+ All Categories
Home > Documents > Final Thesis with Table of contents(hardbound).doc

Final Thesis with Table of contents(hardbound).doc

Date post: 14-Apr-2018
Category:
Upload: michaellester-ordonez-monteron
View: 224 times
Download: 0 times
Share this document with a friend

of 64

Transcript
  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    1/64

    ILIGAN MEDICAL CENTER COLLEGE

    CAMPUS ENTRANCE

    A proposal for Barcode System

    An Undergraduate Thesis

    Presented to

    The Faculty of College of Computer Studies

    ILIGAN MEDICAL CENTER COLLEGE

    Iligan City

    In Partial Fulfilment

    Of the Requirements for the degree ofBACHELOR OF SCIENCE AND INFORMATION TECHNOLOGY

    By:

    Rachel Jane L. Rosal

    Jomar S. Balolong

    March 2012

    1

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    2/64

    ILIGAN MEDICAL CENTER COLLEGE

    City of Iligan

    APPROVAL SHEET

    This project study entitled:

    ILIGAN MEDICAL CENTER COLLEGE CAMPUS ENTRANCE

    A proposal for Barcode System

    Prepared and submitted by Rachel Jane L. Rosal and Jomar S. Balolong, in Partial

    fulfilment of the requirement for the degree of Bachelor of Science in Information

    Technology.

    Enrico Miguel E. Ong

    Adviser

    PANEL OF EXAMINERS

    Mr. Enrico Miguel E. Ong Mr. Dindo Donald A. Manulat, Jr

    Member Member

    Alecia C. Diaz, MMEM

    Chairman

    2

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    3/64

    ACKNOWLEDGEMENT

    The researcher would like to convey their sincere appreciation to the following

    individual who gave valuable assistance and service for the completion of his software

    project study.

    To Mr. Enrico Miguel E. Ong for his continuous moral and technical support and

    for being their adviser in this software project study.

    To the panel members, Prof. Alecia C. Diaz and Mr. Dindo Donald A. Manulat Jr,

    for their time and knowledge they shared to make this project.

    To the Information Technology Support Group Head, Mr. Jerome Gonzales, for

    allowing the researchers to use the Computer Laboratory.

    To their beloved parents, Mr and Mrs Salvacion L. Rosal and Mr and Mrs Marilyn

    S. Balolong , who gave financial and moral support in making of this project study.

    To their friends, who encouraged and gave them the confidence and strength

    they needed to complete this project.

    To security guard, who gave extra knowledge, support understanding, patience

    and needed information for the completion of the study.

    And above all, the researchers would like to express their heartfelt thanks and

    gratitude to the Almighty father for all the bountiful blessings we had bestowed on them

    during the development of the project.

    3

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    4/64

    TABLE OF CONTENTS

    TITLE OF PAGE Pages

    APPROVAL SHEET iiACKNOWLEDGEMENT iiiTABLE OF CONTENTS ivLIST OF TABLES viLIST OF FIGURES viiiABSTRACT ix

    Chapter I: THE PROBLEM AND ITS SCOPE

    1.1 Background of the Study 11.2 Statement of the Problem 11.3 Objective of the Problem 21.4 Significant of the Study 21.5 Scope and Limitation of the Study 31.6 Conceptual Framework 31.7 Glossary of Terms 4

    Chapter II: REVIEW RELATED LITERATURE2.1 Barcode 52.2 Barcode Reader 5

    Chapter III: RESEARCH METHODOLOGY3.1 Requirement Analysis 73.2 Design 73.3 Construction and Testing 83.4 Hardware and Software Requirements 9

    4

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    5/64

    Chapter IV: RESULTS AND DISCUSSION4.1 Requirement Analysis 104.1.1 Project Charter 114.1.2 Software Project Plan 11

    4.2 Analysis 114.2.1 Context Model 124.2.2 Use Case Diagram 134.2.3 Entity Relationship Diagram 144.2.4 Activity Diagram 154.2.5 Deployment Diagram 164.2.2 List of Entity and Attributes 174.3 Design 194.3.1 Database Design 194.3.2 Database Schema 214.3.3 Capacity Plan 23

    4.3.4 Graphical User Interface Design GUI274.3.5 Program Design 384.3.6 Report Design 394.4 Construction and Testing 394.4.1 Test Result 404.4.2 Summary for Test Result 41

    Chapter V: SUMMARY, CONCLUSIONS AND RECOMMENDATION5.1 Conclusion 425.2 Summary 43

