SlideShare a Scribd company logo
1 of 15
i
DEBRE BERHAN UNIVERSITY
COLLEGE OF COMPUTING
DEPARTMENT OF INFORMATION TECHNOLOGY
Integrated prison controlling and monitoring system for Debre Berhan
By
Group Name ID
Binyam Eshetu Ecomp/07/06
Hiwote Getye Ecomp/22/06
Getachewu Taddese Ecomp/18/06
Hermela Mekonnen Ecomp/21/06
Estifanos Yirga Ecomp/16/06
Submitted Date: August 2017 G.C
ii
Contents
List of Table.................................................................................................................................iii
List of Acronyms.......................................................................................................................... iv
1.1. Background of the Study....................................................................................................1
1.2. Statement of the Problem..................................................................................................1
1.3. Objective of the project .....................................................................................................2
1.3.1. General Objective.......................................................................................................2
1.3.2. Specific Objective.......................................................................................................2
1.4. Significance of the project..................................................................................................2
1.5. Scopes of the project.........................................................................................................3
1.6. Feasibility study................................................................................................................. 3
1.6.1. Technical Feasibility....................................................................................................3
1.6.2. Operational Feasibility................................................................................................ 4
1.6.3. Economic Feasibility...................................................................................................4
1.7. Requirement Analysis........................................................................................................4
1.7.1. Functional Requirements ............................................................................................... 4
1.7.2. Nonfunctional Requirements.......................................................................................... 5
1.8. Methodology..................................................................................................................... 6
1.8.1. Data source................................................................................................................ 6
1.8.2. Development Tools ....................................................................................................7
1.8.2.1. Hardware Tools ..................................................................................................7
1.8.2.2. Software Tools....................................................................................................7
1.8.3. Required Resources with Costs.................................................................................... 8
1.8.3.1. Hardware cost....................................................................................................8
1.8.3.2. Software cost.....................................................................................................8
1.8.3.3. Time schedule ....................................................................................................9
Appendix I.................................................................................................................................. 10
Appendix II................................................................................................................................. 10
Reference .................................................................................................................................. 11
iii
List of Table
Table 1.1. Hardware Tools.........................................................................................................7
Table 1.2. Software Tools ..........................................................................................................7
Table 1.3. Hardware Tools Cost..................................................................................................8
Table 1.4. Hardware Tools Cost..................................................................................................8
Table 1.5. Time Schedule...........................................................................................................9
iv
List of Acronyms
Spec Specification
TB Tera Byte
GB Giga Byte
GUI Graphical User Interface
SQL Structured Query Language
UML Unified Modeling Language
HDD Hard Disk Drive
RAM Random Access Memory
CPU Central Processing Unit
1
1.1. Background of the Study
Ancient time people had generated output from the given input by using a finite sequence of
computation. Computation is start early by several mechanisms, for example people had
calculate numbers by using abacus, using bubbles and it will produce output. Our world rapidly
changed now a day. Every person creates many data per day and also there are several
organizations which is governmental or non-governmental those organization is generate data
in order to satisfy their mission. In this way, these organizations will compile a variety of data
and perform activityā€™s. so, in many organizations every transaction should perform in manual
system and it use match amounts of resources, such as man power, time, money to retrieve
huge amount of data from the manual system. There are several actions perform in prison
controlling and monitoring system. In which it was hard to search a single data of any prisoner,
overwriting and time consuming, chance of data loss, too much space occupied because of too
many registers which are present in hard form and it was non-secure, because of these draws
back we introduce a solution for it by building a system for the prison which keep all those
