View
224
Download
0
Category
Preview:
Citation preview
7/30/2019 Final Thesis with Table of contents(hardbound).doc
1/64
ILIGAN MEDICAL CENTER COLLEGE
CAMPUS ENTRANCE
A proposal for Barcode System
An Undergraduate Thesis
Presented to
The Faculty of College of Computer Studies
ILIGAN MEDICAL CENTER COLLEGE
Iligan City
In Partial Fulfilment
Of the Requirements for the degree ofBACHELOR OF SCIENCE AND INFORMATION TECHNOLOGY
By:
Rachel Jane L. Rosal
Jomar S. Balolong
March 2012
1
7/30/2019 Final Thesis with Table of contents(hardbound).doc
2/64
ILIGAN MEDICAL CENTER COLLEGE
City of Iligan
APPROVAL SHEET
This project study entitled:
ILIGAN MEDICAL CENTER COLLEGE CAMPUS ENTRANCE
A proposal for Barcode System
Prepared and submitted by Rachel Jane L. Rosal and Jomar S. Balolong, in Partial
fulfilment of the requirement for the degree of Bachelor of Science in Information
Technology.
Enrico Miguel E. Ong
Adviser
PANEL OF EXAMINERS
Mr. Enrico Miguel E. Ong Mr. Dindo Donald A. Manulat, Jr
Member Member
Alecia C. Diaz, MMEM
Chairman
2
7/30/2019 Final Thesis with Table of contents(hardbound).doc
3/64
ACKNOWLEDGEMENT
The researcher would like to convey their sincere appreciation to the following
individual who gave valuable assistance and service for the completion of his software
project study.
To Mr. Enrico Miguel E. Ong for his continuous moral and technical support and
for being their adviser in this software project study.
To the panel members, Prof. Alecia C. Diaz and Mr. Dindo Donald A. Manulat Jr,
for their time and knowledge they shared to make this project.
To the Information Technology Support Group Head, Mr. Jerome Gonzales, for
allowing the researchers to use the Computer Laboratory.
To their beloved parents, Mr and Mrs Salvacion L. Rosal and Mr and Mrs Marilyn
S. Balolong , who gave financial and moral support in making of this project study.
To their friends, who encouraged and gave them the confidence and strength
they needed to complete this project.
To security guard, who gave extra knowledge, support understanding, patience
and needed information for the completion of the study.
And above all, the researchers would like to express their heartfelt thanks and
gratitude to the Almighty father for all the bountiful blessings we had bestowed on them
during the development of the project.
3
7/30/2019 Final Thesis with Table of contents(hardbound).doc
4/64
TABLE OF CONTENTS
TITLE OF PAGE Pages
APPROVAL SHEET iiACKNOWLEDGEMENT iiiTABLE OF CONTENTS ivLIST OF TABLES viLIST OF FIGURES viiiABSTRACT ix
Chapter I: THE PROBLEM AND ITS SCOPE
1.1 Background of the Study 11.2 Statement of the Problem 11.3 Objective of the Problem 21.4 Significant of the Study 21.5 Scope and Limitation of the Study 31.6 Conceptual Framework 31.7 Glossary of Terms 4
Chapter II: REVIEW RELATED LITERATURE2.1 Barcode 52.2 Barcode Reader 5
Chapter III: RESEARCH METHODOLOGY3.1 Requirement Analysis 73.2 Design 73.3 Construction and Testing 83.4 Hardware and Software Requirements 9
4
7/30/2019 Final Thesis with Table of contents(hardbound).doc
5/64
Chapter IV: RESULTS AND DISCUSSION4.1 Requirement Analysis 104.1.1 Project Charter 114.1.2 Software Project Plan 11
4.2 Analysis 114.2.1 Context Model 124.2.2 Use Case Diagram 134.2.3 Entity Relationship Diagram 144.2.4 Activity Diagram 154.2.5 Deployment Diagram 164.2.2 List of Entity and Attributes 174.3 Design 194.3.1 Database Design 194.3.2 Database Schema 214.3.3 Capacity Plan 23
4.3.4 Graphical User Interface Design GUI274.3.5 Program Design 384.3.6 Report Design 394.4 Construction and Testing 394.4.1 Test Result 404.4.2 Summary for Test Result 41
Chapter V: SUMMARY, CONCLUSIONS AND RECOMMENDATION5.1 Conclusion 425.2 Summary 43
5.3 Recommendation 44
BIBLIOGRAPHY 45
APPENDICES
A Letter of Approval 46B Gantt chart 47B Pert Chart 48C Cost and Benefits 49
5
7/30/2019 Final Thesis with Table of contents(hardbound).doc
6/64
LIST OF TABLES
Tables Page
Table 1 Hardware Requirements 9
Table 2 Software Requirements 9
Table 3 Student Log Entity and Attributes 17
Table 4 Student Entity and Attributes 17
Table 5 Employee Entity and Attributes 17
Table 6 Employee Log Entity and Attributes 18
Table 7 Valid Student Entity and Attributes 18
Table 8 Student Log Database Design 19
Table 9 Student Database Design 20
Table 10 Employee Database Design 20
Table 11 Employee Log Database Design 20
Table 12 Valid Student Database Design 20
Table 13 Employee Database Schema 21
Table 14 Student Database Schema 21
Table 15 Student Log Database Schema 22
Table 16 Employee Log Database Schema 22
Table 17 Valid Student Database Schema 22
Table 18 Capacity Plan for Student 23
Table 19 Capacity Plan for Student Log 24
6
7/30/2019 Final Thesis with Table of contents(hardbound).doc
7/64
Table 20 Capacity Plan for Employee 24
Table 21 Capacity Plan for Employee Log 25
Table 22 Capacity Plan for Valid Student 25
Table 23 Summary of Capacity Plan 26
Table 24 Test Result 40
Table 25 Summary of Test Result 41
7
7/30/2019 Final Thesis with Table of contents(hardbound).doc
8/64
LIST OF FIGURES
Figures Page
Figure 1 Conceptual Framework 3
Figure 2 Context Model 12
Figure 3 Use Case 13
Figure 4 Entity Relationship Diagram 14
Figure 5 Activity Diagram 15
Figure 6 Deployment Diagram 16
Figure 7 Barcode Form 27
Figure 8 System Login Type Form 28
Figure 9 Validate Student Form 29
Figure 10 Student Registration Form 30
Figure 11 Student Profile Form 31
Figure 12 Student Log Form 32
Figure 13 Validation Student Form 33
Figure 14 Employee Form 34
Figure 15 Employee Log Form 35
Figure 16 Employee Registration Form 36
Figure 17 Employee Profile Form 37
Figure 18 Report Design 39
8
7/30/2019 Final Thesis with Table of contents(hardbound).doc
9/64
ABSTRACT
Rachel Jane L. Rosal
Jomar S. Balolong
Iligan Medical Center College campus entranceCollege of Computer Studies, Iligan Medical Center College, March 2021.