    5.3 Recommendation 44

    BIBLIOGRAPHY 45

    APPENDICES

    A Letter of Approval 46B Gantt chart 47B Pert Chart 48C Cost and Benefits 49

    5

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    6/64

    LIST OF TABLES

    Tables Page

    Table 1 Hardware Requirements 9

    Table 2 Software Requirements 9

    Table 3 Student Log Entity and Attributes 17

    Table 4 Student Entity and Attributes 17

    Table 5 Employee Entity and Attributes 17

    Table 6 Employee Log Entity and Attributes 18

    Table 7 Valid Student Entity and Attributes 18

    Table 8 Student Log Database Design 19

    Table 9 Student Database Design 20

    Table 10 Employee Database Design 20

    Table 11 Employee Log Database Design 20

    Table 12 Valid Student Database Design 20

    Table 13 Employee Database Schema 21

    Table 14 Student Database Schema 21

    Table 15 Student Log Database Schema 22

    Table 16 Employee Log Database Schema 22

    Table 17 Valid Student Database Schema 22

    Table 18 Capacity Plan for Student 23

    Table 19 Capacity Plan for Student Log 24

    6

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    7/64

    Table 20 Capacity Plan for Employee 24

    Table 21 Capacity Plan for Employee Log 25

    Table 22 Capacity Plan for Valid Student 25

    Table 23 Summary of Capacity Plan 26

    Table 24 Test Result 40

    Table 25 Summary of Test Result 41

    7

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    8/64

    LIST OF FIGURES

    Figures Page

    Figure 1 Conceptual Framework 3

    Figure 2 Context Model 12

    Figure 3 Use Case 13

    Figure 4 Entity Relationship Diagram 14

    Figure 5 Activity Diagram 15

    Figure 6 Deployment Diagram 16

    Figure 7 Barcode Form 27

    Figure 8 System Login Type Form 28

    Figure 9 Validate Student Form 29

    Figure 10 Student Registration Form 30

    Figure 11 Student Profile Form 31

    Figure 12 Student Log Form 32

    Figure 13 Validation Student Form 33

    Figure 14 Employee Form 34

    Figure 15 Employee Log Form 35

    Figure 16 Employee Registration Form 36

    Figure 17 Employee Profile Form 37

    Figure 18 Report Design 39

    8

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    9/64

    ABSTRACT

    Rachel Jane L. Rosal

    Jomar S. Balolong

    Iligan Medical Center College campus entranceCollege of Computer Studies, Iligan Medical Center College, March 2021.

    Project AdviserMr. Enrico Miguel E. OngFacultyCollege Of Computer StudiesIligan Medical Center College

    This proposed study, which is entitled Iligan Medical Center College Campus

    Entrance, deals with the problem on monitoring the entrance system due to the number

    of students who entered every day. The system was coded in PHP with MySQL as its

    database.

    Other software tools uses are Dezign and Uniform Server UPX to fully represent

    the system. For further understanding, tables, diagram, charts and figures were created

    to illustrate relationship and dependencies among classes. Analysis models were also

    applied to demonstrate the rationality of developing the system.

    The system was intently built with a user friendly graphical user interfacing for a

    fast and easy usage of the system.

    9

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    10/64

    Chapter I

    THE PROBLEM AND ITS SCOPE

    1.1 Background of the study

    In Iligan Medical Center College, each student has its own identification. The

    school use Identification card (ID) in which each IDs has a unique number to identify the

    students. The school guard should be responsible to monitor the entrance system in

    Iligan Medical Center College (IMCC) campus. The school has a policy, which is NO

    ID, NO ENTRY and students are required to wear their individual school IDs in order to

    enter the school campus. Still, there are lot of students who enter the school campus

    without wearing their school ID. If the personnel who is involve in the current system

    and let the student pass without wearing school IDs, their would be a possibility that

    their are some person who can enter even it is not a student in IMCC.

    We the researchers conduct some interviews to the school Guard and we found

    out that using barcode access in school security in Iligan Medical Center College

    (IMCC) will easily to identify the student with or without school ID. The system also

    helps to identify if the student is active or inactive in every school semester. By using

    this system it will automatically display into the database the time and date when the

    student enter the school.

    10

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    11/64

    1.2 Statement of the Problem

    Based from the information gathered, the researchers have identified the problems:

    1. Students can directly enter the school without wearing school I.D

    2. Students are using other I.D to have access in school security

    1.3 Objective of the Study

    After knowing the specific problem that is involved in school security system, the

    researchers have come up with these objectives in developing as system:

    1. To create a system that would help to identify if the student are wearing their

    school ID and to avoid using other ID

    2. In order to enter in the school campus some students borrow ID to the other

    student. This system could avoid this particular problem.

    11

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    12/64

    1.4 Significance of the study

    The implementation of this project is to facilitate the process of school entrance.

    This would be great help to the following:

    To the school guards, this study will help monitor entrance system the easy way

    and no hassle to the school guard. Their task also is to gather some information to the

    student; they were going to check in to the computer if the students are currently

    enrolled in IMCC.

    To the Future Researchers, this study will give ample and accurate monitoring

    that will provide better understanding about the Bar coded access in IMCC entrance

    system.

    1.5 Scope and Limitation of the study

    This study will focus on monitoring school security in IMCC to generate fast and

    accurate entrance system.

    This study limits on the entrance system through barcode access, storing and

    counting of number of students entered the school campus. If the student is officially

    enrolled his/her responsible of renewing their ID every semester thats why the registrar

    is responsible to activate into active the student data.

    12

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    13/64

    1.6 Conceptual Framework

    A conceptual framework is used to outline possible courses of action or present a

    preferred approach to an idea and thought.

    This figure shows the flow of data in the Bar code access in Iligan Medical Center

    College entrance.

