0% found this document useful (0 votes)
7 views26 pages

Report

The document is a project report on the development of a Crime Record Management System (CRMS) aimed at assisting law enforcement in managing crime-related data efficiently. It outlines the system's objectives, methodologies, and various modules including user authentication, crime report management, offender management, and legal proceedings, all designed to enhance data integrity and accessibility. The project utilizes database management system concepts to provide a secure, structured platform for tracking and managing criminal cases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views26 pages

Report

The document is a project report on the development of a Crime Record Management System (CRMS) aimed at assisting law enforcement in managing crime-related data efficiently. It outlines the system's objectives, methodologies, and various modules including user authentication, crime report management, offender management, and legal proceedings, all designed to enhance data integrity and accessibility. The project utilizes database management system concepts to provide a secure, structured platform for tracking and managing criminal cases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

A Project Report

on

INVENTORY MANAGEMENT SYSTEM

Submitted in partial fulfillment of requirements for the award of the course

of

CGB1221 - DATABASE MANAGEMENT SYSTEMS

Under the guidance of

Dr.R.BHARATHI M.E., PhD.,

Associate Professor / IT

Submitted By

SUJAN P (927623BIT117)

DEPARTMENT OF INFORMATION TECHNOLOGY

M.KUMARASAMY COLLEGE OF ENGINEERING


(Autonomous)

KARUR – 639 113

MAY 2025
M. KUMARASAMY COLLEGE OF ENGINEERING

(Autonomous Institution affiliated to Anna University, Chennai)

KARUR – 639 113

BONAFIDE CERTIFICATE

Certified that this project report on “CRIME MANAGEMENT SYSTEM” is


the bonafide work of SUAJN P (927623BIT117) who carried out the project
work during the academic year 2024 - 2025 under my supervision.

Signature Signature

Dr.R.BHARATHI M.E., PhD., Dr. K. RAVIKUMAR M.E.,Ph.D.,

SUPERVISOR, HEAD OF THE DEPARTMENT,

Department of Information Technology Department of Information Technology


M.Kumarasamy College of Engineering, M.Kumarasamy College of Engineering,
Thalavapalayam, Karur -639 113. Thalavapalayam, Karur -639 113.

ii
DEPARTMENT OF INFORMATION TECHNOLOGY
VISION OF THE INSTITUTION
To emerge as a leader among the top institutions in the field of technical education
MISSION OF THE INSTITUTION

 Produce smart technocrats with empirical knowledge who can surmount the global
challenges
 Create a diverse, fully-engaged, learner-centric campus environment to provide quality
education to the students
 Maintain mutually beneficial partnerships with our alumni, industry, and Professional
associations

VISION OF THE DEPARTMENT


To Create Technically Skilled IT Professionals to meet Corporate Expectations and to
Address Societal Concerns

MISSION OF THE DEPARTMENT


 To build competency in advanced computing technologies and implement project-based
learning
 To establish industry collaboration for research projects and consultancy
 To inculcate Entrepreneurial skills to serve the societal benefits

PROGRAM EDUCATIONAL OBJECTIVES (PEOs)


Graduates will be able to
 PEO1: Solve real world problems using advanced computing technologies
 PEO2: Encompass the ability to build innovative software products and become a
successful entrepreneur

iii
 PEO3: Carry out industrial projects and succeed in research careers

PROGRAM OUTCOMES (POs)


Engineering students will be able to:
1. Engineering knowledge: Apply the knowledge of mathematics, science, engineering
fundamentals, and an engineering specialization to the solution of complex engineering
problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.
4. Conduct investigations of complex problems: Use research-based knowledge and
research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.

iv
9. Individual and team work: Function effectively as an individual, and as a member or
leader in diverse teams, and in multidisciplinary settings.

10. Communication:Communicate effectively on complex engineering activities with the


engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, give and receive
clear instructions.

11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.

