Professional Documents
Culture Documents
INSTITUTE OF TECHNOLOGY
DEPARTMENT OF COMPUTING SCHOOL
By
Name ID.No
1. Mohammed Husen Seyid------------------------------S/3225/08
2. Abiti Feto Shenku --------------------------------------S/3007/08
3. Fikadu Adugna------------------------------------------S/3219/08
4. Gadise Nedesa-------------------------------------------S/3065/08
5. Woyinishet Redi-----------------------------------------S/3159/08
6. Mohammed Abdurhaman Muhummed-----------S/3252/08
7. Genet Fura Tato ----------------------------------------S/3071/08
The project describes the prison management system effectively to determine the feasibility and
usability of the system. In this document problem that initiated this project, the objectives of the
project, how we can also address the problems mentioned has been explained. The traditional
methods for getting the appropriate report usually take long time to process which helps the
prisoner to escape.
List of Figure
Figure 1 Use case Diagram ......................................................................................................................... 23
Figure 2 Use Case Diagram ........................................................................................................................ 24
Figure 3 Activity diagram for Log in Use Case .......................................................................................... 33
Figure 4 Activity diagram for Prisoner Registration Use Case................................................................... 34
Figure 5 Activity diagram for search prisoner Use Case ............................................................................ 35
Figure 6 Activity diagram for Visitor Use Case ......................................................................................... 36
Figure 7 Activity diagram for Visitor Use Case ......................................................................................... 37
Figure 8 show the Class Diagram ............................................................................................................... 38
Figure 9 Sequence diagram of Login use case ............................................................................................ 39
Figure 10 sequence diagram of register Prisoner use case .......................................................................... 40
Figure 11 sequence diagram of uploading nominal roll.............................................................................. 41
Figure 12 sequence diagram of Modifying Prisoner data ........................................................................... 42
Figure 13 sequence diagram of in out register ............................................................................................ 43
Figure 14 sequence diagram of generate report register ............................................................................. 44
Figure 15 System Architecture .................................................................................................................... 45
Figure 16: State Chart For Register Prisoner............................................................................................... 46
Figure 17: State Chart for search prisoner Information ............................................................................. 47
Figure 18 State chart for upload Numeral roll ............................................................................................ 47
Figure 19: State chart for Generate report ................................................................................................. 47
Figure 20 Collaboration Diagram for Register Tasks ................................................................................... 48
Figure 21 Collaboration Diagram for modifying Tasks .............................................................................. 48
Figure 22Collaboration Diagram for modifying Tasks................................................................................. 49
Figure 23 Component Modeling ................................................................................................................. 50
Figure 24 Deployment Modeling ................................................................................................................ 51
Figure 25 Graphical user Interfaces ........................................................................................................... 52
1 INTRODUCTION
The development of one country is analyzed from many directions or factors such as peaceful
security of the Prison and their property etc. Those are protected by Prison Management station
such as police and Prison employers.
Prison give service to protect prisoners from harum-scarum but on the given of this service there
are many problems on the Prison Management techniques. Our project has been prepared for
developing a new web based Prison Management System We chooses this topic to protect the
Security of the prison and our country.
The proposed System applies to Prison management institution all across the Prison and
specially looks in the subject of Prison management system. This chapter contains the boundaries
of this project background, statement of the problem, objective, scope and limitation,
methodologies, time schedule and the project risk management. We are doing the Zway PMS
project because of to reduce the prison office workload and we will do the Zway PMS desktop
application program.
The development of one country is analyzed from many angles. So there are many factors such
as peaceful security of the people and their properties etc. those are protected by Prison
management station such as police officer and peoples. The institution of prison management
station is standing to protect people‟s peaceful security and their property from danger.
Ziway prison management organization was having no computerized way of controlling the
prisoner. It was manual way of controlling the prisoner. This means that it was document based.
And it is time consuming. to manage all prisoner,to register the new prisoner, to live the prisoner
from the compound who have finished the criminal time.
The station has given service. The activities of the Ziway Prisons Service interms of records
keeping has for a long time been a huge problem to the service as there areno proper facilities
inplace to ensure that they are able to store and retrieve information nonprisoners very
quickly. Records keeping are still done using big-old files which have to be shelved once that file is
full and then replaced with another and so when the need comes to get informationonprisoners, they
will have to look through the old files according to the dates they assume the information could
have been stored and then go through hall files that were recorded during that period until the file
is found.
This very tiring and time-consuming activity usually leaves them with no other option but to
record the prisoner details againthe inthe new file to avoid going through so much stress
but which also calls for data redundancies hence, data inconsistencies
These included time consumption process, human errors in administering records and registers
of prison inmates, and management hurdles in compilation and analysis of data due to lack of
data and information accuracy.