Project AdviserMr. Enrico Miguel E. OngFacultyCollege Of Computer StudiesIligan Medical Center College
This proposed study, which is entitled Iligan Medical Center College Campus
Entrance, deals with the problem on monitoring the entrance system due to the number
of students who entered every day. The system was coded in PHP with MySQL as its
database.
Other software tools uses are Dezign and Uniform Server UPX to fully represent
the system. For further understanding, tables, diagram, charts and figures were created
to illustrate relationship and dependencies among classes. Analysis models were also
applied to demonstrate the rationality of developing the system.
The system was intently built with a user friendly graphical user interfacing for a
fast and easy usage of the system.
9
7/30/2019 Final Thesis with Table of contents(hardbound).doc
10/64
Chapter I
THE PROBLEM AND ITS SCOPE
1.1 Background of the study
In Iligan Medical Center College, each student has its own identification. The
school use Identification card (ID) in which each IDs has a unique number to identify the
students. The school guard should be responsible to monitor the entrance system in
Iligan Medical Center College (IMCC) campus. The school has a policy, which is NO
ID, NO ENTRY and students are required to wear their individual school IDs in order to
enter the school campus. Still, there are lot of students who enter the school campus
without wearing their school ID. If the personnel who is involve in the current system
and let the student pass without wearing school IDs, their would be a possibility that
their are some person who can enter even it is not a student in IMCC.
We the researchers conduct some interviews to the school Guard and we found
out that using barcode access in school security in Iligan Medical Center College
(IMCC) will easily to identify the student with or without school ID. The system also
helps to identify if the student is active or inactive in every school semester. By using
this system it will automatically display into the database the time and date when the
student enter the school.
10
7/30/2019 Final Thesis with Table of contents(hardbound).doc
11/64
1.2 Statement of the Problem
Based from the information gathered, the researchers have identified the problems:
1. Students can directly enter the school without wearing school I.D
2. Students are using other I.D to have access in school security
1.3 Objective of the Study
After knowing the specific problem that is involved in school security system, the
researchers have come up with these objectives in developing as system:
1. To create a system that would help to identify if the student are wearing their
school ID and to avoid using other ID
2. In order to enter in the school campus some students borrow ID to the other
student. This system could avoid this particular problem.
11
7/30/2019 Final Thesis with Table of contents(hardbound).doc
12/64
1.4 Significance of the study
The implementation of this project is to facilitate the process of school entrance.
This would be great help to the following:
To the school guards, this study will help monitor entrance system the easy way
and no hassle to the school guard. Their task also is to gather some information to the
student; they were going to check in to the computer if the students are currently
enrolled in IMCC.
To the Future Researchers, this study will give ample and accurate monitoring
that will provide better understanding about the Bar coded access in IMCC entrance
system.
1.5 Scope and Limitation of the study
This study will focus on monitoring school security in IMCC to generate fast and
accurate entrance system.
This study limits on the entrance system through barcode access, storing and
counting of number of students entered the school campus. If the student is officially
enrolled his/her responsible of renewing their ID every semester thats why the registrar
is responsible to activate into active the student data.
12
7/30/2019 Final Thesis with Table of contents(hardbound).doc
13/64
1.6 Conceptual Framework
A conceptual framework is used to outline possible courses of action or present a
preferred approach to an idea and thought.
This figure shows the flow of data in the Bar code access in Iligan Medical Center
College entrance.
Figure 1: Conceptual Framework
13
7/30/2019 Final Thesis with Table of contents(hardbound).doc
14/64
1.7 Glossary Of term
These are words that technically used in the study:
Bar Code - is a series of parallel black bars and white spaces, both of varying
widths. Bars and spaces together are called elements. Different combinations of the
bars and spaces represent different characters, such as numbers or letters.
Access - The ability and means necessary to store data in, to retrieve data from,
to communicate with, or to make use of any resource of a system.
