You are on page 1of 105

CURFEW “ANTI-TAMBAY” SYSTEM with MOBILE APPLICATION

______________________________________________________________________________________

A Project

Presented to

The Faculty of the College of Arts and Sciences

Iloilo Science and Technology University

La Paz, Iloilo City

________________________________________________________________________

In Partial Fulfillment

Of the Requirements for the Degree

Bachelor of Science in Information Technology

________________________________________________________________________

Mark Anthony M. Sucaldito

Robert John C. Lentija II

Hanzel V. Andrade

Meschelle E. Ba-ang

MARCH 2020
ILOILO SCIENCE AND TECHNOLOGY UNIVERSITY
La Paz, Iloilo City
COLLEGE of ARTS and SCIENCES

APPROVAL SHEET

This capstone project entitled CURFEW “ANTI-TAMBAY” SYSTEM with MOBILE


APPLICATION, prepared and submitted by Mark Anthony M. Sucaldito, Robert John C.
Lentija II, Hanzel V. Andrade, and Meschelle E. Ba-ang in partial fulfilment of the
requirements of the degree BACHELOR OF SCIENCE IN INFORMATION
TECHNOLOGY, is hereby recommended for approval.

LORETO P. GABAWA JR, MSCS


Adviser

It has passed the final defense on August 19, 2019, and approved by the Defense
committee on August 19, 2019 with a grade of pass.

FRANCIS FRITZ B. ESPORTONO


CHAIRPERSON

CHARLES D. JARANILLA, MSCS MAUREEN NETTIE N. LINAN, DIT


Member Member

FRANCIS FRITZ B. ESPORTONO


Subject Professor

Accepted and approved in partial fulfillment of the requirement of the degree


BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY.

TRACY N. TACUBAN, D.I.T ALEJO P. BITON, Ed D


Head, Computer Department Dean, College of Arts and Sciences
Date: ________ Date: ________

ii
ACKNOWLEDGEMENT

We, the researchers, would like to thank the following individuals whom we have

greatly benefited from their combined efforts and valuable time for the completion of this

study:

But above all, we thank our Almighty Lord, for being there to always enlighten,

motivate and shower us with countless of blessings from above.

Mr. Loreto P. Gabawa Jr., our thesis adviser, for his aid, guidance, and great

understanding throughout the completion of this study. His full knowledge of the system

was able to steer us in the right direction, so much so that his advice made us overcome

any difficulties we encountered throughout our study towards completion of the project.

Mr. Francis Fritz Esportono, our Information Technology instructor, for his

remarkable effort in checking our documents in catching errors, his helpful criticisms

during the defense, as well as his important discussions, comments, and suggestions

during our class time. We are truly grateful for his guidance.

To the board of panels, Maureen Nettie Linan, Mr. Charles Jaranilla for all of

their supervision and helpful evaluation to get the right output for the thesis. For their

comments, suggestions and more importantly, their time and countless effort spent in

reading and checking the researcher’s documents.

To our fellow researchers, classmates and friends for their advice, constructive

criticism and moral support that motivates us to pursue our passion for our study.

iii
To the researchers’ family, Mr. and Mrs. Rolando Lentija, Mr. and Mrs. Hernane

Ba-ang, Mr. and Mrs. Gerardo Andrade, and Mr. and Mrs. Sucaldito for their undying

support, love, and understanding that made the researchers finished this study.

Mark Anthony M. Sucaldito

Robert John C. Lentija II

Hanzel V. Andrade

Meschelle E. Ba-ang

iv
Curfew “Anti-Tambay” System with Mobile Application

Mark Anthony M. Sucaldito

Robert John C. Lentija II

Hanzel V. Andrade

Meschelle E. Ba-ang

Loreto P. Gabawa Jr., MSCS


Adviser

Abstract

This study aimed to develop a Curfew “Anti-Tambay” System with Mobile

Application that would facilitate; (1) manage user accounts, (2) manage violators’ details,

(3) match fingerprint from existing records, (4) generate monthly report of apprehended

violators. The throw-away prototyping was used as the system development methodology

where thorough analysis phase that is used to gather information and to develop ideas for

the system concept. The system was tested by the white-box and black-box testing. In

determining of the target respondents, random sampling was used. The system was

evaluated by policemen and IT personnel based on the evaluation in terms of functional

suitability, performance efficiency, compatibility, usability, reliability, security,

maintainability, and portability of ISO 25010.

