0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
17 visualizzazioni122 pagine
The number of research project, scheduling a Presentation, grading the research project and management, cannot be controlled. The researchers decided to make an Online Scheduling, Grading and Management system for DCS Research Presentation to accommodate the work processes problems of the specific college in Lyceum Philippine University. The system will be in HTML as main markup language, PHP as server-side scripting language, Css for the look and formatting, JavaScript, jquery, AJAX for client-side script
The number of research project, scheduling a Presentation, grading the research project and management, cannot be controlled. The researchers decided to make an Online Scheduling, Grading and Management system for DCS Research Presentation to accommodate the work processes problems of the specific college in Lyceum Philippine University. The system will be in HTML as main markup language, PHP as server-side scripting language, Css for the look and formatting, JavaScript, jquery, AJAX for client-side script
The number of research project, scheduling a Presentation, grading the research project and management, cannot be controlled. The researchers decided to make an Online Scheduling, Grading and Management system for DCS Research Presentation to accommodate the work processes problems of the specific college in Lyceum Philippine University. The system will be in HTML as main markup language, PHP as server-side scripting language, Css for the look and formatting, JavaScript, jquery, AJAX for client-side script
1.1 Background of the Study Lyceum Philippine University is Located at General Trias Cavite. There are five colleges in this school, the head faculty which is also the professor. We all know that the number of research project, Scheduling a Presentation, Grading the research project and management, cannot be controlled and that keeping of records is one of the main problems in a school. Just like the Lyceum Philippines University COECSA-Faculty whos experiencing the same kind scenario where the number of research project and grades is keep on increasing so they cannot handle their records efficiently. The researchers decided to make an Online Scheduling, Grading and Management System for DCS Research Presentation to accommodate the work processes problems of the specific college in Lyceum Philippine University. The Online Scheduling, Grading and Management System for DCS Research Presentation, will help the college to minimize time doing the work processes and to hasten the production of reports accurately.
Online Scheduling, Grading and Management System for DCS Research Presentation is the structure of processes and procedures used to ensure that an 2
organization can fulfill tasks required to achieve its objectives. Online Scheduling, Grading and Management System for DCS Research Presentation generally includes detailed information on establishing Scheduling, Grading and Management. The proposed system will be in HTML as main markup language, PHP as server-side scripting language, Css for the look and formatting, JavaScript, JQuery, AJAX for client-side scripting language which is used widely in our generation. The purpose of creating this system is to minimize the error, scheduling every research project created, grading every project and manage the research project and because of that the user will have a more time in doing another task. The Administrator can easily login by using there username and password. The Administrator can easily schedule if the group is not registered or scheduled and they can easily grade and manage the research project. Administrator can easily notice that this group in capstone is not scheduled. The most important part is the report the system will automatically generate reports and grade the research project and have a result within the day of the presentation.
1.2 Background of the Company Lyceum Philippine University Cavite. is established by the year 2008 in General Trias, Cavite, Philippines 14.2908N 120.9156E The Head Faculty 3
needs to schedule the group in capstone, Grade the research project of every group and manage it. The all in all processes inside the school within college is handled by the head faculty. 1.2.1 Mission Lyceum of the Philippines University, espousing the ideals of Jose P. Laurel is committed to the following
1. Provide equitable access to learning through relevant, innovative, industry-based and environment-conscious programs and services in the context of nationalism and internationalism. - INSTRUCTION and QUALITY SERVICES
2. Provide necessary knowledge and skills to meet entrepreneurial development and the managerial requirements of the industry. - INSTRUCTION
3. Establish local and international linkages that will be the source of learning and growth of the members of the academic community. - INSTRUCTION and INSTITUTIONAL DEVELOPMENT
4. Advance and preserve knowledge by undertaking research and disseminating and utilizing the results. - RESEARCH
5. Support a sustainable community extension program and be a catalyst for social transformation and custodian of Filipino culture and heritage. - COMMUNITY EXTENSION
4
6. Build a community of God-centered, nationalistic, environment-conscious and globally-competitive professionals with wholesome values and attitudes. -PROFESSIONALISM and VALUES
1.2.2 Vision Lyceum of the Philippines University envisions itself as a leading university in the Asia-Pacific region, dedicated to the development of the integral individual who constantly seeks the truth and acts with fortitude in service to God and country.
1.3 Statement of the Problem The college has a lot of paper works to do since scheduling, grading, and management of records is part of their processes. The head of the faculty, Jerian Peren, is assigned to give permission to the secretary and faculty member to give schedule, manage the research project and the faculty member who assign to grade the project who are taking capstone 5
project. She also handles all the information, updates of the information about the system, add, delete and edit every schedule. About. Gathering information from head faculty is quite easy for her, but keeping records scheduling grading takes big responsibility. The head faculty let the secretary give schedule to group who are taking capstone project by the use of writing their information in a record book then encodes it in Microsoft Office Excel for reports. The information needed includes (1) first name, (2) middle name, (3) surname,(4) section,(5) title of the system. Though the details of group getting a schedule are quite hard because of the time and date of the specific faculty member, the grading of their project are quite hard to handle. One of the problems in this process is tampering of the group who are scheduled. Online Scheduling, Grading and Management System for DCS Research Presentation is designed to make the processes and procedures easy and time consumable. It has three users; the administrator or head faculty, panelist or the professor and the adviser. The data is secured by computer by the use of log in. The administrator can also manage all the research presentations by adding, editing and deleting records of all researches, as well the research presentations, advisers, panelists and the research presenters. The administrator can also approve and disapprove a research project.
The Panelist can grade the research presenters through the computerized grading system provided by the system, the system can also provide manual grading sheet if the panelist cant use the computerized grading sheet. Panelist can also view all of their schedule for a research presentations. 6
The Advisers can manage all of their handled sections with research projects. They can add, edit and remove a research presenters with their research titles and information. Advisers can also view all the research presentations schedule of their handled sections.
Furthermore, the application needs an internet connection and browser to use the system. All information from the system are stored and secured in a database, which is located on the web server. The application also has a capability to provide summary reports and information about the research presentation, panelist, professors, advisers, presenters, grades and schedules.
The Internet connection is also a constraint for the application. Since the application fetches data from the database over the Internet, it is crucial that there is an Internet connection for the application to function.
The Internet browser is also a constraint for the application. Since the application uses the latest functions and tools for designing and coding. The internet browser must be in the latest version. Lower version of a browser can cause unexpected results and will not display a result as expected to be.
1.4 Objective of the study 7
1.4.1 General Objectives The main goal of this document is to give a detailed description of the requirements for the Online Scheduling, Grading and Management System for DCS Research Presentation software. It will illustrate the purpose and complete declaration for the development of system. It will also explain system constraints, interface and interactions with other external applications. This document is primarily intended to be proposed to a customer for its approval and a reference for developing the first version of the system for the development team.
1.4.2 Specific Objectives The specific objectives are the following: 1.4.2.1 To provide well organized data in Online Scheduling, Grading and Management System for DCS Research Presentation 1.4.2.2 To reduce paper works. 1.4.2.3 To fasten the work processes in Online Scheduling, Grading and Management System for DCS Research Presentation 1.4.2.4 For faster and accurate release of reports. 1.4.2.5 For faster and accurate of grading the research project. 1.4.2.6 For faster scheduling of the presentation and to avoid conflict to the schedule. 8
1.4.2.7 Provide security of data in Online Scheduling, Grading and Management System for DCS Research Presentation 1.4.2.8 To easily monitor Online Scheduling, Grading and Management System for DCS Research Presentation.
1.5 Significance of the Study This study will help to reduce the time in Scheduling, grading, management and to increase the effectiveness of Online Scheduling, Grading and Management System for DCS Research Presentation. The Online Scheduling, Grading and Management System for DCS Research Presentation aims to benefit the school and college in their traditional scheduling and grading system. The system desire to benefit the following: 1.5.1 The college It will save time, because of manage and informative system can do. The main recipient of the proposed system is the school and college because it will help the COECSA faculty in minimizing errors that occurs in the traditional system. This will also help them to become effective in the reports that they are making. 1.5.2 The Administrator The Administrator can schedule all the research presentations of all sections with research projects, the scheduling has a decision support capability to provide much easier scheduling by providing all panelist, time and room without any conflicts. The administrator can view all the 9
grades of all the research presenters using the computerized grading system, an automated grading system which the panelist can grade the presenters using the computerized grading sheet, the grades are automatically computed every time the user inputs a grade and automatically compute its average grade based from the panelists total grade. The administrator can also manage all the research presentations by adding, editing and deleting records of all researches, as well the research presentations, advisers, panelists and the research presenters. The administrator can also approve and disapprove a research project.
1.5.3 The Panelist The proposed Online Scheduling, Grading and Management System for DCS Research Presentation will lessen the time of grading of presenter and post the result of the there research. It will also help the project leader because they will not be fill up the form again, The Panelist can grade the research presenters through the computerized grading system provided by the system, the system can also provide manual grading sheet if the panelist cant use the computerized grading sheet. Panelist can also view all of their schedule for a research presentations.
10
1.5.4 The Adviser or faculty The Advisers can manage all of their handled sections with research projects. They can add, edit and remove a research presenters with their research titles and information. Advisers can also view all the research presentations schedule of their handled sections. This study can help them by using this research as a reference for their own.
1.6 Scope and Delimitation of the study The Online Scheduling, Grading and Management System for DCS Research Presentations is a web-based application which will provide easier scheduling, grading and management of all the DCS research presentations.