PMS is the system to manage the activities related to prison like tracking and monitoring of
activities in all the prison, effective management of the records. Prison management system
To ensure that data recording is done using computers for easy access.
To generate prisoner report with any format.
To register and keep all information‟s about the prisoners such as their family details and
background information.
To reduce the work load stakeholders.
To manage large number of prisoner‟s details.
To save time, money, materials by using computer.
To ensure the satisfaction of the prisoner relatives and also the prisoners.
To prevent loss of data and ensure security.
To attain the general objective, the following specific objectives are set
To deliver a system that covers all region of prison management from the admission to
the release of the prisoner and connectivity/connection across jails; brings in
administrative efficiency and sense of security; leads to prisoner empowerment in the
jails.
Proper use of technology to bring transparency in the system and provide accurate
implementation of rules and make data easily available to bring in efficient decision
making.
To bring in full accuracy in the prison management is the key functional and
operational areas, to overcome the manual or hand-written system and to bring in the
advancement and use of new technology in the process with proper record keeping and
make the work of staff much easier and smooth in day-to-day activity.
Police Commander: manage the all activity of Police officer and generate report to the
administrator in easy way
Data Source
Data source is a name given to the connection set up to a database from a server. The name is
commonly used when creating a query to the database A data source is any of the following
types of sources for (mostly) digitized data: a database. in the Java software platform, data
source is a special name for the connection set up to a database from a server.
Administrator: -
Data manager: -
How you consecrate report for consecrate body?
Can you easily modify the prisoner data?
How fond the numeral-roll?
Practical Observation
We observed various prison criminal documents from the internet. Observing organizational
behaviors in their functional settings is one of the most direct ways to collect data. To
understand how the jobs are performed sequentially we have looked into the features they
provide for users.
Documenting Analysis
In our project document analysis referees the manual based document that the organization used
before or we reviewing documents that exist at different time in the organization is also the other
A software tools are a programming tool or software development tool is a computer program
that our team members use to create, debug, maintain, or otherwise support other programs and
applications.
Activities Tools/programs
Platforms Windos8.1,10
Database MYSQL
Clint side script CSS, Java script/HTML5
Documentation MS word2016
User training MS Power point 2016
Modeling and scheduling EDRAW
Server side scripting Wamp Server
Coding language PHP
Hardware
Laptop computer
Flash disk, CD/DVD RW disk
Desktop computer
1.9 Feasibility Analysis
A feasibility study aims to objectively and rationally uncover the strengths and weaknesses of an
existing business or proposed venture, opportunities and threats present in the environment, the
resources required to carry through, and ultimately the prospects for success.
Cost benefit analysis (CBA), sometimes called benefit cost analysis (BCA), is a systematic
approach to estimating the strengths and weaknesses of alternatives. It is used to determine
options that provide the best approach to achieve benefits while preserving savings. The CBA is
also defined as a systematic process for calculating and comparing benefits and costs of a
decision, policy (with particular regard to government policy) or (in general) project.
The existing manual system of prison management system of prison management system was
time consumes to do all tasks, it need a lot of works to do the system. Need around 15 works to
do all the prisoners activity, for only one worker. The organization pays
2000*15=30000birr.during the existing system. The proposed system aim is to reduce this cost
and human resource to save time and to reduce cost of the organization, in the case of propose
system need only for workers to do the system, then 4*4000=16000 birr only, there for this
reduce the cost of the projects and time.
Give Training on the new system for the system administrator and for the staff
Operational feasibility is the measure of how well a proposed system solves the problems, and
takes advantage of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirements analysis phase of system development, the
operational feasibility assessment focuses on the degree to which the proposed development
projects fits in with the existing business environment and objectives with regard to development
schedule, delivery date, corporate culture and existing business processes. The computerized and
the new system can be used effectively and efficiently after it has been completed it‟s
developing. The stake holder‟s actors and users of the system will have no any complexity and
have no any difficulty to use the new system,will not have any difficulty with the new system,
producing the expected benefits. The new system will not need a lot of training for stake holders
and users of the system. But may it need a little training for the users off the system.
1 Project Proposal
2 Requirement analysis
3 System Design
4 Implementation and
Testing
5 Project conclusion
Software cost
Software description Price
Hardware cost
NO Name Quantity Unit price in Total
Birr
1 Purchase of flash disk (8GB) 2 150 300
2 Purchase of stationary
Paper 250 pace 250 250
Pen 4 5 20
Printing cost 200 page 4 800
Photocopy 200 page 0.75 150
3 Purchase of CD-RW 2 35 70
4 Miscellaneous expense 200
Total Cost 1790.00Birr
Equipment
CHAPTER TWO
2 REQUIREMENTS ELICITATION
Description of the Existing System This chapter covers the description of the existing system,
problem of the existing system and the proposed system in detail.
