Documente Academic
Documente Profesional
Documente Cultură
1. Project Proposal:
1.1 Introduction:
Jails are an important component of the correctional system, even more so than prison. This is
because many more people will pass through the jails as opposed to prison. Regardless of the
fact that jails and prisons are two distinct institutions, this paper is going to discuss them
together. The procedures and protocols are similar between the two, changing only slightly based
on security needs, resources, and the type of inmate that may land within the respective
institutional walls. Jail populations usually consist of substance abuse offenders, sex industry
workers, juveniles who are treated as adults, terrorists, gang leaders, as well as those persons
who fail to appear for court hearings, trials or other required conditions of a previous sentence.
Only a small number of clearly serious and predatory offenders move through the jail system and
eventually go to prison. Hence, most jail inmates are there for misdemeanor offenses whereas
prison inmates are there for serious, and/or violent offenses. Social control of inmate behavior is
a primary focus of any correctional operation, and is critical to the success of any institution.
Hence, a significant component of institutional policy should be a functional, well‐implemented
disciplinary guideline. This policy should in still respect for authority, which will hopefully
persist when the offender is released back into the community .In order to normalize day‐to‐day
living; most facilities emphasize free movement of inmates during daytime hours and evening
activities. This policy benefits both inmates and staff by decreasing restlessness, and planting
the seeds of future compliance with the wishes of authority, thus, benefiting both inmates and
staff. Another goal of the inmate disciplinary system is to make behavior conform to accepted
norms of the institution, which helps to ensure the safety and property of all. Some of the
drawbacks to having free inmate movement are the amplified need for discipline and obedience
that it creates. Therefore, there should be a written set of rules defining expected inmate behavior
and procedures when handling any misconduct, all of which must be communicated carefully
and thoroughly to the staff and inmates. Apart from all these above mentioned, inmates, visitors
and all staffs requires or needs very Nice system which can be recorded any information about
jail prisoners. Although there are so many systems in the world which are based on modern
technology, these systems are crucial for recording data among different institutions.
Hargeisa Central Prison Admas University College
2|Page
Hence Somaliland is one of the poorest countries in Horn of Africa it uses very bad system
which is more time losing, and the safety of data in the whole jail prisoners maybe risk, system
is manual that Somaliland government using the last decades . The lack of criminal’s informal
education and skill training opportunities are included problems always standing in the prisons in
Somaliland. To meet these challenges, there is need for capacity building formulation as well as
human and physical resource capacity building within the Somaliland prisons.
So to avoid these problems a new system is needed, this can help the administrators to get the
accurate data about prisoners and will easily record the data. This system will focus on only
prisoners but not the entire jail management.
1.2 Background:
Hargeisa Central Prison is one of the largest and oldest prison in Somaliland this jail was
established in 1945 and it was built by British colony which was colonized Somaliland at that
time. This jail was first prison that was established in horn of Africa .The number of inmates was
required to take the prison was only 1000 inmates (prisoners) because of the number of
population who live in Somaliland were few also the crimes were not so more because most of
the somalilanders were animal-keepers who were busy keeping and feeding of their live-stock.
Mostly people use to fight for water and grass when these conflicts happen ,it must be taken to
prison those who started the conflict and bring to court, then court will sent to central prison if
the crime is so serious .. It is renewed in 2007 by UNDP & UNODC and now the jail is working
well and good. This prison is only for men, and it consist of 48 rooms each room for 10 prisoners
in other way the prison classified in 4 blocks named A,B,C,D .about 560 prisoners can be
arrested, and the exact number that is present now is 320 prisoners. And each prisoner has his
own crime the most crimes that repeated so many times in the book records are: thefts, rape,
killing and other criminals .So when the data of inmates are needed, it become difficult because
of book-keeping record system .Custodial police are responsible the management of the whole
prison like guard record, prison record and all department affaires. This means any information
about prison will responsible by custodial police.
