You are on page 1of 28

PRISON MANAGEMENT SYSTEM

CHAPTER 1
INTRODUCTION
1.1 Project description
Prison management system software is developed to computerize process of daily
activities with in and our time, daily wages, criminal records, case status..etc. These
details are available on website which can be visible by higher authorities from any
location. This application will manage each prisoner details in a organized manner. As
the database is centralized modification done by any higher official will reflect in
database. This application will help higher officials to view records of each prisoner
details and take respective actions.

Prison management is a daunting task and especially when the numbers are too
high to handle, resources are minimal to manage and there is lack of trained manpower to
manage pressures and crisis situations. In case of Goa, two major set of challenges were
identified in relation to prison affairs management. One challenge was from the prison
administration perspective. The manual prison administration was plagued by ills of a
traditional administrative and management structure. These included time consumption
process, human errors in administering records and registers of prison inmates, and
management hurdles in compilation and analysis of data due to lack of data and
information accuracy.

For example, the manual visitor’s management could not track photographs of
visitors, fingerprints taken were not recorded, difficulty to track the previous convictions
of the inmates with regard to other trials pending and so on. Remission, release and bail
calculations were extremely time consuming and prone to data and information errors.
Human errors in information and data management amounted to 40 % to 50 % of total
defaults. Overall, the impact from these was no less disturbing. Sharing of accurate data
and information within the department and other stakeholders was a problem. Right
decisions at right time could not be taken when needed. The challenge was “rule of law”
could not be successfully implemented.

DEPARTMENT OF CSE,MITT Page 1


PRISON MANAGEMENT SYSTEM

1.2 Objective of Project

In any prison management system, basic agenda is to solve single criteria that each
and every detail activity of the prisoners should be monitored inside the prison. So we
should have each and every detail like prisoner’s health, status, work, sentence, visitors,
etc.

The solution for our problem statement is that the web designers who assist in
developing a website to keep track of prisoner details everyday has to create a website in
such a way that a board member of that prisoner or a police officer must login to it and
see each and every detail of prisoners inside the prison.

DEPARTMENT OF CSE,MITT Page 2


PRISON MANAGEMENT SYSTEM

CHAPTER 2

REQUIREMENTS AND ANALYSIS

2.1 Existing system

In India, there are lot of prison management systems like prison management
system(PMS) in Mumbai central prison, Maharashtra and many more. But the drawback
is it is hard to keep track of each prisoner entire day.

Drawbacks:

 Hard task in monitoring


 Lack of technology in security systems
 More crime in society increasing prisoners

2.2 Proposed system

To avoid the drawbacks of current system, we come with a webpage application


for which can be made access to both board members and the police officers to track
activities of every prisoner at any time. This can be a great help for all security forces in
looking after the prisoners and can help them to get their information any time.

2.3 Hardware requirements

1. PROCESSOR: Pentium 4 and higher (1.2GHZ and higher)

2. RAM: 4GB and higher

3. HARD DISK: 20GB or higher.

4. Monitor: 15”CRT or LCD monitor

5. Keyboard: normal

6. Mouse: compatible mouse

DEPARTMENT OF CSE,MITT Page 3


PRISON MANAGEMENT SYSTEM

2.4 Software requirements

 Operating system: Windows XP/7.

 Coding Language: HTML, PHP, CSS.

 Database: XAMPP

2.5 Analysis

System analysis is a detailed study of the various operations performed by a


system and their relationships within and outside the system. It is a systematic technique
that defines goals and objectives. The goal of system development is to deliver the system
in line with the user’s requirement, and analysis of the system plays an important role.
One of the main aspects of analysis is defining the boundaries of the system. System
study has been conducted with the following objectives:
(1)Identify user’s need.
(2) Evaluate the system concept for feasibility.
(3)Perform economical and technical analysis.
(4)Allocate functions to hardware, software, people, database, etc.

The various tools of structured analysis are:


 Entity-Relationship Diagram
 Data Flow Diagram
 Sequence Diagram
 Use-case Diagram

DEPARTMENT OF CSE,MITT Page 4


PRISON MANAGEMENT SYSTEM

2.5.1 Use case Diagram


Use-case diagram is a coherent piece of functionality that a system can provide by
interacting with actors. In our system, all the modules are going to interact with one or the
other actors (different actors could be new recruits, police officers, database admin). The
use case technique is used to capture a system behavioral by dealing scenario drives
threads through the functional requirements. The components in a use case diagram
include:

 Use cases: A use case describes a sequence of actions that provides something of
measurable value to an actor and is drawn as a horizontal ellipse.
 Actors: An actor is a person, organization, or an external system that plays a role
in one or more interactions with the system.
 Associations: Associations are shown between actors and use cases by drawing a
solid line between them.