    Figure 1: Conceptual Framework

    13

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    14/64

    1.7 Glossary Of term

    These are words that technically used in the study:

    Bar Code - is a series of parallel black bars and white spaces, both of varying

    widths. Bars and spaces together are called elements. Different combinations of the

    bars and spaces represent different characters, such as numbers or letters.

    Access - The ability and means necessary to store data in, to retrieve data from,

    to communicate with, or to make use of any resource of a system.

    System -is a set of elements and relationships which are different from

    relationships of the set or its elements to other elements or sets.

    Code - is a rule for converting a piece of information (for example, a letter, word,

    phrase, orgesture) into another form or representation (one sign into another sign), not

    necessarily of the same type.

    14

    http://www.its.bldrdoc.gov/fs-1037/dir-010/_1401.htmhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://en.wikipedia.org/wiki/Element_(mathematics)http://en.wikipedia.org/wiki/Relationshiphttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Letter_(alphabet)http://en.wikipedia.org/wiki/Wordhttp://en.wikipedia.org/wiki/Phrasehttp://en.wikipedia.org/wiki/Gesturehttp://en.wikipedia.org/wiki/Signhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://en.wikipedia.org/wiki/Element_(mathematics)http://en.wikipedia.org/wiki/Relationshiphttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Letter_(alphabet)http://en.wikipedia.org/wiki/Wordhttp://en.wikipedia.org/wiki/Phrasehttp://en.wikipedia.org/wiki/Gesturehttp://en.wikipedia.org/wiki/Signhttp://www.its.bldrdoc.gov/fs-1037/dir-010/_1401.htm
  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    15/64

    Chapter II

    Review Related Literature

    2.1 Barcode

    A Barcode access is an optical machine readable presentation of data, which

    shows data about the object to which it attaches. The earliest, and still the cheapest,

    barcode scanners are built from a fixed light and a single photo sensorthat is manually

    "scrubbed" across the barcode.

    Barcode scanners can be classified into three categories based on their

    connection to the computer. The older type is the RS-232 barcode scanner. This type

    requires special programming for transferring the input data to the application program.

    "Keyboard interface scanners" connect to a computer using a PS/2 or AT

    keyboardcompatible adaptor cable. The barcode's data is sent to the computer as if it

    had been typed on the keyboard. (Palmer, 1978)

    The researchers found out that the student must present his / her I.D embedded

    with a barcode label that will be detected by the barcode reader. If the ID is detected as

    valid, the particular student will be display on the monitor screen. The informations that

    displayed is such as name, ID number, and student picture

    15

    http://en.wikipedia.org/wiki/Photosensorhttp://en.wikipedia.org/wiki/Photosensor
  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    16/64

    2.2 Barcode System

    In 1948, Bernard Silverwas a graduate student at Drexel Institute of Technology in

    Philadelphia. A local food chain store owner had made an inquiry to the Drexel Institute

    asking about research into a method of automatically reading product information during

    checkout. Silver joined together with fellow graduate student Norman Joseph Woodland

    to work on a solution. Woodland's first idea was to use ultraviolet light sensitive ink. The

    team built a working prototype but decided that the system was too unstable and

    expensive. They went back to the drawing board. On October 20, 1949, Woodland and

    Silver filed their patent application for the "Classifying Apparatus and Method",

    describing their invention as "article classification through the medium of identifying

    patterns".

    It was soon realized that there would have to be some sort of industry standard set.

    In 1970, the Universal Grocery Products Identification Code orUGPIC was written by a

    company called Logicon Inc. The first company to produce bar code equipment for retail

    trade use (using UGPIC) was the American company Monarch Marking in 1970, and for

    industrial use, the British company Plessey Telecommunications was also first in 1970.

    UGPIC evolved into the U.P.C. symbol set or Universal Product Code, which is still

    used in the United States. George J. Laurer is considered the inventor of U.P.C. or

    Uniform Product Code, which was invented in 1973. In June 1974, the first U.P.C.

    scanner was installed at a Marsh's supermarket in Troy, Ohio. The first product to have

    a barcode included was a packet ofWrigley's Gum. (Bellis, 2010)

    16

    http://en.wikipedia.org/wiki/Bernard_Silverhttp://en.wikipedia.org/wiki/Drexel_Universityhttp://en.wikipedia.org/wiki/Point_of_salehttp://en.wikipedia.org/wiki/Norman_Joseph_Woodlandhttp://en.wikipedia.org/wiki/Ultraviolethttp://en.wikipedia.org/wiki/Patent_applicationhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Logiconhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Plesseyhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/George_J._Laurerhttp://en.wikipedia.org/wiki/Marsh_Supermarketshttp://en.wikipedia.org/wiki/Wm._Wrigley_Jr._Companyhttp://en.wikipedia.org/wiki/Bernard_Silverhttp://en.wikipedia.org/wiki/Drexel_Universityhttp://en.wikipedia.org/wiki/Point_of_salehttp://en.wikipedia.org/wiki/Norman_Joseph_Woodlandhttp://en.wikipedia.org/wiki/Ultraviolethttp://en.wikipedia.org/wiki/Patent_applicationhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Logiconhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Plesseyhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/George_J._Laurerhttp://en.wikipedia.org/wiki/Marsh_Supermarketshttp://en.wikipedia.org/wiki/Wm._Wrigley_Jr._Company
  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    17/64

    Chapter III

    Research Methodology

    This chapter presents and analyze the information gathered by the researchers

    by implementing an entrance system and to pursue the following appropriate procedure:

    requirement analysis, design, construction and testing and hardware and software

    requirements.