The most problems that faces police are lack of training because of Somaliland is unrecognized
country which doesn’t have enough resources and financial support also they use bad system
Hargeisa Central Prison Admas University College
3|Page
which is book-keeping record so they need new system that help them to minimize the time
consuming and easily record the prisoners staff and other related data. This system is very
important and suitable for managing the prisoners
On behalf of Somaliland inmates’ population, the worst of all and it is still enduring the side-
effects from their courts with law infrastructure and weak management’s structure from the
different courts in Somaliland in general. The integrity of the governing system always falls
when it comes to the application claims and inmate people rights issues, etc. the commitment to
the principles of Somaliland judiciary systems, that, the Somaliland inmate people with have
different crimes and claims do not share equal rights from their courts and legal administration
procedures in Somaliland prisons, the recurrent inmate background registration mistakes,
misunderstanding and interchange/exchange of inmate persons are common and sometimes
possible among Somaliland prisons administration due to the old traditional registration system
with hand books errors (note books). Therefore, the Somaliland prisons administration will
require new method for inmate background registration through information technology services.
Prison Commander
Secretor
Even though prisons are complex institutions, and often low in political priorities, they aim to
Provide safe and secure environments for both the prisoners and the staff as their first priority.
The activities of Hargeisa Central Prison service in terms of records keeping has for long
time been a huge problem to the service as there are no proper facilities in place to ensure
that they are able to store and retrieve information on prisoner’s very quickly records
keeping are still done using big old files which have to be shelved once that file is full
and then replaced with another and so when the need comes to get information on
prisoner’s they will have to look through the old files according to the dates they assume
the information could have been stored and then go through all files that were recorded
during that period until the file is found . this very tiring and time consuming activity
usually leaves them with no other option but to record the prisoner detail again in the
new file to avoid going through so much stress but which also calls for data
redundancies .
It is in the regard that this system software has proposed to develop a prisoner’s
management system to help them ease up their operations this management system will
ensure that there are no redundancies in records hence checking for data integrity
The new system will organize the current manual system for managing prosecution Information
by mapping functions required under the law, standardizing the processes undertake to meet
those legal requirements and formalization that standardization with templates, forms and
procedures. These circumstances have to be incorporated with the long term planning, Manual
system is old system which has so many problems that is why this project is being generated
these are the problems in manual system using:
Time consuming
Lack of permissions and authentication
Difficult in retrieve data
Lack of information system
High human errors in data.
Lack of modern technology
This project will be focused on the day- to - day activities of the prison and will be mainly used
by the prisoners information system, as everyone knows jail consists of many departments so the
project will not solve the whole jail management system but only for jail prisoners management
system (means recording, retrieval, keeping and manipulating the data of inmates in the prison ),
since all Somaliland jails use manual, this system will help them especially in Hargeisa Central
Prison.
1.7 Objectives:
The main purpose behind the implementation of the Jail Prisoners Management System (JPMS)
was to enhance the administrative capabilities of the jails in terms of monitoring and
Security of the prison while improving the efficiency and productivity of the Prisons. Creating
and maintaining prisoner and detainees files an essential tool for protecting and upholding these
standards.
Therefore the prison services really need adequate information system that is simple to use
tracking and recording of information an effective and efficient manner.
Specific objectives of project are enunciated below:
How many criminal being arrested, their full record full name, nickname, place of born, place of
reside, Mother name, health, his chief, tribe, education level, married or single, picture, figure
print. So that next time arrested or needed his information must be identified
1.8 Goals:
Main goal of this system is to automate the jail prisoner’s activities like recording all data of
inmates,
Specific goals of the project are enunciated below:
To ensure compliance with the Jail Manual with respect to the visitors and their
frequency
To ensure that no impersonation of the prisoners happens by proper validation and
Authentication of the prisoner’s identity
To ensure that assistance could be provided to police stations in real time if the
Need arises
To reduce the costs and the risks associated with the production of the prisoners in
The court
To improve the productivity and efficiency of the prisons so as to facilitate the
Usage of the available work force for sensitive work while leveraging technology
to reduce the mundane workload of the employees
To ensure the availability of data in digital form for preservation, analysis and
Reporting. The nature of project is such that outcome of project could be quantitatively
measured only for few parameters such as
Automatic detection of duplication
Automatic refusal to visitor meeting a prisoner at interval less than prescribed
Software requirements:
Hardware Description:
Hardware Requirements:
2. System Analysis
2.1 Introduction:
System Analysis is the process of gathering and interpreting facts, diagnosing problems
and using the information to recommend improvements to the system. The system analysis
performs this job. Analysis specifies what the system should do. It is about understanding
situations, not solving problems. System analysis can also be said to be fact finding followed by
analysis of the fact.