Login

Retrieve
prisoner details

Other details on
admin prisoner

Log out

Fig 2.1: Use case diagram for admin module

DEPARTMENT OF CSE,MITT Page 5


PRISON MANAGEMENT SYSTEM

The figure shows the use case diagram for the admin page. when the admin enter to
the login page by giving correct username and password he can able to see the detail of
the prisoners, he can able to insert the details of the new prisoners, he can delete the
prisoners and he can also able to logout from the database.

Maintains database

Process requests

Accepts requests

admin
Provides details

Process
termination

Figure 2.2: Use case diagram of Admin Module

DEPARTMENT OF CSE,MITT Page 6


PRISON MANAGEMENT SYSTEM

2.5.3 Data flow diagram (DFD)

A data flow diagram (DFD) is a graphical representation of the "flow" of data


through an information system, modeling its process aspects. Often they are a preliminary
step used to create an overview of the system which can later be elaborated. DFDs can
also be used for the visualization of data processing (structured design).

It is common practice to draw the context-level data flow diagram first, which
shows the interaction between the system and external agents which act as data sources
and data sinks. On the context diagram the system's interactions with the outside world
are modeled purely in terms of data flows across the system boundary.

Enter/search gets stored in


Prisoner details database
Police Database
Registration
/admin process

Figure 2.3: Level 1 DFD

DEPARTMENT OF CSE,MITT Page 7


PRISON MANAGEMENT SYSTEM

Login valid user


Police/admin Checking for
valid user and Database
details ent check for valid
user

Get

prisoner details

Figure 2.4: Level 2 DFD

In the above figure the dataflow diagram shows that the admin or the police can
enter the login page by giving username and password. If the username and password is
successful the he can get the database. Otherwise it shows the popup message as log in
unsuccessful.

After login the admin can able to get the details of the prisoners, he can able to
delete the prisoner, he can insert the details of the new prisoner and he can also able to
logout. This is what this dataflow diagram explains.

DEPARTMENT OF CSE,MITT Page 8


PRISON MANAGEMENT SYSTEM

CHAPTER 3

SYSTEM DESIGN

3.1 ER Diagram

Entity Relationship model (ER model for short) is an abstract way to describe
a database design. It usually starts with a relational database, which stores data in tables.
Some of the data in these tables point to data in other tables. Data in the table is retrieved
using primary key. The primary key is the one which uniquely identifies each record in
the table in relational database management system.In ER Diagram an entire may be
defined as a thing which is recognized as being capable of an independent existence and
which can be uniquely identified. An entity is an abstraction from the complexities of a
domain.
A relationship captures how entities are related to one another. Entity–relationship
diagrams don't show single entities or single instances of relations. Rather, they show
entity sets and relationship sets.

DEPARTMENT OF CSE,MITT Page 9


PRISON MANAGEMENT SYSTEM

nid
fno

transfer uid password


date

1
dob User_tbl

registration 1
name Gets
transferred
to contacts
id
pno
N decides
N Police station

sid
Logs
addr
into 1
sname
1

court Issues
complaint
1
sen
fno 1
nid
admin announce

text

id Name to sid

Fig 3.1: Entity relationship diagram

DEPARTMENT OF CSE,MITT Page 10


PRISON MANAGEMENT SYSTEM

3.2 Database Techniques

Advanced Database Techniques combines advanced techniques with practical


advice and many new ideas, methods, and examples for database management students,
system specialists, and programmers. It provides a wealth of technical information on
database methods and an encyclopedic coverage of advanced techniques that other
current books on database lack. An overview covers important definitions in the area of
database management and describes such classical notions as file structures, conceptual,
physical and external schemas, and relational, network, hierarchical, and entity-
relationship models. Remaining chapters offer advanced techniques, methods, and
practical advice for functional specification and system design of a database-oriented
interactive application; database architecture with qualitative and quantitative
optimizations; the prediction of loads and response times; data representation, packing,
and protection; selection of data elements and structures in a database; practical
extensions of the relational theory to include dynamic relations and schemas, existence
and processing constraints and coroutines; software architectures (functional interface and
decision machine); and open databases for robotics, image processing, CAD, and artificial
intelligence.Extended definitions are provided for conceptual schema, view, soft
constraints and selection, relation, and dynamic schema. And an entire chapter is devoted
to MSD, a new relational approach to specification and design. New software
architectures for database applications are also covered. Advanced Database
Techniques describes the 15 functions of a database management system and its internal
mechanisms and provides a complete product review of the DBMS ORACLE as well as
advice on DBMS purchasing and database administration.

