Page Length: 66

Size: 662 KB

Format: PDF & Word

5,000.00

ABSTRACT

Design and implementation of an intelligent system to combat crime/ terrorism (a case study of central police station, Onitsha Anambra state) was designed to decrease the rate at which crimes occurs in our society. New technological innovations have been developed to prevent crime and to improve the performance of the police, but we know remarkably little about how and why certain innovations are adopted, and the consequences –both intended and unintended—of technology-driven solutions to the problem of crime. An intelligent system which is Terror Alert has been proposed on the basis of combating crimes and protecting lives and properties of a citizen. An algorithm development and its hardware implementation are well addressed. The method of data collection adopted were duly observed. The design tools such as system flow chart, data flow chart, pseudocodes were used in carrying out this research. The programming language used is Visual C++ and MySQL as the database platform. This article provides an examination of a wide range of new technological innovations that have applications in the areas of crime prevention generally, and crime control (by police) in particular. We provide a description of recent technological innovations, summarize the available research on the extent of adoption in the Anambra state, and then review the available research on the impact – both intended and unintended – of each form of new technology on crime prevention and police performance.

 

 

 

 

 

TABLE OF CONTENTS

 

Title page                                                                                                                                i

Certification                                                                                                                            ii

Approval                                                                                                                                 iii

Dedication                                                                                                                              iv

Acknowledgment                                                                                                                   v

Abstract                                                                                                                                  vi

Table of Contents                                                                                                                   vii

CHAPTER ONE

INTRODUCTION                                                                                                    1

1.1.      Background of the Study                                                                                            1

1.2.      Statement of Problems                                                                                               3

1.3       Aim and Objectives                                                                                                                4

1.4       Significance of the Study                                                                                           4

1.5       Scope of the Study                                                                                                     5

1.6       Limitations of the Study                                                                                             5

1.7       Definition of Terms                                                                                                     5

CHAPTER TWO

LITERATURE REVIEW                                                                                                      7

CHAPTER THREE            

METHODOLOGIES AND SYSTEM ANALYSIS                                                  15

3.1       Methodologies                                                                                                            15

3.2       System Analysis                                                                                                          20

3.3       Data Collection                                                                                                           20

3.4       Organization and its environment                                                                               22

3.5       Modus Operandi of the Present System                                                                     22

3.5.1    Input Analysis                                                                                                             23

3.5.2    Process Analysis                                                                                                         23

3.5.3    Output Analysis                                                                                                          23

3.5.4    Data Flow Diagram of the Present System                                                                23

3.6       Problems of the Present System                                                                                 24

3.7       The Proposed System                                                                                                 25

3.8       High Level Model of the Proposed System                                                                26

 

CHAPTER FOUR

SYSTEM DESIGN                                                                                                    27

4.1       Objectives of the Design                                                                                             27

4.2       Data Flow Diagram of the New System                                                                     28

4.3       Database Specification                                                                                               29

4.4       Program Module Specification                                                                                   30

4.5       Input and Output Specification                                                                                   32

4.5.1    Output Specification                                                                                                   32

4.5.2    Input Specification                                                                                                      33

4.6       Algorithms                                                                                                                  34

4.7       System Flowchart                                                                                                       34

4.8       Program Flowchart                                                                                                     35

4.9       Data Dictionary                                                                                                           36

4.10     Choice of Programming Language Platform                                                              36

CHAPTER FIVE

SYSTEM IMPLEMENTATION AND DOCUMENTATION                                 37

5.1       System Implementation                                                                                              37

5.2       Hardware Requirements                                                                                             37

5.3       Software Requirements                                                                                               38

5.4       Installation arrangements                                                                                            38

5.5       Testing                                                                                                                        38

5.5.1    Unit testing                                                                                                                 39

5.5.2    Test Data                                                                                                                    39

5.5.3    Test Result                                                                                                                  39

5.6       Training arrangements                                                                                                39

5.7       Conversion arrangements                                                                                           40

5.8       System documentation                                                                                               41

CHAPTER SIX

SUMMARY, CONCLUSION AND RECOMMENDATIONS                                42

6.1       Summary                                                                                                                     42

6.1.1    Achievements                                                                                                             43

6.1.2    Contribution to ICT body of knowledge                                                                    43

6.2       Conclusion                                                                                                                  43

6.3       Recommendations                                                                                                      43

REFERENCES                                                                                                                    45

APPENDIX A

APPENDIX B

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CHAPTER ONE

INTRODUCTION

1.1.      BACKGROUND OF THE STUDY

According to Eamonn (2022), crime is a social injury and expression of subjective opinion varying in time and place. It was also defined as a legal wrong and remedy for which is the punishment of the offender at the instance of the state.

A person is not a criminal officially until he or she has been defined as such by law. The process of defining what constitute a crime and who will be defined as a criminal is an important part of criminology. Before a law can properly can a person a criminal, it must go through a series of actions governed at all junctures by well defined legal rules collectively cxialled criminal procedure. The criminal procedure code (code of criminal procedure, 1973, Act 2 of 1974), the India penal code, 1860 and the India evidence Act, 1872. These procedural rules however vary greatly from culture to culture, but almost all modern culture have a set of rational rules guiding the serious business of officially labeling a person a criminal.