The Administrator can schedule all the research presentations of all sections with research projects, the scheduling has a decision support capability to provide much easier scheduling by providing all panelist, time and room without any conflicts. The administrator can view all the grades of all the research presenters using the computerized grading system, an automated grading system which the panelist can grade the presenters using the computerized grading sheet, the grades are automatically computed every time the user inputs a grade and automatically compute its average grade based from the panelists total grade. The administrator can also manage all the research presentations by adding, editing and deleting records of all researches, as well the research presentations, advisers, 11
panelists and the research presenters. The administrator can also approve and disapprove a research project.
The Panelist can grade the research presenters through the computerized grading system provided by the system, the system can also provide manual grading sheet if the panelist cant use the computerized grading sheet. Panelist can also view all of their schedule for a research presentations.
The Advisers can manage all of their handled sections with research projects. They can add, edit and remove a research presenters with their research titles and information. Advisers can also view all the research presentations schedule of their handled sections.
Furthermore, the application needs an internet connection and browser to use the system. All information from the system are stored and secured in a database, which is located on the web server. The application also has a capability to provide summary reports and information about the research presentation, panelist, professors, advisers, presenters, grades and schedules.
12
1.7 Methodology of the Study Developing Online Scheduling, Grading and Management System is quite difficult to do because it will take time to finish accurately. It needs wide variation of planning and analyzing on how the process will be minimized. Thus, there is one useful tool that helps in making the system, the System Development Life Cycle (SDLC). It is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. The Waterfall model is one example of the SLDC that is a Sequential design process which includes Feasibility, Requirements Gathering, System Design, Testing, and Implementation and Maintenance. It is used by many System analyst because when a researcher or a system analyst commit an error to the system he/she can go back easily to the previous step unlike other model that requires to go back from the start.
1.7.1 System Planning The first stage of SDLC model. This phase is basically the brainstorming phase and often consists of sub-stages like Feasibility Analysis to check how much of the idea can be put into action. It is the practice of collecting the requirements of a system from users, customers and other stakeholders. If any particular software needs to be modified, the underlying problem(s) of that software is sorted out along with finding ways to solve it. If brand new software is going to be developed, then every minute requirement regarding that 13
software is looked in to. This implies that this stage involves maximum research and inputs from both the company that is developing the software and the client. In this stage, the researchers set a meeting to plan what system is possible to be created so the researchers look for a client to create system software. After looking for a client, the researchers proposed a system that can monitor the Online Scheduling, Grading and Management System of the administrator or the head of faculty of the COECSA College and automatically generate reports in Online Scheduling, Grading and Management System. The researchers prove that this is feasible because of the bunch of records in the cabinet, less error and the most important the reports. The requirements of the system in a user he/she must computer literate.
1.7.2 System Analysis This is the second phase of SDLC where the entire system is defined in detail. In fact, it this stage wherein a detailed blueprint of various processes of the software is developed. If needed the system is divided into smaller parts to make it easier more manageable for the developers, designers, testers, project managers and other professionals who are going to work on the software in the latter stages. This stage is analysis stage; the researchers analyze the process of the COECSA- College. So First, the adviser, panelist/faculty and head of faculty who want to schedule, grade and manage the research project must register and the head of faculty register the faculty according to their position in college. If the adviser, panelist/faculty is already registered he/she schedule, grade and manage the 14
research project, in case the account of the adviser, panelist/faculty and head of faculty is expire he/she should go to Administrator to request update or register or reactivate the account and. After all of this the system can generate reports efficiently.
1.7.3 System Design In this phase, the physical system is designed with the help of the logical design prepared by system analysts. The analysts and designers work together and use certain tools and software to create the overall system design, including the probable output. The researchers used a simple yet good looking user friendly interface for the proposed system to be used easily and effectively. The researchers used a metro style design for the proposed system. This style looks like windows 8 interface. Metro style is a minimalistic and really popular design trend created by Microsoft. It is also characterized by a flat look and feel, no levels and shadows. As the name implies, in this stage the software is coded with precision. A team of programmers are assigned by the company to work on the software. More often than not, the work is sub-divided under a sub-phase called Task Allocation, where each developer is assigned a part of the work depending on his or her skill set(s). This helps complete the coding efficiently.
1.7.6 System Implementation 15
This is the final stage of system development life cycle. In this stage, if the software is run on various systems by users, or if it runs smoothly on systems without any flaw, then it is considered ready to be launched. In Coding stage, the researchers has assigned a programmer in the team and uses HTML, CSS, PHP, JavaScript, JQuery, and AJAX. The programmer codes according to the system of the gym and how the system will easily manage. In implementation stage the researchers need to sure that the proposed system will work perfectly and have a support to the system, in case of the system will have a bug.
1.7.5 System Operation & Support When the software is ready, it is sent to the testing department where Quality Analysts test it thoroughly for different errors by forming various test cases. They either test the software manually or using automated testing tools and ensure that each and every component of the software works fine. Once the QA makes sure that the software is error-free, it goes to the next stage, which is Implementation. Transactions and these errors are needed to be solved so this is the step where we solve those problems. This is the stage where the system should be done and ready to use. This is where the researchers will test the system if it already meets the requirements needed by the administrator or the head faculty. This will also help the researchers to find out errors that will have to fix before implementing it o the user. 1.7.7 To conclude 16
Now that the basic details of software development life-cycle are explained in the previous pages, it will help other researchers to develop software with outmost perfection in the near future. For more details, other researchers can look up various SDLC models and find the one that will suit to their software and put it into practice.
Planning
System Analysis
System Design
Implementation
17
Figure No. 1.1 System Development Life Cycle Chapter 2 Conceptual Framework 2.1 Review of Related Literature 2.1.1 Foreign Literature 2.1.1.1 Bootstrap Bootstrap is a free collection of tools for creating websites and webapplications. It contains HTML and CSS-based design templates for typography, forms, buttons, navigation and other interface components, as well as optional JavaScript extensions. In June 2014 it was the No.1 project on GitHub with 69,000+ stars and 25,000+ forks, with a user base including MSNBC and NASA. (http://en.wikipedia.org/) 18
The system used bootstrap to lessen time in creating a website and have a simple but beautiful design in the system we created. 2.1.1.2 ActiveX Control It is a software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly in the context of the World Wide Web. It was introduced in 1996 and is commonly used in its Windows operating system. In principle it is not dependent on Microsoft Windows, but in practice, most ActiveX controls require either Microsoft Windows or a Windows emulator. Most also require the client to be running on Intel x86 hardware, because they contain compiled code. Many Microsoft Windows applications including many of those from Microsoft itself, such as Internet Explorer, Microsoft Office, Microsoft Visual Studio, and Windows Media Player use ActiveX controls to build their feature-set and also encapsulate their own functionality as ActiveX controls which can then be embedded into other applications. Internet Explorer also allows the embedding of ActiveX controls in web pages. However, ActiveX will not work on all internet platforms, so using ActiveX controls to implement essential functionality of a web page restricts its usefulness. (www.wikipedia.org) 19
ActiveX Control is Somehow Similar to our system because we used ActiveX Control in it. 2.1.1.3 MySQL MySQL can be used for a variety of applications, but is most commonly found on Web servers. A website that uses MySQL may include Web pages that access information from a database. These pages are often referred to as "dynamic," meaning the content of each page is generated from a database as the page loads. Websites that use dynamic Web pages are often referred to as database-driven websites. Many database-driven websites that use MySQL also use a Web scripting language like PHP to access information from the database. MySQL commands can be incorporated into the PHP code, allowing part or all of a Web page to be generated from database information. Because both MySQL and PHP are both open source (meaning they are free to download and use), the PHP/MySQL combination has become a popular choice for database-driven websites. (www.techterms.com) Relationship of MySQL to our System is that we use MySQL language for our database in the system.
