Tuesday, January 28, 2020
Reviewing The Prison Management System Information Technology Essay
Reviewing The Prison Management System Information Technology Essay ICT in prisons was initiated in the year 2002 at Delhi Prisons, Tihar. The Tihar Prisons Complex in New Delhi is the biggest prison complex in Asia comprising of 9 prisons and one District Jail at Rohini with a total strength of more than 11,000 prisoners against a normal sanctioned capacity of 6250 prisoners. In a year, about 70,000 80,000 inmates remain lodged in these prisons for different duration and crimes committed by them. This prison population has about 80% under trials and includes about 480 women inmates. About 400 inmates are foreigners from different parts of the world. Many high security criminals also live here. There has been a substantial increase in number of prison inmates coming to Tihar because of a phenomenal increase in the crime scene at Delhi that has resulted in the increase of the ICT needs and its management at the Tihar Jail Complex. Nearly 1700-1800 visitors meet their relative inmates every day. There was manual system of booking mulaqats (meetings) in each jail for its respective inmates. Centralised visitor record was not available. There was lack of exchange of visitors information within jails and prison headquarters. There was no provision for identification / detection / verification of visitors. Keeping a tab on the movement of visitors / nefarious elements was difficult. There was no control either on multiple meetings with an inmate in a day / week or on number of visitors permissible to meet with each inmate. It was difficult for the jail administration to keep a record of those prisoners whose meetings were stopped by the courts by way of punishment. There was limi ted and unstructured recording of demographic details about the visitors. Managing the prisoner record and monitoring of prisoner / visitor was always difficult since most of the records were normally maintained manually (so the concerned authorities were required to go through all the registers to find out the details and status of the inmate as well as of the visitor). In order to cope up with the increasing number of prisoners being lodged in, the Tihar Administration required a re-engineering and rationalisation of their key business processes and functions of prisoners related information and their computerisation in order to speed up the processing of information. As the technology evolution took place, there arose a need for centralisation of prisoners data to facilitate information exchange and data sharing as well. This re-engineering would be aimed at reducing administrative overheads, speed up responsiveness to users, reduce risks involved in inmates custody, eliminate obsolete processes and reap cost-cutting benefits. 1) Based on your previous internship experience(s), identify any one business process which you have working knowledge of. Prison Management System (PMS) is a G-2-G and G-2-C e-governance application, which encapsulates the manual working-pattern of the prison rule book i.e. registration, movement within the jail and outside and release of the inmate. It captures the inmates photograph and stores the same in the database after reducing it to less than 2.5 KB size. This is directly stored in the central database such that duplicate entry of the prisoner can be identified in a global manner, which helps in tracing out the frequent flyers to the jail. It helps to generate more than 65 reports of administrative, performance and statistical nature. It helps in dealing with over populous prison that is housing inmates, which are more than 3 times of the sanctioned capacity. It facilitates in monitoring the inmate movement (both inside / outside the correction home). It also facilitates, regulates and simplifies the processes of meeting between the visitors who are coming to visit their relations and friends lodged in the correctional home. It is helping the prison authorities in identification / verification of the inmates using fingerprint based identification tools. Video conferencing is also held within the jail complex with courts and inmates are presented before the Honourable Justice. Using both digital and analog cameras, security is enhanced and a central video wall has also been installed. Around 250 300 cameras pan, tilt and zoom round the clock and feed signals at a central location using the integrated network, over which voice, video and data move freely and continuously. 