Instant Download

Download your project material immediately after online payment.

Project File Details

Download the complete Computer science topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A WEB BASED PRISON INFORMATION MANAGEMENT SYSTEM here on See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.



100% Money Back Guarantee

Download the complete Computer science topic and material (chapter 1-5) titled DESIGN AND IMPLEMENTATION OF A WEB BASED PRISON INFORMATION MANAGEMENT SYSTEM here on See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.



The Project File Details

  • Type: PDF and MS Word (DOC)
  • Size: [1116KB]
  • Length: [76] Pages



Prisoners’ management in Nigeria has long been a neglected area and has only recently been included in the 2018 vision document under the e-governance. Currently, prisoner’s records are maintained in a very rudimentary way in the form of manual files and registers.The findings indicated that the number of inmates is escalating and the current manual system cannot handle the records well and the required operations in real time and efficiently is required. This method of data management often results in human error, delay to retrieve information etc. Thus, a Web based Prison Information System was designed and implemented to manage prisoner’s records for the Nigerian prison service Enugu in other to solve the problem of data security, accessibility, timely report production  and avoid redundancy. The objective of this project is to ensure the availability of data in digital form for preservation, analysis and reporting. To ensure that there is no impersonation of the prisoners. In order to achieve the above objectives, a method has to be used which is SSADM (structured system analysis and design method) which is systems approach to the analysis and design of information systems. This methodology has a relationship to waterfall model because it has stages that helped me create my web site. This project was done using Html (hypertext markup language), Css (cascading style sheet), JavaScript, php for server scripting and MySQL database was used to store and manage the prisoner’s records. They are the technologies used in designing the website. The technologies mentioned enabled me achieve a result of creating web based prison information management system.


Title page                                                                                                    i

Certification                                                                                                         ii

Approval                                                                                                    iii

Acknowledgement                                                                                                iv

Table of contents                                                                                        v

Abstract                                                                                                      vi

Table of contents                                                                                        vii

Table of figure                                                                                            viii

List of  table                                                                                                         x


1.0     Background of  study                                                                       1

1.1     Statement of  result                                                                           2

1.2     Objective of  the project                                                                    3

1.3     Significance of the project                                                                 3

CHAPTER  TWO: LITERATURE REVIEW                              

2.0     Introduction                                                                                                5

2.1     Theoretical Background                                                                    5

2.2     Review of Related Literature.                                                            7

2.3     Summary                                                                                          9


3.0     Introduction                                                                                     10

3.1     Description of the Existing System                                                   10

3.2     Analysis of the Proposed System                                                     11

3.3     Design of the Proposed System                                                                  12


4.0     Introduction                                                                                                24

4.1     Choice of Development Environment                                                         24

4.2     Implementation  Architecture                                                           26

4.3     Software Test                                                                                    29

4.4     Documentation                                                                                 30

4.41   User Manual                                                                                     30



5.1     Summary                                                                                          32

5.2     Conclusion                                                                                        32

5.3     Recommendation                                                                              33

References                                                                                                  34

Appendix                                                                                                   36








Fig3.1         Use Case Diagram                                                                             13

Fig 3.2        New Prisoner Registration                                                      19

Fig 3.3        Home page                                                                              20

Fig 3.4        Prisoner Detail                                                                        20

Fig 3.5        Admin Interface                                                                       21

Fig 3.6        Prisoner Information                                                               22

Fig 3.7        Prisoner Transfer Output                                                                  22

Fig 3.8        Prison Staff Interface                                                              23

Fig 3.9        User Interface                                                                          23














Table 3.1    Admin Table of  the Database­                                                 14

Table 3.2    Announcement Table of the Database                                              14

Table 3.3    Capacity Table of the Database                                                        15

Table 3.4    Court Table of the Database                                                    15

Table 3.5    New Prison Table of the Database                                          15

Table 3.6    Officer Table of the Database                                                  16

Table 3.7    Officer Detail of the database                                                  16

Table 3.8    Police Station tbl Table of the Database                                  17

Table 3.9    Registration Table of the Database                                          17

Table 3.10  Trasnfer Table of the Database                                                         18

