Professional Documents
Culture Documents
CHAPTER 1
INTRODUCTION
1.1 Project description
Prison management system software is developed to computerize process of daily
activities with in and our time, daily wages, criminal records, case status..etc. These
details are available on website which can be visible by higher authorities from any
location. This application will manage each prisoner details in a organized manner. As
the database is centralized modification done by any higher official will reflect in
database. This application will help higher officials to view records of each prisoner
details and take respective actions.
Prison management is a daunting task and especially when the numbers are too
high to handle, resources are minimal to manage and there is lack of trained manpower to
manage pressures and crisis situations. In case of Goa, two major set of challenges were
identified in relation to prison affairs management. One challenge was from the prison
administration perspective. The manual prison administration was plagued by ills of a
traditional administrative and management structure. These included time consumption
process, human errors in administering records and registers of prison inmates, and
management hurdles in compilation and analysis of data due to lack of data and
information accuracy.
For example, the manual visitor’s management could not track photographs of
visitors, fingerprints taken were not recorded, difficulty to track the previous convictions
of the inmates with regard to other trials pending and so on. Remission, release and bail
calculations were extremely time consuming and prone to data and information errors.
Human errors in information and data management amounted to 40 % to 50 % of total
defaults. Overall, the impact from these was no less disturbing. Sharing of accurate data
and information within the department and other stakeholders was a problem. Right
decisions at right time could not be taken when needed. The challenge was “rule of law”
could not be successfully implemented.
In any prison management system, basic agenda is to solve single criteria that each
and every detail activity of the prisoners should be monitored inside the prison. So we
should have each and every detail like prisoner’s health, status, work, sentence, visitors,
etc.
The solution for our problem statement is that the web designers who assist in
developing a website to keep track of prisoner details everyday has to create a website in
such a way that a board member of that prisoner or a police officer must login to it and
see each and every detail of prisoners inside the prison.
CHAPTER 2
In India, there are lot of prison management systems like prison management
system(PMS) in Mumbai central prison, Maharashtra and many more. But the drawback
is it is hard to keep track of each prisoner entire day.
Drawbacks:
5. Keyboard: normal
Database: XAMPP
2.5 Analysis
Use cases: A use case describes a sequence of actions that provides something of
measurable value to an actor and is drawn as a horizontal ellipse.
Actors: An actor is a person, organization, or an external system that plays a role
in one or more interactions with the system.
Associations: Associations are shown between actors and use cases by drawing a
solid line between them.
Login
Retrieve
prisoner details
Other details on
admin prisoner
Log out
The figure shows the use case diagram for the admin page. when the admin enter to
the login page by giving correct username and password he can able to see the detail of
the prisoners, he can able to insert the details of the new prisoners, he can delete the
prisoners and he can also able to logout from the database.
Maintains database
Process requests
Accepts requests
admin
Provides details
Process
termination
It is common practice to draw the context-level data flow diagram first, which
shows the interaction between the system and external agents which act as data sources
and data sinks. On the context diagram the system's interactions with the outside world
are modeled purely in terms of data flows across the system boundary.
Get
prisoner details
In the above figure the dataflow diagram shows that the admin or the police can
enter the login page by giving username and password. If the username and password is
successful the he can get the database. Otherwise it shows the popup message as log in
unsuccessful.
After login the admin can able to get the details of the prisoners, he can able to
delete the prisoner, he can insert the details of the new prisoner and he can also able to
logout. This is what this dataflow diagram explains.
CHAPTER 3
SYSTEM DESIGN
3.1 ER Diagram
Entity Relationship model (ER model for short) is an abstract way to describe
a database design. It usually starts with a relational database, which stores data in tables.
Some of the data in these tables point to data in other tables. Data in the table is retrieved
using primary key. The primary key is the one which uniquely identifies each record in
the table in relational database management system.In ER Diagram an entire may be
defined as a thing which is recognized as being capable of an independent existence and
which can be uniquely identified. An entity is an abstraction from the complexities of a
domain.
A relationship captures how entities are related to one another. Entity–relationship
diagrams don't show single entities or single instances of relations. Rather, they show
entity sets and relationship sets.
nid
fno
1
dob User_tbl
registration 1
name Gets
transferred
to contacts
id
pno
N decides
N Police station
sid
Logs
addr
into 1
sname
1
court Issues
complaint
1
sen
fno 1
nid
admin announce
text
id Name to sid
Apache is the most widely used web server software. Developed and maintained by
Apache Software Foundation, Apache is an open source software available for free. It
runs on 67% of all webservers in the world. It is fast, reliable, and secure. It can be highly
customized to meet the needs of many different environments by using extensions and
modules. Most WordPress hosting providers use Apache as their web server software.
Mysql(XAMPP)
Repository www.apachefriends.org
3.2.2 Normalization
The inventor of the relational model Edgar Codd proposed the theory of
normalization with the introduction of First Normal Form, and he continued to extend
theory with Second and Third Normal Form. Later he joined with Raymond F. Boyce to
develop the theory of Boyce-Codd Normal Form.
Theory of Data Normalization in SQL is still being developed further. For example, there
are discussions even on 6th Normal Form. However, in most practical applications,
normalization achieves its best in 3rd Normal Form.
These tables can be normalized into one of an table called product which links all the
tables to an normalized form.
The tables announce and user_tbl are completely dependent on the table police_station
without user_tbl there is no presence for tables so, we are normalizing the table user_tbl
by creating a new table called police_station which holds all the prisoner details and the
status of prisoners under one relation .
CHAPTER 4
4.1 Algorithm
ADMIN CONNECTION
ADMIN MENU
Step1: after the admin is logged in an menu is created for the admin to choose for any
addition (insertion) or deletion.
Step4: Home
Member Login
Prison section
complaint
Step5: on clicking on any of the option it redirects to another page of php where an
insertion or deletion operation can be done.
Step1: when the admin decides to insert additional data to the database he logs in and
selects the member login from the menu.
Step2: In this the admin has to enter national id,full name,date of birth, address, country,
gender, education, status, offence, datein, file number
Step3:When all the data’s are entered he submits it then the query in step4 runs.
Step4: All the data is taken and is being added in the query saying insert into prisoner
information(national id,full name,date of birth, address, country, gender, education,
status, offence, date in,file number) values (the values entered by the admin).
Step5: Again the connection is established and the data’s are compared with format that
is given in the correct format If yes then the values are added.
Step6: After the insertion of new values Is done a message pops up saying 1 data
successfully added.
Step7: If the values entered is not as per the format mentioned the message pops up
saying
Data addition unsucessful.
Step8: An html code is written for getting the data from the from the admin in the front
end and so then the step1 starts.
Step1: when the admin wants to delete a data from the front end. He just have to press the
delete button present below in the prisoner information page.
Step2: when the delete button is pressed the query to delete a data from the database is
written as shown in step3.
Step3: delete from prisoner information where national id is the national id entered.
Step4: A message pops up saying the data has been deleted.
Step5: repeat from step1 for as many data to be deleted
4.2 Results
4.2.1 Snapshots:
Fig 4.2 Above snapshot shows the Introduction about the site
In future we can be upgraded with new features like sms alerts for the guards and
supervisors regarding their job shift time. We can also store the visitors details we are
come to visit the particular details. We can also improve the security system by using
emerging techniques.
BIBLIOGRAPHY