1. i
DEBRE BERHAN UNIVERSITY
COLLEGE OF COMPUTING
DEPARTMENT OF INFORMATION TECHNOLOGY
Integrated prison controlling and monitoring system for Debre Berhan
By
Group Name ID
Binyam Eshetu Ecomp/07/06
Hiwote Getye Ecomp/22/06
Getachewu Taddese Ecomp/18/06
Hermela Mekonnen Ecomp/21/06
Estifanos Yirga Ecomp/16/06
Submitted Date: August 2017 G.C
2. ii
Contents
List of Table.................................................................................................................................iii
List of Acronyms.......................................................................................................................... iv
1.1. Background of the Study....................................................................................................1
1.2. Statement of the Problem..................................................................................................1
1.3. Objective of the project .....................................................................................................2
1.3.1. General Objective.......................................................................................................2
1.3.2. Specific Objective.......................................................................................................2
1.4. Significance of the project..................................................................................................2
1.5. Scopes of the project.........................................................................................................3
1.6. Feasibility study................................................................................................................. 3
1.6.1. Technical Feasibility....................................................................................................3
1.6.2. Operational Feasibility................................................................................................ 4
1.6.3. Economic Feasibility...................................................................................................4
1.7. Requirement Analysis........................................................................................................4
1.7.1. Functional Requirements ............................................................................................... 4
1.7.2. Nonfunctional Requirements.......................................................................................... 5
1.8. Methodology..................................................................................................................... 6
1.8.1. Data source................................................................................................................ 6
1.8.2. Development Tools ....................................................................................................7
1.8.2.1. Hardware Tools ..................................................................................................7
1.8.2.2. Software Tools....................................................................................................7
1.8.3. Required Resources with Costs.................................................................................... 8
1.8.3.1. Hardware cost....................................................................................................8
1.8.3.2. Software cost.....................................................................................................8
1.8.3.3. Time schedule ....................................................................................................9
Appendix I.................................................................................................................................. 10
Appendix II................................................................................................................................. 10
Reference .................................................................................................................................. 11
3. iii
List of Table
Table 1.1. Hardware Tools.........................................................................................................7
Table 1.2. Software Tools ..........................................................................................................7
Table 1.3. Hardware Tools Cost..................................................................................................8
Table 1.4. Hardware Tools Cost..................................................................................................8
Table 1.5. Time Schedule...........................................................................................................9
4. iv
List of Acronyms
Spec Specification
TB Tera Byte
GB Giga Byte
GUI Graphical User Interface
SQL Structured Query Language
UML Unified Modeling Language
HDD Hard Disk Drive
RAM Random Access Memory
CPU Central Processing Unit
5. 1
1.1. Background of the Study
Ancient time people had generated output from the given input by using a finite sequence of
computation. Computation is start early by several mechanisms, for example people had
calculate numbers by using abacus, using bubbles and it will produce output. Our world rapidly
changed now a day. Every person creates many data per day and also there are several
organizations which is governmental or non-governmental those organization is generate data
in order to satisfy their mission. In this way, these organizations will compile a variety of data
and perform activityās. so, in many organizations every transaction should perform in manual
system and it use match amounts of resources, such as man power, time, money to retrieve
huge amount of data from the manual system. There are several actions perform in prison
controlling and monitoring system. In which it was hard to search a single data of any prisoner,
overwriting and time consuming, chance of data loss, too much space occupied because of too
many registers which are present in hard form and it was non-secure, because of these draws
back we introduce a solution for it by building a system for the prison which keep all those
transactions in efficient way. It will be easy to access any data, full secure and easily searchable.
1.2. Statement of the Problem
In current system Debre Berhan Prison center provide several activities. It performs register
new prisoner, transit prisoner from place to place, serve the parents and relatives to ask their
parent, and several activities regarding to prisoner, manager, police and other. Those activities
perform in current system completely manually, the stockholders perform activity like
registering new prisoner, police and performing other several activities by manual system.
Some challenges regarding to current system: -
ā Take time, money, labor to be register new prisoner.
ā Take materials to be registered like paper, classer and other material.
ā Take time in order to retrieve huge amount of data of prisoner and other.
ā Loss of data are happening usually.
ā There is no enough space to be store those documents.
ā No work satisfaction with the workers.
ā And also, no satisfaction regarding the user.
ā Complicated to find Correctional prisoners, Prisoners who are sorry data.
6. 2
1.3. Objective of the project
1.3.1. General Objective
The general objective of the project is produce computerized integrated prison controlling and
monitoring system.