2.1.1.4 HTML HTML or HyperText Markup Language is the standard markup language used to create web pages. 20
HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html>). HTML tags most commonly come in pairs like <h1> and </h1>, although some tags represent empty elements and so are unpaired, for example <img>. The first tag in a pair is the start tag, and the second tag is the end tag (they are also called opening tags and closing tags). A web browser can read HTML files and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses them to interpret the content of the page. HTML describes the structure of a website semantically along with cues for presentation, making it a markup language rather than a programming language. HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such as JavaScript which affect the behavior of HTML web pages. Web browsers can also refer to Cascading Style Sheets (CSS) to define the look and layout of text and other material. The W3C, maintainer of both the HTML and the CSS standards, encourages the use of CSS over explicit presentational HTML. (http://en.wikipedia.org/)
21
2.1.1.5 CSS Cascading Style Sheets (CSS) is a style sheet language used for describing the look and formatting of a document written in a markup language. While most often used to style web pages and user interfaces written in HTML and XHTML, the language can be applied to any kind of XML document, including plain XML, SVG and XUL. CSS is a cornerstone specification of the web and almost all web pages use CSS style sheets to describe their presentation. CSS is designed primarily to enable the separation of document content from document presentation, including elements such as the layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple pages to share formatting, and reduce complexity and repetition in the structural content (such as by allowing for table less web design). It obviates those portions of markup that would specify presentation by instead providing that information in a separate file. For each relevant HTML element (identified by tags), it provides a list of formatting instructions. For example, it might say (in 22
CSS syntax), "All heading 1 elements should be bold." Therefore, no formatting markup such as bold tags (<b></b>)is needed within the content; what is needed is simply semantic markup saying, "this text is a level 1 heading." CSS can also allow the same markup page to be presented in different styles for different rendering methods, such as on-screen, in print, by voice (when read out by a speech-based browser or screen reader) and on Braille-based, tactile devices. It can also be used to allow the web page to display differently depending on the screen size or device on which it is being viewed. While the author of a document typically links that document to a CSS file, readers can use a different style sheet, perhaps one on their own computer, to override the one the author has specified. However if the author or the reader did not link the document to a specific style sheet the default style of the browser will be applied. CSS specifies a priority scheme to determine which style rules apply if more than one rule matches against a particular element. In this so-called cascade, priorities or weights are calculated and assigned to rules, so that the results are predictable. The CSS specifications are maintained by the World Wide Web Consortium (W3C). Internet media type (MIME type) text/css is registered for use with CSS by RFC 2318 (March 1998), and they also operate a free CSS validation service. 23
2.1.2 Local Literature 2.1.2.1 A Proposed Comprehensive Grading System to Predict Outcome for Surgical Management of Intracranial Aneurysms. By conducting a review of clinical outcomes for patients with aneurysms treated using current microneurosurgical techniques and intensive care unit management, we determined that grading systems based only on the clinical condition of the patient failed to produce a significant stratification of outcome between individual grades of patients. We hypothesized that outcome prediction for patients surgically treated for intracranial aneurysms could be improved by including factors other than clinical condition that were also strongly associated with outcome. (journals.lww.com) 2.1.2.2 Filters in license management system A distributed computer system employs a license management system to account for software product usage. A management policy having a variety of alternative styles and contexts is provided. Each licensed product upon start-up makes a call to a license server to check on whether usage is permitted, and the license server checks a database of the licenses, called product use authorizations, that it administers. If the particular use requested is permitted, a grant is returned to the requesting user node. The product use authorization is structured to define a license management policy allowing a variety of license alternatives by values 24
called "style", "context", "duration" and "usage requirements determination method". The license administration may be delegated by the license server to a subsection of the organization, by creating another license management facility duplicating the main facility. The license server must receive a license document (a product use authorization) from an issuer of licenses, where a license document generator is provided. A mechanism is provided for one user node to make a call to use a software product located on another user node; this is referred to as a "calling card", by which a user node obtains permission to make a procedure call to use a program on another node. A management interface allows a license manager at a server to modify the license documents in the database maintained by the server, within the restraints imposed by the license, to make delegations, assignments, etc. The license documents are maintained in a standard format referred to as a license document interchange format so the management system is portable and can be used by all adhering software vendors. A feature of the database management is the use of a filter function. (www.google.com)
2.2 Review of Related Studies 2.2.1 Foreign Related Studies 25
2.2.1.1 License document interchange format for license management system A distributed computer system employs a license management system to account for software product usage. A management policy having a variety of alternative styles and contexts is provided. Each licensed product upon start-up makes a call to a license server to check on whether usage is permitted, and the license server checks a database of the licenses, called product use authorizations, that it administers. If the particular use requested is permitted, a grant is returned to the requesting user node. The product use authorization is structured to define a license management policy allowing a variety of license alternatives by values called "style", "context", "duration" and "usage requirements determination method". The license administration may be delegated by the license server to a subsection of the organization, by creating another license management facility duplicating the main facility. The license server must receive a license document (a product use authorization) from an issuer of licenses, where a license document generator is provided. A mechanism is provided for one user node to make a call to use a software product located on another user node; this is referred to as a "calling card", by which a user node obtains permission to make a procedure call to use a program on another node. A management interface allows a license manager at a server to modify the license documents in the database maintained by the server, within the restraints imposed by the license, to 26
make delegations, assignments, etc. The license documents are maintained in a standard format referred to as a license document interchange format so the management system is portable and can be used by all adhering software vendors. A feature of the database management is the use of a filter function. (http://www.google.com) Looking at the License document interchange format for license management system and in our system, their similarity is they both provide a reliable, secure, and efficient method of Managing the records. And they both produce reports. The difference between them is that License document interchange format for license management system involves License document interchange format for license. 2.2.1.2 Managing quality-of-control in network-based control systems by controller and message scheduling co-design system In network-based control systems (NCSs), plant sensor-controller- actuator nodes in closed-loop operation drive principal network traffic. The quality-of-control (QoC) in an NCS, i.e., the performance delivered by each closed-loop operation, depends not only on the controller design but also on the message scheduling strategy. In this paper, we show that the co-design of adaptive controllers and feedback scheduling policies allows for the optimization of the overall QoC. First, we discuss the limitations of standard discrete-time control models for controllers of control loops that are closed over communication networks. Afterwards, 27
we describe an approach to adaptive controllers for NCS that: 1) overcomes some of the previous restrictions by online adapting the control decisions according to the dynamics of both the application and executing platform and 2) offers capabilities for dynamic management of QoC through message scheduling. (ieeexplore.ieee.org)
About Managing quality-of-control in network-based control systems by controller and message scheduling co-design, visitor monitoring and access control system and our system, they almost have the same operations. Because they also use the process of scheduling to analyse a particular security, the only difference is that the Managing quality-of-control in network-based cognition system that efficiently capabilities for dynamic management.
2.2.1.3 Customer relationship management in higher education: Using information systems to improve the student-school relationship Purpose The purpose of this paper is to explore customer relationship management (CRM) in a higher education setting. Design/methodology/approach The development and implementation of a CRM project in a state community college was 28
examined as were the benefits realized by implementing CRM. As colleges increasingly embrace distance learning and e-business, CRM will become stronger and more pervasive. Viewing students as customers provides a competitive advantage for higher education and enhances a college's ability to attract, retain and serve its customers. Semi-structured interviews were conducted with individuals involved with the planning, development and implementation of a statewide CIS system. Student support personnel were additionally interviewed. Findings The benefits of implementing CRM in a college setting include a student-centric focus, improved customer data and process management, increased student loyalty, retention and satisfaction with the college's programs and services. Research limitations/implications The entire community college system has not implemented the project. Rather, only the phase one colleges have implemented at this juncture. Originality/value Viewing students as customers provides a competitive advantage and enhances a college's ability to attract, retain and serve its customers. As colleges increasingly embrace distance learning and e-business, CRM will become more pervasive.
29
With Customer relationship management in higher education: Using information systems to improve the student-school relationship, they both computer software that allows users easy and efficient control of the file and manage it. But for Customer relationship management in higher education: Using information systems to improve the student- school relationship, they focus in their Students unlikely in our system; we focus in the Research Project of the students in the School. And both systems save time by using automated management.
2.2.1.4 JC Online scheduling system Online scheduling systems comprise a scheduling module having an electronic calendar showing a plurality of time slots. The scheduling modules have executable instructions that transmit the electronic calendar to and receive scheduling data from one or more buyer and seller interfaces in order to facilitate the scheduling of a consultation between a buyer and a seller. The online scheduling systems also comprise a feedback module in communication with the scheduling module. The feedback module has executable instructions configured to receive feedback data from a buyer interface following a scheduled consultation. 30
The similarity about this system and in our system, they both have a database. They can organize schedule, add, edit and delete categories from a drop-down pick list. They can also launch Web sites in the default browser and other features including logging supports, search supports, custom backgrounds and automatic database maintenance. The only difference about these two systems is that the JC Software Development includes ID and personal notes.
2.2.1.5 The Wisconsin Age-related Maculopathy Grading System A new system for grading age-related maculopathy is described and measures of reliability are reported. A number of characteristics of age-related maculopathy are graded in a semiquantitative fashion from stereoscopic 30 color fundus photographs, using a grid to define subfields, standard circles printed on plastic to assess size and area, and a specially designed lightbox to allow better discrimination of subtle drusen. The degree of exact agreement achieved between two trained graders across a variety of lesions ranged from 67.1% for drusen size to 99.6% for geographic atrophy. Kappa scores ranged from 0.55 (for drusen confluence) to 0.95 for geographic atrophy. This system will be useful in epidemiologic studies and clinical trials. The Wisconsin Age-related Maculopathy Grading System also Grade but their using The Wisconsin Age-related Maculopathy Grading 31
System which grading age-related maculopathy is described and measures of reliability are reported. Both systems have far beyond simple time of arrival and/or departure. Example for Wisconsin Age-related Maculopathy Grading System, they will know if a patient have findings and, in the proposed system the grades of the students will automatically computed.
2.2.2 Local Related Studies 2.2.2.1 Online E-Class Record of Holy Child Jesus Montessori The online grading system was developed to replace the existing manual grading system of holy child Jesus Montessori for the purpose of computing students grades faster than before, and more accurate in addition to help the members of the faculty ease if not lessen their workloads. The study pertains of the processes involved in the institution, and how the proposed system may help make the tasks easier for the involved users. Necessary data were collected to make the study possible.
2.2.2.2 Student Affais Office Services Record Management System of Lyceum of the Philippines University of Cavite The study entitled Student Affairs Office Sevices Record Management System for Lyceum of the Philippines Uniersity is was designed to improve the process of keeping and monitoring 32
the records of the student indifferent services of the StudentAffairs Office. The services of the Student Affairs Office are student violation, locker rental, lost and found and monitoring sanction. The system was developed to convert manual process of the SAO to computerize process. This system can also lessen the use of papers and can be able to save time in recording student information. Waterfall Methodology was used ti develop the system because it is the most applicable methodology in the studies. The researcher conducted the system testing with five(5) participants which consists of (3) IT experts and (2) System Administrators with the grand mean of 3.84 and an interpretation of acceptable. The system evaluation was conducted with fifteen (15) respondent consisting of (10) IT experts an (5) System Administrators. The develop system got a 4:15 as the average mean and the average standard deviation of 0.27 with an overall interpretation of acceptable
.2.2.3 Online Medical Specialization Respository with Online Navigation. Focuses primarily in rendering convenient access to different possible medical services that the health unit can offer. Our society is in great need of quality services from us most vulnerable field 33
It is capable of providing information concerning, list and location of health units in the province of cavite, repository of basic information of medical practitioners, list of prescriptions for illness, medical services for animals are not covered in the study as well as services for mental health units in the Province of Cavite. OMRON is made to create a data repository for accessibility and efficiency of information of medical practitioners including their locations to offer reliable information for its accurate specialization of medical practioners including their locations, to offer reliable information for its accurate specialization of medical practitioners their schedules and locations for the benefits of their customers and to maintain a secure and balance relationship between the doctors and patients, in terms of exchange of information.
