You are on page 1of 62

DIRE-DAWA UNIVERSITY

INSTITUTE OF TECHNOLOGY
DEPARTMENT OF COMPUTING SCHOOL

Project Title: Prison Management System (PMS)

By
Name ID.No
1. Mohammed Husen Seyid------------------------------S/3225/08
2. Abiti Feto Shenku --------------------------------------S/3007/08
3. Fikadu Adugna------------------------------------------S/3219/08
4. Gadise Nedesa-------------------------------------------S/3065/08
5. Woyinishet Redi-----------------------------------------S/3159/08
6. Mohammed Abdurhaman Muhummed-----------S/3252/08
7. Genet Fura Tato ----------------------------------------S/3071/08

Advisor’s Inst. Shewit N .


Dire-Dawa University, Ethiopia
August 23/ 2021
Acknowledgment
First of all, we want to thanks our Almighty GOD/Allah for keeping us healthy and that help our
self to succeed this project.
The satisfaction that accompanies the successful completion of any task would be incomplete
without the mention of people whose ceaseless Cooperation made it possible, whose constant
guidance and encouragement crown all efforts with success.
We are grateful to our project adviserInstr.Shewit for the guidance, Inspiration and constructive
suggestions that helped us in the preparation of this project proposal.
We are also thankful to our teachers who have helped in successful completion of the project.
Thanks to our group members for respecting and tolerance with each other. Finally, thanks to our
guidance.
We also wish to express our gratitude to the officials and staff members of Dire-Dawa
University Institutes of Technology department of Computing School who rendered their
during the period of our project work.

Dire-Dawa University Department of Computing School


I
Abstract
The networked based Prison management system solves and minimizes so many problems on the
organization. The system is with the client/server architected configuration. This means there is a
central application database to store data. This system uses SQL/MYSQL database engine to
manage the data and it has the front end with the web programming language PHP, HTML,
NotePad++, Javascript, SQL database, and CSS.
This system helps for the employee of Ziway city prison to communicate and also access their
data easily. the system developed to handle the above problem with the following functionality
such as, The system the upload nominal roll, the system should register the prisoner , The
system should record prisoner case , The system should search the prisoner information, The
system should modify prisoner data, The system should generate timely report, the system
should in out register ,the system should register visitor and The system should store all the data
related with all the tasks performed into a database.
As a generally this project has six chapters. Chapter one is about introduction of the project,
chapter two Description of the existing system, chapter three system analysis, chapter four
design, chapter five Implementation and testing and chapter six recommendation and conclusion.
In general, the system enables the transactions to be easier and faster.

The project describes the prison management system effectively to determine the feasibility and
usability of the system. In this document problem that initiated this project, the objectives of the
project, how we can also address the problems mentioned has been explained. The traditional
methods for getting the appropriate report usually take long time to process which helps the
prisoner to escape.

Dire-Dawa University Department of Computing School


II
Table of Contents
Acknowledgment ........................................................................................................................................... I
Abstract ..................................................................................................................................................... II
List of Table ............................................................................................................................................... V
List of Figure ............................................................................................................................................. VI
Abbreviation and Acronyms ................................................................................................................... VII
CHAPTER ONE ............................................................................................................................................... 1
1 INTRODUCTION ..................................................................................................................................... 1
1.1 Background of the organization.................................................................................................... 1
1.2 Background of the project ............................................................................................................ 2
1.3 Statement of the problem ............................................................................................................ 3
1.4 Objective of the Project ................................................................................................................ 3
1.4.1 General objective .................................................................................................................. 3
1.4.2 Specific objective .................................................................................................................. 4
1.5 Scope and Limitation of the Project.............................................................................................. 4
1.5.1 Scope of the project .............................................................................................................. 4
1.5.2 Limitation of the Project ....................................................................................................... 5
1.6 Significance of the project ............................................................................................................ 5
1.7 Target Beneficiaries of the System ............................................................................................... 5
1.8 Methodology for the project ........................................................................................................ 6
1.8.1 Data Gathering Methodology ............................................................................................... 6
1.8.2 Development Methodology .................................................................................................. 8
1.8.3 Development Tools ............................................................................................................... 8
1.9 Feasibility Analysis ........................................................................................................................ 9
1.9.1 Economic feasibility and cost benefit analysis...................................................................... 9
1.9.2 Technical Feasibility ............................................................................................................ 10
1.9.3 Operational feasibility ......................................................................................................... 10
1.10 Project Plan and Time schedule .................................................................................................. 11
1.10.1 Project Time Schedule......................................................................................................... 11
1.10.2 Budget Plan ......................................................................................................................... 11
CHAPTER TWO ............................................................................................................................................ 14
2 REQUIREMENTS ELICITATION ............................................................................................................. 14
2.1 Overview of the Existing System ................................................................................................. 14

Dire-Dawa University Department of Computing School


III
Prison Management System (PMS)
2021
2.2 Advantage of existing system ..................................................................................................... 14
2.3 Drawback of the existing system ................................................................................................ 14
2.4 Proposed solution ....................................................................................................................... 16
2.5 Preferred Solution ....................................................................................................................... 16
CHAPTER THREE .......................................................................................................................................... 17
3 SYSTEM ANALYZING ............................................................................................................................ 17
3.1 Overview of New System ............................................................................................................ 17
3.2 System Requirements of the Proposed System .......................................................................... 17
3.2.1 Functional requirements..................................................................................................... 17
3.2.2 Nonfunctional requirements .............................................................................................. 19
3.3 System Modeling ........................................................................................................................ 22
3.3.1 System Use case Diagram ................................................................................................... 22
3.3.2 Use case documentation (for each use case identified) ..................................................... 25
3.3.3 Activity Diagram .................................................................................................................. 32
3.3.4 Class diagram (conceptual modeling) ................................................................................. 37
3.3.5 Sequence Diagram .............................................................................................................. 39
CHAPTER FOUR: .......................................................................................................................................... 45
4 System Design ..................................................................................................................................... 45
4.1 Introduction ................................................................................................................................ 45
4.2 System Architecture .................................................................................................................... 45
4.3 Hardware and Software Mapping ............................................................................................... 46
4.4 State chart modeling ................................................................................................................... 46
4.5 Collaboration Modeling .............................................................................................................. 48
4.6 Component modeling ................................................................................................................. 50
4.7 Deployment Modeling ................................................................................................................ 50
4.8 Persistence data storage and Management ............................................................................... 51
4.9 Graphical User Interface ............................................................................................................. 51
5 Conclusions and Recommendations ................................................................................................... 53
5.1 Conclusions ................................................................................................................................. 53
5.2 Recommendations ...................................................................................................................... 53
References .............................................................................................................................................. 54

Dire-Dawa University Department of Computing School IV


List of Table
Table 1 Software Tools ................................................................................................................................ 8
Table 2 Show project Schedule times ......................................................................................................... 11
Table 3 Software Cost of Project .............................................................................................................. 11
Table 4 hardware cost of project ................................................................................................................. 12
Table 5: cost break down ............................................................................................................................ 13
Table 6 The description of each use cases are listed below ........................................................................ 25
Table 7 The description of Login use cases ................................................................................................ 26
Table 8 The description of Prisoner Register use cases .............................................................................. 27
Table 9 the description of uploading nominal rolls use cases ..................................................................... 29
Table 10 the description of Modify Data use cases .................................................................................... 30
Table 11 the description of Visitor use cases .............................................................................................. 31
Table 12 the description of Visitor use cases .............................................................................................. 32

