Professional Documents
Culture Documents
COLLEGE OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE
Group member ID
Submttted to
College of Computing Department of Computer Science
Submitted by :Group 4
Robe,Ethopia
March 2022
I
EXAMINERS APPROVEL SHEET
Project title: prisoners online information managemaent system for goba city
Name of Student Signature date
1. _______________________________________
2. _______________________________________
3. _______________________________________
4. _____________________________________
2
Abstract
The system analysis is prepared for web Based prisoner Management system and the
description of existing system description system, implementation of new system . include In
the first chapter we try to identify the Back ground of the study and the project and statement
of problem in existing system and limitation .
In the next chapter our study about the existing system ,identify problem encountered in the
system and in the rest chapter we are tying model the system ,design new system
The methodology we will be using is Object-oriented system analysis and design (OOSAD)
from object oriented the team will select Iterative method . After determining requirement
specification then the system tool design in accordance with specifications language and
implementation will be carried out using HTML5, CSS, PHP, JavaScript, XAMP server and
MYSQL, database. The current system will be design to be interactive and comfortable in
management of the system and will provide integrated service. This system will help for Goba
central prison institute to access their data easily and to reduce work load.
3
ACKNOWLEDGMENT
Firstly we would like to thank our almighty GOD to keep as full of health to prepare and come
up with this project. Then we would like to thank Computer science department for giving as this
chance to do this project. More over, we would like to express our gratitude to our Advisor Mr.
Muhammed At the last not the least, we would like to express our deepest appreciation to
those people who support us for successful in working of this proj Finally we would like to
thank alla who are help us
4
TABLE OF CONTENTS
ACKNOWLEDGMENT...............................................................................................................................4
CHAPTER TWO:- STUDY OF EXISTING SYSTEM.....................................................................................15
2.1 Introduction...............................................................................................................................15
2.2 LITERATURE REVIEW.....................................................................................................................15
2.3 description of Existing system....................................................................................................15
2. 4 Draw Back of existing system........................................................................................................16
2.6 Business rule.................................................................................................................................16
2.7 Alternative solution.......................................................................................................................17
CHAPTER THREE :- THE PROPOSED SYSTEM........................................................................................20
3.1 over view of proposed system......................................................................................................20
3.3 Functional requirements...........................................................................................................20
3.4 NON FUNCTIONAL REQUIREMENT............................................................................................21
Graphical user interface.......................................................................................................................22
Chapter four : System model..............................................................................................................25
4.1 Introduction....................................................................................................................................25
4.3 use case identification.....................................................................................................................25
4.4 system use case diagram...........................................................................................................27
4.4.1 Actor Description:–...............................................................................................................27
4.4.2 Use case Description:- describe in the following table................................................................27
4.5.1 Sequence diagram........................................................................................................................35
4.5.2 Collabaration Diagram..................................................................................................................43
4.5.3 Activity diagram......................................................................................................................46
4.6.1 CLASS DIAGRAM..........................................................................................................................54
4.6.2 Object Diagram.............................................................................................................................54
5
list ofTable
TABLE 3. 1 DISCRIPTION FOR LOGIN....................................................................................................32
TABLE 3. 2 DISCRIPTION FOR REGISTRATION...................................................................................32
TABLE 3. 3 DISCRIPTION FOR VIEW BY GENDER..............................................................................33
TABLE 3. 4 DISCRIPTION FOR VIEW BY CRIME TYPE......................................................................33