2.2.2. LPU Faculty Attendance Management System with Implementation of Biometric Device Fingerprint Scanner The study entitled LPU Faculty Attendance Management System with Implementation of Biometric Device Fingerprint Scanner is a WLAN basic system design for the house office and professors of LPU-Cavite and is exclusively for the premises of LPU only. The system is designed to improve the process of monitoring, organizing and assigning the attendance of the 34
professors. The system will prevent forging of information because a biometric fingerprint scanner will be used for this study. The research used Prototyping as the method for the development of the system. After the research had conducted the test results to 15 different respondents that composed of alpha and beta testers. Out of 241 criteria, 239 of them passed and 2 of them are for revision. The said modules were debugged and improved to make sure that the system will meet its objectives. The percentages are interpreted as 98.88 for the remark passed and 1.12% for the remark of for revision. The overall general average and standard deviation of all the systems level of acceptability get 4.46 as the average mean and 0.83 as the average standard deviation with an average remark of Strongly Acceptable. The recommendations the were given by the evaluators who graded the deliverables made by the evaluators who graded the deliverables made by the research are the following, Export of faculty Loads, Revise Filtering Method, Revised Date filtering, Change the word Course into Program. Revised the CBA of the proposed system. Change the graph to college graph and include the reports that are submitted t different departments. 2.3 Synthesis The related literature and studies is based on other researched studies of the past documentations. The proponents used the principles of 35
different studies and other application to develop the proposed system; the ideas from different theses, books, sites, discussion and etc. helps to improve details and processes in the developed system. The formers are mainly similar with the proposed system in terms of functionalities. Both offer the integrated components and modules of an access control system and some scheduling, grading and management. The greatest difference is there system not used web based application unlike other related studies. The scheduling, grading and management that the proponents used is the way to complete transaction to be processed quickly. The proposed system also offered this important function wherein users of the system have been allotted an individual username and password for the protection of files for unauthorized users. In this kind of system, security is highly monitored because there is information and grades involved, this eliminate anomalies that might occur.
Chapter 3 Theoretical Background
Theoretical framework is a compilation of interrelated concepts, such as a statement of assumptions, operational definitions, Definition of terms, definition 36
of processes and theories. It will serve as a guide in doing the research, to identify the core set of connectors within the topic and shows how they fit together.
3.1 Statement of Assumptions
3.1.1 The the administrator or head faculty Personnel will provide all the information needed by the researchers for the proposed system. All the information needed from the school college will be given, mostly the existing system processes will be identified to let the researchers know what are the things needed to do.
3.1.2 The administrator or head college, adviser, panelist and should be Computer literate and he/she needs to learn the different functions of the proposed system. The administrator or head college, adviser, panelist should at least know the basic functions of the proposed system so that it will be used correctly.
3.1.3 The administrator or head college, adviser, panelist will support the researchers regarding the proposed system. All the information that is needed to know will be given so that the researchers will be able to understand the proposed system.
37
3.1.4 The administrator or head college, adviser, panelist will be cooperating or willing to cooperate with the requirements of the proposed system needed by the researchers. The administrator or head college, adviser, panelist should let the researchers know all about the information of the proposed system. 3.1.5 The administrator or head college, adviser, panelist should be willing to adopt and use the proposed system. The administrator or head college, adviser, panelist should start to adopt in the proposed system so it will be implemented and be used by the whole COECSA-COLLEGE.
3.2 Operational Definitions Operational definition a very clear and very precise explanation of the items being measured or the terms that are used to ensures comprehensible knowledge of the terminology and the ability to operate a process, procedure, or service and/or collect data consistently and reliably. 3.2.1 Definition of terms 3.2.1.1. User- Someone who interacts with the web application system 3.2.1.2. Admin/Administrator -System administrator who is given a specific permission for managing and controlling the system 3.2.1.3. Advisers - Someone who can manage the sections who are involved in the research presenters; they are also in-charge of handling 38
researches of their students. They can also grade the research presenters. 3.2.1.4. Panelist - Someone who will use the application for grading the research presenters 3.2.1.5. DCS - Department of Computer Studies 3.2.1.6. DSS - Decision Support System, a computer-based information system that supports business or organizational decision-making activities 3.2.1.7. Scheduling - Arrange or plan (an event) to take place at a particular time. 3.2.1.8. Grading - Arrange in or allocate to grades; class or sort. 3.2.1.9. Management - The process of dealing with or controlling things or people. 3.2.1.10. Research - The systematic investigation into and study of materials and sources in order to establish facts and reach new conclusions. 3.2.1.11. Web Application - Any application software that runs in a web browser and is created in a browser-supported programming language (such as the combination of JavaScript, HTML and CSS) and relies on a common web browser to render the application. 3.2.1.12. HTML - Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages. 39
3.2.1.13. CSS - A style sheet language used for describing the look and formatting of a document written in a markup language. 3.2.1.14. Javascript - An object-oriented computer programming language commonly used to create interactive effects within web browsers. 3.2.1.15. PHP - PHP: Hypertext Preprocessor, which is a recursive acronym. PHP code can be simply mixed with HTML code, or it can be used in combination with various templating engines and web frameworks. 3.2.1.16. JQuery - A free and open source JavaScript library that is used by Web developers to navigate HTML documents, handle events, perform animations and add Ajax interactions to Web pages. 3.2.1.17. DESC Description 3.2.1.18. RAT Rational 3.2.1.19. DEP - Dependencies
3.2.2 Definition of Processes 3.2.2.1 Existing System Processes 1. Schedule the presenter The process which the head of the faculty will check the records of the presenters if already exists in the system and if there is no record she can schedule the presenters to present their research project, record in the record book and encode in Microsoft excel. 40
2. Grade Research project The process where the head of the faculty will grade the research project in a yellow paper or paper that can be used to grade research project and encode in Microsoft excel. 3. Encode records The process which the office manager encodes records in Microsoft Office Excel to produce reports that will be given to the owner. Proposed System Processes 1. Register the faculty or adviser The process which will monitor if the faculty or adviser information already exists in the faculty or adviser user list and if not the admin will approved the registration of the faculty. 2. Schedule the presenter They schedule the research project according to the free time of the faculty or adviser of the presenter, by simply drag and drop on the available time. And can easily edit, add, and delete if there is a problem occur. 3. Grading the Research Project The process where the head of the faculty will grade the research project in the system to grade research project and automatically compute the grade and see the result. 4. Produce Reports The process of generating the particular reports such as Schedule, Grades. 41
3.3 Concepts Used in the Study Water Fall Model The waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction, Testing, Production/Implementation, and Maintenance. (www.wikipedia.org) A number of variants of this model exist, with each one quoting slightly different labels for the various stages. In general, however, the model may be considered as having six distinct phases, described below:
Water runs over the following seven stages 1. Planning 2. System Analysis 3. System Design 42
4. Implementation 5. System Operation and Support
1. Planning The stage of planning is the most important in making a system, the Developer analyses users requirement and, performs further investigation of requirements, produces developers version of requirements. Since oftentimes users are unable to describe what they need with precision. However, when the developer finally gets the users to accept the proposal they can now begin. 2. System Analysis This second step is also the most important, because it involves gathering information about what the customer needs and defining, in the clearest possible terms, the problem that the product is expected to solve. Analysis includes understanding the customer's business context and constraints, the functions the product must perform, the performance levels it must adhere to, and the external systems it must be compatible with. Techniques used to obtain this understanding include customer interviews, use cases, and "shopping lists" of software features. The results of the analysis are typically captured in a formal requirements specification, which serves as input to the next step. 43
3. System Design This step consists of "defining the hardware and software architecture, components, modules, interfaces, and data...to satisfy specified requirements" (Wikipedia). It involves defining the hardware and software architecture, specifying performance and security parameters, designing data storage containers and constraints, choosing the IDE and programming language, and indicating strategies to deal with issues such as exception handling, resource management and interface connectivity. This is also the stage at which user interface design is addressed, including issues relating to navigation and accessibility. The output of this stage is one or more design specifications, which are used in the next stage of implementation. 4. Implementation This step consists of actually constructing the product as per the design specification(s) developed in the previous step. Typically, this step is performed by a development team consisting of programmers, interface designers and other specialists, using tools such as compilers, debuggers, interpreters and media editors. The output of this step is one or more product components, built according to a pre-defined coding standard and debugged, tested and integrated to 44
satisfy the system architecture requirements. For projects involving a large team, version control is recommended to track changes to the code tree and revert to previous snapshots in case of problems. In this stage, both individual components and the integrated whole are methodically verified to ensure that they are error-free and fully meet the requirements outlined in the first step. An independent quality assurance team defines "test cases" to evaluate whether the product fully or partially satisfies the requirements outlined in the first step. Three types of testing typically take place: unit testing of individual code modules; system testing of the integrated product; and acceptance testing, formally conducted by or on behalf of the customer. Defects, if found, are logged and feedback provided to the implementation team to enable correction. This is also the stage at which product documentation, such as a user manual, is prepared, reviewed and published. 5. System Operation and Support This step occurs once the product has been tested and certified as fit for use, and involves preparing the system or product for installation and use at the customer site. Delivery may take place via the Internet or physical media, and the deliverable is typically tagged with a formal revision number to facilitate updates at a later date. This step occurs after installation, and involves making modifications to the system or an individual component to alter attributes or improve performance. These modifications arise either due to change requests initiated by the customer, or defects uncovered during live use of the system. Typically, every change made 45
to the product during the maintenance cycle is recorded and a new product release (called a "maintenance release" and exhibiting an updated revision number) is performed to enable the customer to gain the benefit of the update. Data Flow Diagram A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system. DFDs can also be used for the visualization of data processing (structured design). (www.wikipedia.org) A DFD shows what kinds of information will be input to and output from the system, where the data will come from and go to, and where the data will be stored. It does not show information about the timing of processes, or information about whether processes will operate in sequence or in parallel (which is shown on a flowchart). Theory It is common practice to draw the context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. On the context diagram the system's interactions with the outside world are modelled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization. This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the detail of the system being modeled. The Level 1 DFD shows 46