Dire-Dawa University Department of Computing School V


Prison Management System (PMS)
2021

List of Figure
Figure 1 Use case Diagram ......................................................................................................................... 23
Figure 2 Use Case Diagram ........................................................................................................................ 24
Figure 3 Activity diagram for Log in Use Case .......................................................................................... 33
Figure 4 Activity diagram for Prisoner Registration Use Case................................................................... 34
Figure 5 Activity diagram for search prisoner Use Case ............................................................................ 35
Figure 6 Activity diagram for Visitor Use Case ......................................................................................... 36
Figure 7 Activity diagram for Visitor Use Case ......................................................................................... 37
Figure 8 show the Class Diagram ............................................................................................................... 38
Figure 9 Sequence diagram of Login use case ............................................................................................ 39
Figure 10 sequence diagram of register Prisoner use case .......................................................................... 40
Figure 11 sequence diagram of uploading nominal roll.............................................................................. 41
Figure 12 sequence diagram of Modifying Prisoner data ........................................................................... 42
Figure 13 sequence diagram of in out register ............................................................................................ 43
Figure 14 sequence diagram of generate report register ............................................................................. 44
Figure 15 System Architecture .................................................................................................................... 45
Figure 16: State Chart For Register Prisoner............................................................................................... 46
Figure 17: State Chart for search prisoner Information ............................................................................. 47
Figure 18 State chart for upload Numeral roll ............................................................................................ 47
Figure 19: State chart for Generate report ................................................................................................. 47
Figure 20 Collaboration Diagram for Register Tasks ................................................................................... 48
Figure 21 Collaboration Diagram for modifying Tasks .............................................................................. 48
Figure 22Collaboration Diagram for modifying Tasks................................................................................. 49
Figure 23 Component Modeling ................................................................................................................. 50
Figure 24 Deployment Modeling ................................................................................................................ 51
Figure 25 Graphical user Interfaces ........................................................................................................... 52

Dire-Dawa University Department of Computing School VI


Prison Management System (PMS)
2021
Abbreviation and Acronyms
PMS- Prison Management System
DDU- Dire-Dawa University
PHP- Hypertext Preprocessor
HTML- Hypertext Markup Language
CSS- Cascading Style Sheet
SQL/Mysql- Server Query Language
CD/DVD- Compact disk/Digital Versatile Disk

Dire-Dawa University Department of Computing School VII


Prison Management System (PMS)
2021
CHAPTER ONE

1 INTRODUCTION
The development of one country is analyzed from many directions or factors such as peaceful
security of the Prison and their property etc. Those are protected by Prison Management station
such as police and Prison employers.

Prison give service to protect prisoners from harum-scarum but on the given of this service there
are many problems on the Prison Management techniques. Our project has been prepared for
developing a new web based Prison Management System We chooses this topic to protect the
Security of the prison and our country.
The proposed System applies to Prison management institution all across the Prison and
specially looks in the subject of Prison management system. This chapter contains the boundaries
of this project background, statement of the problem, objective, scope and limitation,
methodologies, time schedule and the project risk management. We are doing the Zway PMS
project because of to reduce the prison office workload and we will do the Zway PMS desktop
application program.

1.1 Background of the organization


Ziway Prison (also spelt Ziway federal Prison) in Ziway is one of the several federal prisons of
Ethiopia, it serves as the main prison of the country. It is 163 km south of central Addis Ababa,
in Ziway, the southernmost sub city of the nation's capital.

The development of one country is analyzed from many angles. So there are many factors such
as peaceful security of the people and their properties etc. those are protected by Prison
management station such as police officer and peoples. The institution of prison management
station is standing to protect people‟s peaceful security and their property from danger.

Ziway prison management organization was having no computerized way of controlling the
prisoner. It was manual way of controlling the prisoner. This means that it was document based.
And it is time consuming. to manage all prisoner,to register the new prisoner, to live the prisoner
from the compound who have finished the criminal time.

Dire-Dawa University Department of Computing School 1


Prison Management System (PMS)
2021
All this above problem was manual. So to make change this manual way into computerized
system is important. The efficiency of the prisoner controlling and the effectiveness with which
it deals with prisoner depend on what quality of information it can drive or received from where
the prisoner is occurring and how fast it can have service to it.

The station has given service. The activities of the Ziway Prisons Service interms of records
keeping has for a long time been a huge problem to the service as there areno proper facilities
inplace to ensure that they are able to store and retrieve information nonprisoners very
quickly. Records keeping are still done using big-old files which have to be shelved once that file is
full and then replaced with another and so when the need comes to get informationonprisoners, they
will have to look through the old files according to the dates they assume the information could
have been stored and then go through hall files that were recorded during that period until the file
is found.

This very tiring and time-consuming activity usually leaves them with no other option but to
record the prisoner details againthe inthe new file to avoid going through so much stress
but which also calls for data redundancies hence, data inconsistencies

1.2 Background of the project


Prison management system (PMS) project background was manual based, time consuming and
also was more effective way to do, and also it was paper based but not web based.
Prison management is a daunting task and especially when the numbers are too high to handle,
resources are minimal to manage and there is lack of trained manpower to manage pressures and
crisis situations, two major set of challenges were identified in relation to prison affairs
management. One challenge prison administration was plagued by ills of a traditional
administrative and management

These included time consumption process, human errors in administering records and registers
of prison inmates, and management hurdles in compilation and analysis of data due to lack of
data and information accuracy.

PMS is the system to manage the activities related to prison like tracking and monitoring of
activities in all the prison, effective management of the records. Prison management system

Dire-Dawa University Department of Computing School 2


Prison Management System (PMS)
2021
plays a very significant role in reducing a crime from society and converts the offender into non-
offender.

1.3 Statement of the problem


Since the prison management system apply manual Way of implementing tasks. It will also face
many technological problems to site some this multiphase factors in the case of prison stations.
We have been observing that a prisoner does not have any type of computer software application
to record and monitor all the prisoners in the organization. Such as
 Redundancy of data.
 Difficult to search prisoner‟s records and problem of managing data.
 Time consumption process for all Registration.
 Human errors occur to give Generate report for the Administer.
 Registers of prison inmates, and management hurdles in compilation and analysis of data
due to lack of data and information accuracy
This is what we consider a problem. Because of this we are going to solve the problems by
creating a software application and by changing this manual way into computerized system and
database management system that administrates the problem stated above.
The problem of the statement mainly deals with the problems that initiated this project and
problems that you are going to bring solutions for. Here the problems are clearly defined above
so the project gives the solution to those problems.

1.4 Objective of the Project


The objective of this project is to deeply investigate the problems of the Ziway city prison of
Prison management system which would alive the existing problem of the prison. To deliver a
fully functional system that delivers close to 100% efficiency in prisons management in Ziway
using ICTs.