The system had an overall rating of 4.26 which translate to "Very Satisfactory",

making it acceptable and satisfactory to the end-users.


v
Table of Contents

Content Page

Title Page

Approval Sheet ii

Acknowledgement iii

Abstract v

Table of Contents vi

List of Figures ix

List of Tables xi

Chapter

1. INTRODUCTION
Background of the Study 1

Objectives of the Study 2

Conceptual Framework 3

Definition of Terms 5

Significance of the Study 6

Scope and Delimitations 7

2. REVIEW OF RELATED LITERATURE


Related Literatures 9

Smartphone 9

Google Maps 10

Android 11
vi
Biometrics 12

Juvenile curfew effects on criminal behavior and


Victimization 13

Systematic literature review of mobile application


development and testing effort estimation 14

Live Scan API 14

Real-Time Position Tracking System Using Google Maps 15

Process of Fingerprint Recognition System 16

Mandaluyong intensifies curfew on minors 17

Identity Management Systems: A Comparative Analysis 18

ISO 25010 19

3. METHODOLOGY
Project Description 22

Development Process 23

Requirement Analysis 24

Use Case Diagram 25

Activity Diagram 26

Class Diagram 28

Sequence Diagram 29

Design Specification 31

Graphical User Interface 32

Deployment Diagram 39

vii
Testing and Operation 40

System Evaluation 41

4. RESULTS AND DISCUSSIONS


Manage Users Account 44
Manage Violator’s Details 48
Match fingerprint from existing record 58
View monthly report of apprehended violators 59
System Evaluation and Results 60
5. SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

Summary of Findings 69

Conclusions 69

Recommendations 71

References 73

Appendices 75

Appendix A 76

Appendix B 82

Appendix C 86

Appendix D 88

Appendix E 89

viii
List of Figures

Content Page

Figure 1: Conceptual Framework of Curfew “Anti-Tambay” System


with Mobile Application 3

Figure 2.0: Throw Away Prototyping Methodology 23

Figure 3: Use Case Diagram for Curfew “Anti-Tambay” System


with Mobile Application 24
Figure 4.0: Activity Diagram of Police 26

Figure 4.1: Activity Diagram of Admin 27

Figure 5: Class Diagram of Curfew “Anti-Tambay” System w/ Mobile App 28

Figure 6: Sequence Diagram of Administrator 29

Figure 6.1: Scenario for Admin System Sub Process 30

Figure 6.2: Scenario for Manage User (Police) 31

Figure 7: GUI of Login Police Account 32

Figure 7.1: GUI of Police search page 33

Figure 7.2: GUI for Search or add fingerprint 34

Figure 7.3: GUI for Add Violator Profile 35

Figure 7.4: GUI for Display Message 36

Figure 7.5: GUI for Display Matching Violator 37

Figure 7.6: GUI for Add New Violation 38

Figure 7.7: GUI for Violation Successfully Added Message 39

Figure 8: Deployment diagram of Curfew “Anti-Tambay” System


ix
with Mobile App 40

Figure 9: Register Sub-Admin 44

Figure 9.1: Register application police user 45

Figure 9.2: Admin login 45

Figure 9.3: Admin system homepage 46

Figure 9.4: Police user login 47

Figure 9.5: Search violator’s record 48

Figure 9.6: Add violator record 48

Figure 9.7: Encode violator’s information 49

Figure 9.8: Scans and add violator’s fingerprint 50

Figure 9.9: Profile successfully added dialog box 50

Figure 9.10: Violator’s profile with violation field 51

Figure 9.11: Add violation detail 52

Figure 9.12: Add violation successfully added dialog box 52

Figure 9.13: Admin search and retrieve violator’s profile 53

Figure 9.14: Admin update violator’s profile 54

Figure 9.15: Match fingerprint from the existing record 55

Figure 9.16: Search and view monthly report by filter 56

x
List of Tables

Content Page

Table 1: Mean scale for Evaluating the Curfew and Anti-Tambay


System with Mobile Application 42

Table 2: Functionality of Curfew “Anti-Tambay” System with


Mobile Application 57

Table 3: Efficiency of Curfew “Anti-Tambay” System with


Mobile Application 58

Table 4: Compatibility of Curfew “Anti-Tambay” System with


Mobile Application 59

Table 5: Usability of Curfew “Anti-Tambay” System with


Mobile Application 60

Table 6: Reliability of Curfew “Anti-Tambay” System with


Mobile Application 61

Table 7: Security of Curfew “Anti-Tambay” System with


Mobile Application 62

Table 8: Maintainability of Curfew “Anti-Tambay” System with


Mobile Application 63

Table 9: Portability of Curfew “Anti-Tambay” System with


Mobile Application 64

Table 10: Evaluation Summary of Curfew “Anti-Tambay” System with


Mobile Application 65

xi
xii
CHAPTER 1

Introduction

Background of the Study

Curfew applies as a nightly routine to persons of a certain age staying indoors during

certain hours while loiterers are those of legal age, yet still in the streets drinking liquor,

half-naked, and publicly smoking. Police personnel is usually put in-charge to arrest these

violators. At present, this is manually done by listing down the names in a logbook,

usually coupled with a warning and 24-hour detention. For minors, their guardians are

later being contacted and asked to come to take them home, however, for those without

guardians, they're referred under the Department of Social Welfare & Development care

as imposed by Regulation Ordinance 2011-676, or Curfew for Minors.

In some situations, when they’ve been caught a second time the police are unable to

properly recognize them. Since this time around, the violators realize they can lie or fake

their identity. Listing down the names on paper is not very accurate and reliable, thus

they see this as an easy escape, and they repeat their actions without receiving any form

of punishment.