how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system. Data flow diagrams were proposed by Larry Constantine, the original developer of structured design, based on Martin and Estrin's "data flow graph" model of computation. Data flow diagrams are one of the three essential perspectives of the structured-systems analysis and design method SSADM. The sponsor of a project and the end users will need to be briefed and consulted throughout all stages of a system's evolution. With a data flow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. The old system's dataflow diagrams can be drawn up and compared with the new system's data flow diagrams to draw comparisons to implement a more efficient system. Data flow diagrams can be used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system from order to dispatch to report. How any system is developed can be determined through a data flow diagram model. In the course of developing a set of leveled data flow diagrams the analyst/designers is forced to address how the system may be decomposed into component sub-systems, and to identify the transaction data in the data model. 47
Data flow diagrams can be used in both Analysis and Design phase of the SDLC. There are different notations to draw data flow diagrams (Yourdon & Coad and Gane&Sarson), defining different visual representations for processes, data stores, data flow, and external entities. (www.infocenter.sybase.com) Database Management System (DBMS) A database is an organized collection of data. The data are typically organized to model relevant aspects of reality in a way that supports processes requiring this information. For example, modeling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. Database management systems (DBMS) DBMS are specially designed applications that interact with the user, other applications, and the database itself to capture and analyze data. A general- purpose database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle, SAP, dBASE, FoxPro, IBM DB2, LibreOffice Base and FileMaker Pro. A database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database. (www.wikipedia.org) 48
Terminology and overview Formally, the term "database" refers to the data itself and supporting data structures. Databases are created to operate large quantities of information by inputting, storing, retrieving, and managing that information. Databases are set up so that one set of software programs provides all users with access to all the data. A "database management system" (DBMS) is a suite of computer software providing the interface between users and a database or databases. Because they are so closely related, the term "database" when used casually often refers to both a DBMS and the data it manipulates. Outside the world of professional information technology, the term database is sometimes used casually to refer to any collection of data (perhaps a spreadsheet, maybe even a card index). This article is concerned only with databases where the size and usage requirements necessitate use of a database management system. The interactions catered for by most existing DBMS fall into four main groups: Data definition. Defining new data structures for a database, removing data structures from the database, modifying the structure of existing data. Update. Inserting, modifying, and deleting data. Retrieval. Obtaining information either for end-user queries and reports or for processing by applications. 49
Administration. Registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information if the system fails. A DBMS is responsible for maintaining the integrity and security of stored data, and for recovering information if the system fails. Both a database and its DBMS conform to the principles of a particular database model. "Database system" refers collectively to the database model, database management system, and database. Physically, database servers are dedicated computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. RAID is used for recovery of data if any of the disks fails. Hardware database accelerators, connected to one or more servers via a high- speed channel, are also used in large volume transaction processing environments. DBMSs are found at the heart of most database applications. DBMSs may be built around a custom multitasking kernel with built-in networking support, but modern DBMSs typically rely on a standard operating system to provide these functions.[citation needed] Since DBMSs comprise a significant economical market, computer and storage vendors often take into account DBMS requirements in their own development plans.[citation needed] Databases and DBMSs can be categorized according to the database model(s) that they support (such as relational or XML), the type(s) of computer they run on (from a server cluster to a mobile phone), the query language(s) used 50
to access the database (such as SQL or XQuery), and their internal engineering, which affects performance, scalability, resilience, and security. Query Ability - Querying is the process of requesting attribute information from various perspectives and combinations of factors. (www.dbmswork.blogspot.com) Database Query Language and report - Database Query Language and report writer allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function. Backup and Replication - Copies off attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may be also created for a distant organization that cannot readily access the original. 51
DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets. Rule Enforcement - Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have rule that says each car can have one engine associated with it (identified by Engine Number) Security - For security reasons, it is desirable to limit who can see or change specific attributes or groups of attributes. This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups m or (in the most elaborate models). Computation - Common computations requested on attributes are counting, summing, averaging, sorting, grouping, cross referencing, and so on. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations. Change and access logging - This describes who accessed which attributes, what was changed, and when it was changed. Logging services allow this by keeping a record of occurrences and changes Automated optimization - For frequently occurring usage patterns or requests, some DBMS can adjust themselves to improve the speed of those interactions. In some cases the DBMS will merely provide tools to monitor performance, allowing a human expert to make the necessary adjustments after reviewing the statistics collected.
52
Chapter 4 Methodology 4.1 Environment 4.1.1 Locale The locale of the proposed system was set for the Lyceum of the Philippine University of General Trias, Cavite.
4.1.2 Population of the Study
The user of the system DCS - Faculty of Cavite is estimated for about 40 persons/Faculty member and it is continuing to grow fast.
4.2.1.1 Fishbone Diagram 4.2.1.2 Functional Decomposition Diagram 4.2.1.3 Human Resources Requirements 4.2.1.3.1 The System Analyst A system analyst investigates, analyses, plans solution, designs, develops, evaluates, and coordinates to meet the specific requirements that the system must satisfy. They are not normally involved in the actual hardware or software development though they may be familiar in operating system or other programming 53
languages. The system analyst is responsible for all the tasks on how the system will be developed. A system analyst must have a broad knowledge technically, and a logical approach to problem solving. They need to have an ability to contribute to a team effort, have good interpersonal skills, excellent oral and written communication skills to interact with people at all levels. A system analyst also needs to have a degree in Information system, computer science, business or if non IT-related subjects, a relevant postgraduate qualification may be useful. 4.2.1.3.2 The Programmer A programmer is a person who writes system software. They are assigned to code programs to create the system, and the overall functions and performance of the user interface, and its connection to the database needed. A programmer should have a background on different forms of computer coding language such as SQL which is used for database, HTML, PHP, Java and more. They compose instructions for computer systems to perform a given action. 4.2.1.3.3 The Trainer A trainer is the person who guides, coaches, or give knowledge to another person in a particular subject matter. The 54
main task of the trainer for using the proposed system is to guide and teach the end user on how to operate the system. They are the one whos responsible to teach and educate the user which is the administrator or other personnel that will be involved in the whole process. The programmer can also serves as the trainer since they know the flow of the whole system. A trainer should know how to share their knowledge in the easiest but understandable way for the user to follow correctly. 4.2.1.3.4 The User The users will be the administrator, the customer, the system programmer, and the database manager. The administrator and the customer will be the end users, they need to have enough knowledge how to operate the system and the proponents are going to conduct trainings so they will be familiar to the system. The system programmer and the database manager is still considered as users since they are assigned to fix bugs and update software and hardware that will be used in the system.
55
4.2.2 Technical Feasibilty 4.2.2.1 Combatibilty checking (Hardware/Software and other technologies) 4.2.2.1.1 System Installation The proposed system is installed upon the approval of the COECSA Head Faculty as they are the ones to give the authorization to use the system. The system is can be access thru lan which are for Head Faculty. A compute will also be placed in the database of the system. This is scheduled on September 20, 2014. 4.2.2.1.2 Conversion Plans The proponents used the parallel conversion plan. With this kind of plan, there is ease in comparing both systems. The established solutions are easily shown as both systems run at the same time. This kind of plan clarifies if the requirements are met by the new system. From the obtained results, evaluating the system can be done quickly and efficiently.
56
4.2.2.1.3 Training Plans The proponents handled just one day for training seminars. The reason why the training is just for one day is because the Head of the faculty in the faculty, who will access the system, is an I.T. also. So we just have to teach him about the functionalities. The objective of these training is to give knowledge to the Head of the faculty who will be handling the system and also give instructions on how the system may be operated. The proponents find it important to implement trainings so that the Head of the faculty will be capable to handle the system appropriately and efficiently. The training involves demonstration on how the system works, proper handling, troubleshooting, familiarization in using Microsoft Office Access, how database works, and maintaining record in the database, time keeping system works and implementing instructions or rules on how the system will work according to the guidelines set modules. This training is not only for the two users of the system but for those employees who handle the scheduling system.
57
Schedule of training: Date Activity Participants Facilitator September 20, 2013 Installation of the system and demonstration on how the system operates. Employees of the Head of the faculty and Professor. Proponents September 21, 2013 Giving of guidelines and instruction on how the system will be implemented Employees of the Lyceum Philippine University. Proponents Table 4.1 Schedule if Training
4.2.2.1.4 Testing The accuracy of the system is put into a test. This proves that the proposed system has met the requirements established to come up on an effective attendance monitoring process. System testing is done by the employees who are the users of system. End users had run a comprehensive testing on the system to perform designated task. Then, all the process on the system is checked to determine the dependability of the system. 58
The proponents tested each module set. To make sure that all the components of program are working properly. The proponents used a bottom up approach of integration where all low level modules are tested first before going up to the next level.
Date Action to be taken September 23, 2014 The different modules are tested. September 24, 2014 Modifications in the system are tested. Table 4.2 Schedule of Testing 4.2.2.1.4 Maintenance Plan The system should always be under the care of programmers, system analysts, database managers, and especially users. The software and hardware that is applied in the system should maintain the requirements so it will not malfunction. Maintenance plan will be implemented to identify and arrange all required elements then repair in an orderly manner. Users may use the system after the implementation and this will come up with future support so that it will be uphold by actions.