1.4.1 General objective


The general objective of this project is developing prison management system into a more
modern, easy-to-use desktop-based computerized system for the Ziway prison. And also to bring
in transparency and efficiency in an otherwise secrecy driven system; the use of technology is
supposed to bring about transparency in the system and foster the process of precise
implementation of rules and law.

Dire-Dawa University Department of Computing School 3


Prison Management System (PMS)
2021
1.4.2 Specific objective
The specific objective allows identifying and describing about the integrated prison controlling
and monitoring system as shows in the general objective. The specific objective is listed below:

 To ensure that data recording is done using computers for easy access.
 To generate prisoner report with any format.
 To register and keep all information‟s about the prisoners such as their family details and
background information.
 To reduce the work load stakeholders.
 To manage large number of prisoner‟s details.
 To save time, money, materials by using computer.
 To ensure the satisfaction of the prisoner relatives and also the prisoners.
 To prevent loss of data and ensure security.

To attain the general objective, the following specific objectives are set

 To deliver a system that covers all region of prison management from the admission to
the release of the prisoner and connectivity/connection across jails; brings in
administrative efficiency and sense of security; leads to prisoner empowerment in the
jails.
 Proper use of technology to bring transparency in the system and provide accurate
implementation of rules and make data easily available to bring in efficient decision
making.
 To bring in full accuracy in the prison management is the key functional and
operational areas, to overcome the manual or hand-written system and to bring in the
advancement and use of new technology in the process with proper record keeping and
make the work of staff much easier and smooth in day-to-day activity.

1.5 Scope and Limitation of the Project

1.5.1 Scope of the project


This project will be limited on developing for Ziway city prison management system. This
project helps the board to work without barrier of something. On completion of this project we
expect the system will have:

Dire-Dawa University Department of Computing School 4


Prison Management System (PMS)
2021
 Record the prisoner full information
 Search all prisoner information
 Uploads the nominal-roll (criminal person) through the News page
 update record the prisoner Data
 Visitor Pages to see the prisoner.
 IN OUT register
 Generate Report
 Create account for users
 Modify the account of the users

1.5.2 Limitation of the Project


Some of the limitations of our project are:

 It only recommend for the entering Prisoner information.


 Our system does not have any interaction with other prison management system.
 The system applies to only Ziway prison.

1.6 Significance of the project


The new system has immense support for the prison administration. The system has facilitated to
provide and receive factually correct, accurate, and timely data and information and got rid of
time consuming and errors prone records and registers of prison related activities. This can
reduce the time and resource required in the current system by using the newly proposed system.

1.7 Target Beneficiaries of the System


There are different concerning body that can be benefited or can be gate benefit from the
proposed prison management system those are

Administrator: - Administrator is treated as a super user in this system. Administrator can


maintain control all the page of users of the system. He can also look over and supervise the
automated release diary is also managed under his guidance, also view and modify the data or
maybe necessary delete the data.

Police Commander: manage the all activity of Police officer and generate report to the
administrator in easy way

Dire-Dawa University Department of Computing School 5


Prison Management System (PMS)
2021
Police officers: - He can add the new prisoner and the cases of the prisoner. can seek
information regarding prisoners and convicts get the information of the users the prison, in out
register is maintained to record the details of prisoners who are all moving in and out of prison
for various reasons such as court hearings, personal problems, health issues and family problems
etc. The details of in out register are supervised by the administrator and police officials
Data Manager: - They can have the privilege to add and update data in the different registers,
and he can also view and modify the data. Upload the numeral-roll.Registered all the users of
system and. All so Register visitor to see the prisoner
The prison gates the benefit from the system to manage the activities related to prison like
tracking and monitoring of activities in all the prison, effective management of the records. For
the employer of the system make the work easy, save time and decrease work overload. The
system has supported the work of the police department by providing access to all information
related to prisoners as well as their visitors and relatives.

1.8 Methodology for the project


Methodology is generally a guideline for solving a problem using different task, method,
techniques, and tools. It is the way in which information is gathering to developing the system of
this project. We will first have an unstructured face to face interview with the prison service
depart men Tal heads in other to familiarize ourselves with the current operations and the sort
of data that is being used. With this data, we will start analyzing what sort of data we need and
this will inform us about the questions we need to ask for the next phase.

1.8.1 Data Gathering Methodology


Fact Finding is the formal process of using research, interviews, questionnaires, and
other techniques to collect information about systems, requirements, and preferences. It is also
called information gathering or data collection.

Data Source
Data source is a name given to the connection set up to a database from a server. The name is
commonly used when creating a query to the database A data source is any of the following
types of sources for (mostly) digitized data: a database. in the Java software platform, data
source is a special name for the connection set up to a database from a server.

Dire-Dawa University Department of Computing School 6


Prison Management System (PMS)
2021
Interview
It permits the interviewer to ask the respondent direct questions. Further probing and clarification
is possible as the interview proceeds. So we have interview like Administrator, Data Manager,
Police officer and Police. Is one of data gathering methodologies or mechanism we used to
collect information by making a formal meeting at which we are asked some questions to PMS
Manager and other member police as well as some Employers work in the prison. Like

Administrator: -

 How the existing systems work?


 What is the existing system problem?
 How can you manage the prison and prisoners?
 Can you easily get the information of prisoners?
 How register the prisoners?
Police Officer: -
 Watch canid of information need to register one prisoner?
 The manual system is fast to register?
 Can you get easily wonted criminals?

Data manager: -
 How you consecrate report for consecrate body?
 Can you easily modify the prisoner data?
 How fond the numeral-roll?

Practical Observation
We observed various prison criminal documents from the internet. Observing organizational
behaviors in their functional settings is one of the most direct ways to collect data. To
understand how the jobs are performed sequentially we have looked into the features they
provide for users.

Documenting Analysis
In our project document analysis referees the manual based document that the organization used
before or we reviewing documents that exist at different time in the organization is also the other

Dire-Dawa University Department of Computing School 7


Prison Management System (PMS)
2021
data gathering methodology that we used to collect all the necessary information‟s from the
manual guideline of the organization and other related references. We used to all the necessary
information‟s from the manual guideline of the organization (prison) and other related
references.

1.8.2 Development Methodology


Among the different methodologies available, we are planning to use object oriented
methodology for the analysis and design of our system. This greatly improves the
communication among customers, analyzers, designers and programmers. It also allows the
reusability of the code which will help to enhance the project in the future.

1.8.3 Development Tools


Developmental tools are the tools that we are going to use in a case to develop our system, In the
case of our project to develop our system the team members use two types of tools those are
hardware tools and software tools. Those tools are listed below one by one.

Tools We Will Use


When we develop this system, we will use the following hard ware and software tools.

Soft ware Tool

A software tools are a programming tool or software development tool is a computer program
that our team members use to create, debug, maintain, or otherwise support other programs and
applications.

Table 1 Software Tools

Activities Tools/programs
Platforms Windos8.1,10
Database MYSQL
Clint side script CSS, Java script/HTML5
Documentation MS word2016
User training MS Power point 2016
Modeling and scheduling EDRAW
Server side scripting Wamp Server
Coding language PHP

Dire-Dawa University Department of Computing School 8


Prison Management System (PMS)
2021
Hard Ware Tools
The hard ware tools are the tools that we are going to use In case of to develop our system.
Programmable products are supported by a complete range of high-end and low-cost
debugging and programming tools.