The researchers propose a system that will benefit the law enforcers who are

responsible to keep the streets safe and lessen the worries of citizens walking out in

public late at night. The system is a web-based where the administrator manage the

policemen on duty, and policemen, manage violators, and generate report where most

apprehended violators are. Allows to scan fingerprint of violators for verification. The

system comes with an application where policemen encode the basic information of the

1
violators while on mobile patrol. Information is then saved in the server and can be

viewed in real-time.

Objectives of the Study


This study aims to design and develop a Curfew “Anti-Tambay” System with Mobile

Application and evaluate the system based on the International Organization for

Standardization 25010.

Specifically, it aims to attain the following:

1. manage user accounts;

2. manage violators’ details;

3. retrieve records using fingerprint scanning;

4. generate a report; and

5. evaluate the system based on ISO 25010 in terms of functional suitability,

performance efficiency, compatibility, usability, reliability, security,

maintainability, and portability.

2
Conceptual Framework

This study will be developed according to the concept shown below:

Figure 1: Conceptual Framework of Curfew “Anti-Tambay” System with Mobile

Application

Figure 1 shows the input, process, output, and evaluation of the system. The

Curfew “Anti-Tambay” System with Mobile App manages the user's account process, the

system allows the creation of accounts for policemen to use as their log-in details. The

system is capable of adding, viewing, deleting, and updating the user’s profile.

3
In the manage violator details process, the violators' information that was encoded

on the system's mobile application such as the complete name, address, age, contact

number, location through Global Positioning System (GPS) will be supported with a

scanned fingerprint for authentication. The system also allows the administrator and

policemen to view a violator's recent record, place of apprehension, and other pending

violations. The manage violators' details can be modified and updated by the system's

administrator and policeman, and the policeman who encoded the information on the

mobile application. Once the system detects a violator with an existing record, it

automatically adds a new record to an existing one such as type of violation, addresses

where they were apprehended, date and time of apprehension, and finally the police in

charge of arresting them.

The system generates a cross-matching fingerprint feature if the offender has a

previous or existing record retrieved from the server.

The system can generate and display the monthly report of apprehended violators.

The admin has single access to view monthly reports of the location where violators are

frequently caught so they can do regular monitoring of those certain areas.

The overall rating of the system was based on evaluation ISO 25010 in terms of

functional suitability, performance efficiency, compatibility, usability, reliability,

security, maintainability, and portability.

4
Definition of Terms

For better and clearer understanding of the study, the following terms are defined

conceptually and operationally.

Curfew. It is a regulation that requires people, specifically minors, to remain

indoors between specified hours, typically at night (“Dictionary.com,” 2019).

In this study, curfew referred to the rule applying to persons that need to be

staying indoors and are prohibited from going out at a certain time.

Fingerprint. It is an impression or mark made on a person’s fingertip, especially

one used for identifying individuals from the unique pattern of whorls and lines

(“Merriam-Webster.com,” 2019).

In this study, the fingerprint referred to scanned data of the violator that is saved

in the server.

Information. It is defined as knowledge communicated or received concerning a

particular fact or circumstance (“Dictionary.com,” 2019).

In this study, information usually referred to data that is retrieved from the

database to verify the violator's identity.

Mobile. It refers to a portable, wireless computing device, usually with computing

capabilities being held in a hand of a user (“Dictionary.com,” 2019).

In this study, mobile referred to the portable handheld device where the basic

information of the violator is encoded.

5
Violator. It is defined as a person who breaks or fails to comply with a rule

(“Dictionary.com,” 2019).

In this study, violators referred to both minors and loiterers that the police

apprehend.

Update. It is the process of incorporating new or accurate information whether in

a database or program. (“Merriam-Webster.com,” 2019)

In this study, an update referred to the monthly report on the location where

violators are commonly caught.

Significance of the Study

The Curfew “Anti-Tambay” System with Mobile Application would help users

every time they capture minors and loiterers. The study is beneficial to the following:

Policemen. This is a study that can help the law enforcers to manage information

conveniently and efficiently on violators of the Curfew and “Anti-Tambay” Law. Also,

the study can help in-charge law enforcers to keep the streets safe and lessen the worries

of citizens walking out in public late at night.

Future Researchers. This study can be used as a reference in Curfew “Anti-

Tambay” System with Mobile Application of their research and utilize a similar system.

6
Scope and Delimitations

The Curfew “Anti-Tambay” System with Mobile Application monitors helps the

authority to get the information of the violators, including the fingerprint. The system only

manages the violators' information and fingerprint that were encoded and saved through

the mobile application. All accounts are fully managed by the administrator or the

authority in charge and have full access to viewing and printing the fingerprint and the

violators' information.

The application has a limitation on the information that was not encoded through the

mobile application. It means that the system does not hold and save all information of the

residents in a certain area or places, thus the system cannot verify and authenticate

violator's declared information are valid.

The system cannot send short messaging system to notify the parent/guardian of the

violator, thus the coordination to the police station is still in need in notifying and in the

verification process.

