a crucial step that will markedly affect the
user’s knowledge about situation and conditions of any region.

18
• Work package 9: Testing
All the major features of the android application and Monitoring website
is thoroughly tested and any corrections/changes is applied accordingly.
We can add so more trifle features in this phase to gain users and
audience attraction. Thus, a completely working Application and a
monitoring website is ready to use. Website will provide fully confidential
platform for moderators to analyze reported crimes and maintain integrity
of the crimes data being saved. We can add so more trifle features in this
phase to gain users and audience attraction.

• Work package 10: Final Project Report Writing


In this work package, a finalized report of project is completed which
contains full fledge information about our project and all the work which
was already done related our project. In the report aims, objectives,
goals, deliverables, beneficiaries, features, timeline, methodology,
proposed solution, simulation, experimental results and all other
perspectives of the project is discussed in detail.

Table 2 covers completion of above mentioned work packages regarding


completion of a task or milestone.

19
Table 2: Detailed Work Plan including Work Packages.

Tasks/ Milestones Elapsed Deliverable/Work


Duration Packages
1. Document Baseline and SRS 45 days (Work Package 1)
1.1. Literature Review Project Proposal
1.2. Business Value Study Detailed Report
1.3. Decide Deliverables and core
features
1.4. Design Basic Timeline
1.5. Finalize and submit Initial base
line
1.6. Document detailed Report
1.6.1. Study Research Papers
1.6.2. Convert Deliverables to
work Package
1.6.3. Design Detailed Timeline
1.6.4. Write Precise Literature
Review
1.6.5. Write Methodology
1.6.6. Write Introduction and
conclusion
1.6.7. Finalize Documentation
1.6.8. Submit Detailed Report

2. Build Crime Reporting Module 30 days (Work Package 2,


2.1. Decide Flow and UI of module 3,4)
2.2. Develop use cases and test plan Android and
2.3. Build Module Website
2.4. Execute test cases and debug Crime Reporting
2.5. Update Documentation Module,
2.6. Crime reporting module ready Updated Document

3. Build Crime Mapping Module 27 days (Work Package 5,6)


3.1. Decide Flow and UI Android and
3.2. Gather Data for Simulation website
3.3. Develop use cases and test plan

20
3.4. Build Module Crime Mapping
3.5. Execute test cases and debug Module,
3.6. Update Documentation Updated Document,
3.7. Mapping Module Ready

4. Build Crime Analysis Module 28 days (Work Package 7,8)


4.1. choose Data Mining techniques Android and
4.2. Develop use cases and test plan website
4.3. Build Module Crime Analysis
4.4. Execute test cases and debug Module,
4.5. Update Documentation Updated Document,

5. Testing and QA 79 days (Work Package 9)


5.1. Alpha Testing Android Application,
5.2. Beta Testing Monitoring Website
5.3. Quality Assurance
5.4. Testing complete

6. Closing FYP 12 days Work Package (10)


6.1. Deployment Project Report
6.2. Advertisement on TV
6.3. Finalize Documentation
6.4. Submit Final Report and Project

Budget Requirements
We need the following for this project:

• An Azure account for database and website hosting.


• An Android Play Store account for Application hosting.

Budget for both the accounts was required.

21
Chapter 5: Results and Discussions

5.1 Simulation results


Both application and website are tested using a sample data set of crimes for
mapping purposes. All this sample data is collected from valid and authentic
data sources like news channels, newspapers and news reporters. Up to 200
crimes are reported and saved in backend database. These crimes can be
viewed as multi specific colored markers on google maps. It is also displayed in
the form of heat maps and clustered maps. Clustered maps are maps that
display combined markers of more than a specific number of crimes collectively.
This reduces the number of markers at a single place thus keeping the map
neat. Android smart phone with API 22 is used for simulation. Firebase is used
for reporting and user login purposes.

5.2 Product Demo / Screen Shot


5.2.1 App Logo:

Figure 8: App Logo.

22
5.2.2 User Login and Authentication
User can sign up using social accounts e.g. Facebook and google as well
as using app local account. Sign up view is shown in figure:9. Sign in form
is shown in figure:10 having fields of email, password and confirm password.

After entering credential, user should press sign up/sign in button


accordingly.
Screens for sign up and sign in are shown below.

Figure 9: Sign Up Screen. Figure 10: Sign In Screen.

Forgot password link helps when user has already been registered to system
but can’t remember his/her password anymore. It is used to reset password
by prompting user for a new password twice.

23
Validation checks are added in sign up and sign in fields. If user leaves a
field blank, it gives an error message to enter the required information field,
as shown in figure:11. There is also a check for password minimum length.

After entering credential, when user press the signup/ sign in button. After
verifying credentials from database, user is asked to enter and verify phone

Figure 11: Validation check. Figure 12: Sign in Loading Dialog.

number as shown in figure :11 and figure:12.

After entering phone number, user presses verify button and a confirmation
message is sent to that number.

24
Figure 13: Confirm Phone Number. Figure 14: Verify Phone Number.

After receiving text, user enters confirmation code. If code matches to that
one sent to user, user is asked to verify email address previously provided.

Figure:15 and figure:16 shows confirmation email sent on provided email


address. After clicking on link, user email is verified. Now they can log in to
dashboard.

25
Figure 15: Confirmation Mail. Figure 16: Email Verified.

26
Report Crime:
User reports an incident using a form as shown in Figure:17. First user
chooses a place where user wants to report incident.

Figure 17: Report Crime. Figure 18: Choose location to report crime.

User chooses incident type by main category and then by choosing sub
category respectively.

