28
TH DEVELOPMENT OF PRISON MANAGEMENT SYSTEM PRMS ) NADATUL IFFAH BINTI B U HASAN This repor t is submitted n partial fulfilment of the requi rements for the Bachelor of Compute r Science Database Management) FACULTY OF INFORMATION AND COMMUNICATIO N TECH NOLOGY UNIVERSITI TEKNIK L MALAYSIA MEL K 2008

The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

Embed Size (px)

Citation preview

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 1/27

TH DEVELOPMENT

OF

PRISON MANAGEMENT SYSTEM PRMS)

NADATUL IFFAH BINTI BU HASAN

This report is submitted n partial fulfilment of the requirements for the

Bachelor of Computer Science Database Management)

FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY

UNIVERSITI

TEKNIK L

MALAYSIA

MEL K

2008

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 2/27

  BSTR CT

The development of Prison M anagement System (PRM S) is used to manage the

prisoner information including their dependents, cases, cells and also the parole requests.

The purpose of this system is to make a user-friendly system to both users which are

System Adm inistrator (SA) and Database Adm inistrator (DBA). With this system, DBA

will do m ost of their work such s grant or revoke system and object privilege to other

user, make the backup and recovery for the selected data, create a dynamic table and

produce the dynamic report by using the system interfaces in the PRMS. This system is

developed by using Oracle9i as the database management system. Meanwhile, Oracle9i

Application Server is used as application server in the server side and the Oracle9i

Forms Builder is used s the tool to design the system interfaces nd used to code

PRMS. The Iterative waterfall model is the chosen methodology to develop th is system.

The database methodology for the PRMS is Structured System Analysis and Design

Method (SSADM ) and it is implemented along with the system development process to

ensure the objectives of the project can be fulfilled. The features like password security

by using encryption, generating dynamic report and tracing the logon user are included

in this system. The frnal result or the expected output of this project is the development

of system for the use o f prisons staff to manage the prisoner information, which is

PRMS.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 3/27

  BSTR K

Sistem Pengumsan Penjara PRMS) adalah sistem yang digunakan untuk

menguruskan maklumat pesalah termasuk maklumat penjaga, kes yang terlibat, tempat

kumngan serta permohonan parol. Tujuan utama sistem ini dibangunkan ialah untuk

menyediakan sistem yang mesra pengguna terutamanya kepada pengguna sistem ini

iaitu Pentadbir Sistem SA) dan Pentadbir Pangkalan Data DBA). Dengan adanya

sistem ini, DBA boleh melakukan kerja-kerja seperti memberi kebenaran atau menarik

kembali keistimewaan akses ke atas sistem dan objek, membuat data sokongan dan

pemulihan data, menghasilkan jadual dinamik dan menghasilkan laporan dinamik

dengan hanya menggunakan antara muka sistem. Sistem ini dibangunkan dengan

menggunakan Oracle9i sebagai sistem pegmsan pangkalan data. Selain itu, Oracle9i

Application Server digunakan sebagai pelayan sistem di dalam komputer pelayan dan

Oracle9i Forms Builder digunakan sebagai perisian atau alat untuk menghasilkan antara

muka dan mengkodkannya. Model Iterative W aterfall digunakan sebagai kaedah untuk

membangunkan sistem ini. Sementara itu, langkah-langkah dalarn Teknik Struktur

Analisis dan Reka Bentuk di gunakan untuk membangunkan pangkalan data untuk

PRMS. Selain daripada itu, ciri-ciri tambahan yang di aplikasikan di dalam sistem ini

ialah seperti perlindungan sekuriti untuk kata lauan pengguna, menghasilkan laporan

dinamik dan meyimpan data pengguna yang m e n d a h masuk ke sistem. Hasil akhir

daripada projek ini adalah PRM S.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 4/27

CHAPTER

I

INTRODUCTION

This chapter contains project background, problem statement, objective, scope,

project significance, expected output of the system and the conclusion of this chapter.