PROGRAM SPECIFIC OUTCOMES (PSOs)


 PSO1: Apply knowledge of computer programming concepts to develop software
projects
 PSO2: Design software in a futuristic approach to adapt cutting-edge technologies
 PSO3: Solve societal problems using computational intelligence

v
ABSTRACT

Crime Record Management System (CRMS) is a database-driven solution


designed to assist law enforcement agencies in efficiently storing, managing, and
retrieving crime-related data. The system provides a structured platform for police
officers to log crime reports, track investigations, store offender details, and manage
case statuses. By leveraging DBMS concepts, the system ensures data integrity,
security, and quick access to critical information. The database is designed to store
essential records such as crime incidents, offender profiles, investigation progress, and
legal proceedings. Advanced querying mechanisms enable efficient data retrieval,
facilitating decision-making and improving crime-solving efficiency. The system
enhances law enforcement capabilities by ensuring centralized data management,
reducing redundancy, and enabling real-time updates on case statuses. Through role-
based access control, sensitive data is protected while ensuring authorized personnel
can access relevant information. This project demonstrates the practical application of
database management techniques in a real-world scenario, contributing to better crime
management and public safety.

vi
ABSTRACT WITH POs AND PSOs MAPPING

POs PSOs
ABSTRACT
MAPPED MAPPED
Crime is a significant concern for law enforcement PO1, PSO1,
agencies worldwide. Efficient crime record PO2, PSO2,
management is essential for tracking cases, managing PO3, PSO3
offender details, and monitoring legal proceedings. This PO4,
project aims to design and develop a Crime Record PO5,
Management System (CRMS) using DBMS concepts to PO6,
store, manage, and retrieve crime-related data PO8,
effectively. The system enables police officers to log PO9,
crime reports, track investigations, store offender PO11,
details, and manage case statuses. Using SQLite with PO12
Flask, this system provides a structured and efficient
way to handle crime-related records, ensuring security,
accuracy, and easy retrieval of data.

Note: 1- Low, 2-Medium, 3- High

vii
SUPERVISOR HEAD OF THE DEPARTMENT

TABLE OF CONTENTS

CHAPTER TITLE PAGE


No. No.

ABSTRACT vi

1 INTRODUCTION 1

1.1 Objective 1

1.2 Overview 1

1.3 DATABASE MANAGEMENT SYSTEMS 2


CONCEPTS

2 PROJECT METHODOLOGY 4

2.1Proposed Work 5

2.2 Block Diagram 5

3 MODULE DESCRIPTION 6

3.1 User Authentication 6

3.2 Crime Report Management 6

3.3 Offender Management 7

3.4 Legal Proceedings 8

3.5 Investigation 8

viii
3.6 Search & Reports 9

4 RESULTS AND DISCUSSION 10

5 CONCLUSION 14

REFERENCES 15

APPENDIX 16

ix
CHAPTER 1
INTRODUCTION

1.1 OBJECTIVE

The primary objective of the Crime Record Management System (CRMS) is to


provide a comprehensive, efficient, and secure digital platform for law enforcement
agencies to manage crime-related information. It aims to digitize the crime recording
process, eliminating manual inefficiencies and promoting structured data storage for
quick retrieval of crime records, offender details, and legal case updates. The system
incorporates role-based access control to maintain data confidentiality and security,
while also enhancing investigation tracking and reporting capabilities through the
integration of database-driven solutions. Overall, CRMS serves as a practical
implementation of Database Management System (DBMS) concepts applied in a
real-world law enforcement scenario.

1.2 OVERVIEW

The Crime Record Management System is a web-based application


developed using Flask as the backend framework and SQLite as the
database. It provides a responsive and user-friendly interface using
HTML, CSS, JavaScript, and Bootstrap. The system is designed with
modular functionality, offering distinct components for user
authentication, crime data entry, offender management, investigation
tracking, and legal documentation. It acts as a central repository where
police personnel can securely and systematically handle all aspects of a
criminal case, from the initial report to court proceedings.

1
Unlike manual systems, which are susceptible to data loss,
inconsistency, and human error, CRMS ensures accuracy, accountability,
and speed in crime data processing. The system’s architecture supports
efficient search capabilities, quick updates to records, and real-time access
to vital information. The use of role-based access control means only
authorized personnel can access or modify certain data, thereby
maintaining confidentiality and integrity. In this way, the CRMS
addresses major pain points in current crime record-keeping systems and
brings a scalable, efficient solution tailored to law enforcement needs.

