Professional Documents
Culture Documents
______________________________________________________________________________________
A Project
Presented to
________________________________________________________________________
In Partial Fulfillment
________________________________________________________________________
Hanzel V. Andrade
Meschelle E. Ba-ang
MARCH 2020
ILOILO SCIENCE AND TECHNOLOGY UNIVERSITY
La Paz, Iloilo City
COLLEGE of ARTS and SCIENCES
APPROVAL SHEET
It has passed the final defense on August 19, 2019, and approved by the Defense
committee on August 19, 2019 with a grade of pass.
ii
ACKNOWLEDGEMENT
We, the researchers, would like to thank the following individuals whom we have
greatly benefited from their combined efforts and valuable time for the completion of this
study:
But above all, we thank our Almighty Lord, for being there to always enlighten,
Mr. Loreto P. Gabawa Jr., our thesis adviser, for his aid, guidance, and great
understanding throughout the completion of this study. His full knowledge of the system
was able to steer us in the right direction, so much so that his advice made us overcome
any difficulties we encountered throughout our study towards completion of the project.
Mr. Francis Fritz Esportono, our Information Technology instructor, for his
remarkable effort in checking our documents in catching errors, his helpful criticisms
during the defense, as well as his important discussions, comments, and suggestions
during our class time. We are truly grateful for his guidance.
To the board of panels, Maureen Nettie Linan, Mr. Charles Jaranilla for all of
their supervision and helpful evaluation to get the right output for the thesis. For their
comments, suggestions and more importantly, their time and countless effort spent in
To our fellow researchers, classmates and friends for their advice, constructive
criticism and moral support that motivates us to pursue our passion for our study.
iii
To the researchers’ family, Mr. and Mrs. Rolando Lentija, Mr. and Mrs. Hernane
Ba-ang, Mr. and Mrs. Gerardo Andrade, and Mr. and Mrs. Sucaldito for their undying
support, love, and understanding that made the researchers finished this study.
Hanzel V. Andrade
Meschelle E. Ba-ang
iv
Curfew “Anti-Tambay” System with Mobile Application
Hanzel V. Andrade
Meschelle E. Ba-ang
Abstract
Application that would facilitate; (1) manage user accounts, (2) manage violators’ details,
(3) match fingerprint from existing records, (4) generate monthly report of apprehended
violators. The throw-away prototyping was used as the system development methodology
where thorough analysis phase that is used to gather information and to develop ideas for
the system concept. The system was tested by the white-box and black-box testing. In
determining of the target respondents, random sampling was used. The system was
The system had an overall rating of 4.26 which translate to "Very Satisfactory",
Content Page
Title Page
Approval Sheet ii
Acknowledgement iii
Abstract v
Table of Contents vi
List of Figures ix
List of Tables xi
Chapter
1. INTRODUCTION
Background of the Study 1
Conceptual Framework 3
Definition of Terms 5
Smartphone 9
Google Maps 10
Android 11
vi
Biometrics 12
ISO 25010 19
3. METHODOLOGY
Project Description 22
Development Process 23
Requirement Analysis 24
Activity Diagram 26
Class Diagram 28
Sequence Diagram 29
Design Specification 31
Deployment Diagram 39
vii
Testing and Operation 40
System Evaluation 41
Summary of Findings 69
Conclusions 69
Recommendations 71
References 73
Appendices 75
Appendix A 76
Appendix B 82
Appendix C 86
Appendix D 88
Appendix E 89
viii
List of Figures
Content Page
x
List of Tables
Content Page
xi
xii
CHAPTER 1
Introduction
Curfew applies as a nightly routine to persons of a certain age staying indoors during
certain hours while loiterers are those of legal age, yet still in the streets drinking liquor,
half-naked, and publicly smoking. Police personnel is usually put in-charge to arrest these
violators. At present, this is manually done by listing down the names in a logbook,
usually coupled with a warning and 24-hour detention. For minors, their guardians are
later being contacted and asked to come to take them home, however, for those without
guardians, they're referred under the Department of Social Welfare & Development care
In some situations, when they’ve been caught a second time the police are unable to
properly recognize them. Since this time around, the violators realize they can lie or fake
their identity. Listing down the names on paper is not very accurate and reliable, thus
they see this as an easy escape, and they repeat their actions without receiving any form
of punishment.
The researchers propose a system that will benefit the law enforcers who are
responsible to keep the streets safe and lessen the worries of citizens walking out in
public late at night. The system is a web-based where the administrator manage the
policemen on duty, and policemen, manage violators, and generate report where most
apprehended violators are. Allows to scan fingerprint of violators for verification. The
system comes with an application where policemen encode the basic information of the
1
violators while on mobile patrol. Information is then saved in the server and can be
viewed in real-time.
Application and evaluate the system based on the International Organization for
Standardization 25010.
2
Conceptual Framework
Application
Figure 1 shows the input, process, output, and evaluation of the system. The
Curfew “Anti-Tambay” System with Mobile App manages the user's account process, the
system allows the creation of accounts for policemen to use as their log-in details. The
system is capable of adding, viewing, deleting, and updating the user’s profile.