System -is a set of elements and relationships which are different from
relationships of the set or its elements to other elements or sets.
Code - is a rule for converting a piece of information (for example, a letter, word,
phrase, orgesture) into another form or representation (one sign into another sign), not
necessarily of the same type.
14
http://www.its.bldrdoc.gov/fs-1037/dir-010/_1401.htmhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://en.wikipedia.org/wiki/Element_(mathematics)http://en.wikipedia.org/wiki/Relationshiphttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Letter_(alphabet)http://en.wikipedia.org/wiki/Wordhttp://en.wikipedia.org/wiki/Phrasehttp://en.wikipedia.org/wiki/Gesturehttp://en.wikipedia.org/wiki/Signhttp://www.its.bldrdoc.gov/fs-1037/dir-036/_5255.htmhttp://en.wikipedia.org/wiki/Element_(mathematics)http://en.wikipedia.org/wiki/Relationshiphttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Letter_(alphabet)http://en.wikipedia.org/wiki/Wordhttp://en.wikipedia.org/wiki/Phrasehttp://en.wikipedia.org/wiki/Gesturehttp://en.wikipedia.org/wiki/Signhttp://www.its.bldrdoc.gov/fs-1037/dir-010/_1401.htm7/30/2019 Final Thesis with Table of contents(hardbound).doc
15/64
Chapter II
Review Related Literature
2.1 Barcode
A Barcode access is an optical machine readable presentation of data, which
shows data about the object to which it attaches. The earliest, and still the cheapest,
barcode scanners are built from a fixed light and a single photo sensorthat is manually
"scrubbed" across the barcode.
Barcode scanners can be classified into three categories based on their
connection to the computer. The older type is the RS-232 barcode scanner. This type
requires special programming for transferring the input data to the application program.
"Keyboard interface scanners" connect to a computer using a PS/2 or AT
keyboardcompatible adaptor cable. The barcode's data is sent to the computer as if it
had been typed on the keyboard. (Palmer, 1978)
The researchers found out that the student must present his / her I.D embedded
with a barcode label that will be detected by the barcode reader. If the ID is detected as
valid, the particular student will be display on the monitor screen. The informations that
displayed is such as name, ID number, and student picture
15
http://en.wikipedia.org/wiki/Photosensorhttp://en.wikipedia.org/wiki/Photosensor7/30/2019 Final Thesis with Table of contents(hardbound).doc
16/64
2.2 Barcode System
In 1948, Bernard Silverwas a graduate student at Drexel Institute of Technology in
Philadelphia. A local food chain store owner had made an inquiry to the Drexel Institute
asking about research into a method of automatically reading product information during
checkout. Silver joined together with fellow graduate student Norman Joseph Woodland
to work on a solution. Woodland's first idea was to use ultraviolet light sensitive ink. The
team built a working prototype but decided that the system was too unstable and
expensive. They went back to the drawing board. On October 20, 1949, Woodland and
Silver filed their patent application for the "Classifying Apparatus and Method",
describing their invention as "article classification through the medium of identifying
patterns".
It was soon realized that there would have to be some sort of industry standard set.
In 1970, the Universal Grocery Products Identification Code orUGPIC was written by a
company called Logicon Inc. The first company to produce bar code equipment for retail
trade use (using UGPIC) was the American company Monarch Marking in 1970, and for
industrial use, the British company Plessey Telecommunications was also first in 1970.
UGPIC evolved into the U.P.C. symbol set or Universal Product Code, which is still
used in the United States. George J. Laurer is considered the inventor of U.P.C. or
Uniform Product Code, which was invented in 1973. In June 1974, the first U.P.C.
scanner was installed at a Marsh's supermarket in Troy, Ohio. The first product to have
a barcode included was a packet ofWrigley's Gum. (Bellis, 2010)
16
http://en.wikipedia.org/wiki/Bernard_Silverhttp://en.wikipedia.org/wiki/Drexel_Universityhttp://en.wikipedia.org/wiki/Point_of_salehttp://en.wikipedia.org/wiki/Norman_Joseph_Woodlandhttp://en.wikipedia.org/wiki/Ultraviolethttp://en.wikipedia.org/wiki/Patent_applicationhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Logiconhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Plesseyhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/George_J._Laurerhttp://en.wikipedia.org/wiki/Marsh_Supermarketshttp://en.wikipedia.org/wiki/Wm._Wrigley_Jr._Companyhttp://en.wikipedia.org/wiki/Bernard_Silverhttp://en.wikipedia.org/wiki/Drexel_Universityhttp://en.wikipedia.org/wiki/Point_of_salehttp://en.wikipedia.org/wiki/Norman_Joseph_Woodlandhttp://en.wikipedia.org/wiki/Ultraviolethttp://en.wikipedia.org/wiki/Patent_applicationhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Logiconhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/Plesseyhttp://en.wikipedia.org/wiki/Universal_Product_Codehttp://en.wikipedia.org/wiki/George_J._Laurerhttp://en.wikipedia.org/wiki/Marsh_Supermarketshttp://en.wikipedia.org/wiki/Wm._Wrigley_Jr._Company7/30/2019 Final Thesis with Table of contents(hardbound).doc
17/64
Chapter III
Research Methodology
This chapter presents and analyze the information gathered by the researchers
by implementing an entrance system and to pursue the following appropriate procedure:
requirement analysis, design, construction and testing and hardware and software
requirements.