Hardware
 Laptop computer
 Flash disk, CD/DVD RW disk
 Desktop computer
1.9 Feasibility Analysis
A feasibility study aims to objectively and rationally uncover the strengths and weaknesses of an
existing business or proposed venture, opportunities and threats present in the environment, the
resources required to carry through, and ultimately the prospects for success.

1.9.1 Economic feasibility and cost benefit analysis

Cost benefit analysis (CBA), sometimes called benefit cost analysis (BCA), is a systematic
approach to estimating the strengths and weaknesses of alternatives. It is used to determine
options that provide the best approach to achieve benefits while preserving savings. The CBA is
also defined as a systematic process for calculating and comparing benefits and costs of a
decision, policy (with particular regard to government policy) or (in general) project.

The existing manual system of prison management system of prison management system was
time consumes to do all tasks, it need a lot of works to do the system. Need around 15 works to
do all the prisoners activity, for only one worker. The organization pays
2000*15=30000birr.during the existing system. The proposed system aim is to reduce this cost
and human resource to save time and to reduce cost of the organization, in the case of propose
system need only for workers to do the system, then 4*4000=16000 birr only, there for this
reduce the cost of the projects and time.

Dire-Dawa University Department of Computing School 9


Prison Management System (PMS)
2021

1.9.2 Technical Feasibility


This assessment is based on an outline design of system requirements, to determine whether the
organization has the technical expertise to handle completion of the project. When writing a
feasibility report, the following should be taken to consideration: A brief description of the
business to assess more possible factors which could affect the study
 The part of the business being examined
 The human and economic factor
 The possible solutions to the problem
The developed and computerized system can be technically feasible because the technical
resources need to develop is there. The developed system is a little difficult to use because of
this may be require IT technical.

To use this system in the organization there should be computer is there.

 Give Training on the new system for the system administrator and for the staff

1.9.3 Operational feasibility

Operational feasibility is the measure of how well a proposed system solves the problems, and
takes advantage of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirements analysis phase of system development, the
operational feasibility assessment focuses on the degree to which the proposed development
projects fits in with the existing business environment and objectives with regard to development
schedule, delivery date, corporate culture and existing business processes. The computerized and
the new system can be used effectively and efficiently after it has been completed it‟s
developing. The stake holder‟s actors and users of the system will have no any complexity and
have no any difficulty to use the new system,will not have any difficulty with the new system,
producing the expected benefits. The new system will not need a lot of training for stake holders
and users of the system. But may it need a little training for the users off the system.

Dire-Dawa University Department of Computing School 10


Prison Management System (PMS)
2021
1.10 Project Plan and Time schedule

1.10.1 Project Time Schedule

Table 2 Show project Schedule times


Project schedule chart
No Activities Months
August August September August September
23, 2021 27, 2021 2, 2021 28, 2022 5, 2022

1 Project Proposal

2 Requirement analysis

3 System Design

4 Implementation and
Testing

5 Project conclusion

1.10.2 Budget Plan


Cost of the project is a method that uses technology to measure cost and productivity through the
full life cycle of enterprise level projects. CP encompasses several specific functions of project
management including estimating, job controls, field data collection, scheduling, accounting and
design. PCM main goal is to complete a project within an approved budget.

Cost of the project


The following work specifies the One Time cost associated with the project.

Table 3 Software Cost of Project

Software cost
Software description Price

Dire-Dawa University Department of Computing School 11


Prison Management System (PMS)
2021
Microsoft office word 2016 50.00
Microsoft power point 2016 50.00
Microsoft SQL server 500.00
Visual studio 2010 50.00
Avant !free antivirus and Sadat 2017 50.00
Total 700.00Birr

Table 4 hardware cost of project

Hardware cost
NO Name Quantity Unit price in Total
Birr
1 Purchase of flash disk (8GB) 2 150 300
2 Purchase of stationary
Paper 250 pace 250 250
Pen 4 5 20
Printing cost 200 page 4 800
Photocopy 200 page 0.75 150
3 Purchase of CD-RW 2 35 70
4 Miscellaneous expense 200
Total Cost 1790.00Birr

Dire-Dawa University Department of Computing School 12


Prison Management System (PMS)
2021
Cost break down
Table 5: cost break down

Equipment

Equipment Name Quantity Price

Lap Top ( 2Toshiba and HP) 3 30,000.00 Birr

Paper 1 packet 500.00 Birr

Pain drive 4(4*150) 600.00 Birr

Pen 4(4*5) 20.00 Birr

Total 31120 Birr

Dire-Dawa University Department of Computing School 13


Prison Management System (PMS)
2021

CHAPTER TWO
2 REQUIREMENTS ELICITATION
Description of the Existing System This chapter covers the description of the existing system,
problem of the existing system and the proposed system in detail.
2.1 Overview of the Existing System
The prison management system uses the documentation form storage which is a single user
system to find the wanted information.
 The important and the most significant drawback is that the system is manual. There may
be errors due to carelessness or oversight that may result in loss to the data and as to the
organization. For an organization, time is very important factor.
 The prison information is stored in the document form which is like a data sheet. This
makes it impossible to search for information in such a huge number of documents
manually and to add new information if the searched information is not available.
The manual system had failed to keep timely, updated records of all these activities. There was
negligence, worn out and casual attitude in managing records areas. The other set of challenge
was from the prisoners‟ perspective. This has to do with uneasiness and insecurity in the minds
of the prisoners related to appropriate justice by the system in various aspects including
remission, release, and emoluments.
2.2 Advantage of existing system
The existing system in the organization has different major functions. Current system is manual
that means keeping information paper based.
 Less expensive to setup (i.e the main tools of recording a prison information are pen,
pencil, paper, shelf and others).
 Does not require the professional computer skill to work on it.
 Does not need additional training , the person who are educated read, write and listening
can work on it.
2.3 Drawback of the existing system
Drawback of the existing system describes the main problem, opportunity and directive
identification that were performed in the organization during the existing system. The following

Dire-Dawa University Department of Computing School 14


Prison Management System (PMS)
2021
checklist for problem, opportunity, and directive identification uses prison management system
framework.
 In the manual system searching prisoner‟s information is very slow and often not
interesting.
 is very inefficient,
 Difficult to handles and also looking up of information is time consuming.
 Lack of data security
 Time consuming
 More man power is needed
 Not handling prisoner‟s information properly or lose of data.
 The visitors prison serve turn by turn which is wasting for visiting for visitors for waiting
turn many visitors come to visit early on the morning to take their turn front (to serve first
Performance (Response time): Performance of the existing system is required to show the
needs of users of that system. Performance is low because of it takes a lot amount of second for
searching the prisoner‟s information. Therefore, there is problem of performance according to
the prison management system that was manual.
Information: - According to the current system the existing system was manual in the
organization. Due to this it has that much problem of accuracy, redundancy and flexibility as an
input and output.
Outputs:Conditions in our prisons are getting worse and we believe that is based on poor
planning and policy formation which all emanate from the lack of accurate information to be
used.
Our prisons are over-crowded and it is not clear what the exact number of prisoners in a
particular cell and the entire prison are. There is even a problem of knowing how many of them
are males and how many are females, that of adults. This information when accurately given can
help the government and other agencies to support the service expand its resources.
Inputs: difficult to search prisoner, it is difficult to give service for customers, Data is not
accessible, Loss of Prisoners data because of improper records, Inaccurate record of prisons data,
duplicate information of prisoners
Security and Controls: The current system is manual; due to this the system is not secured. This
means that every user can access the system .to enter in to the system during the manual time

