Professional Documents
Culture Documents
ABSTRACT
ABSTRAK
CHAPTER I
INTRODUCTION
the target users, function and the technology of the to-be system. Project significance
will describe the benefit and the important of the to-be system for the user. Meanwhile,
expected output will describe the final output of the to-be system. The conclusion
summarizes this chapter and gives an introduction of the next chapter.
1.1
Project Background
The project that will be,developed is Prison Management System (PRMS) for the
use of Prisons Department Malaysia under the Ministry of Internal Security in
effectively managing the prison data and also more to the database management. The
users for this system are Database Administrator (DBA) and System Administrator
(SA). DBA can do all the activities like data backup and recovery, creating dynamic
SA will register the new prisoner and all the other detail into the system and
process all the information of the prisoner. After the registration, system administrator
will update the data and do all the given modules in this system.
The existing system is still using both computer and manual file system such as
interview requests by the relatives of the prisoner. To solve this problem, this project
will automate business process and plus, other modules will be added to the system like
adding the specific interface that required all the information about prisoner and their
relatives.
1.2
Problem Statement
1.
2.
3.
Usually, to create table for example, user is not required to give their own
parameter likes number of columns and have to know the syntax.
4.
5.
DBA usually does the backup and recovery file by using some certain wizard.
DBA has to make sure that the wizard can help to backup all the data in the table
or small amount of data in some table.
6.
In existing system, when the user wants to see the report, user chooses the
reports that are listed in the interface only. All the parameter is set to generate the
summary of the report.
1.3
Objective
2.
3.
4.
To allow the system administrator to grant and revoke the system and object
privilege to other user.
5.
To provide the data backup and recovery function by using system interfaces.
6.
1.4
Scope
The scope will explain the boundaries of this project and in order to develop a
system for users in Prisons Department Malaysia that enable them to manage the
prisoner registration and reports. Deliverables of the project will be a complete system
for users that will meet the objectives.
The target users for this Prison Management System (PRMS) are System
Administrator (SA) and Database Administrator (DBA) of Prisons Department
Malaysia.
1.4.2 Function
1.
Insert/Update/Delete/Search
User will insert a new prisoner, update the data, or delete the data of the prisoner
and search some data that related to the prisoner details.
2.
Trigger
Make a trigger to keep track of all the changing of data.
3.
Stored Procedure/Function
For this PRMS, user can use the given interfaces to query the stored procedure or
function. For example, search for number of prisoner who will release for the
next month.
4.
5.
7.
Dynamic Report
User can enter their own parameter to view the report such as by choosing the
number of prisoner and the age. It will show the result of prisoner in what age are
the highest numbers.
1.4.3 Technology
1.
This project will use Microsoft Windows XP Professional as a platform for the
operating system.
2.
3.
This project will use Oracle9i Forms Developer to develop the system interface.
4.
This project will use Oracle9i Application Server as the application server for the
system.
1.5
Project Significance
With the implementation of this project, the Prisons Department Malaysia can
change the existing system to this system so that the DBA can do works more easy to
ensure the data are completely secured and have a backup if something bad happen to
the system and database.
This system also to make sure that all the processes in the modules are doing in
the interfaces expect for the trigger module. The interfaces are link to the Oracle9i
database and the new data that inserted in the interface will be store in database.
In addition, the PRMS also creates a safe way in the matter of managing the
prisoner's information. This is due to the need of username and password in order to use
the system. So, the PRMS can be accessed only by authorized users which are the DBAs
and SAs. Here, the system is protected from intrusion of unauthorized users.
1.6
Expected Output
The expected output from this project is Prison Management System (PRMS).
This project is system-based. It will be used by user to manage all the prisoner data and
protect from unauthorized users.
The users of this system are two SA of the Prisons Department Malaysia. SAs
are the only authorized users to add, update and delete the data and to can list back all
the transactions of data and also generate report.