2) Using the Funnel model diagram, briefly explain how this business process fits into the larger scheme of things for the organization. Funnel Model Diagram -Global Environment There has been a substantial increase in number of prison inmates coming to Tihar because of a phenomenal increase in the crime scene at Delhi that has resulted in the increase of the ICT needs and its management at the Tihar Jail Complex. It has been observed that these inmates tend to revert back to their old habits once they are released after the completion of their term. This can be attributed to several reasons ranging from mistreatment in the correction facility to their inability to obtain employment due to past record. Thus the government and the jail authorities have committed themselves to providing a safe as well as secure detention. They also aim to provide reformation and rehabilitation in a manner which results in welfare opportunities for all inmates. In the long term this should result in a reduction in the number of criminals created due to external environment and society. -Corporate Strategies In the last few years, the prison population has steadily grown, adding tremendous pressure to the overall capacity, basic standard of living and treatment to the prisoners remanded. Effective 24/7 security and vigilance by 1300 jail staff was a key area of concern. The jail management decided that an efficient video surveillance system was required to track, monitor and record movements in critical locations. Management of prisoner records and monitoring of prisoner / visitor has always been difficult in Indian jails since most of the records were normally maintained manually, so the concerned authorities were required to go through all the registers to find out the details and status of the inmate as well as of the visitor. In order to cope up with the increasing number of prisoners being lodged in, the Tihar Administration required a re-engineering and rationalisation of their key business processes and functions of prisoners related information and their computerisation in order to speed up the processing of information need of courts and various other national agencies. -Organizational Structure The Tihar correction facility has a clear set of standard operating procedures. The practical benefit of this model is that the correctional system is not overly dependent upon one or two people. It can easily promote or substitute personnel. The jail dominantly follows a bureaucratic model. This model revolves around a strict hierarchical system but it isnt focussed on one dominant personality. Organizational control flows through the hierarchy with a strict chain of command and a formal process of communication. Rules and regulations are written and specific. Additionally, the policy parameters stressed in this organizational structure are clear for all parties, and staff can be held accountable if they do not comply with written norms. On the negative side, for a difficult environment such as the Tihar jail, written norms do not guarantee consistent enforcement. Such norms are not helpful in every situation. Bureaucratic processes (currently) are slow to respond to change and do not encourage staff to demonstrate new initiative at any level of the organization. -Management and Business processes -Technological Platform 3) Explain in detail the working of this business process and what your role in it was. NIC took up this task of automating and streamlining the process of prisoner / visitor movement at Tihar Prisons. Following are the accomplishment in this area of prison management: Establishment of LAN: Establishment of LAN connecting all prisons situated in a big wide spread complex using 5,500 meters of Optical Fiber Cable (12 and 6 core) operated with one Layer 3 switch supported by 16 Layer 2 switches in the entire jail complex. The network has 185 IOs and can be expanded to 300 nodes without any additions / modifications / disruptions to the existing infrastructure. Surveys were got conducted and laying of OFC was found to be the best suitable option; Development and Implementation of PMS: Prison Management System (PMS) comprises of 12 primary functional modules. More than 65 reports of various types have been developed under Client / Server architecture. It has been developed, tested and implemented. This PMS has the following major features: Based on Client-Server Architecture and supports latest GUI features; Centralised Database for supporting powerful fast retrieval of data; Monitors physical location of inmate, their movements within and outside the jail complex, punishments, medical history of the inmate at the time of his / her arrival at the jail, cases filed against him, court hearings among other attributes; Supports more than 65 reports as per the present needs of the various monitoring agencies like National Human Rights Commission, National Crime Records Bureau and Tihar Jail itself. Biometric Tools: The PMS has been integrated with biometrics tools, which stores inmates biometric details at the time of entry and shall be used to authenticate at the time of their movement. The biometric based verification and authentication system is installed in all 9 jails of Tihar Prisons Complex and at District Jail, Rohini, New Delhi with facility to store prisoner photograph. Tihar Prisons was the first prison in India to use this technology for prisoners identification and verification along with the photograph; Photo pass for visitors: Visitor Management System [VMS] is implemented at Central Public Relation Office situated at Gate # 3 and at Gate # 4 of the Tihar Prisons. All visitors coming to Jail to meet their relative prisoners are