Project background describes briefly about the project that will be developed. The

problem statements will state the problems that encountered in the existing system or

current system. For the objective, it is about the aim for the development of the to-be

system in order to solve of the problem in the existing system while scope covers

the target users, function and the technology of the to-be system. Project significance

will describe the benefit and the important of the to-be system for the user. Meanwhile,

expected output will describe the final output of the to-be system. The conclusion

summarizes this chapter and gives an introduction of the next chapter.

1 1 Project Background

The project that will be ,developed is Prison Management System PRM S) for the

use of Prisons Department Malaysia under the Ministry of Internal Security in

effectively managing the prison data and also more to the database management. The

users for this system are Database Adm inistrator DB A) and System Administrator

SA). DBA can do all the activities like data backup and recovery, creating dynamic

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 5/27

tables grants or revoke a system or object privilege to user stored procedure or

function and generate report by using system interface. This system is also to make sure

that DBA can do all the transaction by using this user-friendly interface not only by

doing all that in the database.

SA will register the new prisoner and all the other detail into the system and

process all the information of the prisoner. After the registration system adm inistrator

will update the data and do all the given m odules in this system.

The existing system is still using both computer and manual file system such as

interview requests by the relatives of the prisoner. T o solve this problem this project

will autom ate business process and plus other mod ules will be added to the system like

adding the specific interface that required all the information about prisoner and their

relatives.

1 2 Problem Statement

Th e following prob lems are identified to develop this system:

1

Limited usage of database trigger

The database triggers are not widely use in the current system. The usage of the

trigger is limited to important data for example trigger will be used to set a time

when D BA w ant to m ake a backup.

2 Lim ited usag e of stored procedure

DB A has to open the database to run the stored procedure or function. It is hard

to d o that because it wastes a lots o f time.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 6/27

3

Not using dynamic table structure

Usually to create table for example user is not required to give their own

parameter likes number o f columns and have to know the syntax.

4

System administrator is not allow to give system and object privilege

Currently system administrator canno t give a system or object privilege to other

user in the system and only DB A will do that.

5

Using wizard for Data Backup and Recovery

DBA usually does the backup and recovery file by using some certain wizard.

DBA has to make sure that the wizard can help to backup all the data in the table

or small amo unt of data in som e table.

6

Produce a static report

In existing system whe n the user wan ts to see the report user choos es the

reports that ar e listed in the interface only. All the param eter is set to gene rate the

summ ary of the report.

1 3 Objective

The aims o f the

PRMS

develop ment are:

1

To ap ply and widely use th e database trigger.

2

To app ly stored procedure or function in the system by using the interface.

3

T o allow user to use dynam ic table structure.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 7/27

4

To allow the system administrator to grant and revoke the system and object

privilege to other user.

5

To provide the data backup and recovery function by using system interfaces.

6

To produce the dynamic report.

1 4 Scope

The scope will explain the boundaries of this project and in order to develop

system for users in Prisons Department Malaysia that enable them to manage the

prisoner registration and reports. Deliverables of the project will be a complete system

for users that will meet the objectives.

1 4 1 Target user

The target users for this Prison Management System PRMS) are System

Administrator SA) and Database Administrator DBA) of Prisons Department

Malaysia.

1 4 2 Function

The modules that the PRMS will provide:

1 Insert/Update/Delete/Search

User will insert a new prisoner, update the data, or delete the data of the prisoner

and search some data that related to the prisoner details.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 8/27

2

Trigger

M ake a trigger to keep track of all the changing of data.

3

Stored Procedure/Function

For this PRMS user can use the given interfaces to query the stored procedure o r

function. For example search for number of prisoner who will release for the

next month.

4 Create dyna mic table structure

User can give their own parameter such as number of column to create a table

and it become easier to DB o crea te table in jus t one interface.

5

Gran t and revoke privilege

Give a grant or revoke to some user. Grant is included system privilege and

object privilege.

6 Data Backup an d Recovery

Users can use this PRMS to make the backup so that it can save much time by

not opening -the new wizard. DB also can make the recovery for the data to

mak e sure that the data are safe.

7

Dynamic Report

User can enter their own parameter to view the report such

s

by choosing the

numb er of prisoner and the age. It will show the result of prisoner in what a ge are

the highest numbers.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 9/27

1 4 3 Technology

List of technology that w ill be used in this system:

1

This project will use Microsoft Windows XP Professional as a platform for the

operating system.