27
Main category includes financial crimes, incident, financial crimes, traffic
incident and other.

Terrorist attempt and surveillance activity are also added to record

Figure 19: Choose Crime Main Categories. Figure 20: Choose Crime sub-categories.

security situation.

28
User provides some description related to incident happened. After providing
description, user submits report by clicking on submit button. If everything
goes smoothly, user is informed about successful submission of report.

Figure 21: Provide Detail Description of incident. Figure 22: Report Submission.

29
5.2.3 Crime Maps and statistics:
Diverse types of crimes are shown on map to get a bird eye view. Figure:23
shows a clustered crime map. While Figure:24 shows all crimes separately,
each marker representing a different type of crime depending on its color.

Figure 23: Clustered Crime Map. Figure 24: Colored Crime Map.

Figure:25 shows a heat map of crimes depending on ratio of crimes in an


area. Red area shows a high crime rate/intensity.

30
Figure:26 shows a collective crime ratio donut graph. Different color shows
a different crime type.

Figure 25: Intensive crime Map. Figure 26: Crime statistics.

31
5.2.4 Azure Database

Figure 27: Azure Database.

5.3 Results and Discussion


Both application and website are tested using a sample data set of crimes for
mapping purposes. All this sample data is collected from valid and authentic
data sources like news channels, newspapers and news reporters. Up to 200
crimes are reported and saved in backend database. These crimes can be
viewed as multi specific colored markers on google maps. It is also displayed in
the form of heat maps and clustered maps. Clustered maps are maps that
display combined markers of more than a specific number of crimes collectively.
This reduces the number of markers at a single place thus keeping the map
neat. Android smart phone with API 22 is used for simulation. Firebase is used
for reporting and user login purposes.

5.4 Budget Used /Unit Cost


• An Azure account for database and website hosting.

32
• An Android Play Store account for Application hosting.

Budget for both above required is 50$.

5.5 Market forecasting


1. The app is free android, non-profit app for the community, by the community.
Banner ads will be added for app monetization.
2. Website can be marketed to law and enforcement bodies. As it provides a
bird eye view of crime scenes.
3. It will be shared widely on social media and sites to increase the audience
for better crime reporting and crowd sourcing.

Download Trends over Next Few Years


6000 6000

5000 5000

4000 4000

3000 3000

2000 2000

1000 1000

0 0
1st 2 3 5
YEAR

Figure 28: Graphical Demonstration of Download Trend as per year.

33
Chapter 6: Conclusion

This project will be helpful in visualizing security and crime incidents in an area.
Currently, in Pakistan there is no such application working and being used.
Current apps are supposed to collect crime data from users. Many useful
information can be extracted from databases of such applications that can help
a lot of citizens around us including insurance companies, foreign tourists as
well as local community in changing their mind set about safety of any area
around their vicinity or anywhere they go. Such applications if deployed in any
country can lead to immense awareness and a positive reaction of citizens and
native people towards incidents or crimes and safety concerns of the country. It
changes their approach of how they are dealing with such scenarios and
ultimately leading to a more safe and aware community. Working for a
community, will ultimately pay back in a positive manner.

34
References
[1] N. Vatanasuk, A. Chomputawat, S. Chomputawat, and W.
Chattriya, "Mobile Crime Incident Reporting System using UX
dimensions guideline," in 2015 Asian Conference on Defence
Technology (ACDT), 2015, pp. 187-192.
[2] M. Saravanan, R. Thayyil, and S. Narayanan, "Enabling Real
Time Crime Intelligence Using Mobile GIS and Prediction Methods," in
2013 European Intelligence and Security Informatics Conference, 2013,
pp. 125-128.
[3] S. M. Raza and L. Rajamanickam, "A Proposed Solution for Crime
Reporting and Crime Updates on Maps in Android Mobile Application,"
International Journal of Computer Applications, vol. 124, 2015.
[4] D. Weisburd, S. D. Mastrofski, A. M. McNally, R. Greenspan, and
J. J. Willis, "REFORMING TO PRESERVE: COMPSTAT AND
STRATEGIC PROBLEM SOLVING IN AMERICAN POLICING*,"
Criminology & Public Policy, vol. 2, pp. 421-456, 2003.
[5] Z. Wang, J. Wu, and B. Yu, "Analyzing spatio-temporal distribution
of crime hotspots and their related factors in Shanghai, China," in 2011
19th International Conference on Geoinformatics, 2011, pp. 1-6.
[6] B. G. T. Ledesma, C. R. G. Lim, J. L. J. Miranda, and M. S.
Tangkeko, "CRIME INTELLIGENCE SYSTEM," 2013.
[7] "Google Play srore", Play.google.com, 2016. [Online]. Available:
https://play.google.com/store. [Accessed: 15- Dec- 2016].
[8] "WikiCrimes", Wikicrimes.org, 2016. [Online]. Available:
http://www.wikicrimes.org/. [Accessed: 15- Dec- 2016].
[9] M. Ahmadi, A. Sharifi, and M. Valadan, "Crime mapping and
spatial analysis," International institute for geo-information science and
earth observation, Enschede, Neatherlands, 2003.

35
[10] D. V. Rohini and P. Isakki, "Crime analysis and mapping through
online newspapers: A survey," in 2016 International Conference on
Computing Technologies and Intelligent Data Engineering (ICCTIDE'16),
2016, pp. 1-4.
[11] H. Goudriaan, Reporting crime: Effects of social context on the
decision of victims to notify the police: Heike Goudriaan, 2006.

36

You might also like