59
4.2.2.2 Relevance of the technologies 4.2.2.2.1 Software The system software will keep up to date and will be provided support for bug fixes. The proponents will immediately take action depending upon the preferred choice of the company to ensure stable function of the system. 4.2.3.2 Hardware Cable, Keyboard, mouse, fingerprint scanner, and wirings will be replaced when theres unnecessary errors occur. The router should also be upgraded or replaced when needed to hasten the connection.
60
4.2.3 Schedule Feasibility 4.2.3.1 Gant Chart FIGURE No. Gantt chart
61
Table Pert/CPM and Gantt chart List of Activities
PERT/CPM and Gantt chart List of Activities
Task/Activities
Duration (In days)
Predecessor A. Planning 8 - B. Client Searching 4 A C. Information Gathering 4 B D. Chapter 1 (Introduction) 8 C E. Chapter 2 (Review of Related Literature) 70 D F. Chapter 3 and 4 ( TECHNICAL BACKGROUND and - METHODOLOGY) 14 E G. DFD (Data Flow Diagram) 8 E H. User Layout and Interface 4 G I. Programming 60 F, G J. Chapter 5 ( SUMMARY, CONCLUSIONS AND RECOMMENDATIONS ) 10 H K. Chapter 6 (IMPLEMENTATION PLAN) 20 I L. Final Draft of Documents 4 J, K M. Mock Defense 2 I N. Final Defense 6 L, M A B C D E F G H I J K L M 4 8 4 8 N 7 0 1 4 8 4 6 0 1 0 20 4 2 6 62
PATH 3: A+B+C+D+E+G+I+M+N 8+4+4+8+70+8+60+2+6 = 170 The critical path is Path 2 which is composed of 198 days. It consists of A. Planning, B. Client Searching, C. Information Gathering, and D. Chapter 1, E. Chapter 2, F. Chapter 3 & 4, I. Programming, K. Chapter 6, 7 & 8, L. Final Drafts of Document, and N. Final Defense.
Name of document: Student Data Prepared by: Student Number of copies: 1 Purpose: To provide details in the registration of Student.
Name of Document: Faculty Data Prepared By: Faculty Number of copies: 1 Purpose: To provide details in enrolling Faculty
64
Name of Document: Students Grades status, data and details Prepared by: Faculty or Administrator Number of copies: 1 Purpose: To provide Grades status and details.
4.2.5.2 Process 4.2.5.2.1 Register Student Records BEGIN IF Student is not registered in Student data the admin ipput a data THEN Obtain Student data from student IF Student data is valid THEN Register Customer IF Student is registered, not enrolled or Inactive THEN Activate/Renew registered Student in the program he/she choose. 65
END IF The Student must register first by admin/adviser before scheduling. END IF The admin must input a correct data END IF END 4.2.5.2.2 Register Faculty Records BEGIN IF Faculty is not registered in Faculty data data the admin ipput a data THEN Obtain Faculty data from Faculty IF Faculty data is valid THEN Register Customer IF Faculty is registered, not enrolled or Inactive THEN Activate/Renew registered Faculty in the program he/she choose. END IF 66
The Faculty must register first by admin/adviser before scheduling. END IF The admin must input a correct data END IF END
4.2.5.3 Grading of research project BEGIN IF Student is now registered THEN The grade details store in grade record. IF Student grade a research project THEN The Student data sent to grade record from panelist END IF END IF END
67
4.2.5.4 Generate Schedule BEGIN IF Student is now registered, status is active THEN The faculty can now view and print the schedule of the student. END IF END
4.2.5.5 Generate Grades BEGIN IF Student is now registered, status is active THEN The faculty can now grade and print the result of research project of the student. END IF END
68
4.2.5.6 Produce Reports BEGIN GET Schedule record form from Schedule. GET Grades records from Grades. END 4.5.3 Output Name of Document: Schedule Prepared By: Administrator Number of copies: 2 Frequency of distribution: Distributed once you are registered in the system in the Online Scheduling, Grading and Management for DCS research Presentation Purpose: To provide the student schedule id the Schedule for every registration made. Recipient: Student and Administrator
Name of Document: Grades Prepared By: Administrator Number of copies: 2 69
Frequency of distribution: Distributed when the student are registered in the Online Scheduling, Grading and Management for DCS research Presentation Purpose: To provide the computation of the grades and result. Recipient: Student, Faculty and Administrator 4.2.5.4 Performance Water Fall Model The waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction, Testing, Production/Implementation, and Maintenance. (www.wikipedia.org) A number of variants of this model exist, with each one quoting slightly different labels for the various stages. In general, however, the model may be considered as having six distinct phases, described below:
Water runs over the following seven stages 1. Planning 2. System Analysis 3. System Design 70
4. Implementation 5. System Operation and Support
1. Planning The stage of planning is the most important in making a system, the Developer analyses users requirement and, performs further investigation of requirements, produces developers version of requirements. Since oftentimes users are unable to describe what they need with precision. However, when the developer finally gets the users to accept the proposal they can now begin. 2. System Analysis This second step is also the most important, because it involves gathering information about what the customer needs and defining, in the clearest possible terms, the problem that the product is expected to solve. Analysis includes understanding the customer's business context and constraints, the functions the product must perform, the performance levels it must adhere to, and the external systems it must be compatible with. Techniques used to obtain this understanding include customer interviews, use cases, and "shopping lists" of software features. The results of the analysis are typically captured in a formal requirements specification, which serves as input to the next step.
3. System Design This step consists of "defining the hardware and software architecture, components, modules, interfaces, and data...to satisfy specified requirements" 71
(Wikipedia). It involves defining the hardware and software architecture, specifying performance and security parameters, designing data storage containers and constraints, choosing the IDE and programming language, and indicating strategies to deal with issues such as exception handling, resource management and interface connectivity. This is also the stage at which user interface design is addressed, including issues relating to navigation and accessibility. The output of this stage is one or more design specifications, which are used in the next stage of implementation. 4. Implementation This step consists of actually constructing the product as per the design specification(s) developed in the previous step. Typically, this step is performed by a development team consisting of programmers, interface designers and other specialists, using tools such as compilers, debuggers, interpreters and media editors. The output of this step is one or more product components, built according to a pre-defined coding standard and debugged, tested and integrated to satisfy the system architecture requirements. For projects involving a large team, version control is recommended to track changes to the code tree and revert to previous snapshots in case of problems. In this stage, both individual components and the integrated whole are methodically verified to ensure that they are error-free and fully meet the requirements outlined in the first step. An independent quality assurance team defines "test cases" to evaluate whether the product fully or partially satisfies the requirements outlined in the first step. Three types of testing typically take place: 72
unit testing of individual code modules; system testing of the integrated product; and acceptance testing, formally conducted by or on behalf of the customer. Defects, if found, are logged and feedback provided to the implementation team to enable correction. This is also the stage at which product documentation, such as a user manual, is prepared, reviewed and published. 5. System Operation and Support This step occurs once the product has been tested and certified as fit for use, and involves preparing the system or product for installation and use at the customer site. Delivery may take place via the Internet or physical media, and the deliverable is typically tagged with a formal revision number to facilitate updates at a later date. This step occurs after installation, and involves making modifications to the system or an individual component to alter attributes or improve performance. These modifications arise either due to change requests initiated by the customer, or defects uncovered during live use of the system. Typically, every change made to the product during the maintenance cycle is recorded and a new product release (called a "maintenance release" and exhibiting an updated revision number) is performed to enable the customer to gain the benefit of the update. Data Flow Diagram A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system. DFDs can also be used for the visualization of data processing (structured design). 73
(www.wikipedia.org) A DFD shows what kinds of information will be input to and output from the system, where the data will come from and go to, and where the data will be stored. It does not show information about the timing of processes, or information about whether processes will operate in sequence or in parallel (which is shown on a flowchart). Theory It is common practice to draw the context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. On the context diagram the system's interactions with the outside world are modelled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization. This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the detail of the system being modeled. The Level 1 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system. Data flow diagrams were proposed by Larry Constantine, the original developer of structured design, based on Martin and Estrin's "data flow graph" model of computation. 74
Data flow diagrams are one of the three essential perspectives of the structured-systems analysis and design method SSADM. The sponsor of a project and the end users will need to be briefed and consulted throughout all stages of a system's evolution. With a data flow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. The old system's dataflow diagrams can be drawn up and compared with the new system's data flow diagrams to draw comparisons to implement a more efficient system. Data flow diagrams can be used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system from order to dispatch to report. How any system is developed can be determined through a data flow diagram model. In the course of developing a set of leveled data flow diagrams the analyst/designers is forced to address how the system may be decomposed into component sub-systems, and to identify the transaction data in the data model. Data flow diagrams can be used in both Analysis and Design phase of the SDLC. There are different notations to draw data flow diagrams (Yourdon & Coad and Gane&Sarson), defining different visual representations for processes, data stores, data flow, and external entities. (www.infocenter.sybase.com) Database Management System (DBMS) A database is an organized collection of data. The data are typically organized to model relevant aspects of reality in a way that supports processes 75
requiring this information. For example, modeling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. Database management systems (DBMS) DBMS are specially designed applications that interact with the user, other applications, and the database itself to capture and analyze data. A general- purpose database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle, SAP, dBASE, FoxPro, IBM DB2, LibreOffice Base and FileMaker Pro. A database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database. (www.wikipedia.org)
4.2.5.5 Control Formally, the term "database" refers to the data itself and supporting data structures. Databases are created to operate large quantities of information by inputting, storing, retrieving, and managing that information. Databases are set up so that one set of software programs provides all users with access to all the data. A "database management system" (DBMS) is a suite of computer software providing the interface between users and a database or databases. Because they 76
are so closely related, the term "database" when used casually often refers to both a DBMS and the data it manipulates. Outside the world of professional information technology, the term database is sometimes used casually to refer to any collection of data (perhaps a spreadsheet, maybe even a card index). This article is concerned only with databases where the size and usage requirements necessitate use of a database management system. The interactions catered for by most existing DBMS fall into four main groups: Data definition. Defining new data structures for a database, removing data structures from the database, modifying the structure of existing data. Update. Inserting, modifying, and deleting data. Retrieval. Obtaining information either for end-user queries and reports or for processing by applications. Administration. Registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information if the system fails. A DBMS is responsible for maintaining the integrity and security of stored data, and for recovering information if the system fails. Both a database and its DBMS conform to the principles of a particular database model. "Database system" refers collectively to the database model, database management system, and database. 77
Physically, database servers are dedicated computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. RAID is used for recovery of data if any of the disks fails. Hardware database accelerators, connected to one or more servers via a high- speed channel, are also used in large volume transaction processing environments. DBMSs are found at the heart of most database applications. DBMSs may be built around a custom multitasking kernel with built-in networking support, but modern DBMSs typically rely on a standard operating system to provide these functions.[citation needed] Since DBMSs comprise a significant economical market, computer and storage vendors often take into account DBMS requirements in their own development plans.[citation needed] Databases and DBMSs can be categorized according to the database model(s) that they support (such as relational or XML), the type(s) of computer they run on (from a server cluster to a mobile phone), the query language(s) used to access the database (such as SQL or XQuery), and their internal engineering, which affects performance, scalability, resilience, and security. Query Ability - Querying is the process of requesting attribute information from various perspectives and combinations of factors. (www.dbmswork.blogspot.com) Database Query Language and report - Database Query Language and report writer allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the 78
security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function. Backup and Replication - Copies off attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may be also created for a distant organization that cannot readily access the original. DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets. Rule Enforcement - Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have rule that says each car can have one engine associated with it (identified by Engine Number) Security - For security reasons, it is desirable to limit who can see or change specific attributes or groups of attributes. This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups m or (in the most elaborate models). 79
Computation - Common computations requested on attributes are counting, summing, averaging, sorting, grouping, cross referencing, and so on. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations. Change and access logging - This describes who accessed which attributes, what was changed, and when it was changed. Logging services allow this by keeping a record of occurrences and changes Automated optimization - For frequently occurring usage patterns or requests, some DBMS can adjust themselves to improve the speed of those interactions. In some cases the DBMS will merely provide tools to monitor performance, allowing a human expert to make the necessary adjustments after reviewing the statistics collected.