TABLE 3. 5 DISCRIPTION FOR SEARCH................................................................................................33
TABLE 3. 6 DISCRIPTION FOR VIEW RELEASEMENT BY REDUCTION.........................................34
TABLE 3. 7 DISCRIPTIONFOR VIEW BY RELEASEMENT BY APOLOGY........................................34
TABLE 3. 8 DISCRIPTION FOR VIEW RELEASING PRISONER..........................................................35
TABLE 3. 9 DISCRIPTION FOR SEND REQUEST MESSAGE FOR HOI..............................................35
TABLE 3. 10 DISCRIPTION SEND APPROVAL MESSAGE FOR PIOAO DIRECTOR........................35
TABLE 3. 11 DISCRIPTION FOR SSO AND MBO DIRECTORS SENDING REQUEST MESSAGE. .36
TABLE 3. 12 DISCRIPTION FOR SEND APPROVAL MESSAGE FOR SSO AND MBO DIRECTORS
..............................................................................................................................................................36
TABLE 3. 13 DISCRIPTION FOR VIEW MESSAG..................................................................................37
TABLE 3. 14 DISCRIPTION FOR SEARCH BY FINGER PRINT............................................................37
TABLE 3. 15 DISCRIPTION FOR UPDATE..............................................................................................38
6
List of of figures
FIGURE 3. 7 SEQUENCE DIAGRAM FOR VIEW BY CRIME TYPE, UPDATE AND DELETE FILE...............43
FIGURE 3. 8 SEQUENCE DIAGRAM FOR VIEW BY SEARCHING....................................................................45
FIGURE 3. 9 SEQUENCE DIAGRAM FOR SEARCH BY FINGERPRINT............................................................45
FIGURE 3. 10 SEQUENCE DIAGRAM FOR STATISTICAL REPORT..................................................................46
FIGURE 3. 11 SEQUENCE FOR SSO AND MBO SENDING REQUEST AND RECIEVING APPROVAL........46
FIGURE 3. 12ACTIVITY DIAGRAM FOR LOGIN....................................................................................................48
FIGURE 3. 15 ACTIVITY DIAGRAM FOR SEARCH BY FINGER PRINT.............................................................51
FIGURE 3. 16 ACTVITY DIAGRAM FOR VIEW STATISTICAL REPORT............................................................52
FIGURE 3. 17 ACTIVITY DIAGRAM FOR UPDATE FILE......................................................................................53
FIGURE 3. 18 ACTIVITY DIAGRAM FOR DELETING FILE...................................................................................54
FIGURE 3. 19 ACTIVITY DIAGRAM FOR SENDING APPROVAL MESSAGE....................................................55
FIGURE 3. 20 VIEW MESSAGE..................................................................................................................................56
FIGURE 3. 21ACTIVITTY DIAGRAM FOR SSO AND MB DIRECTORS SENDING REQUEST MESSAGE......56
FIGURE 3. 22 CLASS DIAGRAM................................................................................................................................58
List of acronym
7
GCOPIMS: ---------------------------Goba city online prisoners’ information management system
PIOAO:---------------------------------prisoners in and out office
HOI:-------------------------------------head of institute
SSO:----------------------------------security and safety office
MDO: --------------------------------maintaining discipline office
OOSAD:----------------------------object oriented system analysis and design
UML:-------------------------------unified modeling language
Chapter one
Introduction
8
The prison of goba town in bale zone is established in 1945 as well as at this time the prison it have
1470 prisoner .Goba central prison institute is one of the most renowned prison around Oromia region.
It have both military and civil employees. However this prison operates its work by manual system
which is not compatible with recent technology; i.e. Traditional way. As we know manual system is a
system which requires human labour for every processing of data it comprises searching, updating,
retrieving, deleting etc. Of data (file) by human labour.so, transforming this system to computer based
system seems to us crucial. Due to this it is very tiresome and time consuming activity to manage the
information of the institute; especially the prisoners’ information. That is why we are dared to improve
the working environment to computerized system by making it web based system for the sake of easy
manipulation of information.
9
1.3.2 Specific Objective
We can achieve the general objective by fulfilling the specific objective listed below:
To design a system which register prisoners.
To enable assigner to assign a Room for prisoners.
To design a system enable officer take an attendance.
To Design a system generate report
10
to retrieving,
searching,
updating,
It will able to identify repetitive prisoner
It save time
The system can automatically calculate the amount of date for prisoners who have to be
released by apology (excuse) and
Calculating the amount of day that will be reduced from the prisoner’s sentenced date
(which is difficult with manual work)
The service provided by employees will be fast as possible.
The system will easily generate statistical report
Reduce wastage of time
Increase usability
11
Object are easier for people understand .
Data process are kept together the main reason we decide to use the object approach.
Code can be reused easily .
To be able to change our existing code to fit.
Its is more flexible .
BACK END
XAMPP Server
Design tool:-visual studio
Adobe photoshop Cs4:-Red and write video and photo fle
Google chrome:-is the fast easy to use and secure web brow
12
The team will use this laptop computer because it is compatible with the system that is going to
be developed in this project.
System requirements is a statement that identifies the functionality that is needed by a system in
order to satisfy the customer’s requirements.