first being photographed and then they are issued photo pass. Details of the visitors are being kept in the database and this information is shared with police for the investigation purpose. The meeting slip is generated within 45 seconds. The booking is using the concept of call centre. ISO Certification has been obtained for this process; Videoconferencing: The use of videoconferencing facility in prisons has drastically reduced expenditure incurred as compared to physically producing the jail inmates in the courts. Physical production of an inmate requires transportation, escort by armed police personnel, prevention of fights between inmates and nearly 6 hours of time wasted by each inmate. Fear of custody break is always there during the physical production. There are incidents when prisoners have fled after breaking lockups in the courtroom or from the custody of armed security personnel escorting them to court or by armed attack on the police vans by daredevils. Cameras: Using analog and digital cameras, security has been enhanced in the Tihar Prison complex. Cameras have been installed at strategic locations within wards. Each and every inmate can be watched from a video wall and surveillance brief is also sent to DG (Prisons) in real time. These video graphed shots are produced in case of any disputes. Implementation Processes Local Area Network (LAN): It was necessary to establish network in each prison and all prisons are connected over on LAN to capture and share prisoner information. This LAN is using 5,500 meters of Optical Fiber Cable (12 and 6 core) operated with one Layer 3 switches supported by 16 Layer 2 switches in the entire jail complex and having 145 IOs. The network is such that it can be expanded in future without any addition to the existing infrastructure and can support Closed Circuit Television [CCTV] System. Prison Management System (PMS): The application software Prison Management System (PMS), prison inmate information handling system, aims to facilitate modular but tightly integrated software solution for administering and managing the data related to inmates with their case details and other related activities of the inmates along with their photographs and also facilitate dissemination of information over the LAN to all the concerned officials of the correction homes. Visitor Management System (VMS): It aims to manage meetings of the inmates with their relatives and brings transparency in the Mulaqat (Meeting). It facilitates visitors to register their appointments / meetings with the inmates on telephone or in person at Central Public Relation Office of the Prison. Videoconferencing: The use of videoconferencing facility in prisons is for the purpose of remand extension and trial of prisoners (eTrial) in various courts of the country. The Delhi Government for speedy trial has changed the laws. This shall rule out any escape of prisoner from police custody while movement from Prisons to Courts for Court trials and after the trial when they return back to prisons. This shall minimise the manpower of security personnel, transportation cost and production time. VC sessions can be conducted between jail-2-jail, between jail-2-court within city and jail-2-court outside city for many important inmates like Pappu Yadav, who also happened to be MP. Use of Modern Security Gadgets: The use of modern security gadgets like Closed Circuit Television [CCTV] cameras and Biometric based Fingerprint Identification / Authentication / Verification System shall enhance the security of the Prisons and shall help prison administration in the effective management of Prisons / Prisoners. This has also been implemented at Tihar Jail. Tihar is the 1st jail in India where 258 cameras have been installed to provide digital surveillance. Training Training is a key part of any successful project. It should be tailored to the needs identified through the assessment of the work requirement, existing skills, knowledge and capacity of the employees. Training must be held for all levels and this training must be held separately for each level. The superintendent is the head of prison who is assisted by deputy and assistant superintendents. Warders and matrons are the lowest functionaries in the jail administrative setup. Primarily they have to maintain the day-to-day administration of inmates inside the jail, to know the number of prisoners in their charge; to count them frequently during their turn of duty and to satisfy themselves that they have all inmates in their custody. They have to report about any plots for the purpose of escaping or of assault or outbreak or any plan to obtain forbidden articles in the jail complex. Smoking is not allowed in the complex. Warders / matrons working in processes have been identified and provided with additional training developed for their specific functions. They possess good academic qualification, more disciplined and have keen interest to work on computers. Although the basic qualification for the post of warden / matron is only matriculation but a number of staff is having much higher qualification and