Dire-Dawa University Department of Computing School 15


Prison Management System (PMS)
2021
there no need of password and user name. Therefore, the aim of the proposed system is to protect
the system from unauthorized person by using user name and password. Only privilege or
authorized person can inter into to the system.
Efficiency: The manual prison management system is prone to various problems. These
problems can be seen from the following perspectives like performance, information, economic,
control, efficiency and services given by the existing system to the users.
2.4 Proposed solution
Even though an existing system provides different functions that are stated above, it is not to
mean that the functions are satisfactory. This is because all the processes (actions) are performed
manually. To overcome or improve this manual operation the team comes up with a new System
entitled. This proposed system is developing in Web based application, mobile and computer
based that enables the users to access the services given by the system through the Internet,
mobile and computer.
The proposed new system operates in the following manner, according to us propose system this
project will do the following functionality:
 The propose system have greater contribution to reduce human resource and wastage of
time.
 The manual to automated operation for easier management, speed up operation for better
record keeping and to help make better decision.
 Generate report within needed time.
 Record prisoner‟s full information, and Update prisoner‟s information

2.5 Preferred Solution


We preferred to develop from the above all proposed system we use the web based system.
The applications of proposed system are:
 Replace the manual to automated system.
 The proposed system enables to register prison and store prison information in the database.
 The application composes different forms to store data to the database and retrieve required
information from the database.
 It provides better and efficient service to the user.
 Reduce the workload of police officer, police and proctor
 Provides facility for proper monitoring, reduce paper-based work & provide data security.

Dire-Dawa University Department of Computing School 16


Prison Management System (PMS)
2021

CHAPTER THREE

3 SYSTEM ANALYZING
A systems analyst is an information technology (IT) professional who specializes in analyzing,
designing and implementing system, a systems analyst is a person who uses analysis and design
techniques to solve business problems using information technology. May serve as change
agents who identify the organizational improvements needed, design systems to implement those
changes, and train and motivate others to use the systems.

3.1 Overview of New System


3.2 System Requirements of the Proposed System
The following are Functional and Nonfunctional requirements of the proposed system that a
group member have identified from requirement use cases associated with each actor and use
case interaction.

3.2.1 Functional requirements


The following are the functional requirements of the new system. Other specific functionality
that defines what a system is supposed to accomplish.

The functional requirements of the proposed system are listed as follows: -Functional
requirements are type of requirements that a project must consider in its entire process.
Operations those understand by the developer and stated as a way of automating the existing
system, Services that the system should provide. This functional requirement defines what the
systems do or the actual functionality of our system. The system provides the following
functions.

Prisoner:

 The system allows prisoner to view their job.


 The system allows prisoners to view personal information
 The prisoner to send transfer
 The system view prisoners and other registered information according to his/her privilege.
 The system allows updating information regarding to prisoners.
 Generate report as the stakeholder wants like it generates by, name, date, time.

Dire-Dawa University Department of Computing School 17


Prison Management System (PMS)
2021
 The system should Search all prisoner information.
 The system should Record the prisoner full information.
 The system should generate timely report about the Criminal.
 The system should store all the data related with all the tasks performed into a database.
 The system should update, of correction program of the prisoners.
 The system allows the administrator to create account for……
 The system allows users to change their password

Performance requirements
Performance requirements state how well the system is to do what it is to do. That is,
performance is an attribute of function. If the Requirements Analyst finds a performance
requirement without corresponding function, the Analyst has found an incomplete requirement.
The Analyst finds the corresponding function, and brings the function and performance together
into a complete statement of the requirement, now a functional and performance requirement.

Where possible, projects should avoid adverse impacts on workers, communities, and the
environment. If avoidance is not possible, negative impacts should be reduced, mitigated or
compensate for, as appropriate.

Process requirements
In terms of our proposed system or in terms of project management, process requirements refer
to one of the four types of project requirements. Along with business, product and resource
requirements, process requirements serve as a foundation for eliciting, analyzing, specifying and
validating needs and expectations of project stakeholders. Determining requirements for a
process in our system means stepping through the following sequence of tasks: Gathering
The first task is to determine and collect initial needs and expectations of customers.
The second task is to review gathered data and ensure it is clear, complete, unambiguous, and
consistent Recording.
The final task is to create a requirements specification document and submit it to customers for
validation.
Input related requirements

Dire-Dawa University Department of Computing School 18


Prison Management System (PMS)
2021
In a case of our project, input related requirements refers to the input necessity things that we can
use to develop our proposed system .by using this input thing the aim of the team members is to
satisfy the needs and wants of the stake holders.

Output related requirements


In case of our proposed system output related requirements refers to the result that this proposed
system is produce as output or in other words the requirements that the stake holders expect as
output from the system. During the system was in the manual case. There is even a problem of
knowing how many of them are males prisoner and how many are females‟ prisoner, that of
adults. Therefore, knowing as output all the above information, this information when accurately
given can help the organization, the stakeholders and the users of the system and other agencies
to support the service expand its resources.

Storage related requirements


In our proposed system storage related requirements refers to the place where data is held or
stored in an electromagnetic or optical storage form for access by the users, stakeholders and
employers of the system. Storage is frequently used to describe the devices and connected to the
computer through input output operations. That is HD and tape system and other forms of
storage. Therefore, in our proposed system we can use storage like hard disk, CD drive, open
drive and the others as data storage to store our data and to simplify the works of the system.

3.2.2 Nonfunctional requirements


Non-functional requirements are that detail the constraints and quality standard that the system
we are building should adhere to. We are finding out what these non-functional requirements
should be our experiences, interviews, and industry standards. Also, we can use try and discover
what non-functional requirements should be. Here are some areas that we should have in our
non-functional requirements document. It describes user-visible aspects of the system that are
not directly related with the functional behavior of the system. Nonfunctional requirements
include quantitative constraints such as:

 Response time (i.e. how fast the system reacts to user commands)
 Accuracy (how precise or accurate the system is)

Reliability

Dire-Dawa University Department of Computing School 19


Prison Management System (PMS)
2021
Reliability is the chance that the system process works correctly without being aborted. Some of
the potential resulting losses that you should considerer are

Complete or partial loss of ability to perform a mission-critical function

Loss or corruption of data loss of user productivity

Time between failures

Recoverability

Recoverability is the ability to restore function and data is backed up and the speed of data
restore from backup. We think about:

 If the hardware, data, and onsite backup are destroyed, how soon must the application be
restored
 How many backups do you have?
 In one server goes down, how many backups servers do we have us?

Availability

System availability is the time when the application must be available for use. Required system
availability is used in determining when maintenance may be performed. Definitely we think
about time zones, schedules, and user location.