3
In the manage violator details process, the violators' information that was encoded
on the system's mobile application such as the complete name, address, age, contact
number, location through Global Positioning System (GPS) will be supported with a
scanned fingerprint for authentication. The system also allows the administrator and
policemen to view a violator's recent record, place of apprehension, and other pending
violations. The manage violators' details can be modified and updated by the system's
administrator and policeman, and the policeman who encoded the information on the
mobile application. Once the system detects a violator with an existing record, it
automatically adds a new record to an existing one such as type of violation, addresses
where they were apprehended, date and time of apprehension, and finally the police in
The system can generate and display the monthly report of apprehended violators.
The admin has single access to view monthly reports of the location where violators are
The overall rating of the system was based on evaluation ISO 25010 in terms of
4
Definition of Terms
For better and clearer understanding of the study, the following terms are defined
In this study, curfew referred to the rule applying to persons that need to be
staying indoors and are prohibited from going out at a certain time.
one used for identifying individuals from the unique pattern of whorls and lines
(“Merriam-Webster.com,” 2019).
In this study, the fingerprint referred to scanned data of the violator that is saved
in the server.
In this study, information usually referred to data that is retrieved from the
In this study, mobile referred to the portable handheld device where the basic
5
Violator. It is defined as a person who breaks or fails to comply with a rule
(“Dictionary.com,” 2019).
In this study, violators referred to both minors and loiterers that the police
apprehend.
In this study, an update referred to the monthly report on the location where
The Curfew “Anti-Tambay” System with Mobile Application would help users
every time they capture minors and loiterers. The study is beneficial to the following:
Policemen. This is a study that can help the law enforcers to manage information
conveniently and efficiently on violators of the Curfew and “Anti-Tambay” Law. Also,
the study can help in-charge law enforcers to keep the streets safe and lessen the worries
Tambay” System with Mobile Application of their research and utilize a similar system.
6
Scope and Delimitations
The Curfew “Anti-Tambay” System with Mobile Application monitors helps the
authority to get the information of the violators, including the fingerprint. The system only
manages the violators' information and fingerprint that were encoded and saved through
the mobile application. All accounts are fully managed by the administrator or the
authority in charge and have full access to viewing and printing the fingerprint and the
violators' information.
The application has a limitation on the information that was not encoded through the
mobile application. It means that the system does not hold and save all information of the
residents in a certain area or places, thus the system cannot verify and authenticate
The system cannot send short messaging system to notify the parent/guardian of the
violator, thus the coordination to the police station is still in need in notifying and in the
verification process.
The system cannot track every user, instead, it only records the area where police
whose hands are physically abled and is unavailable for the demographic who are
physically and mentally disabled specifically the amputees, the mentally ill, and those
The system does not cover and hold other records of charged cases to the violator.
The system focuses only on the record of violating and impeding the curfew and “Anti-
7
The system can only generate a monthly report. It cannot generate a daily or weekly
After which, the researchers have distributed the made questionnaire to the selected
fifteen (15) policemen and fifteen (15) IT personnel who served as respondents. The
researchers used a random sampling technique to determine the respondents. The study
was conducted at the police stations under the Iloilo City Police Office by May 2020.
8
CHAPTER 2
In this study researchers conceptualized what was the perfect device to be used in
the system. Similar concepts had been studied from the different existing systems in the
Smartphone
but now adds features that normally could only be found on a computer – such as the
ability to send and receive email and edit documents. It utilizes various operating systems
allowing it to run applications and has extended capabilities that allow it does more than
just basic text and calls. An example would be a GPS installed on the device, it calculates
data to show multiple paths and determine the location on the ground. It can download
apps such as personal or business managing apps, in short, it's capable of downloading
anything as long as there is available storage left. When it comes to information, more
smartphones can access the web at higher speeds, all thanks to third generation and fourth
generation data networks as well as the inclusion of wireless fidelity support to many
as the medium on which to install a biometric app to analyse fingerprint data on violators.
Furthermore, the researchers used the GPS module whose purpose is to track and save the
9
last known location of violators and store it in a database. Using this feature, police can
monitor areas where common sightings of violators take place with relative ease.
Google Maps
photography. The maps are embedded with additional information on terrain, street and
road names, famous landmarks and buildings, public transit, real-time and typical traffic
information. Users can conveniently switch between map and satellite view, or opt for a
hybrid view that overlays the information available in the map view onto the satellite
view. Google Maps have considerably made online mapping very accessible to the
masses.
While these technologies have many convenient uses in everyday life, law
enforcement agencies have expressed concern that they could be exploited by offenders
and might alter existing offending patterns and habits. For environmental criminologists,
they have the potential to open up new approaches to conducting research. This study
draws on the results of earlier studies in related fields and a handful of criminological
studies to discuss how these online mapping applications can trigger new research
implement these web mapping applications for their research. For instance, in the study
of Pringle, the geographer relied heavily on aerial photography using Google Maps as an
alternative rather than expensive commercial satellite imagery and a separate study of
10
Olea and Mateo-Tomas, these biologists tapped into Street View imagery to assess the
The researchers use Google maps to display various areas every time a monthly
report is needed to be showcased. Similarly, Google Maps basic function is to mark the
areas where most violators are frequently found and caught. The simplicity of this online
feature allows its users to have the benefit of saving time and effort needed to conduct a
wide view of an area without actually needing to manually come and visit areas displayed
on the Google map. The only main difference of the app is that instead of displaying the
whole Iloilo area, every time a violator is caught only a dot is pinned to the location while
Android
touchscreen devices, cell phones, and tablets. Its design allows users to perform various
intuitive actions such as pinching, swiping, and tapping on the screen. Apart from mobile
wristwatch and personal computers, complete with its own distinct and unique graphical
Concerning this study, the researchers decided to develop the system using
Android Studio that is the common integrated development environment platform to use
for Android applications development. The latest version, Android Studio 4.1 is largely
researchers are using the latest version called the Android Gradle plugin that enables the
11
addition of several features specific in building Android apps as well as run independent
Biometrics
physiological or behavioural characteristic. Among the features measured are the face,
fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are
separate and distinct from personal information. Biometric templates cannot be reverse-
engineered to recreate personal information and they cannot be stolen and used to access
personal information.
