Professional Documents
Culture Documents
METHODOLOGY
This chapter will explain in detail the research methods and the
methodology implemented for this study. The chapter will explain about the
Requirement, and Security Requirement. This also talk about the system
design that will be explain through the System Development Life Cycle
diagram. These are GANTT chart, PERT chart, system flowchart, context
Requirement Analysis
After gathering the information needed for the study, researchers will
verified users.
Responsiveness The proposed system will allocate a
31
Software Error The proposed system must be free
system in 30 minutes.
System Design
proponents conducted interviews to see what problem are the Civil Service
Commission was facing. After analyzing the data gathered during the
interview the proponents decided to make a system wherein it will solve the
32
System Development Life Cycle
The proponents use the iterative model in developing the system. The
progressively gains more complexity and a broader feature set until the final
good output.
Philippines.
33
This phase is where the first thing to do in developing a project. Going
determine the existing process and the problem that the Civil Service
attendance, and other data that need to be maintained. Solving the minor and
major problems of the proposed system are by planning the features needed.
Adding some functions that will minimize the work of the employee is also
planned.
attendance of the
participants.
.
Security Plan Objectives What to test
User Level Access To prevent the User access
34
the training and programs
need.
Sensitive Data To make sure the security The OR code of every
the participants/client.
Maintenance Plan Objectives What to Test
Database Backup and To have backups of the The set time of the
restoring it to the
system.
For this phase, the proponents review some systems that may help to
enhance the techniques and tools that will be used in developing the system
for the Civil Service Commission Training Program reservation for instance
system about the reservation. This phase will help boost the implementation
system or the System Development Life Cycle (SDLC) has been recognize.
The proponents choose the Iterative model to represent the flow of the
process on how the system will be a success. The proponents also design a
of the system such as the context diagram and data flow diagram. The
35
context diagram is the overview of the organizational outline of the system. It
illustrates the boundaries, external entities, and the major information flows of
the system and the entities. While the data flow diagram is the breakdown of
the context diagram. The context diagram and data flow diagram of the
Implementation
As the planning and analysis has been carried out, the implementation
and coding phase has begun. The documentation of the design, planning and
specification are being applied into the initial iteration of the project.
The planning has now done, gathering all the needed requirements,
the database design, and others. The proponent started implementing all the
plans that was stated in the diagram. The implementation phase is the
hardest one in developing the system, the proponents needs to interpret the
right logic for implementing all the needed process and come up with the
desire system.
Testing
To ensure that all the process has been implemented, the proponent’s
the potential bugs of issues that make cause a problem in the future. The
proponent conducted a testing for both the client and the developer. The
testing of the client will check if the system is a user-friendly and if it lacks of
process or not, for they are the one who will use the system and they are the
36
one who knows what are the process needed. The testing of the developer
will check if there are bugs in the system, for them to easily locate where the
error is that need to be fix or they need to fix since they are the one who
instrument used is thru survey questionnaire for gathering data. To test the
internal consistency of test items, the proponents conduct a survey with thirty
Alpha Test: A Simple Guide for Researchers by Bujang (2018), et al. explains
that the value of Cronbach’s alpha ranges from zero to one with the higher
values implying the items are measuring the same dimension. In contrary, if
the Cronbach’s alpha value is low (near to 0), it means some or all of the
items are not measuring the same dimension. This means that test items are
not reliably consistent from one another. To determine that the instrument is
items will always result to low rating. To have a more valid result, is much
37
C. Usability 0.88
D. Functionality 0.82
E. Security 0.85
Total Average of the Alpha Testing 0.80
The total average for the Alpha testing is 0.80, which means that it
reaches the need percentage for it to be validated and to be used for the beta
testing.