Performance
Performance describe the time the system performs its function in a minimum amount of time.
The system shall perform its operations within a minimum amount of time without losing a lot of
time or without time consuming. The system shall be comfortable to use and interactive and the
users or the stake holders of the system gets the expected result or things they want within few
seconds without wasting a lot of time.

User interface
The user interface is presented (displayed) on the computer screen. It is the result of processed
user input and usually the primary interface for human-machine interaction.

Dire-Dawa University Department of Computing School 20


Prison Management System (PMS)
2021
The Proposed user interface of the system shall be comfortable, attractive and simple for the
users in order to attract the user of the system friendly and easy enough to work with. The user
interface of this system is not complex and is not difficulty to use.

Security and Access permissions


The part of the system is accessible only for the authorized prison management employees and
workers of the organization according to their assigned right because in order to inter into the
system the authorized user has their own user name and password. Unauthorized users cannot get
access of the proposed system. Because of this the security of the system is strictly prohibited to
use for unauthorized person.

An unauthorized user should not access the administration page by any means. Because the
administrator has their own identification user account. Only few pages of the system are
accessible to the users that help to do the search facility and to interact with the Administrator.
Some of the resources and activity shall be restricted and allowed only for authorized users.
Therefore, the system shall have user identification method, and because of this the system
should restrict unauthorized user to inter into the system.

Backup Recovery
There shall be a frequent and full back up mechanism to avoid any information loss and
inconsistency, we will explore some of the way‟s organizations have moved beyond the simple
backup methods of the past. These include

 Backing up data on a local or centralized file server (using either disk or tape drives for
storage) is the most basic backup scheme. A system of full and incremental backups can
help manage the size of the backup window.
 Another approach is to assign distributed backup clients throughout the organization,
which move backup data over the network to a backup server or cluster of backup
servers. This solution is more scalable than the first. Yet another approach is to perform
full local desktop and server backups on local backup servers, which are then “cloned”
to safe remote backup servers over the network. A storage area network (SAN) can
enable the sharing of storage devices and data across a fast network connection.

Dire-Dawa University Department of Computing School 21


Prison Management System (PMS)
2021
3.3 System Modeling
3.3.1 System Use case Diagram
A use case diagram is a visual representation of the relationships between actors and use cases
together that documents the system‟s intended behavior, Representation of the functionality of
the system. This section presents functionality of the system in terms of actors and use cases. A
use case describes a function provided by the system that yields a visible result for an actor.
Use Case represents interaction between a user (human or machine) and the system.
Use case components:
Actor: is a person, or external system that plays a role in one or more interaction with the
system, and represented with:

Use case: describes a sequence of actions that provides something of measurable value to an
actor and is drawn as a horizontal ellipse.

System boundary: indicates the scope of the system project. Anything within the box represent
System

functionalities in side in scope.


Identify Actors
Actors Descriptions
Administrator Administrator is treated as a super user in this system. Manage all
the page of the system.
Police officer Has the responsibility registration to Prisoner information
Police Commander Has the responsibility to report the criminal person concerning
body and manage Police officer
Data Manager controlling all activity of the data in the organizationand
registration the visitor and users of the System and control them

Dire-Dawa University Department of Computing School 22


Prison Management System (PMS)
2021

Figure 1 Use case Diagram

Dire-Dawa University Department of Computing School 23


Prison Management System (PMS)
2021
The identified use cases of the system are the following
NO Use Case Description
1 Record prisoner This use case used to create
Prisoner and also Create case
which deals more about the
prisoner‟s
2 Search all prisoner
information This use case used to search a
Prisoner information term
3 Uploads the nominal-roll This use case used to find the
criminal person
4 Modify or correction This use case used to update the
program data

5 Register users This use case is used to


create accounts for users
of the system.
6. Register visitor to see the This use case is used to
prisoners create Visitor to see the
prisoners
7 IN OUT register This use case is used to
create the prisoner within
the prison regarding to
the prisoner

8 Generate Report This use case used to


generate the information
of nominal roll.
Use Case Diagram

Figure 2 Use Case Diagram

Dire-Dawa University Department of Computing School 24


Prison Management System (PMS)
2021
3.3.2 Use case documentation (for each use case identified)
Table 6 The description of each use cases are listed below

Use Case Name Log in


Actor Administrator, Police officer, data manager .

Description It describes the process of authenticating the user name, password& Access
level before granting access to his/her mail account. This is part of the
existing system.

Trigger Administrator, Police officer, data manage. needs to visit his/her account to
use the system.

Pre –Condition The Administrator, Police officer ,data manager .who know the password
,username &Access level should login and use the systems.

Normal Action 1. The user click the Log in button in the home page.
2.The system display the login form
3. The Administrator, Data Manager, Police Officer, police, enter the
user name, Access level and password.
4.The user click the log in button in the form of log in.
5. Login validity is checked.
6. The main form display
Post condition All the above users login in to the system. Users can use different activities .
Alternative Action If the enteredusername password and Access level is not validated and
verified, system displays error message and go to step 2.

Dire-Dawa University Department of Computing School 25


Prison Management System (PMS)
2021
Table 7 The description of Login use cases

Use Case name Record prisoner

Actor Administrator, Police officer.

Description Recording prisoner information. Fill the full information of prisoner.

Trigger Administrator, Police officer, needs to fill the information of the prisoner in to
the registration system.
Pre -Condition 1.The Administrator, Police officer is successful log in
2.the Register Main page is displayed
Normal Action 1.The police officer validate the log in form.
2 The system displays the Register form.
3.The Police officer enters all the required information.
4. Then click register button.
5.The system checks the Prisoner record form.
6.The system displays confirmation message of addition.
the records the case of prisoners
1.The Police Officer Click on case register link.
2.The Police officer enters all the required information.
3. Then click Save button.
4.The system checks the Prisoner record form.
5.The system displays confirmation message of addition

Post condition The prisoner record by the system successfully.


Alternative Action 1. If the information is not fully filled go to Step 2
2. The system display report error and need to correct it.

Dire-Dawa University Department of Computing School 26


Prison Management System (PMS)
2021
Table 8 The description of Prisoner Register use cases

Use Case Name Search all prisoner information


Actor The Administrator, Police officer, data manager

Description Search prisoner information


Trigger Administrator, Police officer, data manager.
needs to visit his/her account to use the system.
and they have to login in to the system.
Pre -Condition Login to the system
Normal Action The user initiates the system.
The Administrator/ Data Manager/Police
Officer main form display
Insert the id of the prisoner.
Click on the search register button.
Selects type of search register
The search register bar display
Enter the search key.
The system retrieves the prisoner‟s
information from database.
The system shows the prisoner information.
Post condition The system display Search result is either
found or not.
Alternative Action If the entered search key not found.
The system display the result is not found
message and goes to privies page.

Dire-Dawa University Department of Computing School 27


Prison Management System (PMS)
2021

Use Case Name Uploads the nominal-roll

Actor The Administrator, data manager.