The system cannot track every user, instead, it only records the area where police

made an arrest. It only retrieves information of violators through fingerprint scanning

whose hands are physically abled and is unavailable for the demographic who are

physically and mentally disabled specifically the amputees, the mentally ill, and those

born without arms and hands.

The system does not cover and hold other records of charged cases to the violator.

The system focuses only on the record of violating and impeding the curfew and “Anti-

Tambay” law and ordinance of the city.

7
The system can only generate a monthly report. It cannot generate a daily or weekly

report. The system needs an Internet connection to use the application.

After which, the researchers have distributed the made questionnaire to the selected

fifteen (15) policemen and fifteen (15) IT personnel who served as respondents. The

researchers used a random sampling technique to determine the respondents. The study

was conducted at the police stations under the Iloilo City Police Office by May 2020.

8
CHAPTER 2

Review of Related Literature

In this study researchers conceptualized what was the perfect device to be used in

the system. Similar concepts had been studied from the different existing systems in the

development of the project.

Review of the Related Literature

Smartphone

In general, a smartphone is a piece of device that gives access to telephone calls,

but now adds features that normally could only be found on a computer – such as the

ability to send and receive email and edit documents. It utilizes various operating systems

allowing it to run applications and has extended capabilities that allow it does more than

just basic text and calls. An example would be a GPS installed on the device, it calculates

data to show multiple paths and determine the location on the ground. It can download

apps such as personal or business managing apps, in short, it's capable of downloading

anything as long as there is available storage left. When it comes to information, more

smartphones can access the web at higher speeds, all thanks to third generation and fourth

generation data networks as well as the inclusion of wireless fidelity support to many

handsets that allows browsing of favorite websites (Cassavoy, 2019).

Based on this information, the researchers decided to use smartphone technology

as the medium on which to install a biometric app to analyse fingerprint data on violators.

Furthermore, the researchers used the GPS module whose purpose is to track and save the

9
last known location of violators and store it in a database. Using this feature, police can

monitor areas where common sightings of violators take place with relative ease.

Google Maps

Google Maps is free to use, web-based mapping service that combines

conventional cartographic maps along with satellite imagery and high-resolution

photography. The maps are embedded with additional information on terrain, street and

road names, famous landmarks and buildings, public transit, real-time and typical traffic

information. Users can conveniently switch between map and satellite view, or opt for a

hybrid view that overlays the information available in the map view onto the satellite

view. Google Maps have considerably made online mapping very accessible to the

masses.

While these technologies have many convenient uses in everyday life, law

enforcement agencies have expressed concern that they could be exploited by offenders

and might alter existing offending patterns and habits. For environmental criminologists,

they have the potential to open up new approaches to conducting research. This study

draws on the results of earlier studies in related fields and a handful of criminological

studies to discuss how these online mapping applications can trigger new research

questions, and how they could be considered a valuable methodological addition to

criminological research. In addition, several scientific disciplines were quick to

implement these web mapping applications for their research. For instance, in the study

of Pringle, the geographer relied heavily on aerial photography using Google Maps as an

alternative rather than expensive commercial satellite imagery and a separate study of

10
Olea and Mateo-Tomas, these biologists tapped into Street View imagery to assess the

habitat of certain animal species (Vandeviver, 2014).

The researchers use Google maps to display various areas every time a monthly

report is needed to be showcased. Similarly, Google Maps basic function is to mark the

areas where most violators are frequently found and caught. The simplicity of this online

feature allows its users to have the benefit of saving time and effort needed to conduct a

wide view of an area without actually needing to manually come and visit areas displayed

on the Google map. The only main difference of the app is that instead of displaying the

whole Iloilo area, every time a violator is caught only a dot is pinned to the location while

not necessarily displaying the whole map.

Android

An Android is a mobile operating system developed by Google, intended for all

touchscreen devices, cell phones, and tablets. Its design allows users to perform various

intuitive actions such as pinching, swiping, and tapping on the screen. Apart from mobile

devices, android is also implemented in automotive technology as well as gadgets like a

wristwatch and personal computers, complete with its own distinct and unique graphical

user interface (Chen, 2017).

Concerning this study, the researchers decided to develop the system using

Android Studio that is the common integrated development environment platform to use

for Android applications development. The latest version, Android Studio 4.1 is largely

used in developing an android application using java application language. The

researchers are using the latest version called the Android Gradle plugin that enables the

11
addition of several features specific in building Android apps as well as run independent

of Android Studio and can also be updated separately.

Biometrics

Biometrics is an automated method that recognizes a person based on a

physiological or behavioural characteristic. Among the features measured are the face,

fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are

separate and distinct from personal information. Biometric templates cannot be reverse-

engineered to recreate personal information and they cannot be stolen and used to access

personal information.

Using a unique, physical attribute of your body, such as your fingerprint or iris, to

effortlessly identify and verify that you are whom you claim to be, is the best and easiest

solution in the market today. That is the simple truth and power of Biometrics

Technology today. Although biometric technology has been around for many years,

modern advances in this emerging technology, coupled with big reductions in cost, now

make biometrics readily available and affordable to consumers, small business owners,

larger corporations, and public sector agencies alike (Bioelectronix 2019).