transactions in efficient way. It will be easy to access any data, full secure and easily searchable.
1.2. Statement of the Problem
In current system Debre Berhan Prison center provide several activities. It performs register
new prisoner, transit prisoner from place to place, serve the parents and relatives to ask their
parent, and several activities regarding to prisoner, manager, police and other. Those activities
perform in current system completely manually, the stockholders perform activity like
registering new prisoner, police and performing other several activities by manual system.
Some challenges regarding to current system: -
ā€“ Take time, money, labor to be register new prisoner.
ā€“ Take materials to be registered like paper, classer and other material.
ā€“ Take time in order to retrieve huge amount of data of prisoner and other.
ā€“ Loss of data are happening usually.
ā€“ There is no enough space to be store those documents.
ā€“ No work satisfaction with the workers.
ā€“ And also, no satisfaction regarding the user.
ā€“ Complicated to find Correctional prisoners, Prisoners who are sorry data.
2
1.3. Objective of the project
1.3.1. General Objective
The general objective of the project is produce computerized integrated prison controlling and
monitoring system.
1.3.2. Specific Objective
The specific objective allows to identify and describe about the integrated prison controlling
and monitoring system as shows in the general objective. The specific objective is listed below:
ā€“ To ensure that data recording is done using computers for easy access.
ā€“ To generate prisoner report with any format.
ā€“ To register and keep all informationā€™s about the prisoners such as their family details
and background information.
ā€“ To reduce the work load stakeholders.
ā€“ To manage large number of prisonerā€™s details.
ā€“ To save time, money, materials by using computer.
ā€“ To ensure the satisfaction of the prisoner relatives and also the prisoners.
ā€“ To prevent loss of data and ensure security.
1.4. Significance of the project
At present, technology is rapidly growing. Thus, the uses of the project are to remove old or
manual system that the organization uses and replace with the computerized system. And the
computerized system allows to reduce the amount of time spent on searching different types of
information by changing the use of the methodology of the case of the problem, and to bring a
better way by keeping their confidentiality. The project fix problems that deals with the
statement of the problem accordingly and produce new, easy, save and flexible prison
controlling and monitoring system.
3
1.5. Scopes of the project
There are many prison in our country as well as the world and those prison are uses their own
management systems of the prisoner, but we select Debre Berhan prison center in our project
to be change the current system with the new proposed system and the scope includes activity
listed below: -
ā€“ Records and view prisonerā€™s details.
ā€“ Update records of correctional program attended by prisoners.
ā€“ Uses Automatic ring for prisoner to communicate with their relatives.
ā€“ Register and communicate the prisoner relatives computerized.
ā€“ Generate full report as the user need like, generate by date, time, prison.
ā€“ Notify or Alert prisonerā€™s appointment for court, hospital and other.
1.6. Feasibility study
As we know each and every project needs to have a feasibility study for the complete
understandability of the entire system. A feasibility study is a preliminary study understands
before the real work of a project starts to certain the likelihood of the project success. And we
describe the feasibility study of the project based on technical, operational, economic and
political feasibilityā€™s.
1.6.1. Technical Feasibility
The project should be developed such that the necessary functions and performance are
achieved. The project is developed within latest technology. Through the technology may
become obsolete after some period of time, due to the fact that is easy to implement the system
to new technology. The system has been developed using C# the project is technically feasible
for development.
4
1.6.2. Operational Feasibility
The operational feasibility is the one that will be used effectively after it has been developed.
And the integrated prison controlling and monitoring system is useful project to be implement
and practice the system with the organization. And it is easy to operate after implemented and
we say this project is operationally feasible.
1.6.3. Economic Feasibility
The system is allowing to perform several activities and it converts the manual system into
computerize so according to the current system there are so many costs. So, the proposed
system is profitable than the current system, it has little cost to be implemented. Also, there are
resources are already available, it gives an indication of the system is economically possible
for development.
1.7. Requirement Analysis
In this part, we consider what the project can do directly with the system and indirectly, but it
also supports the system by providing some accessibilityā€™s. The requirement of the project can
have classified as functional and non-functional requirements. The detail of each category
discussed in each part.
1.7.1. Functional Requirements
Functional requirements are type of requirements that a project must consider in its entire
process. Operations those understand by the developer and stated as a way of automating the
existing system. Services that the system should provide. This functional requirement defines
what the systems do or the actual functionality of our system. The system provides the
following functions.
5
ā€“ It Provides add prisonerā€™s information to the system.
ā€“ The system view prisoners and other registered information according to his/her
privilege.
ā€“ The system allows to update information regarding to prisoners.
ā€“ Register prisonerā€™s relatives and automatically call prisoners with specific time.
ā€“ Generate report as the stakeholder wants like it generates by, name, date, time.
ā€“ Notify sound alerts to prisoner, police and other when prisoners have an appointment
in courts, hospitals and another place.
1.7.2. Nonfunctional Requirements