Evaluation
This phase is to evaluate the software standards that will measure the
maintainability. The proponent’s will be measuring the system using the data
After completing the Alpha test, the proponent run a beta testing to
evaluate the system. This phase, the proponents conducted a test to the
Commission (CSC) Regional Office No. VIII and some participants during the
actual training held at CSC. The result of the survey will be presented and
A. Reliability
33%
67%
38
Figure 5.0: Result of question #1
Figure 5.0 shows the result of the Reliability category for question # 1
true. The not functional qualitative description option shows 0% it means that
out of 30 respondent none of them voted. The 33% of the votes are for mostly
qualitative description option. This only state that more than half of the
respondent agreed that the information inputted to the system about the
100%
The figure 5.1 displays that 100% of the respondent voted the fully
functional qualitative description option. Thus, this means that 100% of the
39
Resources are Accurate
23%
47%
30%
For the figure 5.2, the result of question # 3 of reliability category state
The 23% is from fully functional qualitative description option where it has
the 2nd place from the lowest votes. It only means that almost half of the
respondent agree that the resources of the system is accurate but have a
slight lack.
33%
67%
Figure 5.3 for reliability category the result for question # 4 has 67%
votes from fully functional, and 33% from mostly functional. This shows
40
that all the respondent agreed that the system notifies the user if invalid
data is inputted.
B. Maintainability
23%
37%
40%
The figure 6.0 shows the result of question # 1 for the maintainability
category is that all of respondent agreed to the statement that the bugs in
the system can be easily recognized. 23% of the votes came from fully
3%
97%
The figure 6.1 shows the result of question # 2 for the maintainability
41
To sum it up from this results, all respondents agreed to the statement
33%
67%
The figure 6.2 shows the result of question # 3 for the maintainability
option and there is 67% for the fully functional qualitative description
option based from the results of the respondents. With this result, it shows
that the system can runs even if modification has been made.
C. Usability
23%
43%
33%
The figure 7.0 shows the result of question # 1 for the usability
42
33% voted for the mostly functional qualitative description option and 24%
voted for the fully functional qualitative description option based from the
results of the respondents. With this result, it shows that all respondents
agreed that all the pages of the system are running without any problems.
20%
80%
The figure 7.1 shows the result of question # 2 for the usability
option and 80% voted for the fully functional qualitative description option
based from the respondents rating. From this result, it shows that all
respondents agreed that the menus and button are working accordingly
and effectively.
27%
33%
40%
43
Figure 7.2: Result of question #3
The figure 7.2 shows the result of question # 3 for the usability
category wherein there are 33% voted for the functional qualitative
description option, then 40% voted for the mostly functional qualitative
description option based and 27% voted for fully functional qualitative
description option from the results of the respondents in the system from
that all of the respondents agreed that the system tracks the overall data
or processed documents.
13%
27%
60%
The figure 7.3 shows the result of question # 4 for the usability
category wherein there are 27% voted for the functional qualitative
description option and 13% voted for fully functional qualitative description
option based from the respondents rating. Therefore, it shows that based
from the results above, all respondents agreed that the system is error
free.
44
User-friendly
10%
90%
The figure 7.4 shows the result of question # 5 for the usability
category wherein there are 10% voted for the mostly functional qualitative
description option and 90% voted for the fully functional qualitative
description option based from the respondents rating. It only means that
the UI of the system is a user-friendly type and with that it shows that all
43%
57%
The figure 7.5 shows the result of question # 6 for the usability
category wherein there are 43% voted for the mostly functional qualitative
45
description option and 57% voted for the fully functional qualitative
description option. With this result, it shows that the system is pleasant to
the eye of the user because all of the respondents agreed from it based
System is Responsive
23%
77%
The figure 7.6 shows the result of question # 7 for the usability
category. There are 23% voted for the mostly functional qualitative
description option and 77% voted for fully functional qualitative description
option. Therefore, it only means that the system is responsive based from
D. Functionality
13%
33%
53%
46
The figure 8.0 shows the result of question # 1 for the functionality
category wherein there are 34% voted for the functional qualitative
description option, then 53% voted for the mostly functional qualitative
option and 13% voted for the fully functional qualitative description option
based from the respondents rating. With this result, it means that the
system is compatible to all device using web browser and with that it
17% 17%
67%
The figure 8.1 shows the result of question # 2 for the functionality
category wherein there are 16% voted for the functional qualitative
description option, then, 67% voted for the mostly functional qualitative
description option and 17% voted for the fully functional qualitative
sending notifications and QR code after registration. And with that, the
47
System run-time is smooth and fast
100%
The figure 8.2 shows the result of question # 3 for the functionality
category wherein 100% voted for the fully functional qualitative description
option based from the respondents rating. It only means that all
47%
53%
The figure 8.3 shows the result of question # 4 for the functionality
description option and 53% voted for the fully functional qualitative
description option based from the respondents rating. With this result, it
48
shows that all respondents agreed that the system is functioning
3%
40%
57%
The figure 8.4 shows the result of question # 4 for the functionality
description option and 57% voted for the fully functional qualitative
description option based from the respondents rating. Therefore with this
result, it only means that all respondents agreed that the QR code scanner
recognizes the QR code fast and with that, the user can easily scanned
their QR code.
