Get the complete project »
- The Complete Research Material is averagely 69 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
Table Of Content
List Of Figures
List Of Tables
1.1 Background Of The Study
1.2 Statement Of Problem
1.3 Objective Of The Study
1.4 Significance Of The Study
1.5 Scope Of The Study
1.6 Limitations Of The Study
1.7 Project Report Organization
1.8 Definition Of Terms
2.0 LITERATURE REVIEW
2.1 Database Management System
2.2 Management Information System (MIS)
2.3 Review Of Prison Management System
3.0 SYSTEM ANALYSIS
3.1 General Analysis Of The Existing System
3.2 Method Of Data Collection
3.3 Limitations Of Existing System
3.4 Proposed System
3.5 Advantages Of Proposed System
3.6 Input Analysis
4.0 SYSTEM DESIGN AND IMPLEMENTATION
4.1 Objective Of Design
4.2 Input Specification And Design
4.3 Output Specification And Design
4.4 Main Menu Design
4.5 Database File Design
4.6 Program Modules Specification
4.7 System Flowcharts
4.8 Program Flowchart
4.9 Choice Of Programming Language
4.10 System Requirement
5.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS
Appendix A (Source Code
1.1 BACKGROUND OF THE STUDY
Management of prisons in Nigeria has long been a neglected area which has recently been incorporated in the e-governance program of Government of Nigeria. Currently a rudimentary process of storing all the prisoner data in manual files and registers is in place. The Prison Management System project will integrate all the prisoner data into a single integrated system which will in turn result all the information being present in a digital format.
ICT in prisons was initiated in the year 2002 at Delhi Prisons,
Tihar. The Tihar Prisons Complex in New Delhi is the biggest prison
complex in Asia comprising of 9 prisons and one District Jail at Rohini
with a total strength of more than 11,000 prisoners against a normal
sanctioned capacity of 6250 prisoners. In a year about 70,000 - 80,000
inmates remain lodged in these prisons for different duration and crimes
committed by them. This prison population has about 80% under trials
and includes about 480 women inmates. About 400 inmates are foreigners
from different parts of the world. Many high security criminals also
live here. There has been a substantial increase in number of prison
inmates coming to Tihar because of a phenomenal increase in the crime
scene at Delhi that has resulted in the increase of the ICT needs and
its management at the Tihar Jail Complex.
Nearly 1700-1800 visitors meet their relative inmates’ everyday. There was manual system of booking (meetings) in each jail for its respective inmates. Centralized visitor record was not available. There was lack of exchange of visitors’ information within jails and prison headquarters. No provision for identification / detection / verification of visitors was there.
Managing the prisoner record and monitoring of prisoner / visitor was always difficult since most of the records were normally maintained manually, so the concerned authorities were required to go through all the registers to find out the details and status of the inmate as well as of the visitor.
In order to cope up with the increasing number of prisoners being lodged in, the Tihar Administration required a re-engineering and rationalization of their key business processes and functions of prisoners’ related information and their computerization in order to speed up the processing of information need of courts and various other national agencies.
As the technology evolution is taking place, there arose a need for centralization of prisoner’s data to facilitate information exchange and data sharing to the users of the prison. It shall reduce administrative overheads, speed up responsiveness to users, reduce risks involved in inmate’s custody, eliminated obsolete processes and reap cost-cutting benefits.
1.2 STATEMENT OF PROBLEM
Management of prison’s in Nigeria is still at a nascent stage and follows rudimentary processes. Most of the prisons in Nigeria have a collection of manual files and registers to store prisoner/criminal records. This is a very inefficient and cumbersome way of storing records which greatly impedes the flow of critical information as well as makes looking up of information time consuming. Also, different files and registers are required to store the information which is relevant to a single prisoner. This hinders the profiling process of prisoners.
1.3 OBJECTIVE OF THE PROJECT
The main purpose behind the implementation of the Prison Management System (PMS) was to enhance the administrative capabilities of the jails in terms of monitoring and security of the prison while improving the efficiency and productivity of the Prisons. The main goals of the project are enunciated below:
To ensure proper monitoring of the prisons by the top officials
To ensure that the discipline and decorum of the jails is maintained by both the employees and the prisoners
To ensure that no impersonation of the prisoners happens by proper validation and authentication of the prisoner’s identity
To improve the productivity and efficiency of the prisons so as to facilitate the usage of the available work force for sensitive work while leveraging technology to reduce the mundane workload of the employees
To ensure the availability of data in digital form for preservation, analysis and reporting.