2

This project will use Oracle9i and as a DB MS.

3

This project will use Oracle9i Forms Developer to develop the system interface.

4

This project will use Oracle9i Application Server as the application server for the

system.

1 5 Project Significance

Prison Management System PR M S) is aimed at developing prison

managem ent system that is a -collection of registers and reports for the effective

management of prisons. This system is useful for user to manage and store the data of

the prisoners.

With the implementation of this project, the Prisons Department Malaysia can

change the existing system to this system so that the DBA can do works more easy to

ensure the data are completely secured and have a backup if something bad happen to

the system and database.

This system also to make sure that all the processes in the m odules are doing in

the interfaces expect for the trigger module. The interfaces are link to the Oracle9i

database and the new data that inserted in the interface will be store in database.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 10/27

In addition, the PRMS also creates a safe way in the matter of managing the

prisoner s information. This is due to the need of username and password in order to use

the system. So, the PRMS can be accessed only by authorized users which are the DBAs

and SAs. Here, the system is protected from intrusion of unauthorized users.

1 6

xpected Output

The expected output from this project is Prison Management System (PRMS).

This project is system-based. It will be used by user to manage all the prisoner data and

protect from unauthorized users.

The users of this system are two SA of the Prisons Department Malaysia. SAs

are the only authorized users to add, update and delete the data and to can list back all

the transactions of data and also generate report.

Meanwhile, for data backup, DBA will make a backup to the backup file and will

be store in any location or path in the DBA computer. If the data are lost -or missing in

the database, this text files data can be recovery.

For the trigger, which is not included in any interface, DBA will do in the

database the trigger just to keep track of all the incoming data. DBA will set the time

when the trigger will be doing. Other than that, DBA will generate the several of

dynamic report to view the result of some data likes how many prisoners will be release

next year.

The results of literature review will be one of the expected outputs of this system

because it will help to prove the contents of the PRMS are valid and reasonable. Lastly,

the user manual for the PRMS will be produce in a last phase of the system to make the

user more understand about the PRMS.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 11/27

1 7

Conclusion

After identifying the project background problem statements objective scope

project significance and expected output it reveals that PRMS is adeq uate to solve the

problem faced by DBA of Prisons Department Malaysia such as inefficient of backup

method time consu ming low level of security and secrecy of data and others. Each

aspect gives an overall understanding for user that will be using the

system. This to-be

system will develop system interfaces to make DB A work effortlessly. For examp le d o

the data backup and recovery w ithout using an y wizard.

The identification of this chapter will be used as a guide to develop the next

phases which are Literature Review and Project Methodology. The m ethodology

requirements an d schedule of the system also w ill be highlighted in the next chapter.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 12/27

CHA PTER I

LITERATURE REVIEW AND PROJECT METHODOLOGY

2 1

Introduction

This chapter describes about facts and findings on the Prison Management

System PRM S) gathered from som e sources. Several sources from the internet and

interview m ethod s that relevant to PRM S are studied.

The first part that covers on this chapter is literature review. It gives a summary

and an evaluation of previous research or work on a topic. It is important to discover

how the project is related to the work of others and provide background information

needed to understand the project.

The following part of this chapter focused on the project methodology, project

requirements, and project schedule and milestones. The project requirements include

software, hardware and other requirements. The conclusion will summarize about this

chapter.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 13/27

2 2 acts and inding

The Prison Management System (PRMS) is under the Prisons Department

Malaysia. The development of this PRMS is focused to the managing and reporting data

for prisoner details. D atabase Administrators (DBAs) can d o their job where it leads to

more manageable, systematic and easy way. Things that will be research are like how

the existing systems operate, the existing system, the usage of the admin side to the

system such as stored procedure, trigger, backup and recovery, producing report and

grant or revoke privilege to the user. Facts and finding will be helped in guiding the

development of the PRMS.