4.2.5.6 Data and Process Modeling 4.2.5.6.1 Context Diagram 4.2.5.7 Object Modeling 4.2.5.7.1 4.2.6 Risk Management/Analysis
80
Chapter 5 Proposed System
5.1 System Overview The proposed system is made to facilitate all the customers needed information in ARMM Gym efficiently. The traditional system will be replaced by an Online Gym B-Pass System. The proposed system will lessen the time of compiling customer's record to produce reports viewing the companys progress from the record books that is 81
needed by the owner. This will also lessen the time used in the registration and logging in process. The system also has an interface that is meant for the customer, for them to be able to register online. The customer can view their past records attended in the gym and their present program they are enrolled at. They can also monitor how many sessions left that they have in the gym. The proposed system also produces reports in just few clicks. The administrator will just have to select group of records that is needed for the report and then the proposed system will generate it automatically.
User Logs Details Program Subscription Details Payment Customer Information/Subscript ion Program Subscription Report Payments Report User Logs Report Customer Data/Fingerprint Customer Payment Status and Details
Administrator/ Owner
0
ARMM Attendance Monitoring System
CUSTOMER
Receipt 82
Figure No. 5.1 Context Diagram Proposed System of the ARMM GYM B-Pass System
83
Figure No. 5.2 Level 0 Diagram of the Proposed of the ARMM GYM B- Pass System
84
5.3 System Objectives 5.2.1 To generate and provide company a well-organized data. 5.2.2 To conserve time in processing enrollment in the Gym. 5.2.3 To secure the data of the Gym enrollee. 5.2.4 To have more efficient data storage. 5.2.5 To have and efficient, adding, deleting, story and processing of the Gym enrollees files.
5.4 Scope and Limitations of Proposed System 5.3.1 This study is created for the Online Gym B-Pass System processes of the ARMM GYM. 5.3.2 Our Online Gym B-Pass System will have a database that will manage all the clients files and other records. 5.3.3 The system has two user levels to provide security to the clients information. 5.3.4 This can also manage the accounts and the schedule of the clients if there are charges. 5.3.5 The system can also view online.
85
5.5 System Justification As a prolific Gym, there is a need for computerized Online Gym B-Pass System. The number of customers is growing and so the Gym see that there's still a lot of improvements needed to accommodate all the customers. The proposed system will help the Gym to be more competitive by means of having an organized flow of registration process and monitoring attendance of customers that is accurate to the sessions depending on their programs. The system study will help the personnel to lessen the time of finding all the records, compiling, and encoding it into Microsoft Excel.
86
5.6 Project Schedule
FIGURE No. 5.3 Gantt chart 87
Table 5.1 Pert/CPM and Gantt chart List of Activities
Task/Activities
Duration (In days)
Predecessor A. Planning 8 - B. Client Searching 4 A C. Information Gathering 4 B D. Chapter 1 (Introduction) 8 C E. Chapter 2 (Review of Related Literature) 70 D F. Chapter 3 and 4 (Theoretical Framework and Existing system) 14 E G. DFD (Data Flow Diagram) 8 E H. User Layout and Interface 4 G I. Programming 60 F, G J. Chapter 5 (The Proposed System) 10 H K. Chapter 6,7 and 8 *Design of the Proposed System *Testing Implementation *Conclusion and Recommendation 20 I L. Final Draft of Documents 4 J, K M. Mock Defense 2 I N. Final Defense 6 L, M 88
PATH 3: A+B+C+D+E+G+I+M+N 8+4+4+8+70+8+60+2+6 = 170 The critical path is Path 2 which is composed of 198 days. It consists of A. Planning, B. Client Searching, C. Information Gathering, and D. Chapter 1, E. Chapter 2, F. Chapter 3 & 4, I. Programming, K. Chapter 6, 7 & 8, L. Final Drafts of Document, and N. Final Defense.
Figure No. 5.4 PERT Diagram A B C D E F G H I J K L M 4 8 4 8 N 7 0 1 4 8 4 6 0 1 0 20 4 2 6 89
Orange part is year while yellow is cumulative cost crossing in green cumulative benefits in between year 3 which means that in this year the investment of the company on the system is return.
Table 5.12 Cost Analysis for Year 5 of Existing System
101
Chapter 6 DESIGN OF THE PROPOSED SYSTEM 6.1 Inputs Name of document: Customer Data Prepared by: Customer Number of copies: 1 Purpose: To provide details in the registration of client.
Name of Document: Program subscription Prepared By: Customer Number of copies: 1 Purpose: To provide details in enrolling customer
102
Name of Document: Customer Payment status and details Prepared by: ARMM Management Number of copies: 1 Purpose: To provide payment status and details.
Name of Document: User logs Details Prepared by: Customer Number of copies: 1 Purpose: To provide time in and time out of the customer.
103
6.2 Process 6.2.1 Register Customer BEGIN IF Customer is not registered in customer data THEN Obtain Customer data from customer IF Customer data is valid THEN Register Customer IF Customer is registered, not enrolled and Inactive THEN Enroll/Renew registered customer in the program he/she choose. END IF The customer must register first before enrolling in the gym END IF The customer must input a correct data END IF END
104
6.2.2 Generate Payment Records BEGIN IF Customer is now registered and enrolled in the gym THEN The payment details store in payment record. IF Client pay a program fee THEN The client receive a receipt from administrator END IF END IF END 6.2.3 Generate user logs BEGIN IF Customer is now registered, enrolled in the program and status is active, and a program fee THEN The Customer can now login or enter in the gym. END IF END
105
6.2.4 Produce Reports BEGIN GET Program subscription record form program subscription. GET Payment records from Payment. GET User logs records from User Logs. END 6.3 Files the proposed system keeps the following files of the ARMM GYM
Name of File: Customer Records Data needed: Client ID First name Middle name Last name Fingerprint id Email Password
106
Name of File: Program description record Data needed: Program id Client id First Name Middle Name Last name Program description Program id Date enrolled
Name of File: Payments records Data needed: Record id Client id First name Middle name Last name Program information Payment
107
Name of File: User logs Data needed: Program id Client id First name Middle name Last name Program information Time in Time out Enrolled date 6.4 Outputs Name of Document: Receipt Prepared By: Administrator Number of copies: 2 Frequency of distribution: Distributed when you enrolling or renewing the program in the gym Purpose: To provide the client id the program of payment for every transaction made. Recipient: Customer and Administrator 108
Name of the document: Client reports Prepared By: Online Gym B-Pass System Number of copies: Depends on the administrator Frequency of distribution: Depending to the needs of the clients and administrator. Purpose: To have a summary of the client records and to monitor the clients Recipient: Customer and Administrator
Name of the document: Payments reports Prepared By: Online Gym B-Pass System Number of copies: Depends on the administrator Frequency of the distribution: Daily, Weekly, and monthly Purpose: To monitor the income if the gym Recipient: Administrator
109
Name of the document: Log report Prepared By: Online Gym B-Pass System Number of copies: Depends on the needs. Purpose: To monitor the logs and print it according. To the chosen client or all the client if needed. Recipient: Administrator and Customer
110
CHAPTER 7 IMPLEMENTATION 7.1 Resource Requirements 7.1.1 Software Requirements Operating System: Windows 7 or higher version JRE(Java Runtime environment)) Browser (any kind of browser) Application: 7.1.2 Hardware Requirements Processor: Dual Core or higher version RAM: 1G or Higher Hard Disk: at least 80 GB Finger Print Scanner Monitor Network: LAN Card Router UTP Cable RJ45 Connector Keyboard Mouse 111
7.1.3 Human Resources Requirements 7.1.3.1 The System Analyst A system analyst investigates, analyses, plans solution, designs, develops, evaluates, and coordinates to meet the specific requirements that the system must satisfy. They are not normally involved in the actual hardware or software development though they may be familiar in operating system or other programming languages. The system analyst is responsible for all the tasks on how the system will be developed. A system analyst must have a broad knowledge technically, and a logical approach to problem solving. They need to have an ability to contribute to a team effort, have good interpersonal skills, excellent oral and written communication skills to interact with people at all levels. A system analyst also needs to have a degree in Information system, computer science, business or if non IT-related subjects, a relevant postgraduate qualification may be useful. 7.1.3.2 The Programmer A programmer is a person who writes system software. They are assigned to code programs to create the system, and the overall functions and performance of the user interface, and its connection to the database needed. A programmer should have a background on different forms of computer coding language such as SQL which is used for database, 112
HTML, PHP, Java and more. They compose instructions for computer systems to perform a given action. 7.1.3.3 The Trainer A trainer is the person who guides, coaches, or give knowledge to another person in a particular subject matter. The main task of the trainer for using the proposed system is to guide and teach the end user on how to operate the system. They are the one whos responsible to teach and educate the user which is the administrator or other personnel that will be involved in the whole process. The programmer can also serves as the trainer since they know the flow of the whole system. A trainer should know how to share their knowledge in the easiest but understandable way for the user to follow correctly. 7.1.3.4 The User The users will be the administrator, the customer, the system programmer, and the database manager. The administrator and the customer will be the end users, they need to have enough knowledge how to operate the system and the proponents are going to conduct trainings so they will be familiar to the system. The system programmer and the database manager is still considered as users since they are assigned to fix bugs and update software and hardware that will be used in the system.