Meanwhile, for data backup, DBA will make a backup to the backup file and will
be store in any location or path in the DBA computer. If the data are lost -or missing in
the database, this text files data can be recovery.
For the trigger, which is not included in any interface, DBA will do in the
database the trigger just to keep track of all the incoming data. DBA will set the time
when the trigger will be doing. Other than that, DBA will generate the several of
dynamic report to view the result of some data likes how many prisoners will be release
next year.
The results of literature review will be one of the expected outputs of this system
because it will help to prove the contents of the PRMS are valid and reasonable. Lastly,
the user manual for the PRMS will be produce in a last phase of the system to make the
user more understand about the PRMS.
1.7
Conclusion
CHAPTER I1
2.1
Introduction
This chapter describes about facts and findings on the Prison Management
System (PRMS) gathered from some sources. Several sources from the internet and
interview methods that relevant to PRMS are studied.
The first part that covers on this chapter is literature review. It gives a summary
and an evaluation of previous research or work on a topic. It is important to discover
how the project is related to the work of others and provide background information
needed to understand the project.
The following part of this chapter focused on the project methodology, project
requirements, and project schedule and milestones. The project requirements include
software, hardware and other requirements. The conclusion will summarize about this
chapter.
2.2
2.2.1 Technique
For PRMS, techniques to obtain the facts and finding are by interview the
Officer of Penjara Alor Setar, Kedah and a little research on that organization. The
sample of questions are 'Do the prison department still using manual file system to the
certain case or fully computerized system', 'Do the dependent detail is compulsory',
'Parole request case' and many more. For the result, not every prison in Malaysia is
using the same prison system. It depends on the type of the prison in every state in
Malaysia. For example, Penjara Alor Setar is only for Banduan Tahanan Reman so their
system is simpler than the other prisons that have the heavy-hitting criminal. The
permission letter for the research in the Penjara Alor Setar is show in Appendix J.
Other than that, all interview requests by the relatives of the prisoners need to be
recorded and tracked. Most of the prisons still using manual method which is wrote in a
guest book. The programming tool that is used in this system is web programming
language like HTML. The colors of the system are white, red and grey.
-9 &&beirdc
Jab-.
,*.,.g.n
Foto Institmi
W m a -am111
,,I(
hom.l."l.n 4 d . n b l d . n . M . r n . (
+)aua
+ Fehxl
+ hlar
+M
+%
,
.
3
Pl~m
Y P -el
T-
P a a q Dl Pmwa Pew
- .
This case study is based on observation and researching in Lock & Track
Offender Management (htt~:Nwww.locktrack.com/index.html).Lockworks LLC is
controlling data management for the corrections professional: comprehensive, flexible
solutions for jail and prison management. This system provides two version which are
web-based (online) and system-based (desktop).
Lockworks LLC
I+.l.
- T d I zCONTROL N O T h* a
!Lo&Wo*
p o ~ i d e rrolutionr that rtartm'th LldivMualbsd
inerm~~recornm?daHons
and wrtom l n r t a b f b n and
jmna3emmt
Syrtem that prorider irnmedlate
to
jamrate,
and drtalied datl about .,fenderr
and
:*ah%
We
M t o m n km n d a@$
RPOR
I* 24-7
and
'lnmrter. LodgTrar). manaqec ynvr data from invertigarmn to
'bookw& through r e n h n a = h i a h o n and parole.
icontact ur now to learn h a w wlU mrb! an l n b m t l o n rich
:-mad
m m r for your jail:
LOC'KBTRACIi Prison hlanagernent sptern !
15 a wmprehenrire, simple and alfordabte roiution*fth the
: ,,866.664,4,85
apdirV to streamline Uw intake and a x k i n g p r o c ~ r e of
r
modern conechonr facilities
,Enter mr monthk dradng for rm free mffee m q s and
iSearde'r Bert Coffee. W v c 4 h d r , YJ la,&w?)xhp b.