1.3.2. Specific Objective
The specific objective allows to identify and describe about the integrated prison controlling
and monitoring system as shows in the general objective. The specific objective is listed below:
ā To ensure that data recording is done using computers for easy access.
ā To generate prisoner report with any format.
ā To register and keep all informationās about the prisoners such as their family details
and background information.
ā To reduce the work load stakeholders.
ā To manage large number of prisonerās details.
ā To save time, money, materials by using computer.
ā To ensure the satisfaction of the prisoner relatives and also the prisoners.
ā To prevent loss of data and ensure security.
1.4. Significance of the project
At present, technology is rapidly growing. Thus, the uses of the project are to remove old or
manual system that the organization uses and replace with the computerized system. And the
computerized system allows to reduce the amount of time spent on searching different types of
information by changing the use of the methodology of the case of the problem, and to bring a
better way by keeping their confidentiality. The project fix problems that deals with the
statement of the problem accordingly and produce new, easy, save and flexible prison
controlling and monitoring system.
7. 3
1.5. Scopes of the project
There are many prison in our country as well as the world and those prison are uses their own
management systems of the prisoner, but we select Debre Berhan prison center in our project
to be change the current system with the new proposed system and the scope includes activity
listed below: -
ā Records and view prisonerās details.
ā Update records of correctional program attended by prisoners.
ā Uses Automatic ring for prisoner to communicate with their relatives.
ā Register and communicate the prisoner relatives computerized.
ā Generate full report as the user need like, generate by date, time, prison.
ā Notify or Alert prisonerās appointment for court, hospital and other.
1.6. Feasibility study
As we know each and every project needs to have a feasibility study for the complete
understandability of the entire system. A feasibility study is a preliminary study understands
before the real work of a project starts to certain the likelihood of the project success. And we
describe the feasibility study of the project based on technical, operational, economic and
political feasibilityās.
1.6.1. Technical Feasibility
The project should be developed such that the necessary functions and performance are
achieved. The project is developed within latest technology. Through the technology may
become obsolete after some period of time, due to the fact that is easy to implement the system
to new technology. The system has been developed using C# the project is technically feasible
for development.
8. 4
1.6.2. Operational Feasibility
The operational feasibility is the one that will be used effectively after it has been developed.
And the integrated prison controlling and monitoring system is useful project to be implement
and practice the system with the organization. And it is easy to operate after implemented and
we say this project is operationally feasible.
1.6.3. Economic Feasibility
The system is allowing to perform several activities and it converts the manual system into
computerize so according to the current system there are so many costs. So, the proposed
system is profitable than the current system, it has little cost to be implemented. Also, there are
resources are already available, it gives an indication of the system is economically possible
for development.
1.7. Requirement Analysis
In this part, we consider what the project can do directly with the system and indirectly, but it
also supports the system by providing some accessibilityās. The requirement of the project can
have classified as functional and non-functional requirements. The detail of each category
discussed in each part.
1.7.1. Functional Requirements
Functional requirements are type of requirements that a project must consider in its entire
process. Operations those understand by the developer and stated as a way of automating the
existing system. Services that the system should provide. This functional requirement defines
what the systems do or the actual functionality of our system. The system provides the
following functions.
9. 5
ā It Provides add prisonerās information to the system.
ā The system view prisoners and other registered information according to his/her
privilege.
ā The system allows to update information regarding to prisoners.
ā Register prisonerās relatives and automatically call prisoners with specific time.
ā Generate report as the stakeholder wants like it generates by, name, date, time.
ā Notify sound alerts to prisoner, police and other when prisoners have an appointment
in courts, hospitals and another place.
1.7.2. Nonfunctional Requirements
Security: Our system need high security regarding to the prisoner information and other so we
use several security mechanisms to make system secure like, cryptographic technology and
SSH and to our system and it also have a username and password for the interact users on the
system it allows prevent an authorized access of the user. So the system is more secure.
Performance: Its performance may be affected by connection lose, electric power problem. To
make an interrupted in such condition our system needs extra equipment to achieve this
requirement.
Accuracy: Since the system is driven by human it is prone to error. To make it more accurate
advanced technology and knowledgeable programmer must needed.at this time we have not
any means to make the system 100% accurate but through time we planned to make it more
accurate by getting experiences and knowledge from different resources and with new
technology tools that helps us to do what we planned to do.