3.1 Requirement Analysis
The process of understanding that user needs an expectations from a
proposed system is what we called requirement analysis. It describes how a system
should monitor and gathered information base on what are the process of entrance
system using barcode reader. It helps the researcher identify some problem by
conducting an interview and to identify the requirements that are needed to this study.
In acquiring these processes the researchers well determine the accurate requirements
in developing the system.
3.2 Design
The design of the system identifies the problems and finding better solutions, the
researchers had finished gathering information. The researchers of this study will
develop an Entrance system using barcode access in IMCC, which help the researchers
to define what the purpose of the system are and what are the content in developing a
system. A database is the graphical user interface and a server of the system, to be
developed and implemented. Using class diagram, the researchers will be able to
17
7/30/2019 Final Thesis with Table of contents(hardbound).doc
18/64
analyze the possible design of the study, and the processes needed to produce the
desired output.
3.3 Construction and testing
The proposed entrance system would be implemented through the use of
barcode reader in order to read the ID of the students. The researchers construct the
program using PHP (hypertext processor) in testing process of reliability of a program.
In testing process trial and error method is being used to test the proposed system. It is
important to test the system for the implementation and maintenance. In Unit testing
and the integration of modules would be conducted during the testing process for the
input and output verification.
3.4 hardware and software Requirements
In developing the new system, hardware and software resources will be needed.
The hardware and software requirements are the following:
Hardware Requirements
Processor: Intel Core i3
Memory: 4 GB or higher
Hardware Drive: 40 GB or higher
Input/Output devices: Printer, mouse, keyboard, system unit,
barcode reader
Motherboard: ASUS
Table 1: Hardware requirements
Software Requirements
18
7/30/2019 Final Thesis with Table of contents(hardbound).doc
19/64
Operating system: Microsoft Windows XP, Ubuntu
DBMS: MySQL
Tools: DeZign, Microsoft Excel, Ms Access,
PhotoshopProgramming Language: PHP
Table 2: Software Requirements
Chapter IV
Result and Discussions
19
7/30/2019 Final Thesis with Table of contents(hardbound).doc
20/64
This chapter deals with the results of the study. Likewise, it attempts to discuss
the procedure.
4.1 Requirements Analysis
Requirements analysis phase the process of reviewing all the datas identified
and evaluated to determine the system needs. These are the following:
Context Diagram was used the system to understand in how the system
interacts by receiving and sending data to external entities.
Entity Relationship Diagram (ERD) which was used to identify the entities and
attributes in the system. To determine the relationship between these entities.
Activity Diagram which was used to identify the flow of actions that are part of
the system.
Conceptual Framework used to represent on what the information are being
input inside the system and what the output are as a gathered reports of the
system.
Use case diagram to show the steps that have been taken in the system.
Deployment Diagram as used in the system, it shows the hardware and
software components used in the system and to show the user of the system and
its connectivity to the other user.
4.1.1 Project Charter
20
7/30/2019 Final Thesis with Table of contents(hardbound).doc
21/64
Project Charter is a statement of the scope, objectives and participants in a
project. It provides a preliminary delineation of roles and responsibilities, outlines the
project objectives, and defines the authority for the future of the project.
The purpose of the project charter is to document reasons for undertaking the
project, objectives and constraints of project, directions concerning the solution and the
identifies of the main stakeholders.
Project charter outlines the purpose of the project, the way the project will be
structured and how it would be successfully implemented. The project charter describes
the project vision, objectives, scope and deliverables, as well as the stakeholders, roles
and responsibilities.
4.1.2 Software Project Plan
The software project plan serves as the accomplishment of the days work in the
entire set of programs, procedures and related documentation associated with a
system. By the use the Gantt chart the researcher will identify the duration the task to
be performed and the estimated start and end of the project proposed.
4.2 Analysis
The researchers have analyzed the structures data of the system, known by the
research problem, developed and implemented plans for the proposed system and the
conceptual design of a system.
4.2.1 Context Diagram
21
7/30/2019 Final Thesis with Table of contents(hardbound).doc
22/64
The context model shown represent the data input to the system and the
expected data output.
Figure 2: Context Model
4.2.2Use Case
22
7/30/2019 Final Thesis with Table of contents(hardbound).doc
23/64
A use case is a sequence of actions that provide a measurable value to an actor.
Another way to look at it is a use case describes a way in which a real-world actor
interacts with the system. In a system use case you include high-level implementation.
Figure 3: Use case
4.2.3Entity Relationship Diagram
23
7/30/2019 Final Thesis with Table of contents(hardbound).doc
24/64
An entity relationship diagram is a data modelling technique that creates a
graphical representation of the entities, and the relationship between entities, within an
information system.
Figure 4: Entity Relationship Diagram
4.2.4 Activity Diagram
24
7/30/2019 Final Thesis with Table of contents(hardbound).doc
25/64
Activity diagram is basically a flow chart to represent the form one activity to
another activity. The activity can be described as an operation of the system.
Figure 5: Activity Diagram
4.2.5 Deployment Diagram
25
7/30/2019 Final Thesis with Table of contents(hardbound).doc
26/64
Deployment diagram are used for describing the hardware components where
software components are deployed. Component diagrams and deployment diagrams
are closely related. Component diagrams are used to describe the components and
deployment diagrams shows how they are deployed in hardware.