1.3 DATABASE MANAGEMENT SYSTEMS CONCEPTS


The CRMS project incorporates various DBMS concepts that are foundational to the
system’s design and functionality:

 Entity-Relationship (ER) Model: The database schema is designed


using an ER model, defining key entities such as Crimes, Officers,
Offenders, Case Reports, and their relationships.
 Normalization: Applied to structure the database tables efficiently,
eliminating data redundancy and improving data integrity.
 SQL Queries: Utilized for performing CRUD operations (Create,
Read, Update, Delete) on crime-related data.
 Transactions: Ensures reliable database operations through the
implementation of ACID properties:
o Atomicity – All operations within a transaction are completed
successfully or not at all.
o Consistency – The database remains in a valid state before and
after transactions.

2
o Isolation – Concurrent transactions do not interfere with each
other.
o Durability – Changes made by a committed transaction persist
even after a system failure.
 Triggers and Constraints: Implemented to maintain data integrity,
such as enforcing unique case numbers and validating data consistency
rules.
 Role-Based Access Control (RBAC): Ensures that only authorized
users (police officers, admins) can access or modify specific data based
on their roles.

This integration of DBMS principles ensures that the CRMS is robust, scalable, and
capable of handling complex data operations with security and accuracy.

3
CHAPTER 2
PROJECT METHODOLOGY

2.1PROPOSED WORK

The proposed work focuses on the development of a web-based


Crime Record Management System (CRMS) to assist law enforcement
agencies in the digital management of crime-related data. The system is
intended to provide a centralized platform that allows police personnel to
log crime reports, manage offender profiles, track investigations, and
update legal proceedings efficiently. Traditional manual record-keeping is
often prone to data loss, inconsistency, and delays in accessing critical
information. To overcome these limitations, CRMS will offer a structured
and automated approach, ensuring secure, quick, and accurate access to
crime records. The system will include various modules such as user
authentication, crime report entry, offender management, investigation
tracking, legal updates, and data retrieval functionalities.

Technically, the system will be built using Flask (Python web framework) for the
backend, SQLite for the database, and HTML, CSS, JavaScript, and Bootstrap for the
front-end interface. It will utilize essential DBMS concepts like ER modeling, data
normalization, SQL operations, and transaction control to maintain data consistency
and integrity. Role-based access control will be implemented to ensure that only
authorized users (e.g., administrators, police officers) can access or modify specific
data based on their roles. The proposed system will also support features such as

4
report generation and crime data analytics to aid decision-making and strategic
planning.

2.2 PROPOSED ARCHITECTURE

2.3 E-R DIAGRAM

5
CHAPTER 3
MODULE DESCRIPTION
3.1 User Authentication

The User Authentication module is a critical component of the CRMS,


designed to ensure secure and controlled access to the system. It
establishes login credentials for different user roles—primarily
administrators and police officers—allowing them to access only the
functionalities relevant to their responsibilities. Upon login, users are
authenticated through a combination of username and password
verification, and their role is validated before granting access. This
controlled access prevents unauthorized personnel from viewing or
altering sensitive crime records, maintaining the integrity and
confidentiality of the system.
6
In addition to securing the application, this module tracks login
activities to ensure accountability and traceability. For example, every
operation performed by a user—such as logging a crime report or
updating offender information—is logged under their credentials. This not
only promotes responsible use of the system but also helps in identifying
any misuse or unusual activity. By incorporating authentication
mechanisms, the CRMS provides a strong first layer of defense against
data breaches and unauthorized access.

3.2 Crime Report Management

The Crime Report Management module is the core of the CRMS,


responsible for handling the creation, update, and retrieval of crime-
related records. This module allows police officers to log details about a
crime, including the type (e.g., theft, assault), date and time of occurrence,
location, detailed description, involved individuals, and current

status of the case. It provides a structured format for entering data, reducing the
chances of missing or inconsistent information. This digital record serves as the
primary source of information throughout the investigation and legal process.