For this research, the users made this a basis because biometrics is now quickly

turning into a common feature for mobile devices and because this technology is an

effective way to undoubtedly prove the true identity of individual users that will use the

biometric app and will not use hardware that already has a built-in fingerprint scanner.

12
Review of the Related Studies

Juvenile curfew effects on criminal behavior and victimization

A juvenile curfew has one common goal: keep youth at home during the late-

night and early morning hours and to prevent them from committing a crime or being a

victim of a crime. This common-sense appeal has led to the popularity of curfews, at least

within the United States and Iceland. However, prior reviews have questioned the

effectiveness of curfews.

Studies conducted between January 20, 2014, and March 5, 2014, yielded a search

strategy of 7,349 titles and abstracts. The initial screening identified 100 of these as

potentially relevant and in need of a full-text review for study eligibility. Fifteen

documents representing 12 unique studies were eligible and coded.

Evidence suggests that juvenile curfews are ineffective at reducing crime or

victimization. This is not, however, a conclusive finding. The observational nature of the

research designs creates potential sources of bias, and as such the findings need

additional replication. However, many of the most plausible biases should have increased

the likelihood of finding an effect. Most of the studies reviewed were conducted during a

period when the crime was decreasing throughout the United States. Thus, it appears that

juvenile curfews either do not affect crime and victimization or the effect is too small to

be reliability detected with available data (Willson, Gill, Olaghere, & McClure, 2016).

About this study, the researchers used Juvenile curfew effects on criminal

behavior and victimization as a basis for this study where the biometric application could

reduce the alarming number of minors and violators causing problems. Since the

13
proposed system largely deals with a civic disturbance at night, researchers will use this

study as a basis to develop an application intended for both minors and violators.

Systematic literature review of mobile application development and testing effort

estimation

In recent years, advances in mobile technology can bring about changes in an

individual's lifestyle. Mobile phone devices are rampant in all aspects of human life.

Thus, as a result, it leads to an ever-increasing demand for software capable of running

on mobile devices. To keep up with high demand, developers have to constantly deliver

high-quality app on time and within their budget (A. Kaur & K. Kaur, 2018).

In relation to this study, abreast of mobile application and is in demand nowadays.

The application increased the productivity of the policemen in handling of violators’

information.

Live Scan API

Live Scan API is a software development kit that provides fingerprint capture

device abstraction through a common application programming interface. It is considered

as a programmable, configurable logic layer that allows an application to make auto-

capture decisions independently and without the influence of the API or firmware of the

device. It performs real-time quality checks on finger images that ensure compliance and

maximum quality before a final image is taken, dramatically improving overall capture

speed (Aware 2019).

14
In this study, researchers used this toolkit as a basis for accurately scanning the

fingerprints of minors caught by police on the night they went illegally. This is intended

to verify the user's unique fingerprint and prevent the user from easily spoofing their

identity.

Real-Time Position Tracking System Using Google Maps

Vehicle Sensor Networks (VSN) are emerging as a new tool for effectively

monitoring the physical world, especially in urban areas where a high concentration of

vehicles equipped with onboard sensors is expected. A vehicle tracking system combines

the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-

designed computer software at least at one operational base to enable the owner or a third

party to track the vehicle’s location, collecting data in the process from the field and

deliver it to the base of operation.

Several types of vehicle tracking devices exist. Classified as "passive" and

"active". "Passive" devices store GPS location, speed, heading, and sometimes a trigger

event such as key on/off, door open/closed. Once a vehicle returns to a predetermined

point, the device is removed and the data is downloaded on a computer for evaluation.

Passive systems include auto download types that transfer data via wireless download.

"Active" devices also collect the same information but usually transmit the data in real-

time via cellular or satellite network to a computer or data center for evaluation.

Modern vehicle tracking systems commonly use GPS or Globalnaya

Navigazionnaya Sputnikovaya Sistema (GLONASS) technology allows device to be pin

pointed by a group of 55 satellites all across the globe. However, these systems that are

15
developed and designed exclusively by the vehicle developer are not available to the

general public. Also, these systems are designed using proprietary software and

hardware. Due to the high cost of these systems, urban transit agencies cannot afford the

systems. To overcome such problems a system was designed using open-source software

and hardware, keeping the cost of the system to a bare minimum (Garulde & Haldikar,

2014).

The researchers used a Real-Time Position Tracking System Using Google Maps

as the basis of this study to track the location of people instead of vehicles. The system

was not designed to track every user, but instead, it only records the areas during the time

the arrest was created. In addition, the location is ultimately stored in the database and

will display a monthly report about the areas where many violators were commonly

apprehended.

Process of Fingerprint Recognition System

This study highlights current research based on fingerprint recognition systems.