    3.1 Requirement Analysis

    The process of understanding that user needs an expectations from a

    proposed system is what we called requirement analysis. It describes how a system

    should monitor and gathered information base on what are the process of entrance

    system using barcode reader. It helps the researcher identify some problem by

    conducting an interview and to identify the requirements that are needed to this study.

    In acquiring these processes the researchers well determine the accurate requirements

    in developing the system.

    3.2 Design

    The design of the system identifies the problems and finding better solutions, the

    researchers had finished gathering information. The researchers of this study will

    develop an Entrance system using barcode access in IMCC, which help the researchers

    to define what the purpose of the system are and what are the content in developing a

    system. A database is the graphical user interface and a server of the system, to be

    developed and implemented. Using class diagram, the researchers will be able to

    17

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    18/64

    analyze the possible design of the study, and the processes needed to produce the

    desired output.

    3.3 Construction and testing

    The proposed entrance system would be implemented through the use of

    barcode reader in order to read the ID of the students. The researchers construct the

    program using PHP (hypertext processor) in testing process of reliability of a program.

    In testing process trial and error method is being used to test the proposed system. It is

    important to test the system for the implementation and maintenance. In Unit testing

    and the integration of modules would be conducted during the testing process for the

    input and output verification.

    3.4 hardware and software Requirements

    In developing the new system, hardware and software resources will be needed.

    The hardware and software requirements are the following:

    Hardware Requirements

    Processor: Intel Core i3

    Memory: 4 GB or higher

    Hardware Drive: 40 GB or higher

    Input/Output devices: Printer, mouse, keyboard, system unit,

    barcode reader

    Motherboard: ASUS

    Table 1: Hardware requirements

    Software Requirements

    18

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    19/64

    Operating system: Microsoft Windows XP, Ubuntu

    DBMS: MySQL

    Tools: DeZign, Microsoft Excel, Ms Access,

    PhotoshopProgramming Language: PHP

    Table 2: Software Requirements

    Chapter IV

    Result and Discussions

    19

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    20/64

    This chapter deals with the results of the study. Likewise, it attempts to discuss

    the procedure.

    4.1 Requirements Analysis

    Requirements analysis phase the process of reviewing all the datas identified

    and evaluated to determine the system needs. These are the following:

    Context Diagram was used the system to understand in how the system

    interacts by receiving and sending data to external entities.

    Entity Relationship Diagram (ERD) which was used to identify the entities and

    attributes in the system. To determine the relationship between these entities.

    Activity Diagram which was used to identify the flow of actions that are part of

    the system.

    Conceptual Framework used to represent on what the information are being

    input inside the system and what the output are as a gathered reports of the

    system.

    Use case diagram to show the steps that have been taken in the system.

    Deployment Diagram as used in the system, it shows the hardware and

    software components used in the system and to show the user of the system and

    its connectivity to the other user.

    4.1.1 Project Charter

    20

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    21/64

    Project Charter is a statement of the scope, objectives and participants in a

    project. It provides a preliminary delineation of roles and responsibilities, outlines the

    project objectives, and defines the authority for the future of the project.

    The purpose of the project charter is to document reasons for undertaking the

    project, objectives and constraints of project, directions concerning the solution and the

    identifies of the main stakeholders.

    Project charter outlines the purpose of the project, the way the project will be

    structured and how it would be successfully implemented. The project charter describes

    the project vision, objectives, scope and deliverables, as well as the stakeholders, roles

    and responsibilities.

    4.1.2 Software Project Plan

    The software project plan serves as the accomplishment of the days work in the

    entire set of programs, procedures and related documentation associated with a

    system. By the use the Gantt chart the researcher will identify the duration the task to

    be performed and the estimated start and end of the project proposed.

    4.2 Analysis

    The researchers have analyzed the structures data of the system, known by the

    research problem, developed and implemented plans for the proposed system and the

    conceptual design of a system.

    4.2.1 Context Diagram

    21

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    22/64

    The context model shown represent the data input to the system and the

    expected data output.

    Figure 2: Context Model

    4.2.2Use Case

    22

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    23/64

    A use case is a sequence of actions that provide a measurable value to an actor.

    Another way to look at it is a use case describes a way in which a real-world actor

    interacts with the system. In a system use case you include high-level implementation.

    Figure 3: Use case

    4.2.3Entity Relationship Diagram

    23

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    24/64

    An entity relationship diagram is a data modelling technique that creates a

    graphical representation of the entities, and the relationship between entities, within an

    information system.

    Figure 4: Entity Relationship Diagram

    4.2.4 Activity Diagram

    24

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    25/64

    Activity diagram is basically a flow chart to represent the form one activity to

    another activity. The activity can be described as an operation of the system.

