Project Report
Project Report
Project Report
BELAGAVI -590018
Submitted in the partial fulfilment of the requirements for the award of the Degree of
Bachelor of Engineering in Computer Science and Engineering
Submitted by
CERTIFICATE
Certified that the project work entitled “PRISON MANAGEMENT SYSTEM” carried
out by AQUWIN THOMAS(1OX17CS013), BETHEL M VARGHESE(1OX17CS020),
bonafide students of The Oxford College of Engineering, Bengaluru in partial fulfilment
for the award of the Degree of Bachelor of Engineering in Computer Science and
Engineering of the Visvesvaraya Technological University, Belagavi during the year
2019-2020. It is certified that all corrections/suggestions indicated for Internal Assessment
have been incorporated in the report deposited in the departmental library. The project
report has been approved as it satisfies the academic requirements in respect of project
work prescribed for the said Degree.
External Viva
1._______________________ _______________________
2._______________________ _______________________
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
THE OXFORD COLLEGE OF ENGINEERING
Department Vision
Department Mission
DECLARATION
We, the students of fifth semester B.E, in the Department of Computer Science and
Engineering, The Oxford College of Engineering, Bengaluru declare that the Project work
entitled “PRISON MANAGEMENT SYSTEM” has been carried out by us and submitted
in partial fulfilment of the course requirements for the award of degree in Bachelor of
Engineering in Computer Science and Engineering discipline of Visvesvaraya
Technological University, Belagavi during the academic year 2019-20. Further, the matter
embodied in the dissertation has not been submitted previously by anybody for the award of
any degree or diploma to any other university.
AQUWIN THOMAS P
BETHEL M VARGHESE
Place: Bengaluru
Date:
ABSTRACT
Most Prisons in the developing countries are still using the traditional system – pen
and papers, to keep track of their records. This system takes long to finish a single
transaction; this has led to loss of information of some cases (crimes files), insecurity
and data redundancy. Similarly, some cases have been reported where some prison
staff connives with clients (victims) to change and hide some information or files
hence leading to compromising the evidence of the matter. This has consequently
resulted in time wastage to handle cases, increased corruption and insecurity of
important files hence making the whole process costly. Also when reports are
needed especially about prisoners, it takes a long time and therefore makes it hard
for Prison Management to take urgent decisions. This has created a lot of loopholes
in the system because there is no tracking and/or monitoring of the information
available in the different Departments and there are no security measures in place to
safe guard the available information. This necessitated automating the system to
make it more efficient and effective. There was close study of the existing manual
file-based system that was in use, it was compared to the proposed system. A
prototype of a proposed system was developed to ease data access, security and
retrieval for instant report production by the prison management. The prototype
was developed using MySQL database, PHP, CSS, JavaScript and HTML.
i
ACKNOWLEDGEMENT
It gives us great pleasure in expressing our deep sense of gratitude to our respected
Founder Chairman Late. Sri S. Narasa Raju, and to our respected Chairman Sri S.N.V.L
Narasimha Raju, for having provided us with great infrastructure and well-furnished labs.
We are grateful to the Head of the Department Dr. R.Ch. A Naidu, for his
unfailing encouragement and suggestion given to us in the course of our project work.
We thank our parents for their constant support and encouragement. Last, but not
the least, we would like to thank our peers and friends.