This paper is based on the previous studies of the system and its overall concept and

structure. The basic fingerprint recognition system mostly consists of four stages: firstly,

the sensor is used for enrolment & recognition to capture the biometric data. Secondly,

the pre-processing stage is used to remove unwanted data and increase the clarity of ridge

structure by using enhancement techniques. Thirdly, the feature extraction stage which

takes the input from the output of the pre-processing stage to extract the fingerprint

features. Fourthly, the matching stage is to compare the acquired feature with the

template in the database. Finally, the database which stores the features for the matching

stags (Ali, Yannawar, Mahale, & Gaikwad, 2016).


16
For this study, the researchers decided to develop the system using 'Overview of

Fingerprint Recognition System’ as a guide. Where the basic fingerprint recognition

system consists of four stages: firstly, the sensor which is used for enrolment &

recognition to capture the biometric data. Secondly, the pre-processing stage which is

used to remove unwanted data and increase the clarity of ridge structure by using

enhancement technique.

Mandaluyong intensifies curfew on minors

In Mandaluyong, a total of 58 teenagers aged 15 and below from different

barangays were rounded up Monday night after they were caught by police roaming the

streets past the city’s 10 p.m. curfew. Local authorities are now scrambling to strengthen

the implementation of their existing ordinances imposing a curfew on minors.

Based on data from the women and children’s protection desk of the local police,

Mandaluyong recorded 256 cases of crimes involving children, from simple mischief to

street rioting and robbery, in 2013. When the ordinance was enforced, the number

dropped to 77 in 2014 and 73 in 2015.

According to Ignacio, the teenagers were temporarily brought to the police

headquarters for their parents to fetch them. He added that it was also a way to remind the

parents that they violate Ordinance No. 538, or the Code of Parental Responsibility,

which has been implemented since March 2014. Under this ordinance, the city not only

imposes a 10 p.m. curfew on minors but also holds parents responsible if ever their

children violate the curfew or get involved in a crime (Anata and Yee, 2016).

17
Based on this investigation, researchers will use this investigation as a guideline

for the system for arrested offenders. The system can determine if there is a history of

regulatory recorded violations according to policies already set by the authorities. For

minors, there are some restrictions on who has public access to stored information, and

those who fall under this demographic are primarily responsible for the Women's and

Children's Desk Protection Programs.

Identity Management Systems: A Comparative Analysis

It is important to form an Identity Management System, which could provide

central administration, user self-service, role-based access control, and integrated user

management.

Essential features of present-day identity management systems have been

identified in the present work. Along with that, specific challenges to the present-day

identity management systems have been identified.

More than 80 countries in the world have formulated laws on protecting the

privacy of their citizens. These are mostly part of the information security or data

protection acts of the country. Users keep on multiplying in the present-day mobile,

internet, and cloud computing environment. Organizations can manage business risks by

using the efficient Identity management system, however, the cost remains a prime

demerit of Identity Management as technology needs to be continuously upgraded to take

care of these increasing needs. In this new era of computing, organizations need to

identify ways to manage risks for their business and growth (Kumar, Bhardwaj, 2018).

18
For this study, researchers use this as a guide to developing the mobile application

to identify violators that have existing records on the server. Taking all information from

this study into account satisfies the conditions of authentication, confidentiality, and

integrity. To prevent unwanted persons from making fake accounts on the app, the

administrator in charge must be able to verify accounts using badge numbers to make

sure only official police personnel are allowed to have an account with regards to

catching violators as imposed by Regulation Ordinance 2011-676, or Curfew for Minors.

ISO 25010

The quality model is the cornerstone of a product quality evaluation system. The
quality model determines which quality characteristics will be taken into account when
evaluating the properties of a software product.

The quality of a system is the degree to which the system satisfies the stated and

implied needs of its various stakeholders, and this provides value. These stakeholders’

needs (e.g. functional suitability, performance efficiency, security, maintainability, etc.)

are precisely what is represented in the quality model, which categorizes the product

quality into characteristics and sub-characteristics.

The product quality model defined in ISO 25010 comprises the eight quality

characteristics shown in the following figure:

Functional Suitability – This characteristic represents the degree to which a

product or system provides functions that meet stated and implies needs when used under

specified conditions. It includes functional completeness, functional correctness, and

functional appropriateness.

19
Performance Efficiency– This characteristic represents the performance relative

to the number of resources used under stated conditions. It is composed of time, behavior,

resource, utilization, and capacity.

Security – It is the degree to which a product or system protects information and

data so that persons or other products or systems have the degree of data access

appropriate to their types and levels of authorization. It is composed of confidentiality,

integrity, non-repudiation, accountability, and authenticity.

Maintainability – This characteristic represents the degree of effectiveness and

efficiency with which a product or system can be modified to improve it, correct it, or

adapt it to changes in the environment, and in requirements. It is composed of

modularity, reusability, analysability, modifiability, and authenticity.

Portability – It is the degree of effectiveness and efficiency with which a system,

product, or component can be transferred from one hardware, software, or another

operational usage environment to another.