1.4 SIGNIFICANCE OF THE PROJECT
The nature of project is such that outcome of project could be quantitatively measured only for few parameters such as
Automatic detection of duplication
Immediate generation of report on categorization of prisoners on basis of their cases, period of confinement etc.
Automatic calculation of Remission to be granted to a convict prisoner for good behavior, discipline etc.
Reduction in the cost (Saving of resources) of physical production of prisoners in Courts.
1.5 SCOPE OF THE PROJECT
The basic purpose of this project is to develop an online system for prison management. The system developed covers prisoner’s information such as picture, conviction, offense, visitors, address, jail term record etc.
1.6 LIMITATIONS OF THE PROJECT
Generally, a study of this nature would have some constraints such as time, money and data collection method. I wish to say that data collection method used has the limitation of rigidity (people finding it difficult to respond to questions) thereby restricting the information obtained.
Also lack of finance is another obstacle that hindered a wider consultations and research on the project. Some materials may have some cost implications which may be above the budgeted money for the research work.
1.7 PROJECT REPORT ORGANIZATION
The project is organized as follows;-
Chapter one introduces the background of the project with the statement of the problems, objectives of the project, its significance, scope, and constraints are pointed out. Previous literature on prison management information system were reviewed in Chapter two. Chapter three discusses system Investigation and Analysis. It deals with detailed investigation and analysis of the existing system and problem identification. It also proposed for the new system. Chapter four covers the system design and implementation. Chapter five was the summary and conclusion of the project.
1.8 DEFINITION OF TERMS
Data- This can be defined as facts about the organization and its business transaction.
Information- This can be defined as data that has been transformed and organized by processing and purposeful intelligence.
Information system- This is an arrangement of people, data, processes and interface that interact to support and improve day to day operation in a business as well as support the problem solving and decision making needs for management and users.
Management: It is the co-ordination of all the resources of an organization through the process of planning, organization, directing and controlling in order to attain organizational objectives.
You either get what you want or your money back. T&C Apply
Share a Comment
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE1.0 INTRODUCTIONComputerized Traffic Offense System is a powerful web based and database program that records all the traffic offenses comm...Continue Reading »
68 pages | 692 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY Information and communication technology (ICT) offers the promise of fundamentally changing the l...Continue Reading »
60 pages | 393 hits | Source: COMPUTER SCIENCE
» In virtually any job whether it is clerical technical, business, or professional whether it is banking, manufacture, medicine, or retailing compare ar...Continue Reading »
61 pages | 339 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Children are heritage of the cord and the fruit of the womb is his reward. As arrows are in the h...Continue Reading »
45 pages | 369 hits | Source: COMPUTER SCIENCE
5. DESIGNING AND IMPLEMENTING A TRANSACTING SYSTEM OR AN ATM MACHINE. A CASE STUDY OF ECO BANK PLC, OBOSI ONICHA).» CHAPTER ONE 1.0 INTRODUCTION The computerization of the banking/financial sector of the economy has really helped eliminate the manual operation of th...Continue Reading »
45 pages | 274 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Markus (2008) defines e learning as a learning process created by interaction with digitally deli...Continue Reading »
66 pages | 517 hits | Source: COMPUTER SCIENCE
» ABSTRACTOrganizations like Banks give loan to their customers based on certain conditions given by the loan scheme management board. These conditions ...Continue Reading »
50 pages | 331 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 Background of the Study A digit is a numeric symbol (such as "2" or "5") used in combination...Continue Reading »
52 pages | 421 hits | Source: COMPUTER SCIENCE
9. DESIGN AND IMPLEMENTATION OF A UNIVERSITY ELECTRONIC EXAMINATION TIME TABLE (A CASE STUDY OF SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY)» CHAPTER ONE 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY Time table is a structured schedule of an event with time at which they occur, especially tim...Continue Reading »
67 pages | 336 hits | Source: COMPUTER SCIENCE
10. DEVELOPMENT OF AN ENHANCED CHECKPOINTING TECHNIQUE IN GRID COMPUTING USING PROGRAMMER LEVEL CONTROLS» CHAPTER ONE INTRODUCTION 1.1 Background of the Study Grid computing uses a computer network in which each computer's resources are shared with every o...Continue Reading »
59 pages | 62 hits | Source: COMPUTER SCIENCE