Security: Our system need high security regarding to the prisoner information and other so we
use several security mechanisms to make system secure like, cryptographic technology and
SSH and to our system and it also have a username and password for the interact users on the
system it allows prevent an authorized access of the user. So the system is more secure.
Performance: Its performance may be affected by connection lose, electric power problem. To
make an interrupted in such condition our system needs extra equipment to achieve this
requirement.
Accuracy: Since the system is driven by human it is prone to error. To make it more accurate
advanced technology and knowledgeable programmer must needed.at this time we have not
any means to make the system 100% accurate but through time we planned to make it more
accurate by getting experiences and knowledge from different resources and with new
technology tools that helps us to do what we planned to do.
Reliability: The system may generate unexpected output when we enter unpredictable input
sequence. In other side reliability refers that the system should provide service for 24 hours per
a day and 7 days in a week. So, when look our system in such perspective as much as possible
it is reliable.
Graphic user interface (GUI): The system provides highly user interface design that develop
by current version developing tools to be increase the satisfaction of the user to use the system
and it allow the local language in order to be easy communicate within the system.
6
1.8. Methodology
Methodology of a project is in which and how the information is gathered from the required
placed to analysis the current problem of the system. As a project, a systematical and a
methodological travel through problems to eliminate them or as much as possible to reduce
them and to get a better thing by investigating or inventing new innovations, which will be
employed in the real world to solve that specific problem, which is disturbing the wellbeing of
the whole or some part of a community.
1.8.1. Data source
In order to achieve the project, we use some data sources allows give information about the
study. The data is collected in different mechanisms. Some of the mechanisms that we have
used are listed below: -
ā€“ Observation
ā€“ Interview
ā€“ Literature review.
Observation: In order to gather information, we use the observation method because it helps
to get some workflows of the current system and also allow to identify the working
environment. We see and understand different problems that are not conducted to computerized
system some of the observed problems are listed below: -
Time spend for registering prisonerā€™s relative and also communicate.
ā€“ Spends labor of the worker.
ā€“ Canā€™t satisfy the prisoners and its relative.
ā€“ Lack of security.
Interview: We make interview with employs in the prison and prisoners relative. The first one
is the director of the library. We have conduct 2 persons. One is the employee in Debre Berhan
Prison Center. And other is prisoner relative. We ask some question about the Debre Berhan
prison center. And the employer explains about how the current system works, describe the
drawback of the current system. The second one is the prisoner relative and he tell us how his
serve on the prison to communicate with his prisoner.
Literature Review: We use all available documents like forms, reports, and researchā€™s that are
used for the daily activity have been seen in detail since they are our main information resource
for our requirement collection.
7
1.8.2. Development Tools
We use development tools for the purpose of perform the implementation part of the project
and there are two development tools categories those are hardware tools and software tools.
1.8.2.1.Hardware Tools
No
Device
Name
Spec One
HDD
Spec Two
CPU
Spec Three
RAM
Model Quantity Remark
1 Computer 5 TB Core i9 16 GB Dell 4
2 Speaker - - - Sony 3
3 Mobile - - - Samsung 5
Table1.1. HardwareTools
1.8.2.2.Software Tools
No Software Name Version Description Remark
1 Window 10 Operating
System
10.0.15063 The operating system of the
computer.
2 Android Studio 3.0 To develop mobile application
3 C# 2017 To develop desktop application
4 Microsoft Office 2016 2016 To be prepare documents
5 SQL Server 2012 2012 Database to store data
6 Enterprise Architecture 13.5 UML tools to draw designā€™s
Table1.2. Software Tools
8
1.8.3. Required Resources with Costs
The costs we need during the development of the project includes shown on the below table: -
1.8.3.1.Hardware cost
No Device name Quantity
Unit price
(Birr)
Total price
(Birr)
1 Computer 4 25000 100000
2 Speaker 3 5000 15000
3 Mobile 5 10000 50000
Total 165000
Table1.3. HardwareTools Cost
1.8.3.2.Software cost
No Device name Quantity
Unit price
(Birr)
Total price
(Birr)
1 Window 10 Operating System 1 100 100
2 Android Studio 1 100 100
3 C# 1 100 100
4 Microsoft Office 2016 1 100 100
5 SQL Server 2012 1 100 100
6 Enterprise Architecture 1 100 100
Total 600
Table1.4. HardwareTools Cost
9
1.8.3.3.Time schedule
Activity
Months
September -
October
November -
December
January - March April - June
Project Proposal ļƒ¾
Requirement
Analysis
ļƒ¾
System Design ļƒ¾ ļƒ¾
Implementation ļƒ¾
Table1.5. TimeSchedule
10
Appendix I
1. What is the role in the prison?
2. How the prison works?
3. What types of problems occur during your activity?
4. In the current time, what type of system it follows?
5. How you observe the current system from the following perspectives
ā€“ Giving fast service to users.
ā€“ Saving time consumption.
ā€“ Security.
Appendix II
How you get the prison service?
What types of problems you observe with this time?
What type of system you recommend?
How you observe the current system from the following perspectives
ā€“ Giving fast service to users.
ā€“ Saving time consumption.
ā€“ Customer satisfaction.
11
Reference
[1] Amber, S.W. (Ambler 2004). ā€œThe object primer second editionā€, pp 184-200. 2007.
[2] IEEE. (Std 830-1993). ā€œGuide to software requirements specificationsā€.
[3] Alexander, J., and J. Austin. 1992. Handbook for Evaluating Objective Prison
Classification Systems. Washington, DC: U.S. Department of Justice, National Institute
of Corrections.