2 2 1 Technique

For PRMS, techniques to obtain the facts and finding are by interview the

Officer of Penjara Alor Setar, Kedah and a little research on that organization. The

sample of questions are Do the prison department still using manual file system to the

certain case or fully computerized system , D o the dependent detail is compulsory ,

Parole request case and many more. For the result, not every prison in Malaysia is

using the same prison system. It depends on the type of the prison in every state in

Malaysia. For example, Penjara Alor Setar is only for Banduan T ahanan Reman so their

system is simpler than the other prisons that have the heavy-hitting criminal. The

permission letter for the research in the Penjara Alor Setar is show in Appendix

J.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 14/27

2 2 2

Existing System

Case Study

1:

Prisons Department M alaysia O fficial Online Portal

This case study is based on observation and researching in Prisons Department

Malaysia http://www.prison.aov.m~).This online system is more to front-end user and

the user of this system is anyone who can access the website.

This webpage is only to give information generally about Prisons Department

Malaysia including user can view and order products that have been made by prisoners

from the prisons. The staff administrators manage the data like user comment, order and

delivery for the product and store the registered user s details.

Other than that, all interview requests by the relatives of the prisoners need to be

recorded and tracked. Most of the prisons still using manual method which is wrote in a

guest book. The programming tool that is used in this system is web programming

language like HTML. The colors of the system are white, red and grey.

9 be- Jab-. P.n ma

b4d p

n n ~ U r U . *

L.~-~nal w a g

Vd-I

irdc n

L , . ~ . * , - p . * ~ . n . . n * . b n

J.b.u.P.*

W m a am111 4 n M M

nu-

m.8 4 l u M u d W Y

44 .n

at-

I

o n

.*.L~*YD

lah

4 r u u h P.#anan

4 - 7

1.n g~w-

,,I nan*

OUR

~ . l * a n ~ . h II a r n d

nap

hom.l. l.n

4 d . n bld.n.M.rn.

+)aua

Feh x l

hlar

zwam

Kt ewah 17113

i q Terama l tm l la

T w u

M7IYnO P a h a y

Ten$

Pl~m

-el T

P a a q

Dl Pmwa

Pew

,.

- .

Foto Institmi

Figure

2.1

Home Page of Portal Rasmi Jabatan Penjara Malaysia

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 15/27

Case Study 2: Lockworks LL C (Lock Track Offender Management)

This case study is based on observation and researching in Lock Track

Offender Management

htt~:Nwww.locktrack.com/index.html).

ockworks LLC is

controlling data management for the corrections professional: comprehensive, flexible

solutions for jail and prison management. This system provides two version which are

web-based online ) and system-based desktop).

This web-based system of Lock Track Offender Managem ent is basically

manage and control data that had been loaded with lots of data in their clients system.

For example, this system manages the small cases that were reported to the Sheriff

Department. Most of their clients like Benton County Sheriff, Lincoln County Sheriff

and Philadelphia Prisons are using this system because the data can be managed easily.

This system is only use by the System Administrator only. The programming tool that is

used in this system is also web programming language like HTML. The colors of the

system are white an d brown.

Lockworks LLC

I - l

T d I z O NT RO L N O T

h*

a

Lo&Wo* p o ~ i d e rolutionr that rtartm'th LldivMualbsd

;luWH.hukhl -

jmna3emmtyrtem that

prorider

irnmedlate

to

i n e r m ~ ~ r e c o r n m ? d a Ho n snd wr tom ln r ta b fb n and

jamrate, and drta lied dat about .enderr and :*ah% We M t o m n

km

n d a@$ *f* POR

~ . I U * u r ( r . f - 4 ~ ~ ~

'lnmrter.

LodgTrar). manaqec ynvr data from invertigarmn to

I

24-7 and

; h Y . . l ~ . L m ~

e r r l u ( hRY . . l r *Y " , . I * L r

'bookw& through ren hn a =hi ah on and paro le.

icontact ur now to learn h a w

lU

mrb

an l n b m t l o n i c h j-h--whI-HI)-

: -mad

m m r

for y ur

ail:

j M * r r b & w h r r r r a c - a d

LOC KBTRACIi

Prison hlanagernent spt er n

j

15

  wmprehenrire, simple and

alfordabte

roiution*fth the : ,866.664,4,85

j~ , - .~-t .1.~-ac--aw-

apdirV

to streamline

Uw

intake and

x k i n g

p r o c ~ r e r f

;info

modern

conechonr facilities

,Enter r monthk d radng o r

rm

free mffee m q s and

iSearde r Bert Coffee.