Using a unique, physical attribute of your body, such as your fingerprint or iris, to
effortlessly identify and verify that you are whom you claim to be, is the best and easiest
solution in the market today. That is the simple truth and power of Biometrics
Technology today. Although biometric technology has been around for many years,
modern advances in this emerging technology, coupled with big reductions in cost, now
make biometrics readily available and affordable to consumers, small business owners,
For this research, the users made this a basis because biometrics is now quickly
turning into a common feature for mobile devices and because this technology is an
effective way to undoubtedly prove the true identity of individual users that will use the
biometric app and will not use hardware that already has a built-in fingerprint scanner.
12
Review of the Related Studies
A juvenile curfew has one common goal: keep youth at home during the late-
night and early morning hours and to prevent them from committing a crime or being a
victim of a crime. This common-sense appeal has led to the popularity of curfews, at least
within the United States and Iceland. However, prior reviews have questioned the
effectiveness of curfews.
Studies conducted between January 20, 2014, and March 5, 2014, yielded a search
strategy of 7,349 titles and abstracts. The initial screening identified 100 of these as
potentially relevant and in need of a full-text review for study eligibility. Fifteen
victimization. This is not, however, a conclusive finding. The observational nature of the
research designs creates potential sources of bias, and as such the findings need
additional replication. However, many of the most plausible biases should have increased
the likelihood of finding an effect. Most of the studies reviewed were conducted during a
period when the crime was decreasing throughout the United States. Thus, it appears that
juvenile curfews either do not affect crime and victimization or the effect is too small to
be reliability detected with available data (Willson, Gill, Olaghere, & McClure, 2016).
About this study, the researchers used Juvenile curfew effects on criminal
behavior and victimization as a basis for this study where the biometric application could
reduce the alarming number of minors and violators causing problems. Since the
13
proposed system largely deals with a civic disturbance at night, researchers will use this
study as a basis to develop an application intended for both minors and violators.
estimation
individual's lifestyle. Mobile phone devices are rampant in all aspects of human life.
on mobile devices. To keep up with high demand, developers have to constantly deliver
high-quality app on time and within their budget (A. Kaur & K. Kaur, 2018).
information.
Live Scan API is a software development kit that provides fingerprint capture
capture decisions independently and without the influence of the API or firmware of the
device. It performs real-time quality checks on finger images that ensure compliance and
maximum quality before a final image is taken, dramatically improving overall capture
14
In this study, researchers used this toolkit as a basis for accurately scanning the
fingerprints of minors caught by police on the night they went illegally. This is intended
to verify the user's unique fingerprint and prevent the user from easily spoofing their
identity.
Vehicle Sensor Networks (VSN) are emerging as a new tool for effectively
monitoring the physical world, especially in urban areas where a high concentration of
vehicles equipped with onboard sensors is expected. A vehicle tracking system combines
designed computer software at least at one operational base to enable the owner or a third
party to track the vehicle’s location, collecting data in the process from the field and
"active". "Passive" devices store GPS location, speed, heading, and sometimes a trigger
event such as key on/off, door open/closed. Once a vehicle returns to a predetermined
point, the device is removed and the data is downloaded on a computer for evaluation.
Passive systems include auto download types that transfer data via wireless download.
"Active" devices also collect the same information but usually transmit the data in real-
time via cellular or satellite network to a computer or data center for evaluation.
pointed by a group of 55 satellites all across the globe. However, these systems that are
15
developed and designed exclusively by the vehicle developer are not available to the
general public. Also, these systems are designed using proprietary software and
hardware. Due to the high cost of these systems, urban transit agencies cannot afford the
systems. To overcome such problems a system was designed using open-source software
and hardware, keeping the cost of the system to a bare minimum (Garulde & Haldikar,
2014).
The researchers used a Real-Time Position Tracking System Using Google Maps
as the basis of this study to track the location of people instead of vehicles. The system
was not designed to track every user, but instead, it only records the areas during the time
the arrest was created. In addition, the location is ultimately stored in the database and
will display a monthly report about the areas where many violators were commonly
apprehended.