3.2.1 SQL Server

Apache is the most widely used web server software. Developed and maintained by
Apache Software Foundation, Apache is an open source software available for free. It
runs on 67% of all webservers in the world. It is fast, reliable, and secure. It can be highly
customized to meet the needs of many different environments by using extensions and
modules. Most WordPress hosting providers use Apache as their web server software.

DEPARTMENT OF CSE,MITT Page 11


PRISON MANAGEMENT SYSTEM

Mysql(XAMPP)

Is an open source relational database management system (RDBMS) which is integrated


in the xampp webserver.

XAMPP is a free and open source cross-platform web server solution


stack package developed by Apache Friends,consisting mainly of the Apache HTTP
Server, MariaDB database, and interpreters for scripts written in
the PHP and Perl programming languages .XAMPP stands for Cross-Platform (X),
Apache (A), MariaDB (M), PHP (P) and Perl (P). It is a simple, lightweight Apache
distribution that makes it extremely easy for developers to create a local web server for
testing and deployment purposes. Everything needed to set up a web server – server
application (Apache), database (MariaDB), and scripting language (PHP) – is included in
an extractable file.

Developers Apache Friends

Repository www.apachefriends.org

Written in Various languages

Operating Cross-platform; Linux; Windows; Solaris; macOS


System

DEPARTMENT OF CSE,MITT Page 12


PRISON MANAGEMENT SYSTEM

3.2.2 Normalization

The inventor of the relational model Edgar Codd proposed the theory of
normalization with the introduction of First Normal Form, and he continued to extend
theory with Second and Third Normal Form. Later he joined with Raymond F. Boyce to
develop the theory of Boyce-Codd Normal Form.
Theory of Data Normalization in SQL is still being developed further. For example, there
are discussions even on 6th Normal Form. However, in most practical applications,
normalization achieves its best in 3rd Normal Form.

The evolution of Normalization theories is illustrated below-

Database Normalization Examples -


Assume a video library maintains a database of movies rented out. Without any
normalization, all information is stored in one table as shown below.
The normalization has been applied for user_tbl table where it can be of two types
and for differentiating them we are dividing them into a table named police_station
where the attributes are implemented into one.

DEPARTMENT OF CSE,MITT Page 13


PRISON MANAGEMENT SYSTEM

3RD Normal form

announce To Sid subject message

Police_station Sid sname address uid password

User_tbl Uid uname password address phone

These tables can be normalized into one of an table called product which links all the
tables to an normalized form.

The tables announce and user_tbl are completely dependent on the table police_station
without user_tbl there is no presence for tables so, we are normalizing the table user_tbl
by creating a new table called police_station which holds all the prisoner details and the
status of prisoners under one relation .

frid complete dependency over vid,fid

Police_station Sid uid address password sname

DEPARTMENT OF CSE,MITT Page 14


PRISON MANAGEMENT SYSTEM

CHAPTER 4

IMPLEMENTATION AND RESULTS

4.1 Algorithm

ADMIN CONNECTION

Step 1:Using MySQLi object-oriented procedure:

Step2:Using MySQLi procedural procedure

Step3: Using php data objects procedure


Step4: Get admin username data and admin password data from the html and post it on
mysql databse
Step5: If the entered admin user name and admin password entered exist in the database
then a it is compared using a selection query and id it exists then connection
is established.
Step6: the admin is loged in now.
Step7: if the admin user name and password entered doesnot exist in the database then an
error message is giving as user name or password is incorrect. Return to step4 to try
loging in again.

ADMIN MENU

Step1: after the admin is logged in an menu is created for the admin to choose for any
addition (insertion) or deletion.

Step3:the menu has 4 options.

Step4: Home
Member Login
Prison section
complaint

DEPARTMENT OF CSE,MITT Page 15


PRISON MANAGEMENT SYSTEM

Step5: on clicking on any of the option it redirects to another page of php where an
insertion or deletion operation can be done.