this increase their interest in learning to use modern gadgets. One more important aspect was behind the training of warders / matrons is that they are from uniformed force and primary their responsibility being the safety and security of the prisons where more than 11000 criminals including hardcore criminals are lodged and we have to work within the security parameters. Monetary incentives were also given to them. Good work done by them was recorded in their annual confidential reports such that they get benefit in future. The Data Entry Operators were hired from private operators and they were provided training on the visitor module of the system. They are on contract and deployed outside the prison for visitor management. They were thoroughly sensitised before hiring for the job, so that they cannot try to connive with the prisoners relatives in any unlawful activity. 4) Draw a Business Process Modelling Diagram (BPMD) describing its working. BPMD (As-Is): BPMD (To-Be): Sample screenshot of the PMS software: 5) Identify any inefficiency (ies) in this business process and provide suitable justification for the same. General Issues / Inefficiencies in business process During the development of application software the requirements were not clear as the user was not supportive in sharing the information and subsequently could not be frozen. To overcome this problem, prototype of each module was first developed and then shown to the user department to get their suggestions / inputs. This regular interaction with the user helps in freezing out their requirements. There was no standard set for fingerprints scanning and matching which leads to non-interoperability of matching fingerprints. Many vendors provided fingerprint-matching solution, which was proprietary. There is no interoperability and standards in matching of fingerprints. The fingerprint solution integrated in the application software was taken after considering the solution to be used for whom, ruggedness of the scanner, omni directional scanning feature, live finger scanning and complete user satisfaction. Storage of photograph consumes lots of memory space. Reducing the resolution of the image and converting .bmp image to .jpeg image handled this issue. This process reduced image of size of 60k to less than 3k. Define the To-be state using certain metrics and (or) benchmarks. Metrics (Primes) along which To-be state was designed: For example, 7) Conclusions It has now become essential to embrace the new technologies in the area of Information and Communication Technology (ICT) for the development / modernisation / advancement of prisons. Internetworking of all the jails across the India for sharing of information related to prison inmates who had been lodged in various jails of the country should improve the law and order within the state. Tihar Prisons has been pioneer in this area and they have shown it through their IT setup, a role model for other states and even other countries. It is likely that this may be replicated in the SAARC Region.
Monday, January 20, 2020
Who are the Real Parents? Essay -- science
Who are the Real Parents? Are parents those who give birth to a child or those who care for a child? Does nature or nurture make a woman a mother? As more and more heartbreaking tugs-of-war between biological and adoptive parents surface, anyone searching for a baby has good reason for concern (Casey 119). Baby Jessica was raised from infancy by adoptive parents, Jan and Roberta DeBoer. For two and a half years Jessica was at the heart of one of the most bitter custody battles in America, caught between the parents in Michigan who reared her and the parents in Iowa who gave birth to her and wanted her back (Ingrassia and Springen 60). Cara and Dan Schmidt took screaming baby Jessica from her home in 1993 when they won their court battle to get her back (Casey 119). Baby Jessica is just one of the many victims of child custody battles in America. Jane and John Doe adopted a baby boy, Richard in March of 1991. Richardââ¬â¢s biological mother, Daniela Kirchner, gave up her son while her boyfriend, Otakar, was out of the country visiting his family. He had left Daniela just two weeks before Richardââ¬â¢s birth. Daniela had heard rumors that Otakar had been cheating on her with another woman, in Czechoslovakia, so she decided to lie to him about their baby, Richard. She told Otakar that Richard had died just four days after his birth. In May of 1991 Otakar returned to Chicago and the couple reconciled. Daniela told him about the adoption of their son and how she lied to him about his death. Eighty days after Richardââ¬â¢s birth, Otakar challenged the adoption. He claimed that he had no knowledge of his son until his return to the US and now he wanted his son back desperately (Ingrassia and McCormick 44). The Does met in seventh grade in a suburban Chicago school but didnââ¬â¢t start dating until they were in their early twenties. Married in 1979, Jane, a paralegal, and John and a son. They say that they had not sought to adopt another child but were ââ¬Å"bowled overâ⬠by that first call about Richard. Never did they expect that legal briefs and litigation would dominate their lives for the next three years (Alexander 40). After three and a half years of court battle, baby Richard was torn away from his adoptive parents where he had lived since he was four days old and returned to his biological father, who had never seen him before (Terry A1). W... ...sey, Kathryn. ââ¬Å"The Case of Baby Lenore 25 Years Later.