E. Security
100%
49
The figure 9.0 shows the result of question # 1 for the security category
wherein 100% voted for the fully functional qualitative description option
based from the respondents rating. With this result, it shows that all
respondents agreed that the system is fully functioning every time the
100%
The figure 9.1 shows the result of question # 2 for the security category
wherein 100% voted for the fully functional qualitative description option
based from the respondents rating. Therefore, it shows that all respondents
agreed that the system is fully functioned in the account of every user’s
verification.
50
All documents and data are secured by the system
The figure 9.2 shows the result of question # 2 for the security category
wherein 100% voted for the fully functional qualitative description option
based from the respondents rating. Therefore, with this result, it shows that all
respondents agreed that the system is fully functioning and all data and
To determine the point of scaling for every question, likert Scale, a five-
point scaling was used, in order for the respondents to avoid confusion on
the evaluation. The table below shows the result for the beta testing.
51
2 The system can be tested easily 4.8 HC
3 The system can run if changes has been
3.93 C
than
Sub mean: 4.37 HC
Usability
1 All the pages of the system are running
3.8 C
without any problem
2 The menus and button are working
4.8 HC
accordingly and effectively
3 The system tracks the overall data/
3.93 C
processed documents
4 The system run without error 3.86 C
5 The system is a user-friendly type 4.90 HC
6 The interface of the system is pleasant to
4.56 HC
the eye
7 The system is responsive 4.67 HC
Sub mean: 4.37 HC
Functionality
1 The system is compatible to all device
3.8 C
using web browser
2 The system send notification and QR
4 C
code after registering
3 The system run-time is smooth and fast 5 HC
4 Buttons, menus and other are functioning
4.53 HC
accordingly
5 The QR code scanner recognizes the QR 4.36
HC
code fast
Sub mean: 4.34 HC
Security
1 The system asks for a username and
3.86 C
password
2 The system verifies the account of every
4.96 HC
users
3 All data/documents are secured by the
4.66 HC
system
Sub mean: 4.5 HC
TOTAL MEAN FOR THE BETA TESTING: 4.55 HC
Deployment
proponents are now ready to deploy the system to the client. The proponent
will explain the system to the client and user on what are the functionality and
52
others of the system, they will be explaining from the security to maintenance
QR Code Algorithm
QR codes is license-free.
The smallest QR codes are 21x21 pixels, and the largest are 177x177. The
sizes are called versions. The 21x21 pixel size is version 1, 25x25 is version
QR code, you also create some redundant data that will help a QR reader
accurately read the code even if part of it is unreadable. There are four levels
of error correction that you can choose from. The lowest is L, which allows the
15% error correction, then Q, which provides 25%, and finally H, which
provides 30%.
correction level, as well as on the type of data that you are encoding. There
are four data modes that a QR code can encode: numeric, alphanumeric,
binary, or Kanji.
k
Px( a)=∑ xi ai−1
i=1
53
The researchers uses the algorithm for encoding and decoding of QR
code with the used of Reed Solomon code. This is to enable the system to
read even if the QR code is 7%, 15% and soon is not readable for scanning.
General Overview
for encoding text: numeric, alphanumeric, byte, and Kanji. Each mode
encodes the text as a string of bits (1s and 0s), but each mode uses a
different method for converting the text into bits, and each encoding method is
optimized to encode the data with the shortest possible string of bits.
mode, then select the most optimal mode for your text.