2.1 Overview of the Existing System
The prison management system uses the documentation form storage which is a single user
system to find the wanted information.
The important and the most significant drawback is that the system is manual. There may
be errors due to carelessness or oversight that may result in loss to the data and as to the
organization. For an organization, time is very important factor.
The prison information is stored in the document form which is like a data sheet. This
makes it impossible to search for information in such a huge number of documents
manually and to add new information if the searched information is not available.
The manual system had failed to keep timely, updated records of all these activities. There was
negligence, worn out and casual attitude in managing records areas. The other set of challenge
was from the prisoners‟ perspective. This has to do with uneasiness and insecurity in the minds
of the prisoners related to appropriate justice by the system in various aspects including
remission, release, and emoluments.
2.2 Advantage of existing system
The existing system in the organization has different major functions. Current system is manual
that means keeping information paper based.
Less expensive to setup (i.e the main tools of recording a prison information are pen,
pencil, paper, shelf and others).
Does not require the professional computer skill to work on it.
Does not need additional training , the person who are educated read, write and listening
can work on it.
2.3 Drawback of the existing system
Drawback of the existing system describes the main problem, opportunity and directive
identification that were performed in the organization during the existing system. The following
CHAPTER THREE
3 SYSTEM ANALYZING
A systems analyst is an information technology (IT) professional who specializes in analyzing,
designing and implementing system, a systems analyst is a person who uses analysis and design
techniques to solve business problems using information technology. May serve as change
agents who identify the organizational improvements needed, design systems to implement those
changes, and train and motivate others to use the systems.
The functional requirements of the proposed system are listed as follows: -Functional
requirements are type of requirements that a project must consider in its entire process.
Operations those understand by the developer and stated as a way of automating the existing
system, Services that the system should provide. This functional requirement defines what the
systems do or the actual functionality of our system. The system provides the following
functions.
Prisoner:
Performance requirements
Performance requirements state how well the system is to do what it is to do. That is,
performance is an attribute of function. If the Requirements Analyst finds a performance
requirement without corresponding function, the Analyst has found an incomplete requirement.
The Analyst finds the corresponding function, and brings the function and performance together
into a complete statement of the requirement, now a functional and performance requirement.
Where possible, projects should avoid adverse impacts on workers, communities, and the
environment. If avoidance is not possible, negative impacts should be reduced, mitigated or
compensate for, as appropriate.
Process requirements
In terms of our proposed system or in terms of project management, process requirements refer
to one of the four types of project requirements. Along with business, product and resource
requirements, process requirements serve as a foundation for eliciting, analyzing, specifying and
validating needs and expectations of project stakeholders. Determining requirements for a
process in our system means stepping through the following sequence of tasks: Gathering
The first task is to determine and collect initial needs and expectations of customers.
The second task is to review gathered data and ensure it is clear, complete, unambiguous, and
consistent Recording.
The final task is to create a requirements specification document and submit it to customers for
validation.
Input related requirements
Response time (i.e. how fast the system reacts to user commands)
Accuracy (how precise or accurate the system is)
Reliability
Recoverability
Recoverability is the ability to restore function and data is backed up and the speed of data
restore from backup. We think about:
If the hardware, data, and onsite backup are destroyed, how soon must the application be
restored
How many backups do you have?
In one server goes down, how many backups servers do we have us?
Availability
System availability is the time when the application must be available for use. Required system
availability is used in determining when maintenance may be performed. Definitely we think
about time zones, schedules, and user location.
Performance
Performance describe the time the system performs its function in a minimum amount of time.
The system shall perform its operations within a minimum amount of time without losing a lot of
time or without time consuming. The system shall be comfortable to use and interactive and the
users or the stake holders of the system gets the expected result or things they want within few
seconds without wasting a lot of time.
User interface
The user interface is presented (displayed) on the computer screen. It is the result of processed
user input and usually the primary interface for human-machine interaction.
An unauthorized user should not access the administration page by any means. Because the
administrator has their own identification user account. Only few pages of the system are
accessible to the users that help to do the search facility and to interact with the Administrator.
Some of the resources and activity shall be restricted and allowed only for authorized users.
Therefore, the system shall have user identification method, and because of this the system
should restrict unauthorized user to inter into the system.
Backup Recovery
There shall be a frequent and full back up mechanism to avoid any information loss and
inconsistency, we will explore some of the way‟s organizations have moved beyond the simple
backup methods of the past. These include
Backing up data on a local or centralized file server (using either disk or tape drives for
storage) is the most basic backup scheme. A system of full and incremental backups can
help manage the size of the backup window.