One aspect of analysis is defining the boundaries of the system and determining whether
or not a candidate stem should consider other related systems. Data are collected on the available
files, decision points and transactions handled by the present system. Tools used are data flow
diagrams, interviews, and etc.
Jail Prisoners Management System (JPMS) plays an important role in achieving the
desired activities that take place inside the prison as soon as possible .Some common aspects that
is met during arresting an inmate are registering the prisoners in books which will become
difficult the staffs to retrieve that information if it is needed later on. By the way every system
that exists in the world solves any problem whether so serious or not.
There are different tools using for gathering data such as: interviews, questionnaires, meetings,
temporary job assignments, document review and observations. These tools are the most tools
used in this time for projects and researches. By the way in this system is used to gather the
information interview technique which is face to face conversation by using pens and papers.
Information gathering
Information gathering is an important step when developing any system. At this stage you collect
all the available data necessary to produce an up to date application program and you avoid
adding unnecessary components to the system and possible errors. We use interview tool we take
An interview to authority of Hargeisa prison center and also custodial chairman and vice
chairman of costal dial corps, this interview is concerning about the existing system and common
problems that faces them constantly.
Interview
The interview is the primary technique for information gathering during the systems analysis
phases of a development project. It is a skill which must be mastered by every analyst. The
interviewing skills of the analyst determine what information is gathered, and the quality and
depth of that information. Interviewing, observation, and research are the primary tools of the
analyst.
Goals of the interview
1. Gather information on the Prison
4. Uncover problems
8. Provide information
To develop the system based on the requirement of the user we implemented the best method of
data collection according to the project.
We have generated the following interview questions which were answered by the Prisoner’s
Manager.
ANS: the problems we are faced in this system are so huge for example:
- It’s time consuming
- It’s hard to collect data
- Less security
- And other things
Q4: what is the data and information that is kept by the prison's system?
ANS: registration details, prisoner's details, visitor's details and so other data
ANS: it's good and we hope it will handle all the problems we mentioned
Technical feasibility
Technical feasibility focuses on the possibility of developing the system using the existing
technology. The proposed system is based on vb.net technology and SQL SERVER. Obviously
this technology is available for the development of this software product. This means that the
necessary hardware and software are available for the development and implementation of the
new system. Therefore, the solution is technically feasible.
SLAUGHTEUSE MANAGEMENT SYSTEM gust 1, 2010
Economical feasibility
In economic feasibility one has to critically examine and compare the costs and benefits
associated with the development and implementation of the proposed system. Comparing the
two, only if the tangible and intangible benefits outweigh the costs will the system be
economically feasible. The costs involved in the new system are insignificant compared to the
advantage of the system. Since there are more benefits associated with the new system than
costs, it is evident that the system is economically feasible.
Operational feasibility
The proposed system supports interoperability and is acceptable to end-users. Hence the system
is operationally feasible. Always talks about the processes and working movement of the project,
It is mainly related to human organizations and political aspects. The points to be considered are:
What changes will be brought with the system?
What organization structures are disturbed?
What new skills will be required? Do the existing staff members have these skills? If not,
can they be trained in due course of time?
A graphical tool used to describe and analyze the movement of data through a system manual or
automated including the process, stores of data, and delays in the system. Data Flow Diagrams
are the central tool and the basis from which other components are developed. The
transformation of data from input to output, through processes, may be described logically and
independently of the physical components associated with the system.
PHYSICAL DFD:
The physical design relates to the actual input and output processes of the system. This is laid
down in terms of how data is inputted into a system, how it is verified or authenticated, how it is
processed, and how it is displayed as output. Structured analysis states that the current system
should be first understood correctly. The physical DFD is the model of the current system and is
used to ensure that the current system has been clearly understood. Physical DFDs shows actual
devices, departments, and people etc., involved in the current system
LOGICAL DFD:
A database is a set of logically related files organized to facilitate access by one or more
applications programs & to minimize data redundancy. Logical DFDs are the model of the
proposed system. They clearly should show the requirements on which the new system should
be built. Later during design activity this is taken as the basis for drawing the system’s structure
charts.