Reliability: The system may generate unexpected output when we enter unpredictable input
sequence. In other side reliability refers that the system should provide service for 24 hours per
a day and 7 days in a week. So, when look our system in such perspective as much as possible
it is reliable.
Graphic user interface (GUI): The system provides highly user interface design that develop
by current version developing tools to be increase the satisfaction of the user to use the system
and it allow the local language in order to be easy communicate within the system.
10. 6
1.8. Methodology
Methodology of a project is in which and how the information is gathered from the required
placed to analysis the current problem of the system. As a project, a systematical and a
methodological travel through problems to eliminate them or as much as possible to reduce
them and to get a better thing by investigating or inventing new innovations, which will be
employed in the real world to solve that specific problem, which is disturbing the wellbeing of
the whole or some part of a community.
1.8.1. Data source
In order to achieve the project, we use some data sources allows give information about the
study. The data is collected in different mechanisms. Some of the mechanisms that we have
used are listed below: -
ā Observation
ā Interview
ā Literature review.
Observation: In order to gather information, we use the observation method because it helps
to get some workflows of the current system and also allow to identify the working
environment. We see and understand different problems that are not conducted to computerized
system some of the observed problems are listed below: -
Time spend for registering prisonerās relative and also communicate.
ā Spends labor of the worker.
ā Canāt satisfy the prisoners and its relative.
ā Lack of security.
Interview: We make interview with employs in the prison and prisoners relative. The first one
is the director of the library. We have conduct 2 persons. One is the employee in Debre Berhan
Prison Center. And other is prisoner relative. We ask some question about the Debre Berhan
prison center. And the employer explains about how the current system works, describe the
drawback of the current system. The second one is the prisoner relative and he tell us how his
serve on the prison to communicate with his prisoner.
Literature Review: We use all available documents like forms, reports, and researchās that are
used for the daily activity have been seen in detail since they are our main information resource
for our requirement collection.
11. 7
1.8.2. Development Tools
We use development tools for the purpose of perform the implementation part of the project
and there are two development tools categories those are hardware tools and software tools.
1.8.2.1.Hardware Tools
No
Device
Name
Spec One
HDD
Spec Two
CPU
Spec Three
RAM
Model Quantity Remark
1 Computer 5 TB Core i9 16 GB Dell 4
2 Speaker - - - Sony 3
3 Mobile - - - Samsung 5
Table1.1. HardwareTools
1.8.2.2.Software Tools
No Software Name Version Description Remark
1 Window 10 Operating
System
10.0.15063 The operating system of the
computer.
2 Android Studio 3.0 To develop mobile application
3 C# 2017 To develop desktop application
4 Microsoft Office 2016 2016 To be prepare documents
5 SQL Server 2012 2012 Database to store data
6 Enterprise Architecture 13.5 UML tools to draw designās
Table1.2. Software Tools
12. 8
1.8.3. Required Resources with Costs
The costs we need during the development of the project includes shown on the below table: -
1.8.3.1.Hardware cost
No Device name Quantity
Unit price
(Birr)
Total price
(Birr)
1 Computer 4 25000 100000
2 Speaker 3 5000 15000
3 Mobile 5 10000 50000
Total 165000
Table1.3. HardwareTools Cost
1.8.3.2.Software cost
No Device name Quantity
Unit price
(Birr)
Total price
(Birr)
1 Window 10 Operating System 1 100 100
2 Android Studio 1 100 100
3 C# 1 100 100
4 Microsoft Office 2016 1 100 100
5 SQL Server 2012 1 100 100
6 Enterprise Architecture 1 100 100
Total 600
Table1.4. HardwareTools Cost
14. 10
Appendix I
1. What is the role in the prison?
2. How the prison works?
3. What types of problems occur during your activity?
4. In the current time, what type of system it follows?
5. How you observe the current system from the following perspectives
ā Giving fast service to users.
ā Saving time consumption.
ā Security.
Appendix II
How you get the prison service?
What types of problems you observe with this time?
What type of system you recommend?
How you observe the current system from the following perspectives
ā Giving fast service to users.
ā Saving time consumption.
ā Customer satisfaction.
15. 11
Reference
[1] Amber, S.W. (Ambler 2004). āThe object primer second editionā, pp 184-200. 2007.
[2] IEEE. (Std 830-1993). āGuide to software requirements specificationsā.
[3] Alexander, J., and J. Austin. 1992. Handbook for Evaluating Objective Prison
Classification Systems. Washington, DC: U.S. Department of Justice, National Institute
of Corrections.