Professional Documents
Culture Documents
BS (CS)
Batch: 2017 – 2021
Submitted by
MUHAMMAD MOIZ MOOSANI (39818)
BARKHA (39796)
ABDUL KAREEM (39878)
AZHAR TAHIR (39708)
Supervised By
SIR FAIZAN TAHIR
Coordinated By
SIR MANSOOR EBRAHIM
FACULTY OF ENGINEERING, SCIENCES AND TECHNOLOGY
IQRA UNIVERSITY, KARACHI
ABSTRACT
Prior to the 1970’s, the total number of incarcerated in population had scarcely ever risen above.
Today there are over million prison behind bars. Pakistan incarcerates more people than many
other nations. In fact, while Pakistan accounts for only 2.83 percent of the global population, 1.2
percent of the world’s prisoners are held by Pakistan. This thesis uses several different
techniques to study mass incarceration within Pakistan. First, Pakistan prison numbers and
incarceration rates are compared to those of other nations from around the world, and the social
impacts of various systems of mass incarceration are compared. This paper also examines the
history of executive and legislative initiatives which have allowed Pakistan to develop a good
prison network. Next, this thesis examines the interplay between corporate interest and the
perpetuation of a system of mass incarceration. Finally, propositions for downsizing Pakistan’s
prison system are examined.
The purpose of working on such product is just to create a system which will help and protect the
rights of prisoners who are under any law of Pakistan. Our system will work on specific cases
and will provide full and complete record of the prisoner to the law and security department as
well as the lawyer and other close personnel of that prisoner.
This system will help the court to make good and appropriate decisions according to the law of
Pakistan. All the records will be autonomous that is no more manual work. Prisoners will not be
suffering in prison more than their punishment time period according to the law of Pakistan.
We would also like to express thanks to all the teachers, they throughout our
studies helps us and guide us, and without their guidance, this journey would not
have been possible.
CONTENTS
ABSTRACT -------------------------------------------------------------------------------------- 02
AKNOWLEDGEMENT ----------------------------------------------------------------------- 03
6. TESTING ----------------------------------------------------------------------------------- 50
6.1 SYSTEM REQUIREMENTS -------------------------------------------------------- 50
6.2 MAIN DASHBOARD ---------------------------------------------------------------- 51
6.3 LOGIN PAGE -------------------------------------------------------------------------- 52
6.4 SYSTEM’S EVENT GENERATION PAGE -------------------------------------- 53
6.5 NEW PRISONER REGISTRATION ----------------------------------------------- 54
6.6 SYSTEM TESTING ------------------------------------------------------------------- 55
6.7 BILL OF MEASUREMENT AND EVALUATION ------------------------------ 55
7. TESTING ----------------------------------------------------------------------------------- 56
7.1 SCOPE ---------------------------------------------------------------------------------- 57
7.2 LIMITATIONS ------------------------------------------------------------------------ 57
7.3 CHALLENGES ------------------------------------------------------------------------ 57
7.4 FUTURE WORK ---------------------------------------------------------------------- 57
1. INTRODUCTION
Much of the literature explaining both mass incarceration and increasingly harsh
punishment policies has been dominated by a focus on factors external to prisons,
such as macro level explanations that point to political factors (like a popular
Many of the prisoners are still kept in the prison, although their time period of
punishment had been full-filed according to the laws of Pakistan, but due to delay
in their court hearings and manual data representations they are still in prison.
This system predicts the charges and imprisonment of prisoners for specific cases
evaluating the law act and the time period when the charge was filed against the
prisoners. This system will also help the court to grant the best possible hearing
date to the prisoner, and it also keeps track of all the records regarding to the
prisoner.
The prisoner advisory system provide the benefit to the state to give the most
appropriate decision considering the laws and regulations of Pakistan to the
prisoners, who are already in the prison on account of any charges regarding to the
laws of Pakistan. This system predicts the charges and imprisonment of prisoners
for specific cases evaluating the law act and the time period when the charge was
filed against the prisoners. This system will also help the court to grant the best
possible hearing date to the prisoner, and it also keeps track of all the records
regarding to the prisoner.