More Related Content

What's hot

Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPTuhin Ray
Ā 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
Ā 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics abdullah roomi
Ā 
Training and placement
Training and placementTraining and placement
Training and placementBhavesh Parmar
Ā 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
Ā 
Criminal Record System
Criminal Record SystemCriminal Record System
Criminal Record SystemCool Guy
Ā 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
Ā 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
Ā 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
Ā 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting pptShirinAkhtar5
Ā 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
Ā 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
Ā 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
Ā 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
Ā 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Applicationsatvirsandhu9
Ā 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
Ā 

What's hot (20)

Hostel management
Hostel managementHostel management
Hostel management
Ā 
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHPOnline Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
Ā 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Ā 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
Ā 
Training and placement
Training and placementTraining and placement
Training and placement
Ā 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Ā 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
Ā 
Criminal Record System
Criminal Record SystemCriminal Record System
Criminal Record System
Ā 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Ā 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Ā 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Ā 
Crime report
Crime reportCrime report
Crime report
Ā 
Online Crime Reporting ppt
Online Crime Reporting pptOnline Crime Reporting ppt
Online Crime Reporting ppt
Ā 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Ā 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
Ā 
Digital investigation
Digital investigationDigital investigation
Digital investigation
Ā 
Email investigation
Email investigationEmail investigation
Email investigation
Ā 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
Ā 
pda forensics
pda forensicspda forensics
pda forensics
Ā 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
Ā 

Similar to Prison Management System Best

how to write proposal
how to write proposalhow to write proposal
how to write proposalhassanmuude
Ā 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
Ā 
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docx
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docxCLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docx
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docxHussainiHamza1
Ā 
What Is Hardware Abstraction Layerss In The Operating...
What Is Hardware Abstraction Layerss In The Operating...What Is Hardware Abstraction Layerss In The Operating...
What Is Hardware Abstraction Layerss In The Operating...Alana Cartwright
Ā 
Document Imaging Business Case YOUR NAMESystems Analys.docx
Document Imaging Business Case YOUR NAMESystems Analys.docxDocument Imaging Business Case YOUR NAMESystems Analys.docx
Document Imaging Business Case YOUR NAMESystems Analys.docxjacksnathalie
Ā 
Design and implementation of a hospital management system
Design and implementation of a hospital management systemDesign and implementation of a hospital management system
Design and implementation of a hospital management systemOvercomer Michael
Ā 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4NICHOLAS RATEMO
Ā 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
Ā 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPDDavide Gabrini
Ā 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
Ā 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - NuixNuix
Ā 
The Investigative Lab - White Paper
The Investigative Lab - White PaperThe Investigative Lab - White Paper
The Investigative Lab - White PaperNuix
Ā 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
Ā 