Figure 6: Deployment Diagram
4.2.6 List of Entity and Attributes
26
7/30/2019 Final Thesis with Table of contents(hardbound).doc
27/64
These are the list of entity and corresponding attributes and easy to monitor
entrance system. Every sets of entities, there was a corresponding description on it.
STUDENTLOG
ATTRIBUTES DESCRIPTION
log_id Student Log IDlog_date Student Log Datelog_time Student Log Timecode_no Student Log Code No
Table 3: Student log Entity and Attributes
STUDENT
ATTRIBUTES DESCRIPTIONcode_no Student Code Nostudent_id Student IDf_name Student First Namem_name Student Middle Namel_name Student Last NameAddress Student AddressGender Student Gendercontact_no Student Contact NoCourse Student CoursePhoto Student Photo
Table 4: Student Entity and Attributes
EMPLOYEE
ATTRIBUTES DESCRIPTION
code_no Employee Code Nof_name Employee First Namem_name Employee Middle Namel_name Employee Last NamePhoto Employee Photo
Table 5: Employee Entity and Attributes
EMPLOYEE
ATTRIBUTES DESCRIPTION
log_id Employee Log IDlog_date Employee Log Date
27
7/30/2019 Final Thesis with Table of contents(hardbound).doc
28/64
LOG log_time Employee Log Timecode_no Employee Log Code No
Table 6: Employee Log Entity and Attributes
VALIDSTUDENT
ATTRIBUTES DESCRIPTIONvalidation_id Employee Log IDCode_no Employee Code No
Table 7: Valid Student Entity and Attributes
4.3 Design
28
7/30/2019 Final Thesis with Table of contents(hardbound).doc
29/64
The design of the system is the process or art of defining the architecture,
components, modules, interfaces, and data for a system to satisfy specified
requirements. It is also a process for the input and the output process. It aptly stars with
identifying and analyzing the problem. Base from the information the possible solutions
were searched and evaluated in structured procedure.
4.3.1 Database Design
Database design is the process of producing a detailed data model of a
database. This logical data model contains all the needed logical and physical design
choices and physical storage parameter needed to generate a design in a Data
Definition Language, which can then be used to create a database. A fully attributed
data model contains detailed attributes for each entity.
Entity Attributes Data Type Length
STUDENT LOG
LOG_ID INT 10
LOG_DATE DATE
LOG_TIME TIME
CODE_NO VARCHAR 20
Table 8: Student Log Database Design
Entity Attributes Data Type Length
CODE_NO VARCHAR 20
STUDENT_ID VARCHAR 10
29
7/30/2019 Final Thesis with Table of contents(hardbound).doc
30/64
STUDENT
F_NAME CHAR 50
M_NAME CHAR 30
L_NAME CHAR 30
ADDRESS VARCHAR 50
GENDER CHAR 6
CONTACT_NO VARCHAR 20COURSE VARCHAR 20
PHOTO BLOB
Table 9: Student Database Design
Entity Attributes Data Type Length
EMPLOYEE
CODE_NO VARCHAR 15
F_NAME VARCHAR 20
M_NAME CHAR 20
L_NAME CHAR 20
PHOTO BLOB
Table 10: Employee Database Design
Entity Attributes Data Type Length
EMPLOYEE LOG
LOG_ID INT 10
LOG_DATE DATE
LOG_TIME TIME
CODE_NO VARCHAR 20
Table 11: Employee Log Database Design
Entity Attributes Data Type LengthVALIDLOG
VALID_ID INT 10
CODE_NO VARCHAR 20
Table 12: Valid Log Database Design
4.3.2 Database Schema
30
7/30/2019 Final Thesis with Table of contents(hardbound).doc
31/64
The database schema is a collection of records or data that is stored in a
computer system.
Prior to implement the system, a database must be created. Creating a table for
a relation, a data definition instruction must name the relation for the reason that it can
be added to the database directory. Each data item in the relation must then be defined
by describing the data item (attribute), name, data type and length.
Create Table Employee
CREATE TABLE `employee` (
`code_no` VARCHAR(15) NOT NULL,`f_name` CHAR(20) NOT NULL,`m_name` CHAR(20) NOT NULL,`l_name` CHAR(20) NOT NULL,`photo` LONGBLOB NOT NULL,CONSTRAINT `PK_employee` PRIMARY KEY (`code_no`));
Table 13: Employee Database Schema
Table 14: Student Database Schema
31
Create Table Student
CREATE TABLE `student` (`code_no` VARCHAR(15) NOT NULL,`student_id` VARCHAR(15) NOT NULL,`f_name` CHAR(20) NOT NULL,`m_name` CHAR(20) NOT NULL,`l_name` CHAR(20) NOT NULL,`address` VARCHAR(50) NOT NULL,`gender` CHAR(6) NOT NULL,`contact_no` VARCHAR(15) NOT NULL,`course` VARCHAR(50) NOT NULL,`photo` LONGBLOB NOT NULL,
CONSTRAINT `PK_student` PRIMARY KEY (`code_no`));
7/30/2019 Final Thesis with Table of contents(hardbound).doc
32/64
Table 15: Student Log Database Schema
Table 16: Employee Log Database Schema
Table 17: Valid Student Database Schema
4.3.3 Capacity Plan
Capacity planning of the database is necessary to ensure the data are properly
stored in the system. The succeeding tables show number of bytes and total bytes of
each entity.