â⬠Ladies Home Journal. August 1995: 116-9. Diamant, Anita. ââ¬Å"Is It Safe to Adopt A Child?â⬠McCalls (Jan 1994): 96-99. Rpt. in Family. Vol. 5. Ed. Eleanor Goldstein. Boca Raton, FL: S.I.R.S., Inc., 1994. Art. 22. Hegger, Susan. ââ¬Å"The Trials of Childhood.â⬠St. Louis Post-Dispatch. (Aug 1993): 1B. Rpt. in Family. Vol. 5. Ed. Eleanor Goldstein. Boca Raton, FL: S.I.R.S., Inc., 1993. Art. 17. Ingrassia, Michelle and John McCormick. ââ¬Å"Ordered to Surrenderâ⬠Newsweek. (Feb 1995):44-45. Rpt. in Family. Vol. 5. Ed. Eleanor Goldstein. Boca Raton, FL: S.I.R.S., Inc., 1995. Art. 41. Ingrassia, Michelle and Karen Springen. ââ¬Å"Sheââ¬â¢s Not Baby Jessica Anymore.â⬠Newsweek. 21 March 1994: 60-3. McCarty, Kevin. ââ¬Å"Adoption Exchange Association: Statement on the Uniform Adoption Act.â⬠[http://www.webcom.com/kmc/adoption/law/uaa/aca.html]. January 1997. Terry, Don. ââ¬Å"Storm Rages in Chicago Over Revoked Adoption.â⬠New York Times. 15 July 1994: A1:A12. Yack, Wendy and Susan Littwin. ââ¬Å"They Took Away My Baby.â⬠McCalls. (Jan 1994): 96-99. Rpt. in Family. Vol. 5. Ed. Eleanor Goldstein. Boca Raton, FL: S.I.R.S., Inc., 1994. Art. 22.
Sunday, January 12, 2020
Comparison & Contrast Essay
In society it seems that everywhere we look we are surrounded by advertisements whether it is television commercials, billboards or advertisements. Obviously, the main purpose of advertisements is to get the consumer to purchase the product. Print advertisements are an extremely effective way to reach a mass audience because the advertisements are in print, the use of color, text and photography are all key factors in luring the consumers in to buying their product. Advertisements cannot simply attempt to sell the product in question; they must make it appeal to the consumer. It is important that advertisements not only attempt to make the product they are trying to sell clear but also to actually make the advertisement mean something to us, the consumer. The two advertisements that I will be comparing and contrasting are two make-up ads. I picked these two ads because I feel they do a great deal of drawing their consumers in. Mascara is a must have in the make-up world. Most women wear mascara to make their eye ââ¬Å"pop. â⬠Consumers will automatically look at these two ads because of the brand names and how people classify make-up. By knowing that a lot of consumers look at these ads they have to make the ads interesting. Not only will I be comparing and contrasting these two ads but by doing that I will also be telling how they draw consumers in to looking and buying their product. The first ad for mascara came from the magazine Lucky. Lucky is mostly targeted towards young teens and women. This mascara in the advertisement is made by Rimmel London. The use of color is very helpful in this ad because it uses bright vibrant colors that catch your attention. The color of the mascara is black and electric green. Also, the color of the models eyes is very blue which accentuates the true color of the mascara. By making the models eyes such a pretty color it might make people think that if they use this certain mascara it might make their eyes ââ¬Å"popâ⬠like the models does. In the article all the words are written in white and all caps in the background. I think the reasoning behind writing all the words in white is because it is a neutral color and it also stands out. Although the colors really help, keywords also have a great toll in selling a product. By putting ââ¬Å"REV UP THE VOLUMEâ⬠in big letter it draws your attention. It draws people in that want more volume for their eyelashes. All caps draws your attention and makes you want to read every word on the ad. By putting that if you use the product you will have denser more numerous lashes in 30 days it make consumers want to buy this product and actually see if the product will work. Last but not least is the layout of this ad. Layout really helps make an advertisement. By making the model take up most of the page, your attention goes directly to her. Even without knowing what the ad is about; if you just look at her you can automatically tell it is a mascara ad by her eyelashes. By putting the words around the model you can read them and after every word you read about it helping your eye lashes you canââ¬â¢t help but look back at her eye lashes. The brush of the mascara is out of the bottle so the consumer can see what the brush looks like and how it will form their lashes. The second ad is also found in the Lucky magazine, which means it also mostly targets young teens and women. The mascara in this particular ad is made by Revlon which is a very popular brand of make-up. This company took a very