Вы находитесь на странице: 1из 28

Prison Management System

CHAPTER 1

INTRODUCTION

1.1 Aim:

The aim of this project is to automate the work flow that will be carried out by the
Jailer and staff in the prison.

1.2 Objective:

The main objective of prison Management System is providing updated


information about the prison and its activities. This application also facilitates the jailer to
carry out the activities like updating of cells details, prisoner details, food details, etc.

1.3 Project Description:


This is web based application for the jailer to updating all details of prison. Jailer
register the victim by giving the unique id to victim, and jailer update cell detail like
allotted, vacant. Jailer can add the cells when extra cells is available, and also jailer can
generate the report of the victim based on the behaviour in prison. Jailer can also
modify/update the food details. staff can view some information of victim because of
security purpose. Staff can view the cells and food details. Staff can comment on the
report generation and that comment view by jailer.

Page 1
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 2

LITERATURE SURVEY

2.1 Existing System:


The existing System is a manual one. When the prisoner enters into the prison
then all the transactions related to him has to be stored manually at different departments
which may leads to erroneous results due to human errors. This system doesn’t provide
proper security for the data.

2.2 Proposed System:


. Most of the problems encountered in the existing system will be overcome in the
proposed system. It also provides complete details of the prison and its activities at
centralized place at a single click. It also offers the functionalities like:
Details of the prisoners are secured.
Prisoner’s data reports are generated in legible format only by jailer.

2.3 Feasibility Study:


A feasibility analysis usually involves a thorough assessment of the operational
(need), financial and technical aspects of a proposal. It is the test of the system proposal
made to identify whether our user needs may be satisfied using the current software and
hardware technologies, whether the system will be cost effective from a business point of
view and whether it can be developed with the given budgetary constraints. Feasibility
study is carried out to determine whether the proposed system is possible to develop with
available resources and what should be the cost consideration. The three essential
consideration are involved they are
 Operational Feasibility
 Technical Feasibility

Page 2
Dept of CS&E,UBDT Dvg
Prison Management System

2.4 Tools and Technological used

2.4.1 Introduction to PHP


PHP, which stands for "PHP: Hypertext Preprocessor" Is a widely-used Open
Source general-purpose scripting language that is especially suited for Web development
and can be embedded into HTML. Its syntax draws upon C, Java, and is easy to learn.The
main goal of the language is to allow web developers to write dynamically generated web
pages quickly, but you can do much more with PHP Because of PHP's close relationship
to HTML, PHP can be embedded inside an HTML-based document, unlike other
languages that do not inherently understand HTML and therefore must treat HTML as
text that has to be displayed inside the confines of the languages print statements. PHP
can literally switch between PHP and HTML inside a single document, making it so large
areas of pure HTML can be managed normally.

Common uses of PHP


PHP performs system functions, i.e. from files on a system it can create, open,
read, write, and close them. PHP can handle forms, i.e. gather data from files, save data to
a file, through email you can send data, return data to the user. You add, delete, modify
elements within your database through PHP Access cookies variables and set cookies.
Using PHP, you can restrict users to access some pages of your website.

2.4.2 Introduction to HTML


HTML(Hypertext Mark-up Language) was developed to address the need to
easily display content via a web-browser it is a markup language, in that its commands
are designed to assist in the formatting and layout of textual data it by definition is a static
language, in that the content displayed using the standard HTML language will always
look the same, it will not change over time or by who accessed it due to this major
limiting factor of the language in this modern world of dynamic, data-driven websites, a
variety of extensions to HTML and related programming language have been developed.

Page 3
Dept of CS&E,UBDT Dvg
Prison Management System

2.4.3 MYSQL
MYSQL open source license in accordance with the next release. So what do you
want to use it? MYSQL in its own right is a very powerful program. The most expensive
and powerful database package provides a large part of which treated. Standard form
MYSQL data known SQL language. MYSQL works have been very fast in many
operating systems and languages, including PHP, Perl, C, C ++, Java, etc. MYSQL works
well for large data sets work well. MYSQL is in PHP, the language that is admired for
web development very friendly.