    Figure 5: Activity Diagram

    4.2.5 Deployment Diagram

    25

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    26/64

    Deployment diagram are used for describing the hardware components where

    software components are deployed. Component diagrams and deployment diagrams

    are closely related. Component diagrams are used to describe the components and

    deployment diagrams shows how they are deployed in hardware.

    Figure 6: Deployment Diagram

    4.2.6 List of Entity and Attributes

    26

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    27/64

    These are the list of entity and corresponding attributes and easy to monitor

    entrance system. Every sets of entities, there was a corresponding description on it.

    STUDENTLOG

    ATTRIBUTES DESCRIPTION

    log_id Student Log IDlog_date Student Log Datelog_time Student Log Timecode_no Student Log Code No

    Table 3: Student log Entity and Attributes

    STUDENT

    ATTRIBUTES DESCRIPTIONcode_no Student Code Nostudent_id Student IDf_name Student First Namem_name Student Middle Namel_name Student Last NameAddress Student AddressGender Student Gendercontact_no Student Contact NoCourse Student CoursePhoto Student Photo

    Table 4: Student Entity and Attributes

    EMPLOYEE

    ATTRIBUTES DESCRIPTION

    code_no Employee Code Nof_name Employee First Namem_name Employee Middle Namel_name Employee Last NamePhoto Employee Photo

    Table 5: Employee Entity and Attributes

    EMPLOYEE

    ATTRIBUTES DESCRIPTION

    log_id Employee Log IDlog_date Employee Log Date

    27

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    28/64

    LOG log_time Employee Log Timecode_no Employee Log Code No

    Table 6: Employee Log Entity and Attributes

    VALIDSTUDENT

    ATTRIBUTES DESCRIPTIONvalidation_id Employee Log IDCode_no Employee Code No

    Table 7: Valid Student Entity and Attributes

    4.3 Design

    28

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    29/64

    The design of the system is the process or art of defining the architecture,

    components, modules, interfaces, and data for a system to satisfy specified

    requirements. It is also a process for the input and the output process. It aptly stars with

    identifying and analyzing the problem. Base from the information the possible solutions

    were searched and evaluated in structured procedure.

    4.3.1 Database Design

    Database design is the process of producing a detailed data model of a

    database. This logical data model contains all the needed logical and physical design

    choices and physical storage parameter needed to generate a design in a Data

    Definition Language, which can then be used to create a database. A fully attributed

    data model contains detailed attributes for each entity.

    Entity Attributes Data Type Length

    STUDENT LOG

    LOG_ID INT 10

    LOG_DATE DATE

    LOG_TIME TIME

    CODE_NO VARCHAR 20

    Table 8: Student Log Database Design

    Entity Attributes Data Type Length

    CODE_NO VARCHAR 20

    STUDENT_ID VARCHAR 10

    29

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    30/64

    STUDENT

    F_NAME CHAR 50

    M_NAME CHAR 30

    L_NAME CHAR 30

    ADDRESS VARCHAR 50

    GENDER CHAR 6

    CONTACT_NO VARCHAR 20COURSE VARCHAR 20

    PHOTO BLOB

    Table 9: Student Database Design

    Entity Attributes Data Type Length

    EMPLOYEE

    CODE_NO VARCHAR 15

    F_NAME VARCHAR 20

    M_NAME CHAR 20

    L_NAME CHAR 20

    PHOTO BLOB

    Table 10: Employee Database Design

    Entity Attributes Data Type Length

    EMPLOYEE LOG

    LOG_ID INT 10

    LOG_DATE DATE

    LOG_TIME TIME

    CODE_NO VARCHAR 20

    Table 11: Employee Log Database Design

    Entity Attributes Data Type LengthVALIDLOG

    VALID_ID INT 10

    CODE_NO VARCHAR 20

    Table 12: Valid Log Database Design

    4.3.2 Database Schema

    30

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    31/64

    The database schema is a collection of records or data that is stored in a

    computer system.

    Prior to implement the system, a database must be created. Creating a table for

    a relation, a data definition instruction must name the relation for the reason that it can

    be added to the database directory. Each data item in the relation must then be defined

    by describing the data item (attribute), name, data type and length.

    Create Table Employee

    CREATE TABLE `employee` (

    `code_no` VARCHAR(15) NOT NULL,`f_name` CHAR(20) NOT NULL,`m_name` CHAR(20) NOT NULL,`l_name` CHAR(20) NOT NULL,`photo` LONGBLOB NOT NULL,CONSTRAINT `PK_employee` PRIMARY KEY (`code_no`));

    Table 13: Employee Database Schema

    Table 14: Student Database Schema

    31

    Create Table Student

    CREATE TABLE `student` (`code_no` VARCHAR(15) NOT NULL,`student_id` VARCHAR(15) NOT NULL,`f_name` CHAR(20) NOT NULL,`m_name` CHAR(20) NOT NULL,`l_name` CHAR(20) NOT NULL,`address` VARCHAR(50) NOT NULL,`gender` CHAR(6) NOT NULL,`contact_no` VARCHAR(15) NOT NULL,`course` VARCHAR(50) NOT NULL,`photo` LONGBLOB NOT NULL,

    CONSTRAINT `PK_student` PRIMARY KEY (`code_no`));

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    32/64

    Table 15: Student Log Database Schema

    Table 16: Employee Log Database Schema

    Table 17: Valid Student Database Schema

    4.3.3 Capacity Plan

    Capacity planning of the database is necessary to ensure the data are properly

    stored in the system. The succeeding tables show number of bytes and total bytes of

    each entity.