113
7.2 Installation and Testing plans 7.2.1 System Installation The proposed system is installed upon the approval of the ARMM GYM officers as they are the ones to give the authorization to use the system. The system is installed in two computers which are for Human Resource Head, the Administrator and the Client. A compute will also be placed in the database of the system. This is scheduled on September 20, 2013. 7.2.3 Conversion Plans The proponents used the parallel conversion plan. With this kind of plan, there is ease in comparing both systems. The established solutions are easily shown as both systems run at the same time. This kind of plan clarifies if the requirements are met by the new system. From the obtained results, evaluating the system can be done quickly and efficiently.
7.2.2 Training Plans The proponents handled just one day for training seminars. The reason why the training is just for one day is because the Administrator in the gym, who will access the system, is an I.T. also. So we just have to teach him about the functionalities. 114
The objective of these training is to give knowledge to the Administrator who will be handling the system and also give instructions on how the system may be operated. The proponents find it important to implement trainings so that the Administrator will be capable to handle the system appropriately and efficiently. The training involves demonstration on how the system works, proper handling, troubleshooting, familiarization in using Microsoft Office Access, how database works, and maintaining record in the database, time keeping system works and implementing instructions or rules on how the system will work according to the guidelines set modules. This training is not only for the two users of the system but for those employees who handle the Attendance Monitoring.
115
Schedule of training: Date Activity Participants Facilitator September 20, 2013 Installation of the system and demonstration on how the system operates. Employees of the Human Resource Office and Accounting Office Proponents September 21, 2013 Giving of guidelines and instruction on how the system will be implemented Employees of the ARMM GYM Proponents Table 7.1 Schedule if Training 7.2.4 Testing The accuracy of the system is put into a test. This proves that the proposed system has met the requirements established to come up on an effective attendance monitoring process. System testing is done by the employees who are the users of system. End users had run a comprehensive testing on the system to perform designated task. Then, all the process on the system is checked to determine the dependability of the system. 116
The proponents tested each module set. To make sure that all the components of program are working properly. The proponents used a bottom up approach of integration where all low level modules are tested first before going up to the next level.
Date Action to be taken September 23, 2013 The different modules are tested. September 24, 2013 Modifications in the system are tested. Table 7.2 Schedule of Testing 7.3 Maintenance Plan The system should always be under the care of programmers, system analysts, database managers, and especially users. The software and hardware that is applied in the system should maintain the requirements so it will not malfunction. Maintenance plan will be implemented to identify and arrange all required elements then repair in an orderly manner. Users may use the system after the implementation and this will come up with future support so that it will be uphold by actions.
117
7.3.1 Software The system software will keep up to date and will be provided support for bug fixes. The proponents will immediately take action depending upon the preferred choice of the company to ensure stable function of the system. 7.3.2 Hardware Cable, Keyboard, mouse, fingerprint scanner, and wirings will be replaced when theres unnecessary errors occur. The router should also be upgraded or replaced when needed to hasten the connection.
118
Chapter 8 Conclusion and Recommendation
8.1 Conclusion The proponents gathered all the needed information through planning, searching of company, conducting interview, and relying on theories that is related into the subject in the whole process of creating the system. The proponents created a project proposal that will help the ARMM Gym in monitoring the attendance of their clients and in keeping the records they need proficiently. The proposed system of the proponents has met the expectations and needs of the ARMM Gym. This system drives out the paper works in ARMM Gym and lessen the tasks of the office manager. It also minimizes the errors in producing reports that is needed by the owner. To provide well organized data in ARMM GYM Inc. , Reduce paper works, to fasten the work processes , faster and accurate release of reports, develop a system that can automatically update records of customer in one process, Provide security of data , and easily monitor ARMM Gym Inc. transaction progress .In developing the Online Gym B-Pass System, it requires a wide understanding and study in the case involving the problems of the company, specification, and processes of the existing manual system. The proposed Online Gym B-Pass System includes processes that are quite similar to the existing manual system such as (1) checking of records, (2) 119
adding and updating customer records, and (3) producing reports. The only difference is that everything will be shortcut. 8.2 Recommendation This part shows some enhancement that can be made by the future researches who may be interested in making a system with a similar concept. In the light of the findings, the following recommendations are offered by the researches: 8.2.1 Increase of the systems ability to detect errors and data recovery. The system does not have a backup function causing possible data loss in case of system fault. 8.2.2 Improve system functionalities. It is recommended that the system should be able to give a more accurate solution to the problems of the gym. 8.2.3 Improve user interface of the system. It is highly recommended that the interface would be less complicated for the better understanding of the user especially for those who are not information technology literate.
120
REFERENCES Textbooks P. Tensor, 1995. Smart Card and Biometric time and attendance, visitor monitoring and access control system RFID-based Students Attendance Management System from International Journal of Scientific & Engineering Research Volume 4, Issue 2, February- 2013. ISSN 2229-5518
Consumo, Karen Mae M., Mamangun, Mary Ann M. (2011) AN EMPLOYEE ATTENDANCE MONITORING SYSTEM WITH PAYROLL USING BARCODE. A proposal presented to St. Nicolas College of Business and Technology 2nd floor, MELVI Bldg. Olongapo - Road City of San Fernando, Pampanga Online References Waterfall model from http://en.wikipedia.org/wiki/Waterfall_model Data flow diagram from http://en.wikipedia.org/wiki/Data_flow_diagram Database from http://en.wikipedia.org/wiki/Database Requirement Gathering and Analysis or System Planning from http://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction#P lanning Time Office Biometric and Attendance from http://www.timeofficesoftware.com JC Software Development from http://www.download .com/Password- Administrator MyKidSecure from http://www.biometricupdate.com/201309/eportation- launches-biometric-attendance-system-for-schools-uses-fujitsu-tech Student Attendance Monitoring System (SAMS) from http://www.ncl.ac.uk/quilt/assets/documents/com-rep-cfltsec-13mar- docF.pdf 121
Attendance Monitoring System Using Biometrics for Security Staff from http://www.studymode.com/essays/Attendance-Monitoring-System-Using- Biometrics-For-732262.html ActiveX from http://en.wikipedia.org/wiki/ActiveX Fingerprint SDK from http://www.griaulebiometrics.com/en- us/fingerprint_sdk Integrated Automated Fingerprint Identification System (IAFIS) from http://en.wikipedia.org/wiki/Integrated_Automated_Fingerprint_Identificatio n_System BioTime Edu from http://www.m3biometrics.co.uk/BioTimeEDU.aspx MONIROTING SYSTEM FOR TRANININGS OF THE PHILIPPINE NATIONAL HOUSING AUTHORITY from http://essay.utwente.nl/55730/1/Scriptie_Liong.pdf CSIT Attendance Monitoring System from http://www.smu.edu.ph/School%20of%20CSIT/scsitnews/93-school-of- csit-checking-of-attendance-now-computerized
Fingerprint Biometrics from http://www.heritage.org/research/reports/2004/06/biometric-technologies- security-legal-and-policy-implications
(2013)MySQL, techterms.com. from http://www.techterms.com/definition/mysql
Java Programming from http://www.webopedia.com/TERM/J/Java.html
Student Attendance Tracking System (SATS) from http://www.astiwz.com/project-synopsis-abstract-documentation-source- code.php?pid=135&name=Student%20Attendance%20Tracking%20Syste m.&project-mode=Paid
(Barry Mills:LTA 2007 A1 base 20/6/07 10:16) Attendance Monitoring Pilot 122
Project from http://www.derby.ac.uk/files/barry_mills_- _attendance_monitoring_pilot_project.pdf