13
No Item Quantity Cost
Per unit Total
1 Paper Under half packet
2 Print 5 40 200
3 Transport - - 400
4 Laptop 1 25000 25000
5 Desktop 1
6 Networking cable 1 100 100
1.7.3
8 Internet usage
9 Removal disk 16 GB 360 360
Total 26060
14
Luck of data lost Low Backup and restore data
15
The following areas will have the operational feasibility in the proposed project
The organization has approved this system as their working system.
The user of the system has accepted the proposed system as their new working system
and realized the benefits of it.
This existing system can handle prisoner information manually by using paper as well as right
same information on desktop computer so it is difficult to manage prisoner data The existing
system has several disadvantages and many more difficulties to work
The director of each office can manage and manipulate all the information about the prisoners
by paper form in general the institution cn not easily access and provided prisoner information
for which office that required Report
16
Strength of existing system
Team work utilization
Proper communication
Departementalization
weakness of existing system
Since the Goba central prison performs registration, report manually, to find any prison
detail information it takes much time.
Difficult to manage the overall system
Duplication of data occurs when data input into the system.
The data stored takes more rooms.
A need for extra manual effort
Since the system currently uses the manual system it is not economically sufficient i.e.
there is a redundancy of activities,
Currently, almost there is no control and security mechanism within the office.
The services provided by the office are not as fast as possible because the service
providers are busy with the paper and paper related activities.
There will be calculation error during the release of prisoners
17
can cause an irreparable damage.Slow, tedious, time consuming:-
Searching a record is difficult
Lack of security:-
any changes load or maximum demand mayend up being
Information redundancy:
Suchredundancies are not required as the information is already stored previous
18
Be honesty and responsible to institution
Save from illegal act which harm to institution ,prisoner and society
Not allowed smoking and taking illegal drugs
Rule3:Administator
Announce the correct information about institution and give orientation for
prisoners
Inform prisoner information for required body
Maintain employee skill and initiate them
Give command to worker to give quality service
Respect workers right
Control every activity
19
2.8 FORM USED
20
21
CHAPTER THREE :- THE PROPOSED SYSTEM
22
View prisoners: The system must have a fast and easy searching method using different
attributes of the prisoner’s record
Export to excel: export (download) to excel prisoner and officer information from the
database.
Viewing prisoner’s file:the user will be able to view each prisoners file by using whether
finger print orregister number.
Search by finger print: using finger print ofany prisoner the user can fetch
Update prisoner file: The system should have a way of updating or modifying the
prisoner’s information with sufficient reason and authorization
Delete prisoner file:the authorized party can delete the prisoner unnecessary or repetitive
information if needed.
View releasement: The system will transfer the prisoner from the current prisoner’s table
to released prisoners table
Generate statistical report: the system will generate statistical report of the day
Send request message for HOI: if the director of prisoners in and out administrative
office need to update any information regarding the prisoners file the director need to get
approval from the head of the institute.
Send request message for Director of prisoner in and out administrator office: If
office of security and safety and maintaining discipline office needs prisoner file they must
send a request for the approval of the director to get access of certain prisoner file.
View message: if any request message has been sent to the user the user can see the
message.
Non-functional requirement define how the system is supposed to be and it often culled qualities of the
system
It specifies criteria’s that can be used to judge the operation of a system rather than specific behavior
over all it specify characteristics such as cost and reliability
Openness :system should define extend interface to allow easy addition of new data
Transparency :the over all process of online goba city jail prisoner management system
must be transparent for the user being easy to see
Usability
The user can use the system by looking at descriptive icons
The system is user-friendly and easy to use and requires less training to understand.
Security
The system only permits authorized user to enter the system. Authorized users are who
have username and passwords.
23
Error handling : there is the mechanism to handle error occur that is not stop system
functionality
Quality issues :information should be Accurate and update
24
3.5.1 Specification
System requirement specification (SyRS) is a detailed outline of the requirements
necessary to create a complete system.
is a structured collection of information that embodies the requirements of a system.
25
3.5.3 USER INTERFACE PROTO TYPE(SNAP SHOOT)
Prototyping is the process of building a model of a system. In terms of an information system,
prototypes are employed to help system designers build an information system that intuitive and
easy to manipulate for end users. Prototyping is an iterative process that is part of the analysis
phase of the systems development life cycle
26
CHAPTER FOUR : SYSTEM MODEL
4.1 INTRODUCTION
System model is the conceptual model that describe and represent the system The techniques
and associated notation used for object-oriented analysis and design incorporated into a standard
object-oriented language called Unify Modeling language (UML). An important goal of
requirement modeling comes to an understanding of the problem that the new system is to
address. Modeling is vocabulary of the system that used to make decision about which
abstraction is parts of the system and which fail outside boundary of system modeling to improve
and understanding of a situation ,identifying of problem or formulating opportunities and
supporting decision making to model the system we must draw diffident diagram like use
case model, sequence diagram and activity diagram, and interface prototyping are also included.