BASIC NOTATIONS:
1) DATA FLOW
2) PROCESS
3) DATA STORE
4) SOURCE
The Context Analysis Diagram (CAD) may be used to represent the top level overviews of the
existing system. The CAD is drawn to represent the state of the system during the requirement
analysis phase The CAD shows the system as a single process represented by a circle at the
center of the model. There shall always be only one system process in a CAD. The model shows
entities external to the system process. The entities are representative of the existing significant
objects in the current system scenario. The external entities are connected to the central process
through connectors representing the information flowing into/ out of the system.CAD should be
drawn with the help of latest tools available with the Prison.
2.6 DFD for all process of Jail Prisoner’s Management System (JPMS)
Process 1.0 check on inmate information, summarizes the main function of the system.
After checking whether the inmate is convicted or under trial, registration or recording
may be happened.
To draw the data flow diagram correctly, questions must be asked such as ‘what
information is needed to arrest Prisoners?
Check on inmate is used to find matching information about the Inmate.
The process creates a record file, which will eventually produce information about the
total claims received. A double headed arrow indicates that inmate information is
obtained from and registered same file location.
Process 2.0 Explains when the court check all the claims over the prisoner, it takes
decision that if the inmates’ claims are confined then it sends to jail and Room_ID will be
searched. If the claims are aborted then inmate will be released.
Process 3.0
Check in the health of inmate updates the prisoner data store file.
Process 4.0
It explains those inmates that completed their period, when they are released from Prison,
always the database will be checked from his/her ID then it will be recorded as released
prisoner.
Process 5.0
Inmate may be transferred from one prison to another for some reasons, so process for
transferring must be taken. By the way this process explains briefly.
Process 6.0
Explains activities that prisoner can make inside Jail, like working, studying and the like.
So all these activities must be recorded in file.
Process 7.0
Produces useful information for managing the inmates of the Jail and making decisions,
The decision tree for the Prisoners Management that is found above, actions is represented by the
square nodes, and conditions are depicted by the circles.
Circles represent IF and the squares represent THEN. In the prisoners example,
Checks the inmate is new or convicted before, if inmate is convicted before then another
checking is done,
Check if inmate sentenced then two actions are taken
1. Record inmate
The Hargeisa Prison center is backward to the modern technology and lack of Information
system, they record with manual books to register and criminal there were no computerized
working system to manage the huge work from their classification in track records. And also
government can’t classify criminal person and termination of their arrested period when they
require for prisoner releasing. In regards to this project, the project is based problem analysis and
questionnaires interview through Hargeisa prison center administration authorities, which, there
are Hargeisa prison center commander representatives and their custodial corps military group.
Notably, the key contributions to the discussions were included military commanders, custodial
corps groups and other key respective prison staff, etc. Therefore, the hierarchy of problems to
be addressed by the project is described in the following problems and the main technical
problems to be addressed is the lack of criminal background information and awareness of the
prisoners informal education and skill training issues, the problems that the Hargeisa prison
center administration faces are as follows:-
We look at the ‘who’ people involved this system, ‘what’ Jail activities, ‘where’ work
environment, ‘when’ timing/sequence and ‘how’ current procedure of the selected areas of your
Jail System. One important aspect is, understanding why Prison is currently conducted in this
manner.
Interviews with Jail Commanders, and other people who have work experience and knowledge
of Prison may be conducted and their comments, issues and desires for improvements
documented. Important processes may be documented step by step, with tree diagram and data
flow diagram also is written its description.
Current reports may be reviewed, new reports may be detailed. Paper forms may be gathered and
examined. Staff interactions and guards with clients and/or processes may be observed.
In this proposed system we implements Jail Prisoners management. In this system the details of
the prisoners are registered by officials. And each official will have to log in using this there id
and password. This will help in exact identification of each entry into the proposed system to
view the details update. The overall procedure done in the system is shown in the figure.
