CIVIL INTELLIGENCE GATHERING SYSTEM


  • Department: Computer Science
  • Project ID: CPU2298
  • Access Fee: ₦5,000
  • Pages: 67 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 385
Get this Project Materials
ABSTRACT
Crime and insecurity are threats to physical, human and social development. Crime has negative impact (disincentive) on foreign direct investment. Public insecurity impedes domestic and international tourism. Whereas, lack of investment hinders economic development with the result that majority of the citizenry become poor and marginalized. The purpose of this phase is to carry out intelligence gathering with the proposed system, to be used in Security / intelligence agencies. The system analysis requires/ensures that the system developer (s) understand the system, its evolution in the present and the future demand requirement.Computer crime plays a significant role in the criminal law of the information age. Accompanying the influx of computers is an increase in criminal acts and, as a result, an increase in the number of statutes to punish those who abuse and misuse this technology. Crime Monitoring and Control System makes use of data which are required to be processed, retrieved or stored within a short period. Microsoft C# is used as the front end and Microsoft SQL server was used for the database implementationThis project is designed as a centralized system that will improve the activities of Nigeria Police to enhance effective handling of suspect and criminal records.  A centralized system is a multi-user system that contains more disks, more memory, multiple CPUs, serve a large number of users who are connected to the system via terminalsFinally, increase in violent crime and delinquency, has become a common feature of countries in transition. Therefore the system is hereby recommended to Nigeria Police Force.

Keywords: Crime, Intelligence Gathering, Security, C#, Microsoft SQL Server

TABLE OF CONTENTS
Certificationii
Dedicationiii
Acknowledgementiv
Table of Contentv
List of Figuresviii
Abstract ix

Chapter One
1.1Introduction1-2
1.2Statement of the problem2
1.3Aim and objectives                                                                                          2
1.4Significance of the project3
1.5Scope of the project3

Chapter Two: Literature Review
2.1  Review of related works     4-7                   
2.2Crime prevention and detection8-9
2.3The police9
2.4 Historical review of Nigeria police10-15
2.5 Analysis of the existing system16
2.6Overview of the new system16-17

Chapter three: system design
3.1Introduction18
3.2Analysis of the system18
3.3Problems of existing system18-19
3.4Objectives of the proposed system19
3.5System design19-20
3.6System specification21
3.6.1 Input specification21-22
3.7  Input and output forms software process model 22-25
3.7.1 File design25-33
3.8System requirement34
3.8.1Hardware requirement34
3.8.2Software requirement34

Chapter four: design and implementation
4.0System implementation and maintenance35
4.1Introduction                                                                                                        35
4.2Implementation issues35
4.3Choice of programming language35
4.4Coding35-36
4.5 System changeover plan36
4.6System maintenance36

Chapter five: summary, conclusion and recommendation
5.1Summary37
5.2Conclusion                                                                                                    37-385.3Recommendation                                                                                       38
References                                                                                                      39-42
Appendix                                                                                                                  43-49
LIST OF FIGURES
FIGURE 1.03
FIGURE 3.1 20
FIGURE 3.222
FIGURE 3.3                                                                                                                23
FIGURE 3.4 24
FIGURE 3.524
FIGURE 3.6                               24
FIGURE 3.7 25
FIGURE 3.825
FIGURE 3.9                               26
FIGURE 3.1026
FIGURE 3.1127
FIGURE 3.12                             27
FIGURE 3.1328
FIGURE 3.1428
FIGURE 3.15                             28
FIGURE 3.1629
FIGURE 3.1729
FIGURE 3.18                              29
FIGURE 3.1930
FIGURE 3.2030
FIGURE 3.21                              31
FIGURE 3.22                               31
FIGURE 3.2333






  • Department: Computer Science
  • Project ID: CPU2298
  • Access Fee: ₦5,000
  • Pages: 67 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 385
Get this Project Materials
whatsappWhatsApp Us