Capacity Plan for Student
32
Create Table Student_log
CREATE TABLE `student_log` (`log_id` INTEGER NOT NULL AUTO_INCREMENT,`log_date` DATE NOT NULL,
`log_time` TIME NOT NULL,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_student_log` PRIMARY KEY (`log_id`));
ALTER TABLE `student_log` ADD CONSTRAINT `student_student_log`FOREIGN KEY (`code_no`) REFERENCES `student` (`code_no`);
Create Table Employee_log
CREATE TABLE `employee_log` (`log_id` INTEGER NOT NULL AUTO_INCREMENT,`log_date` DATE NOT NULL,`log_time` TIME NOT NULL,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_employee_log` PRIMARY KEY (`log_id`));
ALTER TABLE `employee_log` ADD CONSTRAINT `employee_employee_log`FOREIGN KEY (`code_no`) REFERENCES `employee` (`code_no`);
Create Table Valid_Student
CREATE TABLE `valid_student` (`validation_id` INTEGER NOT NULL AUTO_INCREMENT,`code_no` VARCHAR(15) NOT NULL,CONSTRAINT `PK_valid_student` PRIMARY KEY (`validation_id`));
ALTER TABLE `valid_student` ADD CONSTRAINT `student_valid_student`FOREIGN KEY (`code_no`) REFERENCES `student` (`code_no`);
7/30/2019 Final Thesis with Table of contents(hardbound).doc
33/64
ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)code_no VARCHAR
11 14student_id
VARCHAR6 8
f_name CHAR 20 20m_name CHAR 20 20l_name CHAR 20 20Address VARCHAR 50 60gender
CHAR6 6
contact_no VARCHAR 20 25course VARCHAR 50 60photo BLOB 233
Table 18: Capacity Plan for Student
Information
Number of records per semester = 1,523Size in bytes/students = 2331,523 record/month *5 months/sem * 233 bytes/student * 1kb/1024 bytes
= 1523(5)(233)/1024= 1732.71 kb/sem
Capacity Plan for Student_log
ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)log_id INTEGER 11 4log_date DATE 3log_time TIME 3code_no VARCHAR 11 14
24
33
7/30/2019 Final Thesis with Table of contents(hardbound).doc
34/64
Table 19: Capacity Plan for Student_log
Information
Number of records per semester =1523Size in bytes/student log = 241523 record/month * 5 months/sem * 24 bytes/student log * 1kb/1024 bytes
= 1523(5)(24)/1024=178.48 kb/sem
Capacity Plan for Employee
ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)code_no VARCHAR11 14
f_nameVARCHAR
6 8
m_name CHAR 20 20l_name CHAR 20 20photo BLOB 62
Table 20: Capacity Plan for Employee
Information
Number of records per semester =1523Size in bytes/employee =621523 record/month * 5 months/sem * 62 bytes/employee * 1 kb/1024 bytes
=1523(5)(62)/1024=461.06 kb/sem
Capacity Plan for Employee Log
ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)log_id INTEGER 11 4log_date DATE 3log_time TIME 3code_no VARCHAR 11 14
34
7/30/2019 Final Thesis with Table of contents(hardbound).doc
35/64
24
Table 21: Capacity Plan for Employee Log
Information
Number of records per semester =1523Size in bytes/employee log = 241523 record/month * 5 months/sem * 24 bytes/employee log * 1kb/1024 bytes
= 1523(5)(24)/1024=178.48 kb/sem
Capacity Plan for Valid_Student
ATTRIBUTES DATA TYPES LENGTH SIZE (BYTES)Validation_id INTEGER 11 4code_no VARCHAR 11 14
18
Table 22: Capacity Plan for Valid Student
Information
Number of records per semester=1523Size in bytes/valid students=181523 record/month * 5 months/sem * 18 bytes/valid student * 1 kb/1024 bytes
=1523 (5)(18)/(1024)=133.86 kb/sem
SUMMARY CAPACITY PLAN
Entity Existing Frequency Growth in 10 years Total
Student 233 1523 1732.71 3488.71
35
7/30/2019 Final Thesis with Table of contents(hardbound).doc
36/64
Student Log 24 1523 178.48 1725.48
Employee 62 1523 461.06 2046.06
Employee
Log
24 1523 178.48 1725.48
Valid Student 18 1523 133.86 1674.86
Table 23: Summary of Capacity Plan
4.3.4 Graphical User Interface (GUI) Design
Graphical User Interface (GUI) is a program design that display options on the
screen as icons by which users commands by pressing keyboard, clicking a computer
mouse button or by touching on a touch pad.
36
7/30/2019 Final Thesis with Table of contents(hardbound).doc
37/64
Figure 7: Barcode Form
This form shows the first type of log-in system, where the student needs to read
or scan their ID before entering school campus.
37
7/30/2019 Final Thesis with Table of contents(hardbound).doc
38/64
Figure 8: System Login type Form
This form show the second type of log-in of system . where the administrator
need only to input their user name and password to log-in.
38
7/30/2019 Final Thesis with Table of contents(hardbound).doc
39/64
Figure 9: Validate student form
This form shows the ID not yet enrolled or register to the administrator.
39
7/30/2019 Final Thesis with Table of contents(hardbound).doc
40/64
Figure 10: Student Registration form
This form shows the new / transferee student to register to the school.
40
7/30/2019 Final Thesis with Table of contents(hardbound).doc
41/64
Figure 11:Student Profile form
This form shows the student profile by scanning the code number of the
students ID before entering IMCC campus.