AQUWIN THOMAS P
BETHEL M VARGHESE
ii
Contents
INTRODUCTION 1
1.1 Preamble 1
3.2 Normalization 8
3.2.1 First normal form (1NF) 8
3.2.2 Second normal form (2NF) 8
IMPLEMENTATION 10
TESTING 14
CONCLUSION 17
REFERENCES 18
APPENDICES 19
iii
LIST OF FIGURES
Figure 1.1: ER diagram of prison management System 6
Figure 1.2: Schema diagram of prison management System 7
Figure 1.3: Snapshot of login page 19
Figure 1.4: Snapshot of index page 19
Figure 1.5: Snapshot of add prisoner form 20
Figure 1.6: Snapshot of view prisoner form 20
Figure 1.7: Snapshot of update staff form 21
LIST OF TABLES
Table 3.3: First Normal Form 8
Table 3.4: Second Normal Form 8
Table 5.1: Positive test case for admin login 18
Table 5.2: Negative test case for admin login 18
Table 5.3: Positive test case for phone no insertion 18
Table 5.4: Negative test case for phone no insertion 18
Table 5.5: Test cases for Project 19
iv
Prison Management System
CHAPTER 1
INTRODUCTION
1.1 Preamble
A prison also known as gaol is a place in which people are physically confined
and usually deprived of a range of personal freedoms. Imprisonment or
incarceration is a legal penalty that may be imposed by the state for the commission
of a crime [1]. Other terms used are penitentiary, correctional facility, remand
center, detention center, and gaol or jail. As well as convicted or suspected criminals,
prisons may be used for internment of those not charged with a crime. Prisons may
also be used as a tool of political repression to detain political prisoners,
prisoners of conscience, and "enemies of the state", particularly by authoritarian
regimes. In times of war or conflict, prisoners of war may also be detained in prisons.
A prison system is the organizational arrangement of the provision and operation of
prisons.
CHAPTER 2
other records that are handled in the prison for example the information about the
prisoner’s held in prison and the prison staff available in a particular prison.
This is directly stored in the central database such that duplicate entry of the prisoner can be
identified in a global manner, which helps in tracing out the ‘frequent flyers’ to the jail. The
application has the following advantages; it helps to generate more reports of administrative,
performance and statistical nature, it also helps in dealing with over populous prison that is
housing inmates, which are more than 3 times of the sanctioned capacity. Furthermore, it also
facilitates, regulates and simplifies the processes of meeting between the visitors who are
coming to visit their relations and friends lodged in the correctional home. However, the
system has the limitations below; the system requires very big memory space and also
acquisition of other hardware requirements for example those
needed to work with finger print software. Also, very well-trained personnel are required
to work on the system that is expensive in terms of payment.
Software Requirement
Hardware Requirements
CHAPTER 3
Figure 3.1 describes the ER diagram of Prison Management System. It has 5 entities
namely User, Prisoner, Visitor, Cell and Staff. The entities have attributes which are
primary, foreign and composite attributes. The primary attributes are underlined.
ER DIAGRAM
EXPLANATION:
Visitor is one of the entities taken from the above ER diagram (3.1), visitor has 7
attributes out of which Vid acts as the primary key for the visitor table and Pid is the
foreign key which links the visitor and Prisoner table. Vid and Pid are high cardinality
where as normal cardinality are Fname, Lname and age. Relationship and sex are of low
cardinality. The cardinality ratio between the prisoner and visitor is 1:1, the relationship
between staff and cell is a 1: N ratio.
EXPLANATION:
Staff is one of the entity of the prison database it has 6 attributes –‘Sid’(primary
key),’fname’.’lname’,’age’,’title’,’Salary’,’Sex’,’Cid’(foreign key references primary key
from the cell table-Cid),’Pid’(foreign key references primary key of the prisoner table-Pid)
3.2 Normalization
Normalization is a process of organizing the data in database to avoid data redundancy,
insertion anomaly, update anomaly & deletion anomaly. Let’s discuss about anomalies
first then we will discuss normal forms with examples.
Anomalies in DBMS
There are three types of anomalies that occur when the database is not normalized. These
are – Insertion, update and deletion anomaly.
An attribute that is not part of any candidate key is known as non-prime attribute.
Functional dependency:
→
PID FNAME, LNAME, SEX, CRIME, AGE, ENTRY_DATE, LAST_DATE
FD1
PID FNAME
FD2
CHAPTER 4
IMPLEMENTATION
The system was designed using MySQL RDBMS because of its ease and ability to store
different data types and manipulate it. The researcher also used XAMPP, an inbuilt
DBMS to implement the backend of the system, here a graphical user interface is
available which enables an administrator to create customized database objects such as
tables in case he or she does not prefer using the SQL command prompt. The frontend of
the system was implemented using the web pages in PHP programming and scripting;
therefore, the web pages are accessed using web browsers such as; internet explorer,
Firefox and chrome. Using PHP programming and scripting, the application’s code was
written to implement and ensure the system meets its complete functionality. Therefore,
this system has a graphical interface which has made it user friendly and easy to use.