This paper is based on the previous studies of the system and its overall concept and
structure. The basic fingerprint recognition system mostly consists of four stages: firstly,
the sensor is used for enrolment & recognition to capture the biometric data. Secondly,
the pre-processing stage is used to remove unwanted data and increase the clarity of ridge
structure by using enhancement techniques. Thirdly, the feature extraction stage which
takes the input from the output of the pre-processing stage to extract the fingerprint
features. Fourthly, the matching stage is to compare the acquired feature with the
template in the database. Finally, the database which stores the features for the matching
system consists of four stages: firstly, the sensor which is used for enrolment &
recognition to capture the biometric data. Secondly, the pre-processing stage which is
used to remove unwanted data and increase the clarity of ridge structure by using
enhancement technique.
barangays were rounded up Monday night after they were caught by police roaming the
streets past the city’s 10 p.m. curfew. Local authorities are now scrambling to strengthen
Based on data from the women and children’s protection desk of the local police,
Mandaluyong recorded 256 cases of crimes involving children, from simple mischief to
street rioting and robbery, in 2013. When the ordinance was enforced, the number
headquarters for their parents to fetch them. He added that it was also a way to remind the
parents that they violate Ordinance No. 538, or the Code of Parental Responsibility,
which has been implemented since March 2014. Under this ordinance, the city not only
imposes a 10 p.m. curfew on minors but also holds parents responsible if ever their
children violate the curfew or get involved in a crime (Anata and Yee, 2016).
17
Based on this investigation, researchers will use this investigation as a guideline
for the system for arrested offenders. The system can determine if there is a history of
regulatory recorded violations according to policies already set by the authorities. For
minors, there are some restrictions on who has public access to stored information, and
those who fall under this demographic are primarily responsible for the Women's and
central administration, user self-service, role-based access control, and integrated user
management.
identified in the present work. Along with that, specific challenges to the present-day
More than 80 countries in the world have formulated laws on protecting the
privacy of their citizens. These are mostly part of the information security or data
protection acts of the country. Users keep on multiplying in the present-day mobile,
internet, and cloud computing environment. Organizations can manage business risks by
using the efficient Identity management system, however, the cost remains a prime
care of these increasing needs. In this new era of computing, organizations need to
identify ways to manage risks for their business and growth (Kumar, Bhardwaj, 2018).
18
For this study, researchers use this as a guide to developing the mobile application
to identify violators that have existing records on the server. Taking all information from
this study into account satisfies the conditions of authentication, confidentiality, and
integrity. To prevent unwanted persons from making fake accounts on the app, the
administrator in charge must be able to verify accounts using badge numbers to make
sure only official police personnel are allowed to have an account with regards to
ISO 25010
The quality model is the cornerstone of a product quality evaluation system. The
quality model determines which quality characteristics will be taken into account when
evaluating the properties of a software product.
The quality of a system is the degree to which the system satisfies the stated and
implied needs of its various stakeholders, and this provides value. These stakeholders’
are precisely what is represented in the quality model, which categorizes the product
The product quality model defined in ISO 25010 comprises the eight quality
product or system provides functions that meet stated and implies needs when used under
functional appropriateness.
19
Performance Efficiency– This characteristic represents the performance relative
to the number of resources used under stated conditions. It is composed of time, behavior,
data so that persons or other products or systems have the degree of data access
efficiency with which a product or system can be modified to improve it, correct it, or
exchange information with other products, systems, or components, and/or perform its
20
Reliability – It is the degree to which a system, product, or component performs
ISO 25010 is the evaluation tool utilized by the researchers for the evaluation of
the Curfew “Anti-Tambay” System with Mobile Application. Under ISO 25010 are the
eight (8) characteristics being used to access the quality of the monitoring system
developed. The characteristics mentioned beforehand are broken down into sub
characteristics. Using the ISO 25010 brings clarity of definitions of purpose and
operating capability.
21
CHAPTER 3
Methodology
to be deployed for policemen in the hopes to improve the traditional way of catching
civilians violating rules or ordinances in a certain place. This system is created to improve
security and speed up police work whenever they run into several violators during a nightly
routine patrol.
First, the researchers constructed the survey questionnaire and had it validated for
revisions. Second, the researchers gathered and analyzed the data using the research-
made instrument and identified the mean and overall mean of the accumulated response
based on ISO 25010 standard. The ISO 25010 was used to evaluate the system in terms
compatibility, usability, portability, and reliability. Before the conduct of the study, the
For creating an account, the admin is responsible to verify the accounts of police using
their badge number as their username. While on the policeman's side, the system should
allow them to simply log in and out of their account when done. The police on duty would
be the one to use a mobile application. The violators will be obliged to input their
biographical profile such as first name, last name, address, place of birth, etc., and then
scan their fingerprint for verification purposes. The system automatically stores the data
into a database for a later purpose, if needed. Using the fingerprint cross-matching method,
authority can now identify if the persons they caught have a history of violation and as a
22
result makes it difficult to fake an identity. Every time a violator is caught, the system pins
a dot on the location where the apprehension occurred while not necessarily displaying the
whole map.
Development Process
Planning
Analysis Design
Implementation
Analysis
Implementation System
that includes gathering information and brainstorm ideas for the system concept. Also
called as Close-End Prototyping, its main objective is to ensure that the system
requirements are validated and that it contains only minor details enough for users to
Under the system planning stage, the researchers went through the rigorous process
of identifying the main problems and interviewed at the police station to find out how the
gathered data will be used to make the Curfew “Anti-Tambay” System with Mobile
Application function.