Description The Data manager wants to Upload nominal roll.
Trigger When the Administrator, data Manager went to upload criminal person.
Pre -Condition Login into system. Check which is criminal person.
Normal Action 1.The Data manager validate the log in form.
2 The Data Manager initiates the system
3. The system display the Data Manager home page.
4. The data manager has to first search the Prisoner with his/her Prisoner Id
then submits.
5.The Data Manager click on the search data button.
6.The system checks the Prisoner record data base table
7. The system display information in the form
8. The Data Manager edit the data
9. The Data Manager Enters the data to be updated.
10. The system saves the updating data.
11. The system displays confirmation message of addition
Post condition The system upload the nominal roll.
Alternative Action 1. If the uploading data not correctly filled.
2. The system display report error.

Dire-Dawa University Department of Computing School 28


Prison Management System (PMS)
2021
Table 9 the description of uploading nominal rolls use cases

Use Case Name Modify Prisoner data


Actor The Administrator, data manager.
Description This use case is used to update Prisonerdata.
Trigger When the Data Manager wants to change his/her data and other information
Pre -Condition Who know the password; username&Access level should login and use the
systems.
Normal Action 1. the Data manager validate the log in form.
2 The Data Manager initiates the system
3. The system displays the Data Manager home page.
4. The data manager has to first search the Prisoner with his/her Prisoner Id
then submits.
5.The Data Manager click on the search data button.
6.The system checks the Prisoner record data base table
7. The system display information in the form
8. The Data Manager edit the data
9. The Data Manager Enters the data to be updated.
10. The system saves the updating data.
11. The system displays confirmation message of addition
Post condition The Updated Prisoner data is saved to PrisonerDatabase .
Alternative Action 1.If the searching key is not found
2. The system display incorrect message and goes to Step 3

Dire-Dawa University Department of Computing School 29


Prison Management System (PMS)
2021
Table 10 the description of Modify Data use cases

Use Case name Register visitor


Actor Administrator, Data Manager

Description The Datamanager wants to record the visitor detail information.

Trigger Administrator, DataManager, needs to fill the information of the System Users in to the
registration system.
Pre -Condition The visitor should arrive by the prison‟s prisoner visiting schedule

Normal Action 1. The Data Manager initiates the system.


2. The Data Manager main form display.
3. Click on the Visitor Record link.
4. The Visitor Record form display.
5. Fill the Visitor details information.
6. The system notifies the Visitor detail is captured successfully.

Post condition The visitor details successfully record to the database.

Alternative Action 1. If the data is entered incorrectly.


2. The system displays error message and goes to Step 4

Dire-Dawa University Department of Computing School 30


Prison Management System (PMS)
2021

Table 11 the description of Visitor use cases

Use Case name IN OUT register


Actor Administrator, Police officer.

Description The police officer wants to record the in-out information.

Trigger Administrator, Police officer, needs to fill the information of the prisoner in out
resign.
Pre -Condition First Police officer logged on

Normal Action 1. The Police officer enters to the system to register In-Out prisoner information.
2. The police officer main form display.
3. The police officer Click on the In-Out register link.
4.The system display the specific In-Out registration form
5. The police officer Enter the In-Out register information.
6.The register button click.
7. The system register prisoner as In-Out register.
Post condition In-Out prisoner is registered.
Alternative 1.If the system displays the Entered information is incorrect message.
Action
2. The system informs the Data Manager to re-enter information and goes to step 5

Dire-Dawa University Department of Computing School 31


Prison Management System (PMS)
2021
Table 12 the description of Visitor use cases

Use Case name Generate Report


Actor User
Description The generated reports are case wise report and prisoner wise report

Trigger User needs to Fill report


Pre -Condition The generate report page is displayed
Normal Action 1. The User Click the Generate report link in the home page.
2. The system displays Generate report page main form.
3. The user fills the report form
4. The click the send button
5. The prisoner report generated
6. The system sends the success full message.

Post condition Report generation successfully by the system


Alternative Action 1. If the User fill data entered information as incorrect go to step 3

3.3.3 Activity Diagram

An activity diagram describes a system in terms of activities. Activities are states that represent
the execution of a set of operations. The completion of these operations triggers a transition to
another activity. It is a flow diagram used to represent the data flow or the control flow through a
system.

Prison Management

Dire-Dawa University Department of Computing School 32


Prison Management System (PMS)
2021

Figure 3 Activity diagram for Log in Use Case

Dire-Dawa University Department of Computing School 33


Prison Management System (PMS)
2021
Police officer

Figure 4 Activity diagram for Prisoner Registration Use Case

Dire-Dawa University Department of Computing School 34


Prison Management System (PMS)
2021
Members

Figure 5 Activity diagram for search prisoner Use Case

Dire-Dawa University Department of Computing School 35


Prison Management System (PMS)
2021
Data manager

Figure 6 Activity diagram for Visitor Use Case

Dire-Dawa University Department of Computing School 36


Prison Management System (PMS)
2021
Administrator

Figure 7 Activity diagram for Visitor Use Case

3.3.4 Class diagram (conceptual modeling)

Class diagrams describe the structure of the system in terms of objects, classes, attributes,
operations, and their associations. A class is an abstraction in object-oriented programming
languages. Like abstract data types, a class encapsulates both attributes and operations. Unlike
abstract data types, classes can be defined in terms of other classes by using generalization.
Object is an instance of a class. The following class diagram describes the structure of the Prison
Management System

Dire-Dawa University Department of Computing School 37


Prison Management System (PMS)
2021

Figure 8 show the Class Diagram

Dire-Dawa University Department of Computing School 38


Prison Management System (PMS)
2021
3.3.5 Sequence Diagram
Sequence diagram is a diagram that shows for a particular scenario of a Use case, the events that
Actors generate their order, and possible inter-system events. This diagram should specify and
show the following:

Actors
Message(method)invoked by these Actors
Return values (if any) associated with previous messages.
Sequence diagram used to illustrate how certain tasks are done between users and the system. A
sequence diagram begins at the top with the actor(s) or the system which is located at the top of
the page. Under each actor or system there are long dotted line called life lines, which are
attached to them. Actors are performed with lines that extends between these life lines when an
action line is connected to a life line it shows the interaction between the actor and system.

Login account sequence diagram: - in order to start a system, by giving a username, Access
level and password the ability to access a service

Figure 9 Sequence diagram of Login use case

Dire-Dawa University Department of Computing School 39


Prison Management System (PMS)
2021
Prisoner record: -This deals more about the prisoner‟s information specifically the case of
prisoner. The Police officer have great role to do this activity.

Figure 10 sequence diagram of register Prisoner use case

Dire-Dawa University Department of Computing School 40


Prison Management System (PMS)
2021
Upload nominal roll: - to fined criminal person in the System Page. It will be done by data
manager. Make the system easy ways to find the criminal person.

Figure 11 sequence diagram of uploading nominal roll

Dire-Dawa University Department of Computing School 41


Prison Management System (PMS)
2021
Modifying prison data: - to update the prisoner information or correcting the data of prison.it
will be done by data manager.

Figure 12 sequence diagram of Modifying Prisoner data

Dire-Dawa University Department of Computing School 42


Prison Management System (PMS)
2021
In Out registration: -maintained to record the details of prisoners who are all moving in and out
of prison for various reasons. It will be done by police officer and administrator.