10. Get updates to People as soon as the events are updated in the database.
3. System Design:
Design is the first step in moving from problem domain to the solution domain. Design
is essentially the bridge between requirements specification and the final solution. The goal of
design process is to produce a model or representation of a system, which can be used
later to build that system. The produced model is called the “Design of the System”. It is a plan
for a solution to the system.
The use of System Design is to create a technical solution that satisfies the functional
requirements for the system. At this Point in the project lifecycle there should be a Functional
Specification, written primarily in business terminology, containing a complete description of the
operational needs of the various organizational entities that will use the new system. The
Challenge is to translate all of this information into Technical Specifications that accurately
describe the design of the system, and that can be used as input to System creation. The
Functional Specification produced during System Requirements Analysis is transformed into a
physical architecture. System components are distributed across the physical architecture, Usable
interfaces are designed and prototyped, And Technical Specifications are created for the
Application Developers, enabling them to build and test the system.
Many organizations look at System Design primarily as the Preparation of the system component
specifications; however, Constructing the various system components is only one of a set of
major steps in successfully building a system. The preparation of the environment needed to
build the system, the testing of the system, and the migration and preparation of the data that will
ultimately be used by the system are equally important In addition to designing the technical
solution.
User Requirements
The User requirements were summarized below and to maintain i.e. enter, update and insert data
on the following:
(a) Prisoners’ details: identity number, first name, last name, charge, date in, date out, birth date,
gender, address, crime number comments (which Prison), disease, convict, remand education
level and age variance.
(b) To perform searches on: Crime committed, Prisoner details, like name, age variance, disease
suffering from, by gender (male or female), crime number, education level date of birth.
(c) To track the status of: Prisoner details, Charge (crime) committed, captured by the data
entrants and the detailed reports accumulated for decision making.
(d) To report on: Prisoners details reports made by the authorized data entrants and the detailed
report processed as a management report for decision making.
Functional Requirements:
The system was required to perform automation of the process of prisoners’ details, department
transactions and reports made through quick retrieval of required reports basing on the set
criteria. It ought to overcome the anomalies of the manual system.
Non-Functional Requirements:
The new system ensures that:
(a) A security system prevented unauthorized users from accessing the system. This was
achieved by using usernames and passwords and privileges.
(b) A recovery control system restored the databases to its previous/original consistent state in
case of a hardware or software failure. SQL was used in implementing the design as it supports
quick backup and restoration.
(c) A user accessible catalog provided description of the data in the database.
(d) A concurrency control system allowed shared access to the database. As the department
linked with other prisons throughout the country users, there would be concurrently accessing
since it was of preferred support of a higher number of users and the enormous traffic
Accessed by
Prisoner Prison Management
Allowed by
Visitor Jail Management
Checked by
Release Prison Management
INMATE_REG:
Kept by RELEASE:
Inmate_ID
Release_ID
Inmate
Admission_ID
Age
Is Admitted
VISITOR TRANSFER
Visitor_ID Transfer_ID
Admission_ID Admission_ID
Inmate_ID
Admission
Admission :
Admission id
Admission id Prisoner id Date Admitted Reason
Prisoner id
Date
Admitted Duration Case Type
Reason
Case Type
Duration
Registration Registration:
Prisoner id
Full Name
Prisoner id Full Name Nick Name Mother Name Age
Nick Name
Mother
Name
Gender Address DOB Type of Crime Date Arrested Education
Age
Gender
Address
DOB
Type of
Crime
Arrested
Education
Hargeisa Central Prison Admas University College
30 | P a g e
Visitor:
Visitor
Prisoner id
First Name
Second Name
Age
Gender
Address
Telephone
Relationship
to inmate
Release Release:
Release id
Admission id Release id Admission id Full Name Age
Full Name
Age
Gender Gender Type of Crime Date Release Duration Level
Type of Education
Crime Date
of Release
Duration Of
sentence
Level of
Education
Hargeisa Central Prison Admas University College
31 | P a g e
Transfer
Transfer id
Transfer:
Admission id
Full Name
Transfer id Admission id Full Name Gender
Gender
Transferred to
Reason for
Transfer
3.4 Normalization:
Database normalization is the process of organizing the fields and tables of a relational
database to minimize redundancy and dependency.