Another approach is to assign distributed backup clients throughout the organization,
which move backup data over the network to a backup server or cluster of backup
servers. This solution is more scalable than the first. Yet another approach is to perform
full local desktop and server backups on local backup servers, which are then “cloned”
to safe remote backup servers over the network. A storage area network (SAN) can
enable the sharing of storage devices and data across a fast network connection.
Use case: describes a sequence of actions that provides something of measurable value to an
actor and is drawn as a horizontal ellipse.
System boundary: indicates the scope of the system project. Anything within the box represent
System
Description It describes the process of authenticating the user name, password& Access
level before granting access to his/her mail account. This is part of the
existing system.
Trigger Administrator, Police officer, data manage. needs to visit his/her account to
use the system.
Pre –Condition The Administrator, Police officer ,data manager .who know the password
,username &Access level should login and use the systems.
Normal Action 1. The user click the Log in button in the home page.
2.The system display the login form
3. The Administrator, Data Manager, Police Officer, police, enter the
user name, Access level and password.
4.The user click the log in button in the form of log in.
5. Login validity is checked.
6. The main form display
Post condition All the above users login in to the system. Users can use different activities .
Alternative Action If the enteredusername password and Access level is not validated and
verified, system displays error message and go to step 2.
Trigger Administrator, Police officer, needs to fill the information of the prisoner in to
the registration system.
Pre -Condition 1.The Administrator, Police officer is successful log in
2.the Register Main page is displayed
Normal Action 1.The police officer validate the log in form.
2 The system displays the Register form.
3.The Police officer enters all the required information.
4. Then click register button.
5.The system checks the Prisoner record form.
6.The system displays confirmation message of addition.
the records the case of prisoners
1.The Police Officer Click on case register link.
2.The Police officer enters all the required information.
3. Then click Save button.
4.The system checks the Prisoner record form.
5.The system displays confirmation message of addition
Trigger Administrator, DataManager, needs to fill the information of the System Users in to the
registration system.
Pre -Condition The visitor should arrive by the prison‟s prisoner visiting schedule
Trigger Administrator, Police officer, needs to fill the information of the prisoner in out
resign.
Pre -Condition First Police officer logged on
Normal Action 1. The Police officer enters to the system to register In-Out prisoner information.
2. The police officer main form display.
3. The police officer Click on the In-Out register link.
4.The system display the specific In-Out registration form
5. The police officer Enter the In-Out register information.
6.The register button click.
7. The system register prisoner as In-Out register.
Post condition In-Out prisoner is registered.
Alternative 1.If the system displays the Entered information is incorrect message.
Action
2. The system informs the Data Manager to re-enter information and goes to step 5
An activity diagram describes a system in terms of activities. Activities are states that represent
the execution of a set of operations. The completion of these operations triggers a transition to
another activity. It is a flow diagram used to represent the data flow or the control flow through a
system.
Prison Management
Class diagrams describe the structure of the system in terms of objects, classes, attributes,
operations, and their associations. A class is an abstraction in object-oriented programming
languages. Like abstract data types, a class encapsulates both attributes and operations. Unlike
abstract data types, classes can be defined in terms of other classes by using generalization.
Object is an instance of a class. The following class diagram describes the structure of the Prison
Management System
Actors
Message(method)invoked by these Actors
Return values (if any) associated with previous messages.
Sequence diagram used to illustrate how certain tasks are done between users and the system. A
sequence diagram begins at the top with the actor(s) or the system which is located at the top of
the page. Under each actor or system there are long dotted line called life lines, which are
attached to them. Actors are performed with lines that extends between these life lines when an
action line is connected to a life line it shows the interaction between the actor and system.
Login account sequence diagram: - in order to start a system, by giving a username, Access
level and password the ability to access a service
CHAPTER FOUR:
4 System Design
4.1 Introduction
System Design is the process of defining the architecture, components, Modules, Interfaces,
Deployment, and data for a system to satisfy the specified requirements. In the case of our
Project the team members used object-oriented analysis and design methods. This object-
oriented method is the most widely used methods for systems design and analysis. The UML has
become the standard language in object-oriented analysis and design.
The goal of user interface design is to make the user's interaction as simple and efficient as
possible, in terms of accomplishing user goals.
9. Project Risk Analysis & Management book by Professor John Perry - The University of
Birmingham Peter Simon - CPS Project Management
Websites
www.3WSchool.com
www.google.com
www.wikipedia.org
www.cprogramming.com
www.scribd.com
www.borland-turbo-c.com
www.Asptutotial.com