    Capacity Plan for Student

    32

    Create Table Student_log

    CREATE TABLE `student_log` (`log_id` INTEGER NOT NULL AUTO_INCREMENT,`log_date` DATE NOT NULL,

    `log_time` TIME NOT NULL,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_student_log` PRIMARY KEY (`log_id`));

    ALTER TABLE `student_log` ADD CONSTRAINT `student_student_log`FOREIGN KEY (`code_no`) REFERENCES `student` (`code_no`);

    Create Table Employee_log

    CREATE TABLE `employee_log` (`log_id` INTEGER NOT NULL AUTO_INCREMENT,`log_date` DATE NOT NULL,`log_time` TIME NOT NULL,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_employee_log` PRIMARY KEY (`log_id`));

    ALTER TABLE `employee_log` ADD CONSTRAINT `employee_employee_log`FOREIGN KEY (`code_no`) REFERENCES `employee` (`code_no`);

    Create Table Valid_Student

    CREATE TABLE `valid_student` (`validation_id` INTEGER NOT NULL AUTO_INCREMENT,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_valid_student` PRIMARY KEY (`validation_id`));

    ALTER TABLE `valid_student` ADD CONSTRAINT `student_valid_student`FOREIGN KEY (`code_no`) REFERENCES `student` (`code_no`);

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    33/64

    ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)code_no VARCHAR

    11 14student_id

    VARCHAR6 8

    f_name CHAR 20 20m_name CHAR 20 20l_name CHAR 20 20Address VARCHAR 50 60gender

    CHAR6 6

    contact_no VARCHAR 20 25course VARCHAR 50 60photo BLOB 233

    Table 18: Capacity Plan for Student

    Information

    Number of records per semester = 1,523Size in bytes/students = 2331,523 record/month *5 months/sem * 233 bytes/student * 1kb/1024 bytes

    = 1523(5)(233)/1024= 1732.71 kb/sem

    Capacity Plan for Student_log

    ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)log_id INTEGER 11 4log_date DATE 3log_time TIME 3code_no VARCHAR 11 14

    24

    33

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    34/64

    Table 19: Capacity Plan for Student_log

    Information

    Number of records per semester =1523Size in bytes/student log = 241523 record/month * 5 months/sem * 24 bytes/student log * 1kb/1024 bytes

    = 1523(5)(24)/1024=178.48 kb/sem

    Capacity Plan for Employee

    ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)code_no VARCHAR11 14

    f_nameVARCHAR

    6 8

    m_name CHAR 20 20l_name CHAR 20 20photo BLOB 62

    Table 20: Capacity Plan for Employee

    Information

    Number of records per semester =1523Size in bytes/employee =621523 record/month * 5 months/sem * 62 bytes/employee * 1 kb/1024 bytes

    =1523(5)(62)/1024=461.06 kb/sem

    Capacity Plan for Employee Log

    ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)log_id INTEGER 11 4log_date DATE 3log_time TIME 3code_no VARCHAR 11 14

    34

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    35/64

    24

    Table 21: Capacity Plan for Employee Log

    Information

    Number of records per semester =1523Size in bytes/employee log = 241523 record/month * 5 months/sem * 24 bytes/employee log * 1kb/1024 bytes

    = 1523(5)(24)/1024=178.48 kb/sem

    Capacity Plan for Valid_Student

    ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)Validation_id INTEGER 11 4code_no VARCHAR 11 14

    18

    Table 22: Capacity Plan for Valid Student

    Information

    Number of records per semester=1523Size in bytes/valid students=181523 record/month * 5 months/sem * 18 bytes/valid student * 1 kb/1024 bytes

    =1523 (5)(18)/(1024)=133.86 kb/sem

    SUMMARY CAPACITY PLAN

    Entity Existing Frequency Growth in 10 years Total

    Student 233 1523 1732.71 3488.71

    35

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    36/64

    Student Log 24 1523 178.48 1725.48

    Employee 62 1523 461.06 2046.06

    Employee

    Log

    24 1523 178.48 1725.48

    Valid Student 18 1523 133.86 1674.86

    Table 23: Summary of Capacity Plan

    4.3.4 Graphical User Interface (GUI) Design

    Graphical User Interface (GUI) is a program design that display options on the

    screen as icons by which users commands by pressing keyboard, clicking a computer

    mouse button or by touching on a touch pad.

    36

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    37/64

    Figure 7: Barcode Form

    This form shows the first type of log-in system, where the student needs to read

    or scan their ID before entering school campus.

    37

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    38/64

    Figure 8: System Login type Form

    This form show the second type of log-in of system . where the administrator

    need only to input their user name and password to log-in.

    38

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    39/64

    Figure 9: Validate student form

    This form shows the ID not yet enrolled or register to the administrator.