41
7/30/2019 Final Thesis with Table of contents(hardbound).doc
42/64
Figure 12:Student Log form
This forms allows to show the log date,log time and student name.
42
7/30/2019 Final Thesis with Table of contents(hardbound).doc
43/64
Figure 13: Validation Student form
This form show the Student Profile to Validate their profile. Click the validate
buttom to activate the student profile.
43
7/30/2019 Final Thesis with Table of contents(hardbound).doc
44/64
Figure 14: Employee Form
This form shows the records of employee or list.
44
7/30/2019 Final Thesis with Table of contents(hardbound).doc
45/64
Figure 15: Employee Log form
This forms allow to show the log date, log time and employee name.
45
7/30/2019 Final Thesis with Table of contents(hardbound).doc
46/64
Figure 16: Employee Registration Form
This form shows the employee registratrion form of the system.
46
7/30/2019 Final Thesis with Table of contents(hardbound).doc
47/64
Figure 17: Employee Profile form
This form show the employee profile by scanning the code number of the
employee ID before entering IMCC campus.
47
7/30/2019 Final Thesis with Table of contents(hardbound).doc
48/64
4.3.5 Program Design
The activity of progressing from a specification of some required program to a
description of the program itself. It represents the flow of of events in the user interface
design.
48
7/30/2019 Final Thesis with Table of contents(hardbound).doc
49/64
4.3.6 Report Design
Report design is important to show the result of application in designing. This is
the output of the system that shows semestral statistical report of Barcode access in
Iligan Medical Center College campus entrance.
Figure 18: Report Design
4.4 Construction and Testing
In constructing and testing, the developer produces a system based on the Entity
Relationship Diagram (ERD) as footstep in making the system. After the system is
constructed, it is being tested to determine whether there are bugs/errors in the system
an to be able to apply corrective actions.
49
7/30/2019 Final Thesis with Table of contents(hardbound).doc
50/64
4.4.1 Test Result
Table 24: Test Result
50
COMPONENT CRITERIA RESULTS
HOME Can view IMCC vision, mission and goals Success
STUDENT Can view, add, update, delete Success
STUDENT LOG Can view, print Success
EMPLOYEE LOG Can view, print Success
EMPLOYEE Can view, add, update, delete Success
VALID STUDENT Can update, validate Success
7/30/2019 Final Thesis with Table of contents(hardbound).doc
51/64
4.4.2 Summary of Test Result
Test Goal Expected Remarks
Test for Login To restrict the system from
unauthorized admin.
Only authorized personnel
can use the application
Successful
HOME To view IMCC vision ,mission
and goals
Incoming boarders can view
which room they like
Successful
STUDENT
LOG
To view and print logs record Student log are recorded
everyday
Successful
STUDENT To view, delete, update, add
student record
Student information can be
viewed by the admin
Successful
EMPLOYEE
LOG
To view and print logs record Employee log are recorded
everyday
Successful
EMPLOYEE To view, delete, update, add
employee record
Employee information can
be viewed by the admin
Successful
VALID
STUDENT
To validate, update student
profile
Student validation can
update the profile of the
student
Successful
Table 25: Summary of Test Result
Chapter V
51
7/30/2019 Final Thesis with Table of contents(hardbound).doc
52/64
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 Conclusion
The system that has been developed by the researchers we found out that Iligan
Medical center College Barcode access entrance system has successfully achieve of its
objectives and areas of concerns. The researchers noticed the problem exist regarding
with the easy maonitoring, manipulate, storage, retrieval of the data being records daily.
The proposed system is electronically manipulated thus; monitoring and updating
of students records will be easier. The data input all the records will be saved and view
to the systems database. With the systems capability to organize and maintain
records accurately, retrieving of the data records will be much efficient. The system
admin person could easily track the data by using the system.
The researchers conclude that the monitoring entrance system provides an
integrates data records for the school guard ofIligan Medical Center College.
5.2 SUMMARY
52
7/30/2019 Final Thesis with Table of contents(hardbound).doc
53/64
The barcode access in Iligan Medical Center College entrance campus, the
researchers developed a data record of the student using barcode reader, which is
every student enter the school campus should be wear their corresponding IDs, the
school guard is the responsible to check the IDs of the students by scanning the
barcode located in their individual Ids. Since the school has a policy which is NO ID,
NO ENTRY this system should be implemented.
The researchers found out that using barcode reader or scanner can easily
identify the students who entered the school campus. The student should be required to
renew their ID every semester to activate their data as soon as possible. The barcode
reader may display the time, date and name of the student every log in of the student
its automatically save their data and easy to check the school guard who enter on that
day as well as the data of the student.
Lastly, the researchers conclude that in every semester the students are required
renew their school ID to have activation in the scanner and the administrator is
responsible with it. The system can automatically update the data of the student or
reactivate in every end of the semester. If the students validate their ID to the registrar
they change the profile of the student to activate student data thats why the school
guard know that student is officially enrolled.
53
7/30/2019 Final Thesis with Table of contents(hardbound).doc
54/64
5.3 Recommendation
These are some of the researchers recommendations:
1. The researchers recommend using the said gadget with care. The management
should provide basic guidelines in using the gadget during log in to avoid
hardware damage.
2. The researchers would recommend to the future researchers to enhance and to
develop the design of the system.
3. The student who enrolled should be responsible of renewing their ID every
semester so that they will easily enter the IMCC campus.