HOI
SSO
MDO
System Administrator
27
assign room for prisoner
take finger printer
Retrieves prisoners information
28
MDO :- Perform action like login and search prisoner information
System Administrator :-Perform task like register user, login and search prisoner
information.
29
Table 3. 2 DISCRIPTION FOR REGISTRATION
30
Basic course of action User action System response
1.User clicks view prisoner 2. System display view prisoner
3. User choose and click page.
view by crime type 4. System display view by crime
5.choose crime type type page.
6.user clicks specific file 6. System will display files.
7.system display file
Frequency of use
Priority
Special requirement
Table 3. 5 DISCRIPTION FOR SEARCH
31
that get reduction.
32
Description The user is able to approve a request message about the approval
of discharging prisoners.
Precondition User name and password must be verified.
There must be a request file that have been sent by the director of
PIOAO
Basic course of action User action System response
1.user clicks message. 2.system display message page.
3 user clicks the file. 4.System display file.
5.user click approve. 6.system sends approval
message to director of PIOAO.
Table 3. 10 DISCRIPTION SEND APPROVAL MESSAGE FOR PIOAO DIRECTOR
33
approval message to
director of PIOAO.
Frequency of use
Priority
Special requirement
Table 3. 12 DISCRIPTION FOR SEND APPROVAL MESSAGE FOR SSO AND MBO
DIRECTORS
34
Description Update prisoner information whenever needed.
Precondition User name and password must be verified.
Prisoner’s information record must exist.
Post condition The prisoner information updated.
Basic course of action User action System respond
1.click view prisoner icon 2. The system will display view
3. The user as alternative will by gender, view by crime type
choose one of the three and search bar.
options. 4. The system will display the
5. Click one specific prisoner desired prisoner files based on the
file. unique attribute given.
7. Click the update button. 6. The system will display the full
9.the user will edit the file file of the required prisoner.
accordingly 8.the file will be editable
10.the user will click submit 11. The system will redirect to
button view prisoner page.
Table 3. 15 DISCRIPTION FOR UPDATE
35
page
Precondition User name and password must be verified
Basic course of action User action System response
1.user click view 2.system displays
statistical report view statistical report
page
Frequency of use
Priority
Special requirement
36
4.5 Dynamic Modeling
37
FIGURE 3. 1 SEQUENCE DIAGRAM FOR LOGINFIGURE
38
3. 2 SEQUENCE DIAGRAM FOR REGISTRATION
39
FIGURE 3. 4 SEQUENCE DIAGRAM FOR VIEW PRISONER BY GENDER TYPE
40
FIGURE 3. 5 SEQUENCE DIAGRAM FOR VIEW BY CRIME TYPE, UPDATE AND
DELETE FILE
41
FIGURE 3. 6 SEQUENCE DIAGRAM FOR VIEW BY SEARCHING
42
FIGURE 3. 8 SEQUENCE DIAGRAM FOR STATISTICAL REPORT
FIGURE 3. 9 SEQUENCE FOR SSO AND MBO SENDING REQUEST AND RECIEVING
APPROVAL
43
4.5.2 COLLABARATION DIAGRAM
44
Figure 11: Collaboration diagram for search Information
45
Figure 12: Collaboration diagram of generate report
46
4.5.3 Activity diagram
47
Figure 3. 11ACTIVITY DIAGRAM FOR REGISTRATION
48
Figure 3. 12 ACTIVITY DIAGRAM FOR VIEW RELEASEMENT PAGE
49
Figure 3. 13 ACTIVITY DIAGRAM FOR SEARCH BY FINGER PRINT
50
Figure 3. 14 ACTVITY DIAGRAM FOR VIEW STATISTICAL REPORT
51
Figure 3. 15 ACTIVITY DIAGRAM FOR UPDATE FILE
52
Figure 3. 16 ACTIVITY DIAGRAM FOR DELETING FILE
53
Figure 3. 17 ACTIVITY DIAGRAM FOR SENDING APPROVAL MESSAGE
54
Figure 3. 18 VIEW MESSAGE
55
56
57