Moreover, this module enables law enforcement personnel to update


the status of a case in real-time—from ‘reported’ to ‘under investigation’
to ‘closed’—ensuring transparency and up-to-date information flow. It
helps officers keep track of ongoing cases and prevents duplicate entries
by linking existing records where necessary. This centralized and dynamic
management of crime reports improves coordination among departments
and enhances the overall responsiveness of police services.

7
3.3 Offender Management

The Offender Management module is designed to maintain a


comprehensive digital repository of individuals who are suspected or
convicted of crimes. Each offender's profile includes personal details such
as full name, photograph, gender, age, address, criminal background, and
biometric data if available. These details are linked to corresponding
crime reports and investigation records, creating an interconnected dataset
that simplifies tracking and identification. This module is crucial in
profiling repeat offenders and supporting pattern analysis for crime
prevention strategies.

Beyond storing individual records, the module enables users to view


the offender’s involvement in multiple cases, their legal outcomes, and
their role (suspect, witness, convicted) in each instance. Such structured
information assists investigators in drawing connections between cases
and evaluating the threat level posed by certain individuals. The offender
database becomes a powerful tool for law enforcement, aiding not only in
solving current cases but also in preventing future crimes through targeted
monitoring.

3.4 Legal Proceedings

The Legal Proceedings module manages and tracks all judicial actions associated with
a criminal case. Once a case progresses to the court system, this module logs all
relevant legal data including hearing dates, court names, judges, legal representatives,
case status, verdicts, and sentencing details. It ensures that law enforcement personnel
are informed of all court-related developments and can prepare accordingly. The
8
module also allows uploading or linking of legal documents such as charge sheets,
summons, and judgments, providing a complete legal record in one location.

In addition to maintaining records, this module supports timeline tracking of legal


processes to ensure timely follow-up and compliance with legal protocols. By offering
structured access to legal history and case outcomes, it reduces dependency on
external documentation and manual follow-ups. This centralized view of legal
proceedings increases efficiency, minimizes delays in communication between police
and legal departments, and improves accountability throughout the judicial process.

3.5 Investigation

The Investigation module assists in organizing and monitoring the entire investigative
workflow associated with a crime. It allows users to assign officers to a case, record
investigation updates, track evidence collected, and manage timelines for follow-up
actions. Each step of the investigation is logged with details such as the officer
involved, date and time, description of the activity, and any new developments. This
structured tracking ensures transparency and consistency in the investigation process
and prevents duplication of efforts.

This module also supports collaboration among officers by providing a shared view of
case progress, allowing team members to work cohesively. Investigators can update
case logs with findings, attach relevant documents or images, and note any challenges
or observations. By maintaining a well-documented trail of investigative actions, the
system facilitates smoother handovers, supervisory reviews, and legal validation when
the case reaches the courtroom. Ultimately, it ensures that no crucial information is
lost or overlooked during the investigation.
9
3.6 Search & Reports

The Search & Reports module provides powerful querying and reporting capabilities
that enhance decision-making and operational efficiency. Users can search for specific
crime records, offender details, case statuses, or legal proceedings using filters such as
date range, crime type, location, officer name, or case ID. This enables law
enforcement personnel to quickly locate relevant data without manually browsing
through records, saving valuable time and effort. The search functionality is optimized
for performance, allowing even large datasets to be queried rapidly.

In addition to search, this module allows the generation of various analytical and
zstatistical reports such as crime frequency by area, most common offense types,
unresolved case lists, or performance metrics of investigators. These reports support
administrative planning, policy-making, and resource allocation. For example,
identifying high-crime zones can help in deploying more patrols, while reports on
delayed investigations may highlight the need for additional training or manpower. In
essence, this module transforms raw data into actionable insights that enhance the
efficiency and intelligence of law enforcement operations.