W

v c 4

h d r

YJ la w?)xhp b.

Figure 2.2: Hom e Page of Lock Track Online System

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 16/27

2 2 3

Database Function

1

reating Database Trigger

Database triggers will be used in PRMS. It will be used in some situation like

when the user wants to update the parole appointment of the prisoners. The important of

using this database triggers is to track all the updated data and keep it in the log table.

Syntax to create trigger using Oracle 9i that retrieve from the website,

http://www.ss64.com/ora~triaaer c.htm1 and the example of trigger are:

C R EA T E [ O R R E P L A C E ] T R I G G E R <trigger-name>

[ R E F E R E N C I N G [NEW A S

<new ow ame>]

[ O L D A S <old-row-name>]]

[F O R EACH ROW [WHEN

<trigger ondition>)]]

Example;

CREATE OR REPLACE TRIGGER AFTER-UPDATE AROLE

AFTER UPDATE

ON PAROLE

REFERENCING NEW AS NEW OLD AS OLD

FOR EACH ROW

DECLARE

ACT VARCHAR2

;

BEGIN

INSERT INTO UPDATE PAROLE LOG

CURRENT PPOINTMENT AY,CURRENT PPOINTMENT ONTH,CURRENT

PPOINTMENT EAR, ESCRIPTION)

VALUES :NEW.NEXT AY, :NEW.NEXT ONTH, :NEW.NEXT EAR,

:NEW.DESCRIPTION);

END AFTER UPDATE PAROLE;

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 17/27

2 Creating Stored Procedure/function

This system w ill be used stored procedure to the certain eve nt like when the user

wants to login to the PRM S and to clear the form in the system. S yntax to create a

procedure using O racle 9i that retrieve from the website,

(htt~://www.ss64.com/ora/

p c e d u r e c .html) and the example are :

CREATE [ O R R EP L A CE ] PROCEDURE s c h e m a . p r o c e d u r e - n a m e ( o p t o n s )

i n v o k e r i g h t s A S p l s q l u b r o g r a m ody

CREATE [O R R EP L A CE ] PROCEDURE [ s c h e m a . ] p r o c e d u r e a m e ( o p t i o n s )

i n v o k e r i g h t s A S LANGUAGE J AV A NAME ( s t r i n g )

CREATE [ OR R EP L AC E] PROCEDURE [ s c h e m a . ] p r o c e d u r e a m e ( o p t i o n s )

i n v o k e r r i g h t s A S L A NG UA GE C NAME n a m e L I BR A R Y

l i

n a m e

[AG EN T I N ( a r g u m e n t ) [ W IT H C ON TE XT ] [P AR AM ET ER S

( p a r a m e t e r s )

o p t i o n s :

a r g u m e n t I N [N O C O P Y ] d a t a t y p e

a r g u m e n t OUT [N OC OP Y ] d a t a t y p e

a r g u m e n t I N OUT [N O C OP Y ] d a t a t y p e

The p rocedu re can have s ev e ra l

a r g u m e n t s

separa ted wi th commas)

Example;

P r o c e d u r e C h e c k P a c k a g e F a i l u r e I S

B E G I N

I F NOT F o r m S u c c e s s ) THEN

R A I S E F o r m T r i g g e r F a i l u r e ;

END I F ;

END;

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 18/27

3.

Doing Data Backup and Recovery

According to Database Management System User Guide (2002), the following methods

are valid for backing-up an Oracle database:

ExportAmport

- Exports are logical database backups in that they extract

logical definitions and data from the database to a file.

Cold or Off line Backups -

Shut the database down and backup up ALL data,

log, and control files.

Hot or On line Backups

- If the database is available and in ARCHIVELOG

mode, set the tablespaces into backup mode and backup their files. Also

remember to backup the control files and archived redo log files.

RMAN

Backups

While the database is off-line or on-line, use the m a n

utility to backup the database .