23
Under the system analysis stage, the researchers formulate all important
information from the preliminary research on how to solve the complex functionality of
the system such as the main end-users and how the application can be used in various
settings. It is also during this phase that system requirements and diagrams are created to
Under the system design stage, the researchers visualize a sample of a user interface
based on user requirements to understand and predict the outcome of the problem. During
this stage, the researchers formulate a design structure from several constructed diagrams
to show how it operates inputting a fingerprint to the system. If the initial prototype is
unable to perform its work, it is immediately discarded and replaced until it is deemed
functional.
Under the design prototype, feedback will be gathered from the user that can be
quickly incorporated to the development of the main system. The prototype will later be
Under the system implementation stage, the researchers began to construct codes
to develop the whole system. This phase includes, testing, debugging the coding of the
24
Figure 3: Use Case Diagram for Curfew and “Anti-Tambay” System with Mobile Application
Figure 3 shows the Use Case Diagram of Curfew “Anti-Tambay” System with
Mobile Application. The first user, which is the admin, is tasked with managing the
device and create an account for police personnel while the police as the second user, can
log in where the system can verify the validity of the badge number and password. The
police can also manage devices and log out to the system. In addition, the admin can also
log in, view records and reports whether it exists or not and finally manage the account
The violator will be asked to scan their fingerprints, only then after the
fingerprints have been sent will the system crossmatch the data whether past violations
have occurred or not. If indeed a violator has committed a violation in the past, the
system will display records retrieved from the database. To finish it off, the server then
25
sends an SMS message to the guardian to notify them that the minor under their care has
Figure 4.0 shows the activity performed by the police. The activity starts when the
police log into the system by entering a username and password. The system will validate
the badge number and password. If the input becomes valid, the police are now able to
access the system otherwise the error message will be displayed. Police have the option
to manage devices, view records and manage violators. Under manage violators, if
scanning fingerprint has matched, it will display violation history and update record to
26
the existing list. Otherwise, it will create a new violation and save the fingerprint profile.
Finally, the police can choose to log out of the system once it is done.
Figure 4.1 shows the activity performed by the admin. The activity begins when
the admin logs into the system by entering the username and password. The system will
perform the verification process afterward. If the input consisting of the username and
password becomes valid, the admin is now able to access the system otherwise the error
message will be displayed. Admin has the option to perform an activity such as manage
accounts, manage devices, view records, and view reports. If the admin is done, he/she
27
Figure 5: Class Diagram of Curfew “Anti-Tambay” System with Mobile Application
Mobile Application which represents the table in the database. The classes include admin
info. Police info, violations, reports, violator, and details. The admin class is where the
admin info is stored and the admin can also add, login, edit, update, and log out. In the
police class, the police must log in first to the system and it can manage the violator and
reports. Report class is where all reports will be stored. Violation class is where all
28
violation is stored and can be selected. Violator class is where all the information for the
violator. The details class is where other personal information for a violator is stored.
The police must first log in using their badge number and password which will be
verified by the admin. The system will send a message if the login is successful or failed.
If it is successful the police can manage the violator, its details, its previous
records/reports, and logout. In managing violators, the police can add, update, and view
the violator record. In managing details the police can add, edit, and view the details of
the violator to confirm if it has existing records. In managing the device, the police
should log in first to the system to use the mobile application. In managing the report, the
29
admin can view the report, but the police can add, edit, and update the report. In
managing the violation, the police can add the specific violation of a violator.
The figure shown above is the scenario of the sequence diagram of the Admin to
the system.
The admin will log on to the system by using its badge number as a reference.
The admin can add, edit and view the user's record. And the system will display the
30
Figure 6.2: Scenario for Manage User (Police)
The figure shown above is the scenario of the sequence diagram of the Admin to
Police station. The admin can view, add and edit records of its respective police station.
Design Specification
The design specification is a detailed document providing information about the
characteristics of a project to set criteria the developers will need to meet. Its use is called
31
Figure 7: GUI of Login Police Account
This is the login page where the police officer should enter his/her badge no as a
32
Figure 7.1: GUI of Police search page
After you click the login button, it will go to the search page. On the search page,
the police can either choose if he/she wants to search for the name or fingerprint of a
person. If there is no existing data of that person, it will go to the add page.
33
Figure 7.2: GUI for Search or add fingerprint
If there is no existing data in the database it will display a message and you can
34
Figure 7.3: GUI for Add Violator Profile
On the add page, the police officer will ask for the full name, birthday, address,
parent’s name, parent’s contact number, gender, and scans the fingerprint of the violator.
35
Figure 7.4: GUI for Display Message
After you click the submit button it will display a message your profile
successfully added and you click the “ok button” to return to the search page.
36
Figure 7.5: GUI for Display Matching Violator
If there is a record retrieved, it will automatically display all information and the
violation history of that person. You can add a violation by clicking the add button.
37
Figure 7.6: GUI for Add New Violation
On the add violation page, the police officer can input a new violation on the
38
Figure 7.7: GUI for Violation Successfully Added Message
It will show that you successfully added the violation and if you click the ok
Deployment Diagram
Artefacts represent concrete elements in the physical world that are the result of a
development process.