*f*
;info
Ul.-m
;luWH.hukhl(-
~ . I U * u r ( r . f " - 4 ~ ~ ~
; h Y . . l ~ . L * m ~
!errlu(hRY..lr*Y",.I*Lr
j-h--whI-HI)-
jM*rrb&whrrrrac-ad
j~,-.~-t.1.~-ac--aw-
1!
when the user wants to update the parole appointment of the prisoners. The important of
using this database triggers is to track all the updated data and keep it in the log table.
Syntax to create trigger using Oracle 9i that retrieve from the website,
(http://www.ss64.com/ora~triaaerc.htm1) and the example of trigger are:
[ R E F E R E N C I N G [NEW A S <new-row-name>]
[OLD A S <old-row-name>]]
[FOR EACH ROW [WHEN (<trigger-condition>)]]
Example;
CREATE OR REPLACE TRIGGER AFTER-UPDATE
-PAROLE
AFTER UPDATE
ON PAROLE
REFERENCING NEW AS NEW OLD AS OLD
FOR EACH ROW
DECLARE
ACT VARCHAR2 ( 1 )
BEGIN
INSERT INTO UPDATE-PAROLE-LOG
(CURRENT-APPOINTMENT-DAY,CURRENT-APPOINTMENT-MONTH,CURRENT
-APPOINTMENT-YEAR, DESCRIPTION)
2.
This system will be used stored procedure to the certain event like when the user
wants to login to the PRMS and to clear the form in the system. Syntax to create a
procedure using Oracle 9i that retrieve from the website, (htt~://www.ss64.com/ora/
p c e d u r e c.html) and the example are:
CREATE
[schema.
1p r o c e d u r e - n a m e
(options)
CREATE
[ s c h e m a . ] p r o c e d u r e-n a m e
CREATE
(options)
('string')
[ s c h e m a . ] p r o c e d u r e-n a m e
(options)
(argument)]
(parameters)1
options:
a r g u m e n t I N [NOCOPY] d a t a t y p e
a r g u m e n t OUT
[NOCOPY] d a t a t y p e
a r g u m e n t I N OUT [NOCOPY] d a t a t y p e
(The procedure can have s e v e r a l a r g u m e n t s s e p a r a t e d with commas)
Example;
P r o c e d u r e C h e c k-P a c k a g e-F a i l u r e I S
BEGIN
I F NOT
( F o r m-S u c c e s s
THEN
R A I S E F o r m-T r i g g e r-F a i l u r e ;
END I F ;
END;
3.
According to Database Management System User Guide (2002), the following methods
are valid for backing-up an Oracle database:
Cold or Off-line Backups - Shut the database down and backup up ALL data,
log, and control files.
RMAN Backups - While the database is off-line or on-line, use the "man"
utility to backup the database.
Here, the steps to make a data backup manually using Oracle 9i:
There are two types of backups which are logical backups and physical backups.
In Oracle, use export utility to perform logical backups, and import utility to perform
logical recovery. There are four modes for export and import utility which are full,
tablespace, table and user.
C:\>set oracle-sid
<database-name>
<file-name.dmp> full
2I
. .) >
/owner
<user>
backup2.dmp owner
system
<database-name>
y /tablespace
touser
<file-name.dmp> full
<tablespace-name> /fromuser
<user-receiver> /tables
<user-sender>
4.
system touser
backup2.dmp fromuser
bob
Grant Privilege
..
Based on the article, Control Access with Oracle Grant Security (2003), Object
privileges assign the right to perform a particular operation on a specific object. Here are
some examples of object privilege assignment:
-
I create
1 grant
1 grant
1 grant
5.
role staff;
s e l e c t , u p d a t e on p r i s o n e r t o s t a f f ;
s e l e c t on i t e m-t a b l e t o s t a f f ;
s t a f f t o 5100, 5101;
Revoke Privilege
For example, if you wanted to revoke delete privileges on a table called suppliers
from a user named anderson, you would execute the following statement:
revoke delete on suppliers from anderson;
If you wanted to revoke all privileges on a table, you could use the all keyword.