All these forms are represented by the Add/Edit Prisoner form, it has fields; Prisoner ID,
prisoner name, Sex, Crime, Age, Entry Date and Last Date.
Adding Prisoner:
1. Enter Prisoner details
2. If exist, return Prisoner already exist
3. If not, add the Prisoner successful
Updating Prisoner:
1. Click on Prisoner’s name which will redirect to edit form.
2. Check if all fields are entered correctly
3. If not, system message: Database Error! Please try again!
4. If correct, system message: Prisoner updated successfully
Deleting Visitor:
1. Click on the delete button (represented by a trash icon)
2. On the confirmation dialog box that appears, choose ‘yes’
3. Delete Visitor from table
4. If VID does not exist:
5. System message: Database error! Please try again!
CHAPTER 5
TESTING
This chapter gives the outline of all the testing methods that are carried out to get a bug
free application. Quality can be achieved by testing the product using different techniques
at different phases of the project development.
Input phone number 9663487888abc Must take only alphabets are consume()
9663487888 being taken as
as input input for
phone number
CONCLUSION
This study was set out to develop a secure web-based records management system for
prisons using a user-centered approach to software development. The scope set at
inception was restricted to developing a system for tracking records. The study led to
design and implementation of a prototype for a web-based system for tracking records.
The system was tested and validated for functionality. The system was implemented using
a 3-tier approach, with a backend database (specifically MYSQL database), a middle tier
of Apache server and PHP, and a front-end web browser (client). This paper has also
discussed each of the underlying techniques used to design and implement the application
and the steps undertaken to achieve this. The study provided solution of providing easy
and faster way for managing prisons centrally and tracking the records with ease by the
authenticated users and even the top government officials who need information about a
particular prison. The system will also update the records and improve performance of the
man power, as well as reducing maintenance and repair costs. The desired aim of
providing centralized access to information and records tracking on prisons are more
applicable to developing countries, Uganda in particular is among.
Future Work
It’s recommended that the following modules, be added to the developed system (web-
based system to keep track of information in prisons) so as to perform more tasks:
i. The system should be integrated with the criminal justice system to form a mega system
that spans over all facets of the justice system. This will enhance synchronization and
transfer of information between the court of law and Uganda Prisons Service.
ii. The developed system component can have the capability to be used in different
languages. Further work is recommended so that it can have the capability of being usable
in local Languages.
REFERENCES
[1] Carlson, M. (1999); Garrett, Judith Simon, Prison and Jail Administration:
Practice and Theory, Jones
and Bartlett Publishers. Retrieved on February 10, 2017
[2] Enrado P. (2000). Staff and patient, Room and Resource scheduling systems.
Healthcare IT news, e-
connection. Retrieved on Febuary 12, 2017 from http://www.healthcareitnews.com/new
[3] Carter, L., and Belanger, (2005). The Utilization of e-government services
citizen trust, innovation and
acceptance factors; France, Information Systems 15 (1), 5-25.
[4] Diiulio, J. J. (1990). Governing Prisons: A Comparative Study of Correctional
Management, Simon and
Schuster. ISBN 0-02-907883-0.
[5] Oludele Awodele, Onuiri Ernest E., Olaore Olufunmike A., Sowunmi
Oluwawunmi O.Ugo - Ezeaba
Anita A. (2015). A Real-Time Crime Records Management System for National Security
Agencies.
European Journal of Computer Science and Information Technology Vol.3, No.2, pp.1-12
[6] Norman B. & Johnston (2000). Collection of Prison Architectural Plans, 19th-20th
century (collection
description), Lloyd Sealy Library Special Collections, John Jay College of
Criminal Justice
[7] Ivan N. & Godfrey O. O. (2016). A Secure Application for Information Sharing
in Organizations: A
Case Study of Kabale District Local Government. International Journal of
Computer (IJC). ISSN 2307-
4523 (Print & Online). Volume 21, No 1, pp 64-77.
APPENDICES