Compatibility – It is the degree to which a product, system, or component can

exchange information with other products, systems, or components, and/or perform its

required functions while sharing the same hardware or software environment. It is

composed of co-existence and interoperability.

Usability – It is the degree to which a product or system can be used by specified

users to achieve goals with effectiveness, efficiency, and satisfaction in a specified

context of use. It is composed of appropriateness, level of recognition, learnability,

operability, user error protection, user interface aesthetics, and accessibility.

20
Reliability – It is the degree to which a system, product, or component performs

specified functions under specified conditions for a specified period. It is composed of

maturity, availability, fault tolerance, and recoverability.

ISO 25010 is the evaluation tool utilized by the researchers for the evaluation of

the Curfew “Anti-Tambay” System with Mobile Application. Under ISO 25010 are the

eight (8) characteristics being used to access the quality of the monitoring system

developed. The characteristics mentioned beforehand are broken down into sub

characteristics. Using the ISO 25010 brings clarity of definitions of purpose and

operating capability.

21
CHAPTER 3

Methodology

Project Description and Development Process

Curfew “Anti-Tambay” System is a prime example of an existing mobile application

to be deployed for policemen in the hopes to improve the traditional way of catching

civilians violating rules or ordinances in a certain place. This system is created to improve

security and speed up police work whenever they run into several violators during a nightly

routine patrol.

First, the researchers constructed the survey questionnaire and had it validated for

revisions. Second, the researchers gathered and analyzed the data using the research-

made instrument and identified the mean and overall mean of the accumulated response

based on ISO 25010 standard. The ISO 25010 was used to evaluate the system in terms

of functionality suitability, performance efficiency, security, maintainability,

compatibility, usability, portability, and reliability. Before the conduct of the study, the

researchers secured the permits and consents from the respondents.

For creating an account, the admin is responsible to verify the accounts of police using

their badge number as their username. While on the policeman's side, the system should

allow them to simply log in and out of their account when done. The police on duty would

be the one to use a mobile application. The violators will be obliged to input their

biographical profile such as first name, last name, address, place of birth, etc., and then

scan their fingerprint for verification purposes. The system automatically stores the data

into a database for a later purpose, if needed. Using the fingerprint cross-matching method,

authority can now identify if the persons they caught have a history of violation and as a
22
result makes it difficult to fake an identity. Every time a violator is caught, the system pins

a dot on the location where the apprehension occurred while not necessarily displaying the

whole map.

Development Process

Planning

Analysis Design

Implementation
Analysis

Design Design Prototype

Implementation System

Figure 2.0: Throw Away Prototyping Methodology


The throw-away prototyping method shown in figure 2.0 is a popular methodology

that includes gathering information and brainstorm ideas for the system concept. Also

called as Close-End Prototyping, its main objective is to ensure that the system

requirements are validated and that it contains only minor details enough for users to

understand issues still being considered.

Under the system planning stage, the researchers went through the rigorous process

of identifying the main problems and interviewed at the police station to find out how the

gathered data will be used to make the Curfew “Anti-Tambay” System with Mobile

Application function.

23
Under the system analysis stage, the researchers formulate all important

information from the preliminary research on how to solve the complex functionality of

the system such as the main end-users and how the application can be used in various

settings. It is also during this phase that system requirements and diagrams are created to

better understand the system.

Under the system design stage, the researchers visualize a sample of a user interface

based on user requirements to understand and predict the outcome of the problem. During

this stage, the researchers formulate a design structure from several constructed diagrams

to show how it operates inputting a fingerprint to the system. If the initial prototype is

unable to perform its work, it is immediately discarded and replaced until it is deemed

functional.

Under the design prototype, feedback will be gathered from the user that can be

quickly incorporated to the development of the main system. The prototype will later be

discarded or thrown-away and will no longer be part of the main system.

Under the system implementation stage, the researchers began to construct codes

to develop the whole system. This phase includes, testing, debugging the coding of the

system deriving from the requirements of the end-users.

24
Figure 3: Use Case Diagram for Curfew and “Anti-Tambay” System with Mobile Application

Figure 3 shows the Use Case Diagram of Curfew “Anti-Tambay” System with

Mobile Application. The first user, which is the admin, is tasked with managing the

device and create an account for police personnel while the police as the second user, can

log in where the system can verify the validity of the badge number and password. The

police can also manage devices and log out to the system. In addition, the admin can also

log in, view records and reports whether it exists or not and finally manage the account

wherein he/she can add, edit, and view corresponding details.

The violator will be asked to scan their fingerprints, only then after the

fingerprints have been sent will the system crossmatch the data whether past violations

have occurred or not. If indeed a violator has committed a violation in the past, the

system will display records retrieved from the database. To finish it off, the server then

25
sends an SMS message to the guardian to notify them that the minor under their care has

committed a violation and urgently needs their presence.

Figure 4.0: Activity Diagram of Police

Figure 4.0 shows the activity performed by the police. The activity starts when the

police log into the system by entering a username and password. The system will validate

the badge number and password. If the input becomes valid, the police are now able to

access the system otherwise the error message will be displayed. Police have the option

to manage devices, view records and manage violators. Under manage violators, if

scanning fingerprint has matched, it will display violation history and update record to

26
the existing list. Otherwise, it will create a new violation and save the fingerprint profile.