Similar to Prison Management System Best (20)

how to write proposal
how to write proposalhow to write proposal
how to write proposal
Ā 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Ā 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
Ā 
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docx
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docxCLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docx
CLINICAL_MANAGEMENT_SYSTEM_PROJECT_DOCUM.docx
Ā 
What Is Hardware Abstraction Layerss In The Operating...
What Is Hardware Abstraction Layerss In The Operating...What Is Hardware Abstraction Layerss In The Operating...
What Is Hardware Abstraction Layerss In The Operating...
Ā 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
Ā 
Document Imaging Business Case YOUR NAMESystems Analys.docx
Document Imaging Business Case YOUR NAMESystems Analys.docxDocument Imaging Business Case YOUR NAMESystems Analys.docx
Document Imaging Business Case YOUR NAMESystems Analys.docx
Ā 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Ā 
Design and implementation of a hospital management system
Design and implementation of a hospital management systemDesign and implementation of a hospital management system
Design and implementation of a hospital management system
Ā 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
Ā 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Ā 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
Ā 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
Ā 
Majd
MajdMajd
Majd
Ā 
Majd
MajdMajd
Majd
Ā 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
Ā 
The Investigative Lab - White Paper
The Investigative Lab - White PaperThe Investigative Lab - White Paper
The Investigative Lab - White Paper
Ā 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Ā 
Computer forencis
Computer forencisComputer forencis
Computer forencis
Ā 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
Ā 

Recently uploaded

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
Ā 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
Ā 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
Ā 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
Ā 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
Ā 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
Ā 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
Ā 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
Ā 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
Ā 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
Ā 
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...soniya singh
Ā 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
Ā 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
Ā 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
Ā 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
Ā 

Recently uploaded (20)

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
Ā 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Ā 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
Ā 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
Ā 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Ā 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
Ā 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
Ā 
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Ā 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Ā 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
Ā 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Ā 
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi āž”ļø 8264348440 šŸ’‹šŸ“ž Independent Escort S...
Ā 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
Ā 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Ā 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
Ā 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
Ā 