smart approach by getting a celebrity model to endorse this product which is a very beneficial thing. The colors in this ad are more laid back compared to the Rimmel London ad. The use of all black and then making just around the eyes a little lighter automatically draws your attention not just to the model but to her eyes. The words are in white and a very pretty aqua color. These colors stand out very well on the black background. By closing the eyes I believe it shows how long the lashes look. The words are on the top and on the bottom of the page. In my opinion, the reasoning behind this is so that if you start at the top of the page you will read down to the bottom of the page. The mascara top is out of the bottle and shows quality of the brush and just how thick it is and by doing this, Revlon is trying to visually convince the consumer that with this thicker brush, the more luscious your eyelashes can become. After looking at all of the aspects of these two ads, they have a lot of similarities. The first main similarity is that they both came from the magazine Lucky. By putting these ads in the same magazine, these two mascara providers are competing with each other for the teenage and young woman market. On both of the ads the mascaras are in very pretty colors. Although the colors are different they both stand out and make the mascara unique. Keywords of these ads are very alike. All of the very important words are in all caps, big, white, and very noticeable. The layouts of these two ads are almost just alike. Both of the ads have the model in the very middle of the page which is where usually all the main focus of the reader goes. Both of the mascaras are on the bottom right corner of the page which goes well because after the reader has seen this beautiful woman and what this mascara has done for her, the reader looks to the bottom to see just exactly what the mascaras name and appearance is. Even with many similarities, there are still some differences between these two ads. The brands of the mascaras are different, one is Rimmel and the other is Revlon. The use of color is very different in these two ads; Rimmel London used black and electric green where Revlon used black and aqua. In the Rimmel ad the colors are very bright and vibrant colors, while the Revlon ad is very dark and dull. Although the keywords are alike they are very different too. In the Rimmel ad the words are in all caps, no matter how big they are they are still in caps. Some words in the Revlon ad are all caps but then the words that are small are in regular font. After comparing and contrasting these two very marketable mascaras, it is very difficult to pick which one is the clear cut winner. Many people have different styles, so maybe the black and electric green appeals to half of the readers where the black and aqua mascara appeals to the other half. Both of these companies did a very good job in putting their advertisement out there and making their product very attractive and marketable. These companies have been around a long time and know what theyââ¬â¢re doing. If that means coming up with competitive ads week in and week out, theyââ¬â¢re willing to do whatever it takes to be the top mascara provider in the world.
Friday, January 3, 2020
Treatment plan Email - Free Essay Example
Sample details Pages: 1 Words: 226 Downloads: 6 Date added: 2019/10/10 Did you like this example? Research has shown that swallowing difficulties (dysphagia) affects nearly 5 million people in the United States. Some of the complications that come with the condition include dehydration, malnutrition, pulmonary fibrosis, pneumonia and even death. Some of the methods that have been developed over time for the treatment of this disease involves swallowing exercises, taking manoeuvres and dietary restriction. Dysphagia affects around 22 percent of the people aged above 55 years. This situation can be quite hectic to the individuals since it inhibits them from enjoying the foods or beverages that they previously enjoyed. One of the methods of treatment for the condition that has been devised includes the application of the electrical current to peripheral tissue targets. This aims to strengthen the swallowing musculature and to stimulate the sensory pathways that are relevant to swallowing. Neuromuscular Electrical Transmission (NMES) is the external control of innervated, that is paretic or muscles by electrical stimulation of the corresponding intact peripheral nerves that can be applied to the resting muscles or superimposed on the voluntary muscle contractions. The contractions that are brought about by this method lead to the larger and more motor units than the voluntary contractions. This results into metabolic responses within muscle tissues which ultimately results in the increased strength. This method of treatment is usually administered intramuscularly or transcutaneously. Sensory NMES enhances swallowing by augmenting the visual signals. Donââ¬â¢t waste time! Our writers will create an original "Treatment plan Email" essay for you Create order
Subscribe to:
Comments (Atom)