Table 3.11  User_name Table of the Database                                           18

Table 3.12  Visitor Table of the Database                                                  18





Management of prisons in Nigeria has long been a neglected area which has recently been incorporated in the e-governance program of Government of Nigeria. Currently a rudimentary process of storing all the prisoner data in manual files and registers is in place. The Prison Information System project will integrate all the prisoner data into a single integrated system which will in turn result all the information being present in a digital format. ICT in prisons was initiated in the year 2002 at Delhi Prisons, Tihar[1]. The Tihar Prisons Complex in New Delhi is the biggest prison complex in Asia comprising of 9 prisons and one District Jail at Rohini with a total strength of more than 11,000 prisoners against a normal sanctioned capacity of 6250 prisoners. In a year about 70,000 – 80,000 inmates remain lodged in these prisons for different duration and crimes committed by them. This prison population has about 80% under trials and includes about 480 women inmates. About 400 inmates are foreigners from different parts of the world. Many high security criminals also live here. There has been a substantial increase in number of prison inmates coming to Tihar because of a phenomenal increase in the crime scene at Delhi that has resulted in the increase of the ICT needs and its management at the Tihar Jail Complex.

Nearly 1700-1800 visitors meet their relative inmates’ everyday. There was manual system of booking (meetings) in each jail for its respective inmates. Centralised visitor record was not available. There was lack of exchange of visitors’ information within jailsand prison headquarters. No provision for identification / detection / verification of visitors was there.


Managing the prisoner record and monitoring of prisoner / visitor was always difficult since most of the records were normally maintained manually, so the concerned authorities were required to go through all the registers to find out the details and status of the inmate as well as of the visitor.

In order to cope up with the increasing number of prisoners being lodged in, the Tihar Administration required a re-engineering and rationalization of their key business processes and functions of prisoners’ related information and their computerization in order to speed up the processing of information need of courts and various other national agencies[2].

As the technology evolution is taking place, there arose a need for centralization of prisoner’s data to facilitate information exchange and data sharing to the users of the prison. It shall reduce administrative overheads, speed up responsiveness to users, reduce risks involved in inmate’s custody, eliminated obsolete processes and reap cost-cutting benefits.



Management of prison’s in Nigeria is still at a nascent stage and follows rudimentary processes. Most of the prisons in Nigeria have a collection of manual files and registers to store prisoner/criminal records. This is a very inefficient and cumbersome way of storing records which greatly impedes the flow of critical information as well as makes looking up of information time consuming. Also, different files and registers arerequired to store the information which is relevant to a single prisoner. This hinders the profiling process of prisoners.





The main purpose behind the implementation of the Prison Information System (PIS) is to enhance the administrative capabilities of the jails in terms of monitoring and security of the prison while improving the efficiency and productivity of the Prisons. The objectives of the project are to develop system which can:

  • Makes sure there is proper monitoring of the prisons by the top officials
  • It ensures that the discipline and decorum of the jails is maintained by both the employees and the prisoners
  • To ensure that no impersonation of the prisoners happens by proper validation and authentication of the prisoner’s identity
  • To improve the productivity and efficiency of the prisons so as to facilitate the usage of the available work force for sensitive work while leveraging technology to reduce the mundane workload of the employees
  • Makes sure that there is availability of data in digital form for preservation, analysis and reporting.



The nature of project is such that outcome of project could be quantitatively measured only for few parameters such as

  • Automatic detection of duplication
  • Immediate generation of report on categorization of prisoners on basis of their cases, period of confinement etc.
  • Automatic calculation of Remission to be granted to a convict prisoner for good behavior, discipline etc.
  • Reduction in the cost (Saving of resources) of physical production of prisoners in Courts.





DISCLAIMER: All project works, files and documents posted on this website, are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Most of the project works are provided by the schools' libraries to help in guiding students on their research. Use it as a guidance purpose only and not copy the work word for word (verbatim). If you see your work posted here, and you want it to be removed/credited, please call us on +2348157165603 or send us a mail together with the web address link to the work, to We will reply to and honor every request. Please notice it may take up to 24 or 48 hours to process your request.