Prison Management System Best

  • 1. i DEBRE BERHAN UNIVERSITY COLLEGE OF COMPUTING DEPARTMENT OF INFORMATION TECHNOLOGY Integrated prison controlling and monitoring system for Debre Berhan By Group Name ID Binyam Eshetu Ecomp/07/06 Hiwote Getye Ecomp/22/06 Getachewu Taddese Ecomp/18/06 Hermela Mekonnen Ecomp/21/06 Estifanos Yirga Ecomp/16/06 Submitted Date: August 2017 G.C
  • 2. ii Contents List of Table.................................................................................................................................iii List of Acronyms.......................................................................................................................... iv 1.1. Background of the Study....................................................................................................1 1.2. Statement of the Problem..................................................................................................1 1.3. Objective of the project .....................................................................................................2 1.3.1. General Objective.......................................................................................................2 1.3.2. Specific Objective.......................................................................................................2 1.4. Significance of the project..................................................................................................2 1.5. Scopes of the project.........................................................................................................3 1.6. Feasibility study................................................................................................................. 3 1.6.1. Technical Feasibility....................................................................................................3 1.6.2. Operational Feasibility................................................................................................ 4 1.6.3. Economic Feasibility...................................................................................................4 1.7. Requirement Analysis........................................................................................................4 1.7.1. Functional Requirements ............................................................................................... 4 1.7.2. Nonfunctional Requirements.......................................................................................... 5 1.8. Methodology..................................................................................................................... 6 1.8.1. Data source................................................................................................................ 6 1.8.2. Development Tools ....................................................................................................7 1.8.2.1. Hardware Tools ..................................................................................................7 1.8.2.2. Software Tools....................................................................................................7 1.8.3. Required Resources with Costs.................................................................................... 8 1.8.3.1. Hardware cost....................................................................................................8 1.8.3.2. Software cost.....................................................................................................8 1.8.3.3. Time schedule ....................................................................................................9 Appendix I.................................................................................................................................. 10 Appendix II................................................................................................................................. 10 Reference .................................................................................................................................. 11
  • 3. iii List of Table Table 1.1. Hardware Tools.........................................................................................................7 Table 1.2. Software Tools ..........................................................................................................7 Table 1.3. Hardware Tools Cost..................................................................................................8 Table 1.4. Hardware Tools Cost..................................................................................................8 Table 1.5. Time Schedule...........................................................................................................9
  • 4. iv List of Acronyms Spec Specification TB Tera Byte GB Giga Byte GUI Graphical User Interface SQL Structured Query Language UML Unified Modeling Language HDD Hard Disk Drive RAM Random Access Memory CPU Central Processing Unit
  • 5. 1 1.1. Background of the Study Ancient time people had generated output from the given input by using a finite sequence of computation. Computation is start early by several mechanisms, for example people had calculate numbers by using abacus, using bubbles and it will produce output. Our world rapidly changed now a day. Every person creates many data per day and also there are several organizations which is governmental or non-governmental those organization is generate data in order to satisfy their mission. In this way, these organizations will compile a variety of data and perform activityā€™s. so, in many organizations every transaction should perform in manual system and it use match amounts of resources, such as man power, time, money to retrieve huge amount of data from the manual system. There are several actions perform in prison controlling and monitoring system. In which it was hard to search a single data of any prisoner, overwriting and time consuming, chance of data loss, too much space occupied because of too many registers which are present in hard form and it was non-secure, because of these draws back we introduce a solution for it by building a system for the prison which keep all those transactions in efficient way. It will be easy to access any data, full secure and easily searchable. 