1.1 SYNOPSIS
The purpose of working on such product is just to create a system which will help
and protect the rights of prisoners who are under any law of Pakistan. Our system
will work on specific cases and will provide full and complete record of the
prisoner to the law and security department as well as the lawyer and other close
personnel of that prisoner.
1.2 ADVANTAGES
1.4 BENIFICIARIES
Prisoners
Lawyers
Law and enforcement department
People and communities related to the prisoners
Judges
Current prison system of Pakistan
2. TECHNOLOGY BACKGROUND
Registration:
User data need to be registered in the prison advisory system so as to use the
system and add the prisoner’s details etc.
Login:
After registration one can log in the system as the operator of the system on the
behalf of user. After this, he has the other user interfaces available for further
actions.
Writing FIR:
The first option that is provided in the prison advisory system is writing FIR. We
all know FIR is First Information Report. All FIRs have unique complaint number,
date, time and location.
A similar interface is provided for writing FIR in this system. FIR written cannot
be lost and fast actions can be taken on the basis of it as it will be uploaded on
server and others can see it.
In this system, FIR has all the options that are in the old handwritten system but is
more secure as no changes can be made once the FIR is submitted and only the
authorized users can see it.
Adding Prisoner:
The second option that is given in this is the one of the most important that is
adding prisoner.
As soon as the court declares that the victim is found guilty and tells his or her
punishment and in which prison the victim must be kept, the prisoner will be sent
to the same prison as told by court and all the details of criminal like name,
address, age, criminal number, crime and the punishment all can be updated in the
prison advisory system.
Prisoner data cannot be lost because the backup of the database is there and the
backup gets updated as soon as the changes are made into the database.
Now this prison advisory system is designed in such a way that it takes fewer
resources to work properly. It has its own sort of minimum requirements that we
need to take care of:
The system needs a minimum of 2 GB of ram to run all the features smooth
and sudden.
It needs a minimum 1.3 GHz processor to rum smooth as less than that may
create problems.
The system needs to be operated by some authorized person as wrong hands
can make it irresponsible.
Rest is all up to the user’s usage will care for hardware
The system is made properly and all the testing is done as per the requirements. So
the rest of the things depend upon the the-the user and no one can harm the data or
the software if the proper care is done.
The system will be based on a website and it keep track of all the information of
the prisoner (some cases) autonomously and will give relevant prediction for
judgment of that prisoner. The beneficiaries will be able to keep track of all the
stuff and procedures regarding to the prisoners.
It will help the judges to make appropriate judgement considering the laws and
regulation of Pakistan in appropriate time.
Prisoners will not have to be imprisoned more then the time period declared
according to the laws of Pakistan depending on the charge on which he is arrested.
Current prison system of Pakistan is mostly manual and this results in lost of data
occasionally so this system will keep all the track autonomously.
Research Objectives:
Academic Objectives:
To study the various industries in prisons from all the angles
To assess the "creativity in captivity"
To study how a revenge force/ attitude can be effectively used for better results.
Other Objectives:
To maintain the discipline of law and regulations of Pakistan.
2.5 METHODOLOGY
In this system, the data used for the development of the inmates’ information
system were collected through two important data sources namely – Pakistan
Supreme Court and Police department of Pakistan. These two recourses were used
to analyze the operations of Pakistan Prison situation, using Central jail, located in
Karachi, as a case study. The data collected were analyzed and summarized as
follows; personal data form, family data form, education data form, and court
judgement form. All these forms have different information about the prisoner
which must be filled to open a file for anyone brought in as an inmate. The
personal data form requires information such as inmate name, date of birth, sex,
nationality, state of origin, local government of origin, contact address, telephone
number, offence committed, period of sentence, date of registration, date to leave
prison, etc. The family data form requires information about the prisoner’s family
such as father’s name, address, father’s occupation, mother’s name, address,
mother’s occupation, etc. The education data form captures information about the
primary, secondary, and higher institution attended, qualification obtained, etc. The
data collected from the judgment form captures information about the offender’s
name, offence committed his lawyer, lawyer’s address, name of the judge,
Technical debt refers to the maintenance tasks required to support the existing
product. Those tasks include defect resolution, refactoring, and testing. In a
traditional project methodology, this technical debt can accumulate quickly as the
team focuses on new feature development to keep pace with the project timeline.