2.4.5 Introduction to XAMPP


Xampp is a free and open source cross platform web server package, consisting
mainly of the Apache HTTP server, MYSQL database, and interpreters for scripts written
in the PHP and Perl programming languages.
XAMPP’s name is an acronym for: X(to be read as �cross�, meaning cross platform)
Apache HTTP Server
MYSQL
PHP
Perl

Page 4
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 3

Software and hardware requirements

Software requirements:

 Operating system : windows7


 Front End : PHP ,HTML and MySQL
 Back End : MySQL server.

Hardware requirements:
 Processor : AMD A6-7310 APU
 RAM : 512 GB
 Hard Disk Storage :5OO MB FREE SPACE OR ABOVE
 Keyword :Any Key Board With minimum required keys
 Mouse :Any mouse

Page 5
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 4

SOFTWARE REQUIREMENT SPECIFICATION

4.1 Users

The main users of Prison management system application are Jailer and Staff
module’s description:

1. Jailer:

Jailer is one of the important module of the application. He register the victim by
giving the id. Jailer update and assign the cells to victim, and food details.

2. Staff:
Staff is one of the module of the system. He is applicant. He is view the details, and
also comment on register generation it can view by jailer.

4.2 Functional Requirements:

This section gives the list of Functional requirements which are applicable to the
project monitoring system. the services provided by the system to its end user. Depending
upon the action being preferred by the user, with the help of Textboxes the input is
accepted by the through button selected or hyperlink clicked. The input at the project
level is collected based on the requirements. The data is accepted through the interface
and thus the processing take place as per the user specification made. The user gets the
output of the specified action selected and appropriate outputs will be displayed for the
inputs.

Page 6
Dept of CS&E,UBDT Dvg
Prison Management System

4.3 Non-Functional Requirements:


The product is web-based and run from an application server. Initial load time
depends on the media from which the product is run. Number of terminals to be
supported is dependent on the server that will use at the time of deployment. The web
application server used should provide good performance and ability to manage
performance with techniques such as support for caching. After uploading all the details
about the victim, jailer can update and view the details. staff can view the details. One
can login into the system only if they provide correct user name and password. Only
authorized user can access the data.

Page 7
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 5

SYSTEM DESIGN

System design is a blue print of the solution for a system. Design of the system
can define as the processor of applying various techniques and principles for the purpose
of defining a process or a system in sufficient details to permit its physical realization.

5.1 BASIC DESIGN:

The system has been designed using 3-tier architecture. The different tiers are
 Presentation
 Application logic
 Database

5.1.1 Presentation:

It is basically for displaying information to the user and for the user to interact
with the system. This created using web forms.

5.1.2 Application Logic:

It is basically the logic written in the code behind the files, which will be running
at server end. Depending on the users input the output will be generated.

5.1.3 Database:

In this tier the entire set of data needed by the application is stored in the form of
normalization tables.

Page 8
Dept of CS&E,UBDT Dvg
Prison Management System

5.2 LOGICAL DESIGN:

Logical design aims at establishing the requirements of the users, which the new
system must satisfy. To login into the software the users has to enter the password. If he
is the valid user then, he is allowed to access the different options available in the
software.

5.3 DATA FLOW DIAGRAMS(DFD):

A dataflow diagram is a graphical technique that depicts information flow and


the transformations that are applied as data moves from input to output. The DFD s also
known as a data flow graph or a bubble chart. The data flow diagram may be used to
represent a system or software at any level of abstraction.

Page 9
Dept of CS&E,UBDT Dvg
Prison Management System

5.4 USECASE DIAGRAM

USECASE: JAILER

Login

Insert/Update

Add

Report

View Prisoner

View

Update

Change

Page 10
Dept of CS&E,UBDT Dvg
Prison Management System

USECASE: STAFF

Login

View cell
details

Add

View

Staff
Change

Page 11
Dept of CS&E,UBDT Dvg
Prison Management System

5.5 E -R DIAGRAM

Page 12
Dept of CS&E,UBDT Dvg
Prison Management System

5.6 DATABASE TABLES

Cells table

Column Type Data Type


Cell no int (10)
Capacity int(10)
Cell type int(11)
Crime type Varchar(10)