Crime and terrorism combating comprises strategies and measures that seek to reduce the risk of crime occurring and their potential harmful effects on individuals and society, including fear of crime by intervening to influence their multiple cause. Crime is an offense which violates the law of state and is disapproved by the society. In olden days, the crime rate was not very high. But as time progressed, the crime rate has increased alarmingly. This increase in crime rate may be due to various causes and social problems.

This article focuses on concept of crime, elements of crime, criminology, various stages in commission of crime, causes of crime and types of crime.  Crime is a public wrong. It is an act of offense which violates the law of the state and is strongly disapproved by the society. Crime is defined as acts or omissions forbidden by law that can be punished by imprisonment or fine. Murder, robbery, burglary, rape, drunken driving, child neglect and failure to pay taxes are examples of crimes. The term crime is derived from the Latin word “crimen” meaning offence and also a wrong-doer. Crime is considered as an anti-social behavior. Each society may define crime in a different perspective. A crime may be legal or illegal. Illegal and punishable crime is the violation of any rule of administration or law of the state or practice of any wrongdoing and harmful to self or against third parties, provided in criminal law. Legal and not punishable crime is all acts of self-defense.  The scientific study of the nature, extent, causes, and control of criminal behavior in both the individual and in society is called criminology.

Legally, crimes usually are defined as acts or omissions forbidden by law that can be punished by imprisonment and/or fine. Murder, robbery, burglary, rape, drunken driving, child neglect, and failure to pay your taxes all are common examples. However, as several eminent criminologists recently have noted the key to understanding crime is to focus on fundamental attributes of all criminal behaviors rather than on specific criminal acts. Instead of trying to separately understand crimes such as homicide, robbery, rape, burglary, embezzlement, and heroin use, we need to identify what it is they all have in common. Much past research on crime has been confounded by its focus on these politico-legal rather than behavioral definitions. The behavioral definition of crime focuses on, criminality, a certain personality profile that causes the most alarming sorts of crimes. All criminal behaviors involve the use of force, fraud, or stealth to obtain material or symbolic resources. As Shannon (2020) noted, criminality is a style of strategic behavior characterized by self-centeredness, indifference to the suffering and needs of others, and low self-control. More impulsive individuals are more likely to find criminality an attractive style of behavior because it can provide immediate gratification through relatively easy or simple strategies. These strategies frequently are risky and thrilling, usually requiring little skill or planning. They often result in pain or discomfort for victims and offer few or meager long-term benefits because they interfere with careers, family, and friendships. Shannon assert that this means the “within-person causes of truancy are the same as the within-person causes of drug use, aggravated assault, and auto accidents.” Criminality in this sense bears a problematic relationship with legal crimes. Some drug dealers, tax cheats, prostitutes and other legal criminals may simply be business-people whose business activity happens to be illegal. Psychologically, they might not differ from ordinary citizens. Almost all ordinary citizens commit at least small legal crimes during their lives. Nevertheless, their hypothesis is that the vast majority of legal crime is committed by individuals a general strategy of criminal activity.

This conception of crime explains the wide variety of criminal activity and the fact that individuals tend not to specialize in one type of crime. It also is consistent with the well-established tendency of people to be consistent over long periods of time in the frequency and severity of crimes they commit. Even executives who commit white collar crimes probably are more impulsive, self-centered, and indifferent to the suffering of others than those who do not take advantage of similar opportunities. Focusing on criminality rather than political-legal definitions also allows us to finesse the perplexing problem of why some acts (e.g., marijuana consumption) are defined as crimes while similar arguably more damaging acts (e.g., alcohol consumption) are not. These issues, central to conflict theories and critical theories of crime, are important. However, because they focus on systematically deeper power relations between competing interest groups, they seldom provide feasible policy alternatives and tend to reinforce perceptions of crime as an insolvable problem. What we want to do here is see if the human ecological approach can lead us to some practical strategies for controlling crime.

Human resources can have material, symbolic, or hedonistic value. In crimes such as thefts, individuals take material resources such as property from another person without his or her knowing cooperation. Those who commit crimes such as narcotics trafficking and gambling attempt to obtain money that can be exchanged for material resources. In crimes such as assaults not associated with theft, sexual assaults, and illicit drug use, people obtain hedonistic resources that increase pleasurable feelings or decrease unpleasant feelings. Political crimes such as terrorism or election fraud attempt to obtain symbolic resources such as power or prestige.

 

1.2.      STATEMENT OF PROBLEM

This project developed a computerized system to keep track of criminals and control criminal activity more than the existing system which is Closed circuit television (CCTV). Some studies have shown that active surveillance in any CCTV system is hampered by ineffective system configurations, poor quality video recordings, faulty or old equipment, inadequate communication between stakeholders, inefficient management policies, ineffective workplace setup (e.g. lack of space), background noise (typical in security environments), inclement weather and lack of familiarity by operators with particular areas they are observing.

