CIVIL INTELLIGENCE GATHERING SYSTEM


  • Department: Computer Science
  • Project ID: CPU1253
  • Access Fee: ₦5,000
  • Pages: 67 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,373
Get this Project Materials
ABSTRACT
Crime and insecurity are threats to physical, human and social development. Crime has negative impact (disincentive) on foreign direct investment. Public insecurity impedes domestic and international tourism. Whereas, lack of investment hinders economic development with the result that majority of the citizenry become poor and marginalized. The purpose of this phase is to carry out intelligence gathering with the proposed system, to be used in Security / intelligence agencies. The system analysis requires/ensures that the system developer (s) understand the system, its evolution in the present and the future demand requirement.Computer crime plays a significant role in the criminal law of the information age. Accompanying the influx of computers is an increase in criminal acts and, as a result, an increase in the number of statutes to punish those who abuse and misuse this technology. Crime Monitoring and Control System makes use of data which are required to be processed, retrieved or stored within a short period. Microsoft C# is used as the front end and Microsoft SQL server was used for the database implementationThis project is designed as a centralized system that will improve the activities of Nigeria Police to enhance effective handling of suspect and criminal records.  A centralized system is a multi-user system that contains more disks, more memory, multiple CPUs, serve a large number of users who are connected to the system via terminalsFinally, increase in violent crime and delinquency, has become a common feature of countries in transition. Therefore the system is hereby recommended to Nigeria Police Force.

Keywords: Crime, Intelligence Gathering, Security, C#, Microsoft SQL Server

TABLE OF CONTENTS
Certification ii
Dedication iii
Acknowledgement iv
Table of Content v
List of Figures viii
Abstract ix

Chapter One
1.1 Introduction 1-2
1.2 Statement of the problem 2
1.3 Aim and objectives                                                                                           2
1.4 Significance of the project 3
1.5 Scope of the project 3

Chapter Two: Literature Review
2.1  Review of related works     4-7                   
2.2 Crime prevention and detection 8-9
2.3 The police 9
2.4 Historical review of Nigeria police 10-15
2.5 Analysis of the existing system 16
2.6 Overview of the new system 16-17

Chapter three: system design
3.1 Introduction 18
3.2 Analysis of the system 18
3.3 Problems of existing system 18-19
3.4 Objectives of the proposed system 19
3.5 System design 19-20
3.6 System specification 21
3.6.1 Input specification 21-22
3.7  Input and output forms software process model 22-25
3.7.1 File design 25-33
3.8 System requirement 34
3.8.1 Hardware requirement 34
3.8.2 Software requirement 34

Chapter four: design and implementation
4.0 System implementation and maintenance 35
4.1 Introduction                                                                                                         35
4.2 Implementation issues 35
4.3 Choice of programming language 35
4.4 Coding 35-36
4.5 System changeover plan 36
4.6 System maintenance 36

Chapter five: summary, conclusion and recommendation
5.1 Summary 37
5.2 Conclusion                                                                                                     37-385.3 Recommendation                                                                                       38
References                                                                                                       39-42
Appendix                                                                                                                   43-49
LIST OF FIGURES
FIGURE 1.03
FIGURE 3.1 20
FIGURE 3.2 22
FIGURE 3.3                                                                                                                23
FIGURE 3.4 24
FIGURE 3.5 24
FIGURE 3.6                               24
FIGURE 3.7 25
FIGURE 3.8 25
FIGURE 3.9                               26
FIGURE 3.1026
FIGURE 3.11 27
FIGURE 3.12                             27
FIGURE 3.1328
FIGURE 3.14 28
FIGURE 3.15                             28
FIGURE 3.16 29
FIGURE 3.17 29
FIGURE 3.18                              29
FIGURE 3.19 30
FIGURE 3.20 30
FIGURE 3.21                              31
FIGURE 3.22                               31
FIGURE 3.23 33






  • Department: Computer Science
  • Project ID: CPU1253
  • Access Fee: ₦5,000
  • Pages: 67 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,373
Get this Project Materials
whatsappWhatsApp Us