1.2. Statement of the Problem In current system Debre Berhan Prison center provide several activities. It performs register new prisoner, transit prisoner from place to place, serve the parents and relatives to ask their parent, and several activities regarding to prisoner, manager, police and other. Those activities perform in current system completely manually, the stockholders perform activity like registering new prisoner, police and performing other several activities by manual system. Some challenges regarding to current system: - ā€“ Take time, money, labor to be register new prisoner. ā€“ Take materials to be registered like paper, classer and other material. ā€“ Take time in order to retrieve huge amount of data of prisoner and other. ā€“ Loss of data are happening usually. ā€“ There is no enough space to be store those documents. ā€“ No work satisfaction with the workers. ā€“ And also, no satisfaction regarding the user. ā€“ Complicated to find Correctional prisoners, Prisoners who are sorry data.
  • 6. 2 1.3. Objective of the project 1.3.1. General Objective The general objective of the project is produce computerized integrated prison controlling and monitoring system. 1.3.2. Specific Objective The specific objective allows to identify and describe about the integrated prison controlling and monitoring system as shows in the general objective. The specific objective is listed below: ā€“ To ensure that data recording is done using computers for easy access. ā€“ To generate prisoner report with any format. ā€“ To register and keep all informationā€™s about the prisoners such as their family details and background information. ā€“ To reduce the work load stakeholders. ā€“ To manage large number of prisonerā€™s details. ā€“ To save time, money, materials by using computer. ā€“ To ensure the satisfaction of the prisoner relatives and also the prisoners. ā€“ To prevent loss of data and ensure security. 1.4. Significance of the project At present, technology is rapidly growing. Thus, the uses of the project are to remove old or manual system that the organization uses and replace with the computerized system. And the computerized system allows to reduce the amount of time spent on searching different types of information by changing the use of the methodology of the case of the problem, and to bring a better way by keeping their confidentiality. The project fix problems that deals with the statement of the problem accordingly and produce new, easy, save and flexible prison controlling and monitoring system.
  • 7. 3 1.5. Scopes of the project There are many prison in our country as well as the world and those prison are uses their own management systems of the prisoner, but we select Debre Berhan prison center in our project to be change the current system with the new proposed system and the scope includes activity listed below: - ā€“ Records and view prisonerā€™s details. ā€“ Update records of correctional program attended by prisoners. ā€“ Uses Automatic ring for prisoner to communicate with their relatives. ā€“ Register and communicate the prisoner relatives computerized. ā€“ Generate full report as the user need like, generate by date, time, prison. ā€“ Notify or Alert prisonerā€™s appointment for court, hospital and other. 1.6. Feasibility study As we know each and every project needs to have a feasibility study for the complete understandability of the entire system. A feasibility study is a preliminary study understands before the real work of a project starts to certain the likelihood of the project success. And we describe the feasibility study of the project based on technical, operational, economic and political feasibilityā€™s. 1.6.1. Technical Feasibility The project should be developed such that the necessary functions and performance are achieved. The project is developed within latest technology. Through the technology may become obsolete after some period of time, due to the fact that is easy to implement the system to new technology. The system has been developed using C# the project is technically feasible for development.
  • 8. 4 1.6.2. Operational Feasibility The operational feasibility is the one that will be used effectively after it has been developed. And the integrated prison controlling and monitoring system is useful project to be implement and practice the system with the organization. And it is easy to operate after implemented and we say this project is operationally feasible. 1.6.3. Economic Feasibility The system is allowing to perform several activities and it converts the manual system into computerize so according to the current system there are so many costs. So, the proposed system is profitable than the current system, it has little cost to be implemented. Also, there are resources are already available, it gives an indication of the system is economically possible for development. 1.7. Requirement Analysis In this part, we consider what the project can do directly with the system and indirectly, but it also supports the system by providing some accessibilityā€™s. The requirement of the project can have classified as functional and non-functional requirements. The detail of each category discussed in each part. 1.7.1. Functional Requirements Functional requirements are type of requirements that a project must consider in its entire process. Operations those understand by the developer and stated as a way of automating the existing system. Services that the system should provide. This functional requirement defines what the systems do or the actual functionality of our system. The system provides the following functions.