Agile software development helps keep technical debt to a minimum. Any defects,
feature changes or other maintenance tasks are added to what is known as a
Teams not only adapt to change in Agile, they are encouraged to embrace the
practice. Agile acknowledges that customer needs change and that teams must be
able to adapt. Working in time-boxed iterations means the team does not need to
wait on a lengthy requirement change, review and approval process. Any change or
maintenance item is added to the backlog and allotted to an upcoming sprint based
on priority and business need.
3. Using Agile for Mobile Application Development and Testing Creates Total
Alignment and Transparency
Before each sprint, the entire team reviews, validates, and agrees on which user
stories to assign to the sprint. The developers, analysts, testers, and product owner
work together to accomplish the items assigned to the sprint. The team meets daily
to keep everyone on the same page. Throughout the sprint, each team member
verifies each feature and works closely with the developers to ensure it meets the
customer’s needs.
Although teams do their best to plan the phases of a waterfall project, there is often
a level of uncertainty that isn’t typically found in agile software development. The
traditional approach to software development leaves product testing and release to
Using Agile for mobile application testing, teams get feedback almost daily and
can act on that feedback immediately. Developing a product in sprints allows
teams to quickly determine if they are on track and allows them to adjust almost
immediately. Also, because sprints are customer-focused, the team can be sure
they are producing value at every release.
On an Agile project, the team does not attempt to develop all features at once.
Instead, the team assigns a smaller subset of features to each sprint. That way, the
developers have more time to perfect those items before release. Furthermore,
Agile’s reliance on continuous integration (merging all developers’ working copies
to a shared repository several times a day) gives developers the chance to test
issues daily and address them immediately. Working on a product in small
incremental releases ensures that each sprint results in a fully tested and working
product.
Waterfall projects revolve around lengthy project cycles that make it difficult for
teams to predict a release date accurately. Agile iterations happen in time-boxed
sprints that result in a working product at each release. Thus, the product owner
knows that they will get new features at the end of every sprint.
8. User-Focused Testing
Agile is about more than just adapting to change. It is about delivering what is
most important to the customer. As such, the product owner works closely with the
team to help them gain a clear understanding of what is needed. In Agile software
development, user requirements are represented as “user stories.” These stories
define an action that provides value to the customer. The concept of user stories is
a stark contrast to the rather lengthy list of requirements developed in a traditional
development methodology.
The product owner actively participates in the sprints during the Agile
development and testing process. Their participation in this manner ultimately
fosters a level of
Engagement that ensures their needs are being met. Not only that, they get to see a
working product at the end of each sprint and will be pleased that their team can
deliver releases more quickly and frequently.
Teams work together, along with the product owner, to determine what goes into
each sprint. That way, the team is on the same page about what needs to be
delivered. Also, there is less of a chance of surprises or unplanned features making
it into the build.
Agile software development and testing follow a process that helps teams deliver a
working product that provides value at the end of each sprint. Embracing change is
one of the core tenets of the process. With Agile software development, teams can
quickly adapt to requirements changes without negatively impacting release dates.
Not only that, Agile helps reduce technical debt, improve customer satisfaction and
deliver a higher quality product. Contact one of our testing experts today to learn
how we can help you in your mobile application testing efforts.