4. The researchers recommend to required valid school ID every semester.
5. The researchers recommend requiring a durable barcode scanner.
54
7/30/2019 Final Thesis with Table of contents(hardbound).doc
55/64
BIBLIOGRAPHY
Internet Sources:
Palmer, R. (2007, September 13). The barcode book. Helmers Publishing. Retrieved
last August, 2011, from
http://en.wikipedia.org/wiki/barcode
Mary Bellis. "Bar Codes - The History of Bar Code". Inventors.about.com. Retrieved
August 04, 2010, from
http://en.wikipedia.org/wiki/Barcode_system
55
http://en.wikipedia.org/wiki/barcodehttp://inventors.about.com/library/inventors/blbar_code.htmhttp://en.wikipedia.org/wiki/Barcode_systemhttp://en.wikipedia.org/wiki/barcodehttp://inventors.about.com/library/inventors/blbar_code.htmhttp://en.wikipedia.org/wiki/Barcode_system7/30/2019 Final Thesis with Table of contents(hardbound).doc
56/64
APPENDIX A
LETTER OF APPROVAL
August 19, 2011
Mr. Jefrrey L. BarrancoMRC HEAD
Dear Sir:
Greetings!
We are the 4th year students taking Bachelor of Science in Informationtechnology. As a requirement of the course CS 405-Project Study, we are todevelop a system. With the intent of developing a system for your goodadministration, we humbly ask your approval allowing us to conduct an interview.This will allow us to identify the needs and meet the requirements of the systemthat we are to develop to bring out a more effective and efficient system.
We are hoping for your kind consideration on this matter.
Thank you.
Respectfully yours,
Jomar S. BalolongRachel Jane L. Rosal
Noted by:
Enrico Miguel E. OngAdviser
56
7/30/2019 Final Thesis with Table of contents(hardbound).doc
57/64
APPENDIX B
GANTT CHART
57
7/30/2019 Final Thesis with Table of contents(hardbound).doc
58/64
APPENDIX C
PERT CHART
58
7/30/2019 Final Thesis with Table of contents(hardbound).doc
59/64
APPENDIX D
Cost and Benefits
Cost and Benefits Analysis
A. Development Cost
a. Hardware cost: P
50,000
Barcode reader P 2,500
b. Software Cost Programming Cost P
80,000
Total Development Cost P
132,000
B. Present Operating Cost
Salary (1 Person) P
80,000
59
7/30/2019 Final Thesis with Table of contents(hardbound).doc
60/64
Maintenance P 2,000
Total Operating Cost P
82,000.00
C. Proposed Operating Cost
Salary (1 Person) P
80,000
Electric Bill
P 5,000
Total Proposed Operating Cost P
85,000.00
Cost Recovery Scheme
Existing Present annual Cost
P 82,000
Proposed Annual Cost P
85,000
60
7/30/2019 Final Thesis with Table of contents(hardbound).doc
61/64
Total cost Recovery Scheme P
83,000
Present Value: P= F/ (1+i)
Where:
i = Interest (10%)
n = number of years
F = Present Amount
Year Annual saving Present Value Cumulative
Present
1 83,000 75454.55 75454.55
2 83,000 68595.04 144049.59
Pay Back Period:
61
7/30/2019 Final Thesis with Table of contents(hardbound).doc
62/64
Cost of Implementation = P 132,000
Less: Cumulative Present Value = P 83,000
Unpaid Portion = P 49,500
To solve for unpaid portion = 49, 500/132,500 =0.37
To determine the exact month = .37x12 = 4.44 or 4 months
To determine the exact day = .44x30 = 13.2 or 13 days
Recovery period is: 1 year 4 months and 13 days.
CURRICULUM VITAE
Name: RACHEL JANE LIM ROSAL
Address: Prk. Santan 2-b Barina-ut, San Roque Iligan City
62
7/30/2019 Final Thesis with Table of contents(hardbound).doc
63/64
Contact No.: 09193537643
Email:Rj_cute0817@yahoo.com
PERSONAL INFORMATION
Place of Birth : City Hospital, Ilgan City
Civil Status : Single
Sex : Female
Religion : Roman Catholic
Height : 55
Weight : 45kgs.
Fathers Name : Rogelio Bohol Rosal
Mothers Name : Salvacion Lim Rosal
EDUCATIONAL BACKGROUND
Level School
ELEMENTARY : Echavez Elementary School
2003-2004
HIGH SCHOOL : Sacred Heart High School
2007-2008
COLLEGE : Iligan Medical Center College
2011-2012
63
7/30/2019 Final Thesis with Table of contents(hardbound).doc
64/64
Name: JOMAR SOTTO BALOLONG
Address: Prk. 13-A Palao, Iligan City
Contact No.: 09056598392
Email:jomarbalolong@yahoo.com
PERSONAL INFORMATION
Place of Birth : St.Mary, Ilgan City
Civil Status : Single
Sex : Male
Religion : Roman Catholic
Height : 56
Weight : 70kgs.
Fathers Name : Joel Dalogdog Balolong
Mothers Name : Marilyn Sotto Balolong
EDUCATIONAL BACKGROUND
Level School
ELEMENTARY : Simacolong Elementary School
2003-2004
HIGH SCHOOL : Saint Isidore The Farmer Catholic School
2007-2008
COLLEGE : Iligan Medical Center College
2011-2012
Recommended