Comment table

Column Type Data Type


Vid int(10)
Comment Text

Food table

Column TYPE Data Type


id int(10)
Day Varchar(10)
Breakfast Varchar(10)
Lunch Varchar(10)
Dinner Varchar(10)

Page 13
Dept of CS&E,UBDT Dvg
Prison Management System

Record behaviour Table

Column Type Data Type


aid int(10)
id int(10)
rdate Date
Behaviour Varchar(50)
comment Varchar(500)

Register Table

Column Name Data Type


First name Varchar(10)
Last name Varchar(10)
Address Varchar(10)
Male Varchar(10)
Female Varchar(10)
Phone no int(10)
Designation Varchar(10)
District Varchar(10)
Username Varchar(10)
Password Varchar(10)

Page 14
Dept of CS&E,UBDT Dvg
Prison Management System

Victim Table

Column Name Data Type


Id int(10)
Name Varchar(10)
Dob Date
Address Varchar(10)
Father Varchar(10)
Blood Varchar(10)
Gender Varchar(10)
Phone no Varchar(10)
Crime Varchar(10)
Cell no int(10)
Enter date Date
Release date Date
Status int(10)
Pre released date Date

Page 15
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 6
CODING

Database connection:

$q= mysqli_connect("localhost","root","","prisons");

mysqli_select_db($q,"prisons");

if($q)

echo "connn";

else

echo "not ";

Page 16
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 7
TESTING
Systems should not be tested as a single, monolithic unit. The testing process
should therefore proceed in stages where testing is carried out incrementally in
conjunction with system implementation. Errors in program component may come to
light at a later stage of the testing process. The process is therefore an iterative one with
information being fed back from later stages to earlier parts of the process. The various
strategies that were used in testing this software were as follows:

1. Unit Testing
2. Integration Testing
3. Acceptance Testing
4. System Testing
 Validation Testing
 Black Box Testing
 White Box Testing

Page 17
Dept of CS&E,UBDT Dvg
Prison Management System

TEST CASES AND RESULTS:

S.No. TestCases Expected Result Actual Result


Decription
1 Jailer login Successful Logged in
1.Enter user name
and password
2.Click submit
2 Jailer login Unsuccessful Login Unsuccessful
1.Enter user name
and password
2.Click submit
3 Staff login Successful login Logged in
1.Enter user name
2.Enter password
3.Click submit
4 Jailer login Unsuccessfuly login Invalid user name
1.Enter user name in and password
and password
2.Click submit
5 Logout Succesfully logged Logged out
out

Page 18
Dept of CS&E,UBDT Dvg
Prison Management System

CHAPTER 8
SNAPSHOTS

Home Page

Registration Page

Page 19
Dept of CS&E,UBDT Dvg
Prison Management System

Login Page

Jailer Page

Dept of CS&E, UBDT Dvg Page 20


Prison Management System

Cells Details Page

Jailer Page

Dept of CS&E,UBDT Dvg Page 21


Prison Management System

Victim Page

Victim Profile Page

Dept of CS&E,UBDT Dvg Page 22


Prison Management System

Victim Details page

Victim Profile page

Dept of CS&E,UBDT Dvg Page 23


Prison Management System

Food Update Details Page

Victim Page

Dept of CS&E,UBDT Dvg Page 24


Prison Management System

Food details

Change Password Page

Dept of CS&E,UBDT Dvg Page 25


Prison Management System

FUTURE ENHANCEMENT

 We maintain the database of visitor, who come to meet prisoner.


 We provide the VIP cells for male and female.
 Integrating of prison located at various place.

Dept of CS&E,UBDT Dvg Page 26


Prison Management System

CONCLUSION

We here by conclude this application provides very good platform for both jailer
and staff. In this application various activities of the jailer are made easy automating
various activities. This application also helps to get various current details about cell,
jailer and jail staff, prisoner, etc.

Dept of CS&E,UBDT Dvg Page 27


Prison Management System

BIBLIOGRAPHY:

Referred books:
Robert W. Sebesta : Programming the World Wide Web 4th Edition.

Websites:

 www.w3school.com
 www.tutorialspoint.com
 www.stackoverflow.com

Dept of CS&E,UBDT Dvg Page 28

Вам также может понравиться