CHAPTER 4
RESULTS AND DISCUSSION

10
4.5 CRIME RECORDS

4.6 SYSTEM LOGS

4.7 ADD OFFICER

11
CHAPTER 5
CONCLUSION

The Crime Record Management System (CRMS) is a well-structured, database-driven


solution aimed at modernizing the way law enforcement agencies manage and access
crime-related information. Traditional manual systems often suffer from
inefficiencies, data loss, and security risks, which hinder effective crime tracking and
investigation. CRMS addresses these challenges by offering a centralized, web-based
platform that ensures secure data entry, structured storage, and efficient retrieval of
crime reports, offender details, investigation records, and legal proceedings. This shift
from paper-based to digital management significantly enhances the reliability,
accessibility, and speed of operations in police departments.

12
Technologically, CRMS is developed using Flask for backend processing, SQLite for
data storage, and front-end technologies such as HTML, CSS, JavaScript, and
Bootstrap to provide a user-friendly interface. The system incorporates essential
DBMS concepts including ER modeling, normalization, ACID properties, SQL
queries, and role-based access control to maintain data integrity, security, and
consistency. Each module—ranging from user authentication to investigation tracking
—has been thoughtfully designed to reflect real-world use cases and support the
various operational needs of law enforcement personnel.

In essence, CRMS not only simplifies crime record management but also reinforces
data-driven decision-making, faster case resolutions, and improved accountability in
police work. Its implementation demonstrates the real-world impact of database
management systems in solving societal challenges. The project showcases how
technology can enhance public safety infrastructure, contributing to more effective
governance and service delivery in the criminal justice system.

REFERENCES:

1. Elmasri, R., & Navathe, S. B. (2017). Fundamentals of Database Systems


(7th ed.). Pearson Education.
2. Silberschatz, A., Korth, H. F., & Sudarshan, S. (2019). Database System
Concepts (7th ed.). McGraw-Hill Education.
3. Flask Documentation – https://flask.palletsprojects.com
4. SQLite Documentation – https://www.sqlite.org/docs.html
5. Bootstrap Documentation – https://getbootstrap.com
6. Python Official Documentation – https://docs.python.org

13
APPENDIX
(Coding)

Flask App.py :
import os
import logging
from datetime import datetime

from flask import Flask


from flask_sqlalchemy import SQLAlchemy
from sqlalchemy.orm import DeclarativeBase
from werkzeug.middleware.proxy_fix import ProxyFix

14
from flask_login import LoginManager

# Configure logging
logging.basicConfig(level=logging.DEBUG)

# Base class for models


class Base(DeclarativeBase):
pass

# Initialize extensions
db = SQLAlchemy(model_class=Base)
login_manager = LoginManager()

# Create Flask app


app = Flask(__name__)
app.secret_key = os.environ.get("SESSION_SECRET", "dev-secret-key")
app.wsgi_app = ProxyFix(app.wsgi_app, x_proto=1, x_host=1)

# Configure database
app.config["SQLALCHEMY_DATABASE_URI"] = os.environ.get("DATABASE_URL",
"sqlite:///crms.db")
app.config["SQLALCHEMY_ENGINE_OPTIONS"] = {
"pool_recycle": 300,
"pool_pre_ping": True,
}
app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = False

# Initialize extensions with app


db.init_app(app)
login_manager.init_app(app)
login_manager.login_view = "login"
login_manager.login_message_category = "info"

# Context processor for global template variables


15
@app.context_processor
def inject_now():
return {'now': datetime.utcnow()}

with app.app_context():
# Import models after db is defined to avoid circular imports
from models import User, Crime, Offender, Investigation, LegalProceeding, SystemLog

# Create database tables


db.create_all()

# Create admin user if it doesn't exist


from werkzeug.security import generate_password_hash
admin = User.query.filter_by(username="admin").first()
if not admin:
admin = User(
username="admin",
password_hash=generate_password_hash("admin123"),
email="admin@crms.com",
role="admin",
full_name="System Administrator",
badge_number="ADMIN-001",
is_active=True
)
db.session.add(admin)
db.session.commit()
logging.info("Admin user created")

# Load user for login manager


@login_manager.user_loader
def load_user(user_id):
from models import User
return User.query.get(int(user_id))

16
MAIN.PY :
from app import app
import routes # noqa: F401

if __name__ == "__main__":
app.run(host="0.0.0.0", port=5000, debug=True)

17

You might also like