The prisoner advisory system provide the benefit to the state to give the most
appropriate decision considering the laws and regulations of Pakistan to the
prisoners, who are already in the prison on account of any charges regarding to the
laws of Pakistan. This system predicts the charges and imprisonment of prisoners
for specific cases evaluating the law act and the time period when the charge was
filed against the prisoners. This system will also service the court to grant the best
possible hearing date to the prisoner, and it also keeps track of all the records
regarding to the prisoner.
The specific objective allows to identify and describe about the integrated prison
controlling and monitoring system. The specific objective is listed below:
To ensure that data recording is done using computers for easy access.
To generate prisoner report.
To register and keep all information’s about the prisoners such as their
family details and background information.
To reduce the work hold stakeholders.
To manage the large number of cases/prisoner’s details.
To save time, money, materials by using computerize system.
To prevent loss of data and ensure secuirity.
At present, technology is rapidly growing. Thus, the uses of the project are to
remove old or manual system that the organization uses and replace with the
computerized system. The computerized system allows to reduce the amount of
time spent on searching different types of information by charging the use of the
The project fix problems that deals with the statement of the problem accordingly
and produce new, easy, save and flexible prison advisory system.
The project should be developed such that the necessary functions and
performance are achieved. The project is developed within latest technology.
Through the technology may become obsolete after some period of time, due to the
fact that is easy to implement the system of new technology. The system we are
working on is a web based system with the backend database compatibility so the
data and records will be remain secured.
With both qualitative and quantitative surveys, this analysis used a descriptive
research design. To gain the thoughts and responses of respondents, the qualitative
approach was used, whereas the quantitative method was used to present
quantitative results. To promote the transfer of information in the information
system, the study architecture contained diagrammatic depictions.
To show the progression of events, Individual Relational Diagrams (ERDs ').
Examination of the system is the analysis of the existing system and its challenges,
criteria and potential methods assessment. The High Security Prison in Pakistan
uses a manual records keeping scheme and the conventional and unreliable paper
file form holds details. It is difficult to view the information of prisoners when the
officers have to browse through files, resulting in a lot of effort. The never-ending
crowds of people arriving to see prisoners greet you at the entrance, on the other
side.
Some of the key points which motivated us to create a website base prison
advisory system are below:
Our project has two key interfaces, one for the Admin screen, and the other for the
jailor user. We have other interfaces besides these, which can be discussed as
follows:
LOGIN: One will log into the system as the operator of the system on
behalf of the user after registration. After this, he has access to the other user
interfaces for more intervention.
The prisoner will be returned to the same jail as told by the judge as soon as
the court declares that the victim is found guilty and records his or her
sentence and in which prison the victim may be held, and all the criminal
information such as identity, location, age, criminal number, offense and
punishment will all be changed in the prison advisory system.
Then these records will be further used later as there is no way to remove the
data of the inmate so that if the inmate is added to the database, no one can
erase the data of the prisoner because it would be useful as papers can be lost
or fraud, but information will not be lost in this situation and this
information is not used for theft and no modifications will be made in the
database.
Data from inmates will not be destroyed because the computer archive is
there and the backup is changed as soon as the database changes are made.
Entity User: Can be performed only if the the-the user is authenticated. After the
user has registered and is verified by the admin then the user can perform all the
tasks on it. Some of the features of the user are as follows:
Username: Username is taken from the user and fed into this it is properly
validated so that no mistake happens.
Number: The phone number is taken here to keep the member updated and for the
confirmation of the event is also managed through this method.
Email: Email is taken to make member aware of new offers new events and for
future reference, it is also relevant. Password: Password is required to login into
the system and the password must contain a special character, a numeric character
and an uppercase letter.
Entity Admin: Admin is only a single user which can verify the user who is trying
to register on this prison advisory system.
If the admin verifies the user then only the user can see the details and can make
changes according to the given privileges. No other user can register as admin as
there is only one account for admin.
Entity Prisoner: The prisoner is the criminal who is found guilty and is in the
prison for his crime. A prisoner cannot do any change in this software as there are
no privileges given to them and their information can only be seen only by the
authentic user.