39
Figure 8: Deployment diagram of Curfew “Anti-Tambay” System with Mobile
Application
System with Mobile Application. It shows the admin using a PC connected to a modem
that is connected to the internet to access the server. The police also connect to the
internet through a mobile application and also uses GPS to locate the exact location
where the police apprehend the violator. The system has a database that saves the data of
The white-box and black-box testing will be used by the researchers in testing the
Curfew “Anti-Tambay” System with Mobile Application. The researchers will use two
ways of testing, the white box and the black box for the software to locate bugs that exist
in the system.
40
For white-box testing, also termed as clear box testing or structural testing looks
inside a software being tested and uses that knowledge as being part of its testing process.
The codes for the functionality of the graphical user interface, how the program queries
the database, and information updating as well as sending the notification are checked in
For black-box testing, the system will be tested without any knowledge of the
code or internal structure of the program. Both the physical functionalities of the device
and its graphical user interface (GUI) will be put to the test. Button functionality is tested
tested if it sent the SMS notification to the legal guardian about the biographical profile
of the minor such as the first name, last name, age, contact number, location as well as
The researchers utilize this method if it could be applied to all levels of software
testing such as unit, integration, functional, system, and acceptance. It comprises most, if
not all testing at higher levels, but can dominate unit testing as well.
System Evaluation
portability. The Curfew “Anti-Tambay” System with Mobile Application will be evaluated
41
Before the evaluation started, the researchers explain to the respondents the flow of
Curfew and the Anti-Tambay System with Mobile Application. After they used the
questionnaires. The scale that was utilized by the researchers was the Likert scale which
was a psychometric scale commonly used in questioners and was the most widely used in
the survey research. Respondents specified their level of agreement in the statement which
The researchers gathered the questionnaires to solve its arithmetic mean. Getting
the arithmetic mean was by adding up the set of scores and divide it by the number of
scores thus getting the average. The mean scale for evaluating the Curfew “Anti-Tambay”
interpretation.
Table 1: Mean scale for Evaluating the Curfew “Anti-Tambay” System with Mobile
Application
42
Table 1 shows the Likert scale used for evaluating the Curfew “Anti-Tambay”
System with Mobile Application for purpose of the study. The computed arithmetic mean
will help the researchers determine the Curfew “Anti-Tambay” System with Mobile
43
CHAPTER 4
Results and Discussions
This chapter presents the results and information of the study, the structure that
made up the project, and the capabilities and limitations of the project. The analysis of the
The admin police has the authority to create account for sub-admin in the system
as shown in figure 9 and application police user shown in figure 10. The admin will register
the personal information and the preferred user ID and password. The admin must click
the add button first in order to enable the textbox fields and click save button to save the
information. Edit button for modification and delete button for deletion of the account.
Navigation buttons are also available for viewing next or previous account and search box
44
Figure 10: Register application police user
The admin login where the admin can log in using his/her username and password
to start using the system. The admin will input his/her username and password then click
the “Login”. If the username and password are correct, he/she will see message shown in
figure 11.
45
Figure 11: Admin login
The admin can now access the home page and perform the task in the menu bar:
admin to manage sub-admin account, police to manage police profile and manage arrest
Police user will also login using his/her the badge no as username and the
password to start using the application. If the badge no and the password do not match,
dialog box will appear to enter the correct badge no and password shown above.
47
Figure: Search violator’s record
The application police user has two ways to search and retrieve violator’s record.
The first method is typing the name in the search box and pressing the “search” button
The second option is using the “search using fingerprint” shown above.
48
Figure: No violator record found
Dialog box will prompt if the violator has no existing record when searched. Police
user will press “add” button to add violator record and cancel button to cancel.
49
Figure: Encode violator’s information
Police user will encode the violator’s first name, middle, last name, birthday,
50
Figure: Scan and add violator’s fingerprint
Scan the fingerprint of the violator by lightly tapping the finger on the screen to add
51
Figure: Profile successfully added dialog box
Press the “submit” button to save and submit then dialog box will prompt for
52
Figure: Violator’s profile with violator field.
Police users can also manage violator’s violation details and history. After
submitting the violator’s record profile, he/she will go back to the search page to search
and retrieve the profile created. The profile will be displayed with the field for violation
details.
53
Figure: Add violation detail
To add violation, the police user will press the “add violation” button and enter the
54
Figure: Add violation successfully added dialog box
After pressing the “add” button, dialog box will display that the violation
55
Figure: Admin search and retrieve violator’s profile
The admin and/or sub-admin on duty can manage the account of the violators in
the system. Caught violators will be forwarded to the respective precinct. The admin
and/or sub-admin on duty will search and retrieve the record in the system shown in
figure 9.13. The admin/or sub-admin will click the “update” button to update the
violator’s profile.
56
Figure: Admin update violator’s profile
The information encoded and saved from the mobile application will be stored in
the database and will reflect in the system if retrieved. It is where the admin and/or sub-
admin will interview the violator, the other details that will be encoded and update in the
57
Figure: Match fingerprint from existing record
The fingerprint is used for identifying individuals from the unique pattern of
whorls and lines. One cannot deny and fake his/her identity if the fingerprint is used. As
mentioned, using a fingerprint is the other way to search and retrieve a violator’s record.
If the fingerprint has a match in the existing record from the database, automatically the
profile and information of the violator will be displayed shown in the next figure.