Here, the step s to make a data backup manually using Oracle 9i:

There are two types of backups which are logical backups and physical backups.

In Oracle, use export utility to perform logical backups, and import utility to perform

logical recovery. There are four modes for export and import utility which are full,

tablespace, table and user.

To do the IogicaI backup in Oracle9i is by using windows command prompt. The

syntax are:

C:\>set oracle sid <database name>

C:\>exp user/password@database ame file <file ame.dmp> full

y

/tablespace <tablespace ame> /tables < table 1,table

> /owner <user>

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 19/27

Example for full modes backup,

Open w indows comm and prompt and type:

C:\>set oracle sid=company

c:\>exp system/manager@company file

=

backup2.dmp owner

=

system

To do the logical recovery in Oracle9i is by using windows command prompt.

The syntax are:

oracle-sid

=

<database ame>

C:\>imp user/paisword@database ame file

=

<file ame.dmp> full

= y /tablespace

=

<tablespace ame> /fromuser

=

<user sender>

touser

=

<user-receiver> /tables

=

< table 1,table 2,..)>

Exam ple for user modes recovery,

Open windows comm and prompt and type:

C:\>set oracle id=company

C:\>exp system/manager@company file backup2.dmp fromuser

=

system touser

=

bob

4 Gran t Privilege

Oracle Object privileges

Based on the article, Control Access with Oracle Grant Security 2003), Object

privileges assign the right to perform a particular operation on a specific object. Here a re

some examples of object privilege assignment:

grant select, insert on prisoner to staff;

grant all on prisoner to dba;

grant select on prisoner view to staff;

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 20/27

Oracle System privileges

System privileges cover m any areas of access in a broad b rush, with grants such

as select any table. Examples o f system privilege grants include:

g r a n t s e l e c t an y t a b l e t o d ba ;

g r a n t c r e a t e an y t a b l e t o d ba ;

g r a n t c r e a t e t a b l e s p a c e t o db a;

Oracle Role based security

Role security a llows gathering related gran ts into a collection. S ince the role is a

predefined collec tion of privileges that are grouped together, p rivileges are easier to

assign to users, a s in this example:

c r e a t e r o l e s t a f f ;

g r a n t s e l e c t u pd at e on p r i s o n e r t o s t a f f ;

g r a n t s e l e c t on i t e m a b l e t o s t a f f ;

g r a n t s t a f f t o 5100 5101;

5 Revoke Privilege

Revoke Privileges on Tables

Once you have granted privileges, you may need to revoke some or all of these

privileges. To do this, you can execute a revoke command. You can revoke any

combination of select, insert, update, delete, references, alter, and index.

The syntax for revoking privileges on a table is:

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 21/27

  revoke privileges on object from user

For exam ple, if you wanted to revoke d elete privileges on a table called suppliers

from a user named an derso n, you would execu te the following statement:

revoke delete on suppliers from anderson

If you wanted to revoke all privileges on a table, you could use the all keyword.

For example:

revoke all on suppliers from anderson

r

If

you had granted privileges to public all users) and you wanted to revoke these

privileges, you could execute the following statem ent:

revoke all on suppliers from public

2 2 4

Summary o Facts and Finding

After studied the relevant existing system, it can conclude that to-be system is

more manageable an d efficient especially for the DBA to manage all the data. Th is to-be

system is more to back-end user so the DBA works will be m uch easier to m anage the

data and ma ke sure the data is secured.

Comparing the both current system, their system are not using the database

function like creating a dyna mic table, backup an d recovery, or even grant or revoke an

system privilege using the system interfaces. A ll the works are not stated in their system

s

only Database Adm inistrator DB A) knows it.

To-be system will develop the database function such as creating a dynamic

table, backup and recovery, or even grant or revoke a system and object privilege using

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 22/27

the system interfaces. It also will designed an in-out register to keep track all prisoners

and others who move in and out for various reasons and include provisions for recording

the prisoners sent to courts for hearing. Table 2.1 show the com parison between PRM S

and the two existing sys tem.