Primary key prisoner_id: As we all know that all the prisoners in prison have a
unique criminal number so that is used here as a primary key.
Crime: The user must know that which prisoner is there and for which crime. So
the user can check it in the database whenever he wants and about whoever he
wants.
Punishment: As the user must know about the crime he or she must also know
about the punishment period and the type of the punishment of the prisoner. So an
entity punishment is provided to know about the punishment of the prisoners.
Users: There is only a single type of user which is present here in this system. This
user has all the privileges but it cannot register itself on this system as the admin
needs to verify the registering user.
After the admin verifies the user only when he is eligible to use the the-the system
and after that, it has all the privileges.
Attributes given to the user are
Writing FIR: The user can write FIR and can save it. The saved FIR can be seen
only by the valid users.
Admin panel: There can be only one account of admin. Admin can add the users.
When a user tries to register on prison advisory system then the request goes to
admin and if the admin verifies only then the user can register itself on it.
He can Login through his id and password. The password is made very secure so
that no person can guess and make it difficult for hackers to crack.
He has access to the profile of his own and he can search detail of other Users and
can see the detail of him.
This admin is responsible for creating and uploading the Menu card to every User
in the Interface.
He can add a user to that account and give access to for handling the prison on
their own.
He can manipulate the data of any user. In this, we are showing here the interaction
of the users with our system through our use case diagram.
Square non-functional necessities calculate the demand rather than realistic needs.
Instead of individual habits, this square tests the necessities that determine
parameters that would be used to select the operation of a device.
In the style of "system shall be" the square measure of non-functional necessities,
the corresponding degree of overall property of the system as a complete or a basic
facet and not a single process.
The overall properties of the method substantially mark the gap in whether or not
the event project has succeeded or failed.
Our team worked on the research of this project to the complete core so that we
can have a complete knowledge about our project. In order to explain our project to
the portal we must have a complete knowledge about our project. Our supervisor
also helped us a lot in the research plan and he had also arranged a meeting with a
lawyer for getting more knowledge about our project because our project is based
on prisoners and court system a lawyer had helped us a lot in this matter. After a
complete phrase of research we had expressed our idea to the portal and we got an
approval letter from the coordinator to work on the project.
After getting the approval for our project we had a task to evaluate the tools
required for the project. We want our project to work on the latest tools in the
market, so we were researching on the tools that weather they will work for our
project or not. As per the plan we decided to build a website of our project because
this platform is available for all means of technology.
We planned to use NODE JS for the development of our project as it is a new
technology in the market and has many benefits.
Also for the backend we are using MongoDB as it provides many good features for
the backend.
After the research work on project and the requirements of the project our team
started to prepare the report for the project, in which we summarize all the research
things we did for the project. All the functional and non-functional requirements
PRISON ADVISORY SYSTEM
were mentioned in the report as well as the all the necessary reports for the
proposal was also mentioned.
As mentioned that our project will be working on NODE JS, we started our
implementation for front end on NODE JS. All the requirements of our project
were design according to the current requirement. We want our project to be user
friendly which can be understood and can be used easily by the users. For
achieving this milestone we have to work a lot on user interface to make much
easier much reliable and much appealing to the user, and apart from that we also
want our front end to very responsive, so that user might not face any glitch while
using.
One more thing that we worked on was that we made our front end in such a
manner that there is a lot of room for updating the front end, so if in future if the
front end needs to be updated it can be done in a very good way.
Color selection and theme selection are provided to the user, so user can set the
theme and color according to their wish.
Developing the front end was the great challenge for the team, and after achieving
the milestone we have a new challenge now to develop the back end for our
system. We used MONGO DB for our back end because it provides a good backup
for the system and is cheaper than the other DB’s in the market. Mongo DB also
provides a good interface which in results very less lag in the system, and it also
provides a
Cloud backup as well that means that the data is save even if the system is not
working or is in the process of maintenance.