  • 9. 5 ā€“ It Provides add prisonerā€™s information to the system. ā€“ The system view prisoners and other registered information according to his/her privilege. ā€“ The system allows to update information regarding to prisoners. ā€“ Register prisonerā€™s relatives and automatically call prisoners with specific time. ā€“ Generate report as the stakeholder wants like it generates by, name, date, time. ā€“ Notify sound alerts to prisoner, police and other when prisoners have an appointment in courts, hospitals and another place. 1.7.2. Nonfunctional Requirements Security: Our system need high security regarding to the prisoner information and other so we use several security mechanisms to make system secure like, cryptographic technology and SSH and to our system and it also have a username and password for the interact users on the system it allows prevent an authorized access of the user. So the system is more secure. Performance: Its performance may be affected by connection lose, electric power problem. To make an interrupted in such condition our system needs extra equipment to achieve this requirement. Accuracy: Since the system is driven by human it is prone to error. To make it more accurate advanced technology and knowledgeable programmer must needed.at this time we have not any means to make the system 100% accurate but through time we planned to make it more accurate by getting experiences and knowledge from different resources and with new technology tools that helps us to do what we planned to do. Reliability: The system may generate unexpected output when we enter unpredictable input sequence. In other side reliability refers that the system should provide service for 24 hours per a day and 7 days in a week. So, when look our system in such perspective as much as possible it is reliable. Graphic user interface (GUI): The system provides highly user interface design that develop by current version developing tools to be increase the satisfaction of the user to use the system and it allow the local language in order to be easy communicate within the system.
  • 10. 6 1.8. Methodology Methodology of a project is in which and how the information is gathered from the required placed to analysis the current problem of the system. As a project, a systematical and a methodological travel through problems to eliminate them or as much as possible to reduce them and to get a better thing by investigating or inventing new innovations, which will be employed in the real world to solve that specific problem, which is disturbing the wellbeing of the whole or some part of a community. 1.8.1. Data source In order to achieve the project, we use some data sources allows give information about the study. The data is collected in different mechanisms. Some of the mechanisms that we have used are listed below: - ā€“ Observation ā€“ Interview ā€“ Literature review. Observation: In order to gather information, we use the observation method because it helps to get some workflows of the current system and also allow to identify the working environment. We see and understand different problems that are not conducted to computerized system some of the observed problems are listed below: - Time spend for registering prisonerā€™s relative and also communicate. ā€“ Spends labor of the worker. ā€“ Canā€™t satisfy the prisoners and its relative. ā€“ Lack of security. Interview: We make interview with employs in the prison and prisoners relative. The first one is the director of the library. We have conduct 2 persons. One is the employee in Debre Berhan Prison Center. And other is prisoner relative. We ask some question about the Debre Berhan prison center. And the employer explains about how the current system works, describe the drawback of the current system. The second one is the prisoner relative and he tell us how his serve on the prison to communicate with his prisoner. Literature Review: We use all available documents like forms, reports, and researchā€™s that are used for the daily activity have been seen in detail since they are our main information resource for our requirement collection.
  • 11. 7 1.8.2. Development Tools We use development tools for the purpose of perform the implementation part of the project and there are two development tools categories those are hardware tools and software tools. 1.8.2.1.Hardware Tools No Device Name Spec One HDD Spec Two CPU Spec Three RAM Model Quantity Remark 1 Computer 5 TB Core i9 16 GB Dell 4 2 Speaker - - - Sony 3 3 Mobile - - - Samsung 5 Table1.1. HardwareTools 1.8.2.2.Software Tools No Software Name Version Description Remark 1 Window 10 Operating System 10.0.15063 The operating system of the computer. 2 Android Studio 3.0 To develop mobile application 3 C# 2017 To develop desktop application 4 Microsoft Office 2016 2016 To be prepare documents 5 SQL Server 2012 2012 Database to store data 6 Enterprise Architecture 13.5 UML tools to draw designā€™s Table1.2. Software Tools
  • 12. 8 1.8.3. Required Resources with Costs The costs we need during the development of the project includes shown on the below table: - 1.8.3.1.Hardware cost No Device name Quantity Unit price (Birr) Total price (Birr) 1 Computer 4 25000 100000 2 Speaker 3 5000 15000 3 Mobile 5 10000 50000 Total 165000 Table1.3. HardwareTools Cost 1.8.3.2.Software cost No Device name Quantity Unit price (Birr) Total price (Birr) 1 Window 10 Operating System 1 100 100 2 Android Studio 1 100 100 3 C# 1 100 100 4 Microsoft Office 2016 1 100 100 5 SQL Server 2012 1 100 100 6 Enterprise Architecture 1 100 100 Total 600 Table1.4. HardwareTools Cost
  • 13. 9 1.8.3.3.Time schedule Activity Months September - October November - December January - March April - June Project Proposal ļƒ¾ Requirement Analysis ļƒ¾ System Design ļƒ¾ ļƒ¾ Implementation ļƒ¾ Table1.5. TimeSchedule
  • 14. 10 Appendix I 1. What is the role in the prison? 2. How the prison works? 3. What types of problems occur during your activity? 4. In the current time, what type of system it follows? 5. How you observe the current system from the following perspectives ā€“ Giving fast service to users. ā€“ Saving time consumption. ā€“ Security. Appendix II How you get the prison service? What types of problems you observe with this time? What type of system you recommend? How you observe the current system from the following perspectives ā€“ Giving fast service to users. ā€“ Saving time consumption. ā€“ Customer satisfaction.
  • 15. 11 Reference [1] Amber, S.W. (Ambler 2004). ā€œThe object primer second editionā€, pp 184-200. 2007. [2] IEEE. (Std 830-1993). ā€œGuide to software requirements specificationsā€. [3] Alexander, J., and J. Austin. 1992. Handbook for Evaluating Objective Prison Classification Systems. Washington, DC: U.S. Department of Justice, National Institute of Corrections.