Now that you have selected the appropriate encoding mode for your
text, the next step is to encode the text. The data encoding section describes
this process in detail for each encoding mode. The result of this step is a
string of bits that is split up into data code words that are each 8 bits long.
after you create the string of data bits that represent your text, you must then
use those bits to generate error correction code words using a process called
54
QR scanners read both the data code words and the error correction
code words. By comparing the two, the scanner can determine if it read the
data correctly, and it can correct errors if it did not read the data correctly.
The data and error correction code words generated in the previous steps
must now be arranged in the proper order. For large QR codes, the data and
error correction code words are generated in blocks, and these blocks must
After generating the data code words and error correction code words
and arranging them in the correct order, you must place the bits in the QR
code matrix. The code words are arranged in the matrix in a specific way.
During this step, you will also place the patterns that are common to all QR
Certain patterns in the QR code matrix can make it difficult for QR code
specification defines eight mask patterns, each of which alters the QR code
patterns results in the QR code with the fewest undesirable traits. This is done
by evaluating each masked matrix based on four penalty rules. Your final QR
code must use the mask pattern that resulted in the lowest penalty score.
55
Step 7: Format and Version Information
The final step is to add format and (if necessary) version information to
the QR code by adding pixels in particular areas of the code that were left
blank in previous steps. The format pixels identify the error correction level
and mask pattern being used in this QR code. The version pixels encode the
size of the QR matrix and are only used in larger QR codes. [ CITATION Tho15 \l
1033 ]
56
GANNT Chart of the Proposed
57
58
List of the Activities with the Predecessor
1 19 -
2 3 1
3 2 2
4 4 2
5 3 3 ,4
6 6 4
7 4 6
8 9 5, 7
9 4 8
10 20 8
11 20 9
12 4 11
13 14 12
14 11 13
15 76 3
16 2 15
17 21 16
18 16 17
19 1 17
20 29 19
21 49 19
22 5 21
23 5 21
24 4 23
25 6 22
26 4 25
59
PERT CHART OF THE PROPSED SYSTEM
60
System Flow Chart
Create Account
(Admin, Participants)
Start G
Homepage
A
(System User Admin? Participant?
Interface)
Display
Create Account? Registration Display
Form Create Account? Registration
Form
Enter Name,
Display Login Ldms_db Enter Name,
Email, Display Login
Form Email,
Ldms_db Password, Form
Position, Password,
Region Position,
Region
Enter Email
and Enter Email
Password Display and
Successfully Password Display
Created Account Successfully
Created Account
B
C
61
Super Admin
A G G
Superadmin? Logs?
Display Login
Display Logs
Form
Enter Email
and View Details
Password
Display
True? Superadmin
Dashboard
62
Continuation of Admin
B
Add Training D
Repository Vie w Users
Program?
Display List of
Users
Display Form Display Form
Display User
Details
Display Admin
Save? Display Form Save?
Dashboard
Update User
Details
Successfully
Display Form
Added Validate Data Error Message
Save to
Ldms_db Ldms_db database?
63
Continuation of Participants
64
C F
Register? Repository? Trainings?
Search Your
Verify Email and Name
Decrement slot Render? Ldms_db
Password
Generate QR code
Download Found?
Successful
Send Email to
the
participants for
verification
65
D
Settings Attendance?
Display Pending
Logout Attendance
A.M? P.M
Destroy
Logout Approve
Sessions
Scan QR code
View
G Sucessfully
Created Verify QR code Ldms_db
Attendance
Display User
Datails Redirect to
True?
attendance sheet
for time in and out
Update
Successfully
Time in?
Time in
Save to
database?
66
67
F
Live streaming Logout? End
Broadcast of live
stream with flash Destroy
Logout
media encoder Sessions
Watching of
live strem
Download data
Ldms_db
from database
68
No
D
Settings Attendance?
H
Yes Yes
No
Display Pending
No
Logout Attendance
No
Yes A.M? P.M
No
Destroy Yes
Logout Approve
Continuation of Admin Sessions
Yes
Scan QR code
Yes
View
G Sucessfully
No
Created Verify QR code Ldms_db
Yes Attendance
Yes
Display User
Datails Redirect to
True? Error Message
attendance sheet
for time in and out
Yes
No No
Update
Successfully
Time in?
Time in
Yes
yes
No
69
Yes Save to
database?