58
Figure: Search and view monthly report by filter
provide status updates on apprehended violators within one week after the end of a
month. These reports will track past and present records. The police admin and/or sub-
admin can generate monthly reports of apprehended violators in the system. Police
admins can filter the reports by date, precinct, violation, name, age, birthday, gender, and
address.
59
System Evaluation and Results
personnel and policemen to determine its capacity. The system evaluation purpose is to
Table 1 includes the criteria of functionality, the mean, overall mean, and the
The system set of function covers all the 4.25 Very Satisfactory
The system provides the correct results with 4.28 Very Satisfactory
Table 1 shows that the respondents rated the system in terms of functional
suitability as the result presented in the table. The system rated “very satisfactory” (mean
The study correlates with the study of Boicov (2012) had developed worked
properly and satisfied the preferences of the users of the system and the system can perform
mean, and the verbal description affecting the system standard as evaluated by the
respondents.
software
the requirements.
Table 2 shows that the system efficiency which composes of the time and
resource behavior is rated “very satisfactory” (mean=4.35) by the user. The system
capability responds quickly to the user interface which requires performance with time
and resources.
The study correlates to Techtarget (2018) where the developed system worked
61
Table 3 includes the criteria for compatibility in statement form, the mean, overall
mean, and the verbal description affecting the system standard as evaluated by the
respondents.
efficiently
Table 3 shows that the respondents rated the system in terms of compatibility as the
result presented in the table. The system rated “very satisfactory” (mean = 4.24) since all
The study conformed to Camat et al (2014) worked properly and satisfied the
preferences of the users of the system and the system can perform the task required.
62
Table 4 includes the criteria for usability, the mean, overall mean, and the verbal
concepts.
The system easy to use (i.e consistent navigation). 4.47 Very Satisfactory
The system user interface enables pleasing and 4.27 Very Satisfactory
The system can be used by the people with the 4.4 Very Satisfactory
familiarity, learnability, operability, user error protection, user interface aesthetics, and
accessibility was rated by the user “very satisfactory” (mean = 4.25) because the system
63
The study correlates to what Dela Torre et al, (2016) had studied where the
system developed worked properly and satisfied the preferences of the user of the system
Table 5 includes the criteria for reliability, the mean, overall mean, and the verbal
The software have less crashes resulting from 4.13 Very Satisfactory
of failure.
Table 5 shows that the respondent rated the system in terms of reliability as the
result presented in the table. The system rated “very satisfactory” (mean = 4.21) in
This study conformed Camat et al (2014) worked properly and satisfied the
preferences of the users of the system and the system can perform the task required.
64
Table 6 includes the criteria for security, the mean, overall mean, and the verbal
The system ensures that the data are accessible 4.23 Very Satisfactory
repudiated later.
The system entity can be proved to be the one 4.40 Very Satisfactory
claimed.
Table 6 shows that the respondents rated the system in terms of security as the result
presented in the table. The system rated “very satisfactory” (mean = 4.22) in security since
This study conformed to Coberiza, (2013) worked properly and satisfied the
preferences of the users of the system and the system can perform the task required.
65
Table 7 includes the criteria for maintainability, the mean, overall mean, and the
other components.
The system used an asset on the other system. 4.25 Very Satisfactory
The system diagnose deficiency and identify parts 4.24 Very Satisfactory
to be modified.
testing.
Table 7 shows the result of the system’s evaluation in terms of maintainability. The
user rated the system “very satisfactory” (mean = 4.24). It stores the data in the system to
66
The study correlates to Coberiza, Fuentes, et al (2013) where the system developed
worked properly and satisfied the preferences of the user often system and software can be
tested easily.
Table 8 includes the criteria for portability, the mean, overall mean, and the verbal
Table 8 shows that the system evaluation in terms of portability resulted as “very
This study correlates to Boicov (2012) has developed where it worked properly and
satisfied the preferences of the user of the system and the system can perform the task
required.
67
Table 9 includes evaluation summary of each criteria, the mean, overall mean, and the
overall rating of (mean = 4.26) as Very Satisfactory and it also shows that the system is
feasible to use for it passes the criteria for developing a successful system and it meets all
the requirements.
68
CHAPTER 5
Summary of Findings
Based on the result of the study, the Curfew “Anti-Tambay” System with Mobile
Application a great addition to the traditional way of catching civilians violating rules or
ordinances in a certain place. The respondents were chosen through the use of a
participants of the study are comprised of fifteen (15) policemen and fifteen (15) IT
personnel within the vicinity of Iloilo City to evaluate the performance standard of the
system. To evaluate the system, ISO 25010 standards were utilized. The Curfew “Anti-
Tambay” System with Mobile Application got 4.27 mean in functionality, 4.35 in
efficiency, 4.24 in compatibility, 4.25 in usability, 4.21 in reliability, 4.22 in security, 4.24
in maintainability, and 4.27 in portability with an overall rating of 4.26 which translate to
Conclusions
Based on the findings of this project, the following conclusions were achieved its
objectives.
• Following the process under manage user account, the system is responsible for the
creation of a policeman’s account, for which they can input their details to be able
69
• Following the process under “manage violators’ details”, relevant information such
as name, age, address, contact number, and save location using Global Positioning
Satellite will need to be encoded to the system. It allows the administrator and
apprehension, place of apprehension and other pending violations they may have.