    39

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    40/64

    Figure 10: Student Registration form

    This form shows the new / transferee student to register to the school.

    40

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    41/64

    Figure 11:Student Profile form

    This form shows the student profile by scanning the code number of the

    students ID before entering IMCC campus.

    41

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    42/64

    Figure 12:Student Log form

    This forms allows to show the log date,log time and student name.

    42

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    43/64

    Figure 13: Validation Student form

    This form show the Student Profile to Validate their profile. Click the validate

    buttom to activate the student profile.

    43

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    44/64

    Figure 14: Employee Form

    This form shows the records of employee or list.

    44

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    45/64

    Figure 15: Employee Log form

    This forms allow to show the log date, log time and employee name.

    45

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    46/64

    Figure 16: Employee Registration Form

    This form shows the employee registratrion form of the system.

    46

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    47/64

    Figure 17: Employee Profile form

    This form show the employee profile by scanning the code number of the

    employee ID before entering IMCC campus.

    47

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    48/64

    4.3.5 Program Design

    The activity of progressing from a specification of some required program to a

    description of the program itself. It represents the flow of of events in the user interface

    design.

    48

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    49/64

    4.3.6 Report Design

    Report design is important to show the result of application in designing. This is

    the output of the system that shows semestral statistical report of Barcode access in

    Iligan Medical Center College campus entrance.

    Figure 18: Report Design

    4.4 Construction and Testing

    In constructing and testing, the developer produces a system based on the Entity

    Relationship Diagram (ERD) as footstep in making the system. After the system is

    constructed, it is being tested to determine whether there are bugs/errors in the system

    an to be able to apply corrective actions.

    49

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    50/64

    4.4.1 Test Result

    Table 24: Test Result

    50

    COMPONENT CRITERIA RESULTS

    HOME Can view IMCC vision, mission and goals Success

    STUDENT Can view, add, update, delete Success

    STUDENT LOG Can view, print Success

    EMPLOYEE LOG Can view, print Success

    EMPLOYEE Can view, add, update, delete Success

    VALID STUDENT Can update, validate Success

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    51/64

    4.4.2 Summary of Test Result

    Test Goal Expected Remarks

    Test for Login To restrict the system from

    unauthorized admin.

    Only authorized personnel

    can use the application

    Successful

    HOME To view IMCC vision ,mission

    and goals

    Incoming boarders can view

    which room they like

    Successful

    STUDENT

    LOG

    To view and print logs record Student log are recorded

    everyday

    Successful

    STUDENT To view, delete, update, add

    student record

    Student information can be

    viewed by the admin

    Successful

    EMPLOYEE

    LOG

    To view and print logs record Employee log are recorded

    everyday

    Successful

    EMPLOYEE To view, delete, update, add

    employee record

    Employee information can

    be viewed by the admin

    Successful

    VALID

    STUDENT

    To validate, update student

    profile

    Student validation can

    update the profile of the

    student

    Successful

    Table 25: Summary of Test Result

    Chapter V

    51

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    52/64

    SUMMARY, CONCLUSION AND RECOMMENDATION

    5.1 Conclusion

    The system that has been developed by the researchers we found out that Iligan

    Medical center College Barcode access entrance system has successfully achieve of its

    objectives and areas of concerns. The researchers noticed the problem exist regarding

    with the easy maonitoring, manipulate, storage, retrieval of the data being records daily.

    The proposed system is electronically manipulated thus; monitoring and updating

    of students records will be easier. The data input all the records will be saved and view

    to the systems database. With the systems capability to organize and maintain

    records accurately, retrieving of the data records will be much efficient. The system

    admin person could easily track the data by using the system.

    The researchers conclude that the monitoring entrance system provides an

    integrates data records for the school guard ofIligan Medical Center College.

    5.2 SUMMARY

    52

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    53/64

    The barcode access in Iligan Medical Center College entrance campus, the

    researchers developed a data record of the student using barcode reader, which is

    every student enter the school campus should be wear their corresponding IDs, the

    school guard is the responsible to check the IDs of the students by scanning the

    barcode located in their individual Ids. Since the school has a policy which is NO ID,

    NO ENTRY this system should be implemented.

    The researchers found out that using barcode reader or scanner can easily

    identify the students who entered the school campus. The student should be required to

    renew their ID every semester to activate their data as soon as possible. The barcode

    reader may display the time, date and name of the student every log in of the student

    its automatically save their data and easy to check the school guard who enter on that

    day as well as the data of the student.

    Lastly, the researchers conclude that in every semester the students are required

    renew their school ID to have activation in the scanner and the administrator is

    responsible with it. The system can automatically update the data of the student or

    reactivate in every end of the semester. If the students validate their ID to the registrar

    they change the profile of the student to activate student data thats why the school

    guard know that student is officially enrolled.

    53

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    54/64

    5.3 Recommendation

    These are some of the researchers recommendations:

    1. The researchers recommend using the said gadget with care. The management

    should provide basic guidelines in using the gadget during log in to avoid

    hardware damage.

    2. The researchers would recommend to the future researchers to enhance and to

    develop the design of the system.