For example:
revoke all on suppliers from anderson;
r--
If you had granted privileges to public (all users) and you wanted to revoke these
privileges, you could execute the following statement:
revoke all on suppliers from public;
2.2.4
more manageable and efficient especially for the DBA to manage all the data. This to-be
system is more to back-end user so the DBA works will be much easier to manage the
data and make sure the data is secured.
Comparing the both current system, their system are not using the database
function like creating a dynamic table, backup and recovery, or even grant or revoke an
system privilege using the system interfaces. All the works are not stated in their system
so only Database Administrator (DBA) knows it.
To-be system will develop the database function such as creating a dynamic
table, backup and recovery, or even grant or revoke a system and object privilege using
the system interfaces. It also will designed an in-out register to keep track all prisoners
and others who move in and out for various reasons and include provisions for recording
the prisoners sent to courts for hearing. Table 2.1 show the comparison between PRMS
and the two existing system.
PRMS
Prisons Department
Lockworks LLC
Malaysia Portal
Yes
No
No
Yes
No
Yes
Yes
No
No
Yes
No
No
on the system
interfaces
Dynamic report
generate on the
system interfaces
Create dynamic table
on the system
interfaces
Grant and revoke
privilege on the
system interfaces
2.3
Project Methodology
This section will explain about the methodology used to develop the system.
The Iterative Waterfal1:Model that shows in Figure 2.2 is the approach that has been
used to implement the Structured System Analysis and Design Method (SSADM). This
model has been choosing because when a stage is not successful, previous stages will
often require revision. The phases involved in the SSADM are:
2.3.1 Planning
At this phase, all the requirements are gathered by using interview method and
some. The data requirements document is used to agree requirements with clients. To
make sure that it is easily understood, it should not be overly formal or highly encoded.
Furthermore during this time a consistent Gantt chart was developed for the project
management.
2.3.2 Analysis
Data analysis begins with the statement of data requirements and then produces a
conceptual data model. The aim of analysis is to obtain a detailed description of the data
that will suit client's requirements so that both high and low level properties of data and
their use are dealt with. These include properties such as the possible range of values
that can be permitted for attributes. The conceptual data model provides a shared, formal
representation of what is being communicated between clients and developers during
database development. The current system is analyzed using the UML Class Diagram.
Meanwhile the to-be database systems are analyzed using Context Diagram and Data
Flow Diagram.
2.3.3 Design
Database design starts with a conceptual data model and produces a specification
of a logical schema. This will usually determine the specific type of ORACLE database
system (network, relational, object-oriented) that is required, but not the detailed
implementation of that design. The Data Flow Diagram and Context Diagram from
2.3.4 Implementation
2.3.5 Testing
2.4
Project Requirements
This part describes the software, hardware and other requirements for the
development of Prison Management System (PRMS).
The required software for the development of this system is as described in the
Table 2.2.
1.
Network Requirements:
The network will be required to test the completed project and the requirement is
Local Area Network (LAN) cable that will be used to convert the computers to form
client-server architecture. The web browser that recommended is Mozilla Firefox.
2.5
This section will state the Project Schedule and milestones which will be main
time frame guideline for the project. Schedule date starts from the briefing from the
client and ends by the presentation of initial project. Table 2.4 shows the project
milestone. For the Gantt Char4 refer Appendix A.
Table 2.4: Project Milestones
requirements.
2
2.1.2008
11.1.2008
Project Proposal
12.1.2008
15.1.2008
Report of
proposal.
I methodology documentation
II
I
I to clients.
1I
1 Prepare for project analysis. 1
16.1.2008
2 1.1.2008
I
1
I and Project
1 Literature Review II
1I Methodology
1 Introduction,
I
1I
1
20.1.2008
26.1.2008
1 None
I
1 Report of Project
I1