Plan maintenance is, at its heart, a matter of adhering to a set of very basic
principles over the duration of your project. Instead of hoping everything will go as
expected,
it means being really deliberate about monitoring your progress against objectives
and targets. It entails maintaining order by consistent and constant contact.
Plan maintenance sessions should be held at least once a week. See (and frame)
these meetings as a confirmation that the mission is on schedule and your activities
are having an effect, rather than as a way to ensure that your team completes their
tasks.
4.4 ERD
4.5 PROTOTYPE
LOGIN SCREEN:
DASHBOARD:
CALENDAR
PEOPLE
A complete report is generated of all the prisoners who have fulfilled their
punishment time period.
Timer shows the remaining time of the current case i.e how much time is left in the
prisoner’s imprisonment.
6. TESTING
The following software and hardware components are required to complete this
project.
We used:
Hardware requirements:
The program produced needed the following hardware as part of the design cost:
The new system's reliable and successful service.
Pentium IV
1 GB RAM
Enhanced Keyboard
E.G.A/V.G.A, a colored monitor.
An uninterruptible power supply (UPS) units
LaserJet or Desk Jet printer.
Software Requirement:
Top to down Approach was used to develop the system. It employs the most basic
program-solving methods. The program is set up such that each subsystem can be
chosen and implemented independently. The job is broken down into multiple
components that work together to provide a solution to the problem.
This page provides a security feature that allows a user to gain access into the Prison Advisory
system as seen below:
This module allows user access the event generation in Prison Advisory System
and authentication details have been verified, this is where prisoners details,
reports and cases are managed in a report format and can be placed over one pdf
file which shows all the cases according to the status, as seen in the diagram
below:
This module helps the user to create new prisoner case documents and archive
them in a folder. This documents make it possible to track down facts on prisoners
at any time. Reports can also be created from the documents that have been saved.
After the integration of modules, the whole system was tested. The prison advisory
system was system was tested using a local host and it worked perfectly. Sample
prisoners and cases details were imputed into the system and it was stored in the
database and viewed using the event and report event module.
ITEMS AMOUNT
We considered the system of prisons in our country and then decide to do work on
it. We made automatic system for prisons which will give better outcome, it works
on the time management, Effectiveness and provide the benefit to the state to give
the most appropriate decision considering the laws and regulations of Pakistan to
the prisoners, who are already in the prison on account of any charges regarding to
the laws of Pakistan.
This system predicts the charges and imprisonment of prisoners for specific cases
evaluating the law act and the time period when the charge was filed against the
prisoners. This system will also help the court to grant the best possible hearing
date to the prisoner, and it also keeps track of all the records regarding to the
prisoner.
In spite of the benefits of the use of computer to provide timely and accurate
information, which is absent in prison, it is not all problem arises as to how
computer can be utilize that is programmed to achieve desire result.
The introduction of computer has brought many changes to various fields, such as
prison, health sector, hotel, banks and in business sector generally. Just because it
helps to carry out complex and lengthy analytical operation very rapidly to
effective communication system, it is also time saving, versatile, flexible storage of
large information and reduce human labor.
7.1 SCOPE:
By having this kind of system the law enforcement personnel will get a huge
advantage in making their decision, more over the laws will also be followed
legally. Implementing such systems will make a big change in the current systems
of prison. Chances of fraud and law breaking will be minimized because of its
autonomous ability.
The system is to attend to the welfare of prisoners and updating of information and
enhance-the criminal investigation research e.tc the general information system
will help to ensure that up –to-dated individual information of every prisoner is
being maintained such as the cell number and other personal information relating
to his date of release, how to locate such inmate and make him/ her available.
7.2 LIMITATIONS:
7.3 CHALLENGES:
As the project is about prisoner so collecting correct and efficient data was difficult
because these type of data is not publically and for finding it we use resources.
Coordinating with the government is the big challenge, for us as a common man
it’s not easy to make use of it at government level.
There could be other types of cases handled, live streaming of court, Notification
to the guidance, Profiles of witnesses and so on in future.