    3. The student who enrolled should be responsible of renewing their ID every

    semester so that they will easily enter the IMCC campus.

    4. The researchers recommend to required valid school ID every semester.

    5. The researchers recommend requiring a durable barcode scanner.

    54

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    55/64

    BIBLIOGRAPHY

    Internet Sources:

    Palmer, R. (2007, September 13). The barcode book. Helmers Publishing. Retrieved

    last August, 2011, from

    http://en.wikipedia.org/wiki/barcode

    Mary Bellis. "Bar Codes - The History of Bar Code". Inventors.about.com. Retrieved

    August 04, 2010, from

    http://en.wikipedia.org/wiki/Barcode_system

    55

    http://en.wikipedia.org/wiki/barcodehttp://inventors.about.com/library/inventors/blbar_code.htmhttp://en.wikipedia.org/wiki/Barcode_systemhttp://en.wikipedia.org/wiki/barcodehttp://inventors.about.com/library/inventors/blbar_code.htmhttp://en.wikipedia.org/wiki/Barcode_system
  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    56/64

    APPENDIX A

    LETTER OF APPROVAL

    August 19, 2011

    Mr. Jefrrey L. BarrancoMRC HEAD

    Dear Sir:

    Greetings!

    We are the 4th year students taking Bachelor of Science in Informationtechnology. As a requirement of the course CS 405-Project Study, we are todevelop a system. With the intent of developing a system for your goodadministration, we humbly ask your approval allowing us to conduct an interview.This will allow us to identify the needs and meet the requirements of the systemthat we are to develop to bring out a more effective and efficient system.

    We are hoping for your kind consideration on this matter.

    Thank you.

    Respectfully yours,

    Jomar S. BalolongRachel Jane L. Rosal

    Noted by:

    Enrico Miguel E. OngAdviser

    56

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    57/64

    APPENDIX B

    GANTT CHART

    57

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    58/64

    APPENDIX C

    PERT CHART

    58

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    59/64

    APPENDIX D

    Cost and Benefits

    Cost and Benefits Analysis

    A. Development Cost

    a. Hardware cost: P

    50,000

    Barcode reader P 2,500

    b. Software Cost Programming Cost P

    80,000

    Total Development Cost P

    132,000

    B. Present Operating Cost

    Salary (1 Person) P

    80,000

    59

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    60/64

    Maintenance P 2,000

    Total Operating Cost P

    82,000.00

    C. Proposed Operating Cost

    Salary (1 Person) P

    80,000

    Electric Bill

    P 5,000

    Total Proposed Operating Cost P

    85,000.00

    Cost Recovery Scheme

    Existing Present annual Cost

    P 82,000

    Proposed Annual Cost P

    85,000

    60

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    61/64

    Total cost Recovery Scheme P

    83,000

    Present Value: P= F/ (1+i)

    Where:

    i = Interest (10%)

    n = number of years

    F = Present Amount

    Year Annual saving Present Value Cumulative

    Present

    1 83,000 75454.55 75454.55

    2 83,000 68595.04 144049.59

    Pay Back Period:

    61

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    62/64

    Cost of Implementation = P 132,000

    Less: Cumulative Present Value = P 83,000

    Unpaid Portion = P 49,500

    To solve for unpaid portion = 49, 500/132,500 =0.37

    To determine the exact month = .37x12 = 4.44 or 4 months

    To determine the exact day = .44x30 = 13.2 or 13 days

    Recovery period is: 1 year 4 months and 13 days.

    CURRICULUM VITAE

    Name: RACHEL JANE LIM ROSAL

    Address: Prk. Santan 2-b Barina-ut, San Roque Iligan City

    62

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    63/64

    Contact No.: 09193537643

    Email:[email protected]

    PERSONAL INFORMATION

    Place of Birth : City Hospital, Ilgan City

    Civil Status : Single

    Sex : Female

    Religion : Roman Catholic

    Height : 55

    Weight : 45kgs.

    Fathers Name : Rogelio Bohol Rosal

    Mothers Name : Salvacion Lim Rosal

    EDUCATIONAL BACKGROUND

    Level School

    ELEMENTARY : Echavez Elementary School

    2003-2004

    HIGH SCHOOL : Sacred Heart High School

    2007-2008

    COLLEGE : Iligan Medical Center College

    2011-2012

    63

  • 7/30/2019 Final Thesis with Table of contents(hardbound).doc

    64/64

    Name: JOMAR SOTTO BALOLONG

    Address: Prk. 13-A Palao, Iligan City

    Contact No.: 09056598392

    Email:[email protected]

    PERSONAL INFORMATION

    Place of Birth : St.Mary, Ilgan City

    Civil Status : Single

    Sex : Male

    Religion : Roman Catholic

    Height : 56

    Weight : 70kgs.

    Fathers Name : Joel Dalogdog Balolong

    Mothers Name : Marilyn Sotto Balolong

    EDUCATIONAL BACKGROUND

    Level School

    ELEMENTARY : Simacolong Elementary School

    2003-2004

    HIGH SCHOOL : Saint Isidore The Farmer Catholic School

    2007-2008

    COLLEGE : Iligan Medical Center College

    2011-2012


Recommended