Figure 13 sequence diagram of in out register

Dire-Dawa University Department of Computing School 43


Prison Management System (PMS)
2021
Generate report: - to give information about the criminal person for prison office.
It will be done by society or users.

Figure 14 sequence diagram of generate report register

Dire-Dawa University Department of Computing School 44


Prison Management System (PMS)
2021

CHAPTER FOUR:
4 System Design
4.1 Introduction
System Design is the process of defining the architecture, components, Modules, Interfaces,
Deployment, and data for a system to satisfy the specified requirements. In the case of our
Project the team members used object-oriented analysis and design methods. This object-
oriented method is the most widely used methods for systems design and analysis. The UML has
become the standard language in object-oriented analysis and design.

4.2 System Architecture


System Architecture a Strategy for Layering Software Applications, a common architectural
strategy, some might call it a pattern, is to layer the architecture of a system into several
layers/strata. The class type architecture describes how the system works and interacts with the
user by dividing work into different layers. A layered approach is used to design the system.
These layers are interface layer, control layer, domain layer, persistent layer and system layer.

Figure 15 System Architecture

Dire-Dawa University Department of Computing School 45


Prison Management System (PMS)
2021
4.3 Hardware and Software Mapping
This section lists the minimum hardware and software requirements needed to run the system
efficiently.
Hardware Mapping:
 Pentium Processor
 450 GB free hard-drive space
 2GB or above MB of RAM
Software Mapping:
 Operating System: client side Windows (8.1 or above) and server side windows server
2012 core
 Web Browser: IE 10 or above, Mozilla FF 31 and above or Google Chrome
 Drivers: WAMP Server
 Integrated Development Environment: PHP and SQL Server

4.4 State chart modeling


A state diagram, also called a state machine diagram or state chart diagram, is an illustration of the states
an object can attain as well as the transitions between those states in the Unified Modeling Language
(UML).

Figure 16: State Chart For Register Prisoner

Dire-Dawa University Department of Computing School 46


Prison Management System (PMS)
2021

Figure 17: State Chart for search prisoner Information

Figure 18 State chart for upload Numeral roll

Figure 19: State chart for Generate report

Dire-Dawa University Department of Computing School 47


Prison Management System (PMS)
2021
4.5 Collaboration Modeling
Collaboration diagram shows the structural organization of objects that send and receive
messages. Sequence and collaboration diagrams are jointly called interaction diagrams and they
can be transformed one into another. The following are collaboration diagrams drawn for basic
services of the system.

Figure 20 Collaboration Diagram for Register Tasks

Figure 21 Collaboration Diagram for modifying Tasks

Dire-Dawa University Department of Computing School 48


Prison Management System (PMS)
2021

Figure 22Collaboration Diagram for modifying Tasks

Dire-Dawa University Department of Computing School 49


Prison Management System (PMS)
2021
4.6 Component modeling
A Component, for this discussion only, is a relatively independent part of an IT System and is
characterized by its responsibilities, and the interfaces it offers. A Component Model describes
the hierarchy of functional components, their responsibilities, static. Component modeling shows
which component or objects will be accessed by user. In these modeling components of the
system will be showing that there is relation among components.

Figure 23 Component Modeling

4.7 Deployment Modeling


To describe a web site, a deployment diagram would show what hardware components ("nodes")
exist (e.g., a web server, an application server, and a database server), what software components
("artifacts") run on each node (e.g., web application, database), and how the different pieces are
connected. Deployment modeling used to show the hardware of the system, the software that is
installed in the hardware and also the middleware that is used to connect the disparate machines
to one and other. It also shows how the software and the hardware components work together.

Dire-Dawa University Department of Computing School 50


Prison Management System (PMS)
2021

Figure 24 Deployment Modeling

4.8 Persistence data storage and Management


Persistence modeling is used to communicate the design of the database, usually the data base to
both the users and the developers. It is also used to describe the persistence data aspect of the
system. The following diagrams indicate the persistence diagram of the system.

4.9 Graphical User Interface


Graphical User interface design is the overall process of designing how a user will be able to
interact with a system.

The goal of user interface design is to make the user's interaction as simple and efficient as
possible, in terms of accomplishing user goals.

Dire-Dawa University Department of Computing School 51


Prison Management System (PMS)
2021

Figure 25 Graphical user Interfaces

Dire-Dawa University Department of Computing School 52


Prison Management System (PMS)
2021
Chapter Five

5 Conclusions and Recommendations


5.1 Conclusions
Management of prisons as well as prison records is a vital aspect in the national security which
becomes important in the current unstable security situation. Prison management is still in a
growing stage using manual system of files and folders to store and organize prison record. This
system is inefficient as well as looking up of specific information is time consuming. The project
team is developing this system to solve the problems mentioned above and others.PMS
effectively stores all the information in neat and clear prison profiles which have all the
necessary information about a prisoner. All these improvements greatly reduce the time at which
specific information is delivered to concerned organization.
Prison management System is one of the main Management System found in the prison
Management. This system is a web based application to serve prisoners as well as the working
group of the system in different direction. Specially:-The employers of the organization now
made on line which overcomes extra expenditure of time and resource, Saving Administrator
time lost for controlling the entire page by sitting in one places. For the prisoners preparing
report while prisoners leave from prison, etc Through various challenging, now the team is
coming to the end of this project. Those different challenges made possible by the cooperation of
all the group members. In developing this project all group members contributed their full
capability with maximum interest and all group members get ways toward developing a project
with a lot of effort.
5.2 Recommendations
While doing this system the team has faced different challenges. But by the cooperation of all the
group members and an advisor the team is now able to reach to the final result. I.e. all the group
members strongly fought these challenge and take the turn to the front. So now all the group
members strongly recommend the department that for the coming students, it has to provide
them with better service than the present in better hard ware, guaranteed software‟s, giving
orientations how to proceed, offering guest to provide them with more experienced work,
support morally, manually, at all of these we recommended for the researcher who interest to
create advance prison management to announce, recreation and generate book and some
psychological treatment for the prison it possible to use it.

Dire-Dawa University Department of Computing School 53


Prison Management System (PMS)
2021
References
I would like to thank the following individuals whose content appears in the documents designed
for this project.

1. Computer Science with C++ - Sumita Arora.


2. Book: Prison, records Management Manual System, March 21/3/2015
3. Book: Oracle8i certified professional DBA upgrade Exam guide by Jason S.Couchman.
4. Book: how to use the internet –third edition by Heidi Steele.
5. IT project management lecture note.
6. Essentials-of-systems-analysis-and-design-5th-ed.
7. Adviser proposal guideline.
8. Research Methodology Methods and Techniques (Second Revised Edition) By C.R. Kothari

9. Project Risk Analysis & Management book by Professor John Perry - The University of
Birmingham Peter Simon - CPS Project Management

10. Project management Plan „On Your Bike‟ website redevelopment

Websites

 www.3WSchool.com
 www.google.com
 www.wikipedia.org
 www.cprogramming.com
 www.scribd.com
 www.borland-turbo-c.com
 www.Asptutotial.com

Dire-Dawa University Department of Computing School 54

You might also like