Normalization usually involves dividing large tables into smaller (and less redundant) tables and
defining relationships between them. The objective is to isolate data so that additions, deletions,
and modifications of a field can be made in just one table and then propagated through the rest of
the database via the defined relationships.
There are two goals of the normalization process: eliminating redundant data (for example,
storing the same data in more than one table) and ensuring data dependencies make sense (only
storing related data in a table).
Both of these are worthy goals as they reduce the amount of space a database consumes
and ensure that data is logically stored. There are several benefits for using Normalization in
Database and they are
2. Registration
Prisoner id Full Name Nick Name Mother Name Age Gender ……… Education
3. Visitor
4. Release
Release id Admission id Full Name ………….. Level Education
5. Transfer
1. Admission
2. Registration
Prisoner_id Full Name, Nickname, Mother Name, Age, Gender, Address,
DOB, Type of Crime, Date Arrested, Education.
3. Visitor
Visitor_id Prisoner_id, Admission_id, First Name, Second Name, Age,
Gender, Address, Telephone, Relationship to Inmate.
4. Release
Release_id Addmission_id, Full Name, Age, Gender, Type of Crime, Date
Release, Duration, Level of Education.
5. Transfer
Transfer_id Addmission_id, Full Name, Gender, Transferred From,
Transferred To, Reason for Transfer.
Third Normal Form (3NF):
3.5 Decomposing:
Is the process of splitting relations into multiple relations to eliminate anomalies and maintain
data integrity?
Insertion Anomaly:
It is a failure to place information about a new database entry into all the places in the
database where information about the new entry needs to be stored. In a properly
normalized database, information about a new entry needs to be inserted into only one
place in the database, in an inadequately normalized database, information about a new
entry may need to be inserted into more than one place, and human fallibility being what
it is, some of the needed additional insertions may be missed.
Deletion Anomaly:
It is a failure to remove information about an existing database entry when it is time to
remove that entry. In a properly normalized database, information about an old, to-be-
gotten-rid-of entry needs to be deleted from only one place in the database, in an
inadequately normalized database, information about that old entry may need to be
deleted from more than one place.
Update Anomaly:
An update of a database involves modifications that may be additions, deletions, or both.
Thus “update anomalies” can be either of the kinds discussed above.
All three kinds of anomalies are highly undesirable, since their occurrence constitutes corruption
of the database. Properly normalized database are much less susceptible to corruption than are
un-normalized databases.
After critically examining and understanding the requirements of the client the entire data
storage requirements are segmented into tables. The below tables are normalized to avoid any
anomalies during the course of data entry.
Data dictionary is used to support the delivery of environmental data by countries to report net;
the data dictionary also introduces the possibility of simple automated validation of deliverables
by countries and facilitates the development of data submission interfaces. The data dictionary is
structured in tables.
REGISTER TABLE
ADMISSION TABLE
VISITOR TABLE
RELEASE TABLE
TRANSFER TABLE
Visual Basic .NET is more than just a programming language; the secret to Visual Basic is in its
name” Visual”. With days Windows Operating System, a program must be able to interact with
the screen, Keyboard, mouse and printer graphically.
The environment provided by Visual Basic is suitable for any type of application. Using this
environment, the user can visually design the objects that your application uses. Visual Basic is
not just a languages, it’s an integrated development environment in which you can develop, run,
test and debug your applications.
Visual Basic supports the principle of object-oriented design. This means that you can
compartmentalize different aspects of your application as objects and develop and test those
objects independently of the rest of the application. By modifying certain properties and
invoking the methods of these objects, you exert a great deal of control over the user’s
interaction with the visual basic you’ve written. Although Visual Basic does not comply with
all the concepts and principles behind the object – oriented development model supported by
visual basic, it includes enough of these features to satisfy most ardent followers of object
oriented programming
As a database, it is a software product whose primary function is to store and retrieve data
as requested by other software applications, be it those on the same computer or those
running on another computer across a network (including the Internet). There are at least a
dozen different editions of Microsoft SQL Server aimed at different audiences and for
different workloads (ranging from small applications that store and retrieve data on the
same computer, to millions of users and computers that access huge amounts of data from
the Internet at the same time).
Stored procedures.
This is the first screen that loads when the user Enter the program
Login Form:
The login form allows a user to gain access to the software application.