The main problem against CCTV is its potential to intrude on individuals’ privacy, employees (or customers) feeling that Big Brother is watching, and potential privacy breaches. Many of these issues can be mitigated by network monitoring software like PRTG.

When a crime does occur, video footage can help law enforcement to investigate and later provide evidence for prosecution in a law court. Used in conjunction with CCTV, audio, thermal and other types of sensors can alert officials to occurrences that are out of the ordinary, e.g. a fire or gun shots at a location. For businesses, CCTV cameras can detect and monitor in-house criminal activities. Prisons may use video surveillance to prevent drones from delivering drugs and other contraband to prisoners. Security cameras are able to monitor areas that are not easily accessible, e.g. rooftops.

Now the problem with this is that CCTV does not prevent that crime from occurring at that particular time, rather it punishes the offenders after the damages have been made.

In carrying out this project, the need to stop a crime from happening at a particular time is the researcher’s priority. In other to handle this problem, the project is intended to design and implement an intelligent system for combating crime and terrorism.

 

1.3.      AIM AND OBJECTIVE OF THE STUDY.

The aim of this project is to design and implement an intelligent system for combating crime. The objectives of this project work are:

  1. To develop an intelligent system to aid in crime and terrorism combating.
  2. For the purpose of active and immediate response to an individual.
  3. To reduce crime and improve people’s safety.
  4. To protect lives and properties.
  5. To give awareness on how to protect ourselves as a citizen.
  6. Creating a system for people to report suspicious activities within the

neighborhood.

  1. To have a safe and better life
  2. To ensure the growth of a county’s economy
  3. To improve life expectancy and progress of the citizens
  4. To avoid changes in information by a witness (Ezekude 2022).

 

1.4.      SIGNIFICANCE OF THE STUDY.

Crime has many negative consequences for victims of crime nd for society as a whole. Being the victim of crime is often a traumatic experience that can lead to a greater risk of various forms of physical and mental ill health in the short and long term. For society too, the consequence of crime are significance, not least in financial terms.

After investigating the existing system which is CCTV, it is observed that the system does not stop immediate crime but punishes the offenders. A new system for stopping imme1diate crime is proposed for the safety of the citizens.

This study is set to investigate the necessary ways of combating crime and terrorism in a society and gives benefits in the following ways;

  1. Effective, responsible crime combating enhances the quality of life of all citizens.
  2. It could serve as referencing material for further study for computer science students.
  3. It serves the purpose of educating the citizens on safety precautions.

 

1.5.      SCOPE OF THE STUDY

This project work which is an intelligent system for stopping crime/ terrorism shall focus on Central Police Station, Onitsha Anambra State. After observing the existing system for stopping crime, I have the intention of devising a new means for crime combating which is faster and efficient. The required data shall be collected from the criminal department of Central Police Station Onitsha, Anambra state.

1.6.      LIMITATIONS OF THE STUDY:

Most headaches and set back experienced during the research work of this project are:

  1. Time constraint: I make time to visit my case study which sometimes is out of my convenient time. It also affected this research very immensely for the fact that the writing of this project was in progress lots of time is said to be consumed.
  2. Finance: Finance as a limitation factor contributed to the research due to the present economic situation of the country and also the increment of fuel prices.
  • Information constraint: The problem of information restricted arising from the library attendant as an order giving to them at eth e-library, they restricted the researchers from the use of systems in the library for sorting of information. Nevertheless, it is conspicuously evident to note that the researcher made several effort see the success of the research work in the most efficient and effective manner. In the same measure, the researcher ensures that the purpose of this research should be valid, profitable and practical at the same time.

 

1.7.      DEFINITION OF TERMS.

Crime:                        This is a specific act committed in violation of the law. It’s also the practice or habit of committing crime.

Criminal:                   This is a person that is guilty of breaking the law.

Law:                           This is the body of rules and standards issued by a government or to be applied by courts and similar authorities.

Accused:                     Accused is a person or group of people who are charged with or on a trial for a crime.

Guilty:                        Having committed an offense, crime, violation or wrong, especially against moral or penal law, the person is said to be guilty.

Offence:                     This is a crime that breaks a particular law and requires a particular punishment.

Terrorism:                 It involves the use or threat of violence and seeks to create fear, not just within the direct victim but among a wide audience.

Punishable:                This is an offence that is liable to be punished or deserving of punishment

Theft:              This is the action or crime of stealing.

Court:                         This is a person or institution, often as a government institution with the authority to adjudicate legal disputes between parties and carry out the administration of justice in civil, criminal, and administrative matters in accordance with the rule of law.

Intention:                   A thing intended or determined to plan and carry out.

Appeal:                       Making a serious, urgent or heartfelt request.

Committed:    Pledged or bound to a certain course or policy; dedicated.

 

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.