INSERTION CODE THROUGH ADMIN

Step1: when the admin decides to insert additional data to the database he logs in and
selects the member login from the menu.

Step2: In this the admin has to enter national id,full name,date of birth, address, country,
gender, education, status, offence, datein, file number

Step3:When all the data’s are entered he submits it then the query in step4 runs.
Step4: All the data is taken and is being added in the query saying insert into prisoner
information(national id,full name,date of birth, address, country, gender, education,
status, offence, date in,file number) values (the values entered by the admin).
Step5: Again the connection is established and the data’s are compared with format that
is given in the correct format If yes then the values are added.
Step6: After the insertion of new values Is done a message pops up saying 1 data
successfully added.
Step7: If the values entered is not as per the format mentioned the message pops up
saying
Data addition unsucessful.
Step8: An html code is written for getting the data from the from the admin in the front
end and so then the step1 starts.

DELETION CODE THROUGH ADMIN

Step1: when the admin wants to delete a data from the front end. He just have to press the
delete button present below in the prisoner information page.
Step2: when the delete button is pressed the query to delete a data from the database is
written as shown in step3.
Step3: delete from prisoner information where national id is the national id entered.
Step4: A message pops up saying the data has been deleted.
Step5: repeat from step1 for as many data to be deleted

DEPARTMENT OF CSE,MITT Page 16


PRISON MANAGEMENT SYSTEM

4.2 Results
4.2.1 Snapshots:

Fig 4.2 Above snapshot shows the Introduction about the site

DEPARTMENT OF CSE,MITT Page 17


PRISON MANAGEMENT SYSTEM

Fig 4.3 Above snapshot shows the Index page

DEPARTMENT OF CSE,MITT Page 18


PRISON MANAGEMENT SYSTEM

Fig4.4 Above snapshot shows the Login page

DEPARTMENT OF CSE,MITT Page 19


PRISON MANAGEMENT SYSTEM

Fig4.5 Above snapshot shows the Home page

DEPARTMENT OF CSE,MITT Page 20


PRISON MANAGEMENT SYSTEM

Fig 4.6 Above snapshot shows the Complaint panel

DEPARTMENT OF CSE,MITT Page 21


PRISON MANAGEMENT SYSTEM

CONCLUSION AND FUTURE ENHANCEMENT


The application PMS(prison management system) will be used by all prison
administrators around the world for as well as the police officers in the remote areas.
Those who are already using an phone, can register with their phone number and get an
account. The data sent by them will be stored in the corresponding account. The experts
may provide their advice to that particular phone number. By this application, the officers
may be able to get each and every bit of access on activities of all prisoners at any time
through the online web portal which is dedicated to mainly the police officers. Using this
application, officers may manage and monitor prisoners daily activities with ease. Special
features which would popularize the application are Simple Graphical User Interface
(GUI) that can be used by everybody. One Stop Solution” to all kinds of issues to the
officers. The main objective of this project is build a website which will help the
administrators of prison and the police officers to maintain a tactical and pricise record of
all prisoners which is satisfied in this project.

In future we can be upgraded with new features like sms alerts for the guards and
supervisors regarding their job shift time. We can also store the visitors details we are
come to visit the particular details. We can also improve the security system by using
emerging techniques.

DEPARTMENT OF CSE,MITT Page 22


PRISON MANAGEMENT SYSTEM

BIBLIOGRAPHY

[1] Database systems Models, Languages, Design and Application programming –


Elmasri and Shamkant B.Navathe,7th Edition,2017,pearson.

[2] Database management systems, Ramkrishnan and Gehrke,3rd


Edition,2014,McGrawHill.

[3] Silberschatz Korth and Sudharshan, Database system concepts,6th


Editon,McGrawHill,2013.

[4] Coronel,Morris and Rob,Database Principles Fundamentals of Design,


Implementation and management ,Cengage Learning 2012.

DEPARTMENT OF CSE,MITT Page 23


PRISON MANAGEMENT SYSTEM

DEPARTMENT OF CSE,MITT Page 24


PRISON MANAGEMENT SYSTEM

DEPARTMENT OF CSE,MITT Page 25


PRISON MANAGEMENT SYSTEM

DEPARTMENT OF CSE,MITT Page 26


PRISON MANAGEMENT SYSTEM

DEPARTMENT OF CSE,MITT Page 27


PRISON MANAGEMENT SYSTEM

DEPARTMENT OF CSE,MITT Page 28

You might also like