This Main Form a user may get Forms, Reports and other information
Admission Form:
This is Admission Form and manages Admission Details like save, update& delete.
Registration Form:
Visitor Form:
This is Visitor Form and manages visitor details like save, update & delete.
Release Form:
This is Release Form and records the Criminal out of the prison
Transfer Form:
This is Transfer Form and Manages the Transfer of inmate to other prison
This is Creating User Form and is used for creating and adding users for the
previous users in the database
Change Password:
Visual studio .NET is the first windows development environment that gives developers
A fully integrated and robust reporting solution .crystal report is now installed with visual
Studio so developers can write applications that have reports seamlessly integrated into them.
Starting with visual basic ,crystal report was included with the language ,but not part of the
default installation .it was also a stand- alone product that was independent of the programming
language.
REGISTRATION REPORT:
ADMISSION REPORT:
VISITOR REPORT:
RELEASE REPORT:
TRANSFER REPORT:
4. Implementation:
Implementation is one of the most important stages in software development and in fact is the
final stage. It involves user training, testing the system and evaluation to decide that
software implementation is complete and successful. Implementation is the stage in which the
system developer starts to turn the design of the system into a functioning program. While
implementing the new system, a wide range of testing data is provided to the system
users to scrutinize how the system responds and copes with the testing data and correct if
any faults arise during the testing. Testing can be done by both the system developer and
by the user.
5. Testing:
System testing of software is testing conducted on a complete, integrated system to evaluate the
system's compliance with its specified requirements. System testing falls within the scope of
black box testing, and as such, should require no knowledge of the inner design of the code or
logic.
As a rule, system testing takes, as its input, all of the "integrated" software components that have
successfully passed integration testing and also the software system itself integrated with any
applicable hardware system(s). The purpose of integration testing is to detect any inconsistencies
between the software units that are integrated together (called assemblages) or between any of
the assemblages and the hardware. System testing is a more limiting type of testing; it seeks to
detect defects both within the "inter-assemblages" and also within the system as a whole.
Unit Testing:
Unit testing is a method by which individual units of source code are tested to determine if they
are fit for use. A unit is the smallest testable part of an application. In procedural programming a
unit may be an individual function or procedure. Unit tests are created by programmers or
occasionally by white box testers.
Ideally, each test case is independent from the others: substitutes like method stubs, mock
objects, fakes and test harnesses can be used to assist testing a module in isolation. Unit tests are
typically written and run by software developers to ensure that code meets its design and behaves
as intended. Its implementation can vary from being very manual (pencil and paper) to being
formalized as part of build automation.
Black box testing: Internal system design is not considered in this type of testing. Tests
are based on requirements and functionality.
White box testing: This testing is based on knowledge of the internal logic of an
application’s code. Also known as Glass box Testing. Internal software and code
working should be known for this type of testing. Tests are based on coverage of code
statements, branches, paths, conditions.
Alpha Testing:
The above different testing process described takes place in different stages of development as
per the requirement and needs. But a final testing is always made after a full finished product
that is before it released to end users and this is called as alpha testing. The alpha testing involves
both the white box testing and black box testing thus making alpha testing to be carried
out in two phases.
Beta Testing:
This process of testing is carried out to have more validity of the software developed. This takes
place after the alpha testing. After the alpha phase also the generally the release is not made fully
to all end users. The product is released to a set of people and feedback is got from them to
ensure the validity of the product. So here normally the testing is being done by group of end
users and therefore this beta testing phase covers black box testing or functionality testing only.
Figure 1.
Figure 2.
Figure 3.
Prisoner_Id:
Prisoner Name:
5.2 Conclusion:
Today the system is at the cross roads of innovation. The direction to take will only involve with
time and expertise, effort has to be taken seriously. The main tasks that this project focuses on
are to make a modern jail prisoners management system which controls and manages these
factors:
5.3 References:
Books Referenced:
Websites Referenced:
www.egovon line .net
www.w3schools.com
Wikipedia .org
www.scribd.com/prison
www.code project.com
www.google.com/writing IT projects.asp
www.freevbcode.com
The End
Hargeisa Central Prison Admas University College
60 | P a g e