Design And Implementaion Of A Web Based Prison Information Management System

Computer Science Project Topics

Get the Complete Project Materials Now! »

ABSTRACT

Prisoners’ management in Nigeria has long been a neglected area and has only recently been included in the 2018 vision document under the e-governance. Currently, prisoner’s records are maintained in a very rudimentary way in the form of manual files and registers.The findings indicated that the number of inmates is escalating and the current manual system cannot handle the records well and the required operations in real time and efficiently is required. This method of data management often results in human error, delay to retrieve information etc. Thus, a Web based Prison Information System was designed and implemented to manage prisoner’s records for the Nigerian prison service Enugu in other to solve the problem of data security, accessibility, timely report production  and avoid redundancy. The objective of this project is to ensure the availability of data in digital form for preservation, analysis and reporting. To ensure that there is no impersonation of the prisoners. In order to achieve the above objectives, a method has to be used which is SSADM (structured system analysis and design method) which is systems approach to the analysis and design of information systems. This methodology has a relationship to waterfall model because it has stages that helped me create my web site. This project was done using Html (hypertext markup language), Css (cascading style sheet), JavaScript, php for server scripting and MySQL database was used to store and manage the prisoner’s records. They are the technologies used in designing the website. The technologies mentioned enabled me achieve a result of creating web based prison information management system.

 

TABLE OF CONTENTS

Title page                                                                          i                                                                                                                   

Certification                                                                                                         ii

Approval                                                                                                    iii                                                                                             

Acknowledgement                                                                                                iv                                                                                                   

Table of contents                                                                                        v                                                                                                      

Abstract                                                                                                      vi

Table of contents                                                                                        vii

Table of figure                                                                                            viii

List of table                                                                                                                                                                                                                        

CHAPTER ONE: INTRODUCTION

1.0     Background of  study                                                                       1

1.1     Statement of  result                                                                           2

1.2     Objective of  the project                                                                    3

1.3     Significance of the project                                                                 3

CHAPTER  TWO: LITERATURE REVIEW                              

2.0     Introduction                                                                                                5

2.1     Theoretical Background                                                                    5

2.2     Review of Related Literature.                                                            7

2.3     Summary                                                                                          9

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN                 

3.0     Introduction                                                                                     10

3.1     Description of the Existing System                                                   10

3.2     Analysis of the Proposed System                                                     11

3.3     Design of the Proposed System                                                                  12

CHAPTER FOUR: SYSTEM  IMPLEMENTATION

4.0     Introduction                                                                                                24

4.1     Choice of Development Environment                                                         24

4.2     Implementation  Architecture                                                           26

4.3     Software Test                                                                                    29

4.4     Documentation                                                                                 30

4.41   User Manual                                                                                     30

CHAPTER FIVE: SUMMARY CONCLUSION AND

RECOMMENDATION

5.1     Summary                                                                                          32

5.2     Conclusion                                                                                        32

5.3     Recommendation                                                                              33

References                                                                                                  34

Appendix                                                                                                   36     

                    

CHAPTER ONE

INTRODUCTION

1.0 BACKGROUND OF  STUDY

Management of prisons in Nigeria has long been a neglected area which has recently been incorporated in the e-governance program of Government of Nigeria. Currently a rudimentary process of storing all the prisoner data in manual files and registers is in place. The Prison Information System project will integrate all the prisoner data into a single integrated system which will in turn result all the information being present in a digital format. ICT in prisons was initiated in the year 2002 at Delhi Prisons, Tihar[1]. The Tihar Prisons Complex in New Delhi is the biggest prison complex in Asia comprising of 9 prisons and one District Jail at Rohini with a total strength of more than 11,000 prisoners against a normal sanctioned capacity of 6250 prisoners. In a year about 70,000 - 80,000 inmates remain lodged in these prisons for different duration and crimes committed by them. This prison population has about 80% under trials and includes about 480 women inmates. About 400 inmates are foreigners from different parts of the world. Many high security criminals also live here. There has been a substantial increase in number of prison inmates coming to Tihar because of a phenomenal increase in the crime scene at Delhi that has resulted in the increase of the ICT needs and its management at the Tihar Jail Complex.

Nearly 1700-1800 visitors meet their relative inmates’ everyday. There was manual system of booking (meetings) in each jail for its respective inmates. Centralised visitor record was not available. There was lack of exchange of visitors’ information within jailsand prison headquarters. No provision for identification / detection / verification of visitors was there.

Managing the prisoner record and monitoring of prisoner / visitor was always difficult since most of the records were normally maintained manually, so the concerned authorities were required to go through all the registers to find out the details and status of the inmate as well as of the visitor.

In order to cope up with the increasing number of prisoners being lodged in, the Tihar Administration required a re-engineering and rationalization of their key business processes and functions of prisoners’ related information and their computerization in order to speed up the processing of information need of courts and various other national agencies[2].

As the technology evolution is taking place, there arose a need for centralization of prisoner’s data to facilitate information exchange and data sharing to the users of the prison. It shall reduce administrative overheads, speed up responsiveness to users, reduce risks involved in inmate’s custody, eliminated obsolete processes and reap cost-cutting benefits.

 1.1 STATEMENT OF PROBLEM

Management of prison’s in Nigeria is still at a nascent stage and follows rudimentary processes. Most of the prisons in Nigeria have a collection of manual files and registers to store prisoner/criminal records. This is a very inefficient and cumbersome way of storing records which greatly impedes the flow of critical information as well as makes looking up of information time consuming. Also, different files and registers arerequired to store the information which is relevant to a single prisoner. This hinders the profiling process of prisoners.

1.2 OBJECTIVES OF THE PROJECT

The main purpose behind the implementation of the Prison Information System (PIS) is to enhance the administrative capabilities of the jails in terms of monitoring and security of the prison while improving the efficiency and productivity of the Prisons. The objectives of the project are to develop system which can:

  • Makes sure there is proper monitoring of the prisons by the top officials
  •  It  ensures that the discipline and decorum of the jails is maintained by both the employees and the prisoners
  • To ensure that no impersonation of the prisoners happens by proper validation and authentication of the prisoner’s identity
  •  To improve the productivity and efficiency of the prisons so as to facilitate the usage of the available work force for sensitive work while leveraging technology to reduce the mundane workload of the employees
  •  Makes sure that there is availability of data in digital form for preservation, analysis and reporting.

1.3  SIGNIFICANCE OF THE PROJECT

The nature of project is such that outcome of project could be quantitatively measured only for few parameters such as

  • Automatic detection of duplication
  • Immediate generation of report on categorization of prisoners on basis of their cases, period of confinement etc.
  • Automatic calculation of Remission to be granted to a convict prisoner for good behavior, discipline etc.
  • Reduction in the cost (Saving of resources) of physical production of prisoners in Courts.

Get Full Work

Report copyright infringement or plagiarism

Be the First to Share On Social



1GB data
1GB data
1GB data
Design And Implementaion Of A Web Based Prison Information Management System

366