Table 2 1: Comparison between PRMS and existing systems

2 3 Project Methodology

Backup and recovery

on the system

interfaces

Dynamic report

generate on the

system interfaces

Create dynam ic table

on the system

interfaces

Grant and revoke

privilege on the

system interfaces

This section will explain about the methodology used to develop the system.

The Iterative

Waterfal1:Model that shows in Figure

2 2

is the approach that has been

used to implement the Structured System Analysis and Design Method SSADM ). This

model has been choosing because when a stage is not successful, previous stages will

often require revision. The phases involved in the SSA DM are:

PRMS

Yes

Yes

Yes

Yes

Prisons Department

Malaysia Portal

No

No

No

No

Lockworks LLC

No

Yes

No

No

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 23/27

2 3 1 Planning

At this phase, all the requirements are gathered by using interview method and

some. The data requirements document is used to agree requirements with clients. To

make sure that it is easily understood, it should not be overly formal or highly encoded.

Furthermore during this time a consistent Gantt chart was developed for the project

management.

2 3 2 Analysis

Data analysis begins with the statement of data requirements and then produces a

conceptual data model. T he aim of analysis is to obtain a detailed description of the data

that will suit client s requirements s o that both high and low level properties of data and

their use are dealt with. These include properties such as the possible range of values

that can be permitted for attributes. Th e conceptual data model provides a shared, formal

representation of what is being communicated between clients and developers during

database development. The current system is analyzed using the UML Class Diagram.

Meanwhile the to-be database systems are analyzed using Context Diagram and Data

Flow Diagram.

2 3 3 Design

Database design starts with a conceptual data model and produces a specification

of a logical schema. T his will usually determine the specific type of O RA CL E database

system (network, relational, object-oriented) that is required, but not the detailed

implementation of that design. The Data Flow Diagram and Context Diagram from

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 24/27

Analysis phase are now useful to initiate the design phase.

2 3 4 Implementation

Implementation involves the construction of a computer system according to a

given database design document and taking account of the OR CLE environment in

which the system will be operating. Implementation may be staged, usually with an

initial system than can be validated and tested before a final system is released for use.

2 3 5 Testing

Testing compares the implemented system against the Database design

documents and requirements specification and produces an acceptance report or, more

usually, a list of errors and bugs that require a review of the analysis, design and

implemei.ltationprocesses to correct testing is usually the task that leads to the waterfall

model iterating through the life cycle). Testing is usually considered to involve two main

tasks; validation and verification without adequate testing users will have little

confidence in their data processing.

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 25/27

Figure 2 3: Iterative W aterfall Model

2 4 Project Requirem ents

This part describes the software, hardware and other requirements for the

development of Prison Management System PRM S).

2 4 1 Software Requirem ents

The required software for the development of this system is as described in the

Table

2 2

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 26/27

Table 2 2: Software Requirements

Professional 2002 Service Pack 2

2 4 2 Hardware R equirements

This project is stand-alone system or system-based, so only one personal

computer will be used, This computer consists of a mouse, a keyboard, a monitor and

central processing unit CPU).

Table

2 3:

Ha rdwar e Requirements

7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008

http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 27/27

2 4 3 Other Requirements

1 Network Requirements:

The netwo rk w ill b e required to test the comple ted project and the requirement is

Local Area Ne two rk LA N) cable that will be used to conv ert the computers to form

client-server architecture. Th e web browser tha t recomm ended is Moz illa Firefox.

2 5 Project Schedule and Milestones

This section will state the Project Schedule and milestones which will be main

time frame guideline for the project. Schedule date starts from the briefing from the

client and ends by the presentation of initial project. Table 2.4 shows the project

milestone. For the Gantt Char4 refer App endix A.

Table

2 4:

Project Milestones

report of introduction,

I

Introduction,

2

literature review and project

I

Literature Review

I

methodology documentation

I

and Project

I

requirements.

Modify and submit project

proposal.

Complete and submit progress

to clients. 1 1 Methodology 1

4 Prepare for project analysis.

1 16.1.2008

20.1.2008

1

None

2.1.2008

12.1.2008

Com plete project analysis

2 1.1.2008

26.1.2008

1

Report of Project

1 1.1.2008

15.1.2008

Project Proposal

Report of