Context Diagram of the Proposed System
70
Data Flow Diagram of the Proposed System for ADMIN
71
Data Flow Diagram of the Proposed System for PARTICIPANT
72
Data Flow Diagram of the Proposed System for SUPER ADMIN
73
74
75
Program Consideration
For creating an account for admin, the user will fill in the needed
For the new participant, the user will fill up the registration form and the
verification code, the system will generate a user ID for the participant.
After the registration, helshe will put their user lD to the form for them
Then upon reservation, the system will send QR Code to their email
Program Issues
The common system issues that many researchers deal with are to
For the proposed system to be able to work or use at ease, its front end must
be a friendly user and in terms of back end it must have a large amount of
Program Tools
scripting, so you can do anything any other CGI program can do, such
76
as collect form data, generate dynamic page content, or send and
receive cookies. But PHP can do much more. There are three main
areas where PHP scripts are used. First is, Server-side scripting. This
is the most traditional and main target field for PHP. Second,
Command line scripting. You can make a PHP script to run it without
Windows, Mac OS X, RISC OS, and probably others. PHP has also
support for most of the web servers today. This includes Apache, IIS,
and many others. And this includes any web server that can utilize the
FastCGI PHP binary, like lighttpd and nginx. PHP works as either a
programming (OOP), or a mixture of them both. With PHP you are not
PDF files and even Flash movies (using libswf and Ming) generated on
the fly. You can also output easily any text, such as XHTML and any
other XML file. PHP can autogenerate these files, and save them in the
77
for adding, accessing and managing content in a database. It is most
noted for its quick processing, proven reliability, ease and flexibility of
use.
pages. All website pages are really HTML documents. HTML reports
the website, including the layout, visual effects and background color.
paper, or in other media. CSS saves a lot of work. It can control the
78
speech, and handwriting recognition, support for virtual hard disks,
the browser. Also chrome keeps you safe and sound with its built-in
of the browser. And its customize Google Chrome to make it your own.
79
Printer - a device that accepts text and graphic output from a computer
of paper.
the Vista OS. It uses the same Aero user interface (UI) that debuted in
than other kinds of storage, such as a hard disk drive (HDD), solid-
Instrument
questionnaire that will be used for testing the system. The survey
questionnaire has 5 category which was based in the said ISO. The first
category is reliability, it shows how realible does the system need to be when
80
the user uses it to perform their task, updating the system with new content
need to be, does maintaining or porting the system need to be, the output
from the system need to be. The second category is the maintainability. This
for the goal of maintaining the product or system. The third is the usability, the
meet stated and implied needs when used under specified conditions. And the
information and data so that persons or other products or systems have the
Validation
To validate the survey questionnaire that was used for evaluation of the
chosen few offices that have similar characteristics in nature. The total
respondent for the testing was thirty, fifteen were coming from the human
resource office and the other half were the usual employees that avail
weighted mean should be 0.7 in which the total weighted mean was 0.80, this
81
Data Gathering Procedure
the office of the Civil Service Commission. But before conducting an interview,
sent a proposal letter offering the clientele to collaborate to solve the problem
that was Civil Service was encountering. After the approval of the proposed
system, the proponent starts to interview the personnel of the HR office of the
Civil Service Commission to further understand the problem and how it can be
solved.
After analyzing the data that was gathered during the interviews, the
proponent looks into some literature that might help and connected to the
study. The proponents also study also some related system that might help
Statistical Tool
Getting the result of the Cronbach Alpha testing, the proponent used
Test: A Simple Guide for Researchers by Bujang (2018), et al. explains that
82
the value of Cronbach’s alpha ranges from zero to one with the higher values
implying the items are measuring the same dimension. In contrary, if the
Cronbach’s alpha value is low (near to 0), it means some or all of the items
are not measuring the same dimension. This means that test items are not
In order for the researcher to know the results from the evaluation
conducted, a formula was used for computing the mean for every category of
the evaluation. A limit of scale was used as an indicator that will determine the
qualitative descriptions.
where:
Determining the point of scale for every question, Likert Scale, a five-
point scaling was used, in order for the respondents to avoid confusion on
the evaluation.
83
Range Qualitative Description
3.41-4.20 Complied
84