• Following the process under “match fingerprint from existing records”, there are
two ways to search and retrieve violators’ record. The first is typing the name in
the search box while the second option is using the “search using fingerprint”
feature found under the search tab. This determines if the offender has a previous
this is to provide an update on apprehended violators within one week and after the
end of the month. It can track both past and present records as well as filter
information by date, precinct, violation, name, age, birthday, gender, and address.
suitability for passing all correct results with a degree of precision, performance
efficiency for easy and quick user interface which is easy to understand.
Compatibility to satisfy users of the system and performs the task required.
Usability enabling the user to manipulate the system easy and conveniently.
Reliability resulting in less crashes from its programming and fast recovery.
70
Security to prevent confidential and unauthorized data from leaking out.
Maintainability for working properly and satisfying the end user testing the
software, and for portability being operable on other operating systems based in
ISO 25010.
Recommendations
1. The researcher recommended the system to be implemented not only in Iloilo City
2. Future researchers can upgrade the system that can send an SMS notification to the
3. Future researchers can also upgrade and enhance the profile capture wherein the
71
REFERENCES
72
References
Herrera, John Noel (2022). Iloilo City back to shorter curfew hours for minors.
https://www.lifewire.com/what-makes-a-smartphone-smart-579597. Date
https://www.investopedia.com/terms/a/android-operating-system.asp. Date
10, 2020
Gill, Charlotte; McClure, Dave; Olaghere, Ajima; Wilson, David (2016) Juvenile curfew
21, 2019
73
Kaur, Anureet; Kaur, Kulwant (2018) Systematic literature review of mobile application
https://www.researchgate.net/publication/328726677_Systematic_Literature_Revi
ew_of_Mobile_Application_Development_and_Testing_Effort_Estimation. Date
Garude, Mihir; Haldikar, Nirmal (2014) Real-Time Position Tracking System Using
Ali, Mouad; Gaikwad, M.T., Mahale, Vivek; Yannawar, Pravin (2017) Process of
https://www.researchgate.net/publication/322878884_Identity_Management_Syst
74
APPENDICES
75
APPENDIX A
Position: ______________________________________________
Instruction: Please check the box provided to rate the quality of the system according to
your satisfaction.
1 – Poor
2 –Fair
3 – Good
4 – Satisfactory
5 – Very Satisfactory
1 2 3 4 5
1. Functional Sustainability
user objectives.
76
B. Functional correctness The system provides correct
degree of precision.
2. Performance Efficiency 1 2 3 4 5
‘processing
hardware or software.
requirements.
3. Compatibility 1 2 3 4 5
required functions
efficiently.
4. Usability 1 2 3 4 5
concepts.
77
C. Operability The system is easily operable
on any environment.
user
of characteristics and
capabilities.
5. Reliability 1 2 3 4 5
link processing.
B. Availability
Basic.
failure.
6. Security 1 2 3 4 5
78
A. Confidentiality The system ensures that the
access.
programs or data.
unique.
later.
7. Maintainability 1 2 3 4 5
components.
79
C. Analyzability The system diagnoses
to be modified.
products quality.
testing.
8. Portability 1 2 3 4 5
system.
environment specified to
software.
different environment
functions.
80
Comments / Suggestions / Recommendation:
_________________________________________________________________
_________________________________________________________________
Name of Evaluator:______________________________________________________
Signature:_____________________________________________________________
Date:_________________________________________________________________
81
APPENDIX B
March 5, 2019
CHARLES A. JARANILLA,MSCS
Faculty, Computer Department
Dear Sir:
Greetings!
In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.
Respectfully yours,
82
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City
March 5, 2019
Dear Sir:
Greetings!
In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.
Respectfully yours,
83
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City
March 5, 2019
Dear Sir:
Greetings!
In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.
Respectfully yours,
84
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City
March 5, 2019
Dear Sir:
Greetings!
In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.
Respectfully yours,
85
APPENDIX C
Organization Structure
Meschelle E. Ba-ang
Researcher/
Technical Writer
A Project Manager is the person responsible for leading a project from its
inception to execution. This includes planning, execution, and managing the people,
resources and scope of the project. Project manager must have the discipline to create and
attainable objectives and to see them through to successful completion. The project
manager has full responsibility and authority to complete the assigned project.
86
A System Analyst is the person who studies the software application domain and
a specialist in one area of computer programming or to generalist who writes codes for
the user. This documentation includes online helps, user guides/manuals, write papers
87
APPENDIX D
Gantt Chart
88
APPENDIX E
Curriculum Vitae
Personal Information:
Sex: 27
Age: Male
Educational Background:
89
Curriculum Vitae
Personal Information:
Sex: 25
Age: Female
Educational Background:
90
Curriculum Vitae
Personal Information:
Sex: Male
Age: 21
Educational Background:
91
Curriculum Vitae
Personal Information:
Sex: Male
Age: 27
Educational Background:
92
Department: Computer Department
Republic of the Philippines
ILOILO SCIENCE AND TECHNOLOGY UNIVERSITY Document
La Paz, Iloilo City QF-ITEOP-03
Code:
CERTIFICATION
May 19, 2022
93