Finally, the police can choose to log out of the system once it is done.

Figure 4.1: Activity Diagram of Admin

Figure 4.1 shows the activity performed by the admin. The activity begins when

the admin logs into the system by entering the username and password. The system will

perform the verification process afterward. If the input consisting of the username and

password becomes valid, the admin is now able to access the system otherwise the error

message will be displayed. Admin has the option to perform an activity such as manage

accounts, manage devices, view records, and view reports. If the admin is done, he/she

can log out of the account.

27
Figure 5: Class Diagram of Curfew “Anti-Tambay” System with Mobile Application

Figure 5 illustrates the class diagram of Curfew “Anti-Tambay” System with

Mobile Application which represents the table in the database. The classes include admin

info. Police info, violations, reports, violator, and details. The admin class is where the

admin info is stored and the admin can also add, login, edit, update, and log out. In the

police class, the police must log in first to the system and it can manage the violator and

reports. Report class is where all reports will be stored. Violation class is where all

28
violation is stored and can be selected. Violator class is where all the information for the

violator. The details class is where other personal information for a violator is stored.

Figure 6: Sequence Diagram of Administrator

The police must first log in using their badge number and password which will be

verified by the admin. The system will send a message if the login is successful or failed.

If it is successful the police can manage the violator, its details, its previous

records/reports, and logout. In managing violators, the police can add, update, and view

the violator record. In managing details the police can add, edit, and view the details of

the violator to confirm if it has existing records. In managing the device, the police

should log in first to the system to use the mobile application. In managing the report, the

29
admin can view the report, but the police can add, edit, and update the report. In

managing the violation, the police can add the specific violation of a violator.

Figure 6.1: Scenario for Admin System Sub Process

The figure shown above is the scenario of the sequence diagram of the Admin to

the system.

The admin will log on to the system by using its badge number as a reference.

The admin can add, edit and view the user's record. And the system will display the

corresponding account of the user.

30
Figure 6.2: Scenario for Manage User (Police)

The figure shown above is the scenario of the sequence diagram of the Admin to

Police station. The admin can view, add and edit records of its respective police station.

Design Specification
The design specification is a detailed document providing information about the

characteristics of a project to set criteria the developers will need to meet. Its use is called

for where a structure or product has to be specifically made to meet a need.

31
Figure 7: GUI of Login Police Account

This is the login page where the police officer should enter his/her badge no as a

username and password to log in to the application.

32
Figure 7.1: GUI of Police search page
After you click the login button, it will go to the search page. On the search page,

the police can either choose if he/she wants to search for the name or fingerprint of a

person. If there is no existing data of that person, it will go to the add page.

33
Figure 7.2: GUI for Search or add fingerprint
If there is no existing data in the database it will display a message and you can

now add a new violator in the database.

34
Figure 7.3: GUI for Add Violator Profile
On the add page, the police officer will ask for the full name, birthday, address,

parent’s name, parent’s contact number, gender, and scans the fingerprint of the violator.

Then he/she will press submit to save to the database.

35
Figure 7.4: GUI for Display Message
After you click the submit button it will display a message your profile

successfully added and you click the “ok button” to return to the search page.

36
Figure 7.5: GUI for Display Matching Violator
If there is a record retrieved, it will automatically display all information and the

violation history of that person. You can add a violation by clicking the add button.

37
Figure 7.6: GUI for Add New Violation
On the add violation page, the police officer can input a new violation on the

existing data and press submit save it to the server.

38
Figure 7.7: GUI for Violation Successfully Added Message
It will show that you successfully added the violation and if you click the ok

button it will automatically return to the search page.

Deployment Diagram

Deployment diagram is structure diagram which shows architecture at design of

the system as deployment (distribution) of software artefacts to deployment targets.

Artefacts represent concrete elements in the physical world that are the result of a

development process.

39
Figure 8: Deployment diagram of Curfew “Anti-Tambay” System with Mobile

Application

Figure 8 shows the deployment diagram of Curfew and the “Anti-Tambay”

System with Mobile Application. It shows the admin using a PC connected to a modem

that is connected to the internet to access the server. The police also connect to the

internet through a mobile application and also uses GPS to locate the exact location

where the police apprehend the violator. The system has a database that saves the data of

police and violators.

Testing and Operation

The white-box and black-box testing will be used by the researchers in testing the

Curfew “Anti-Tambay” System with Mobile Application. The researchers will use two

ways of testing, the white box and the black box for the software to locate bugs that exist

in the system.
40
For white-box testing, also termed as clear box testing or structural testing looks

inside a software being tested and uses that knowledge as being part of its testing process.

The codes for the functionality of the graphical user interface, how the program queries

the database, and information updating as well as sending the notification are checked in

this type of testing.

For black-box testing, the system will be tested without any knowledge of the

code or internal structure of the program. Both the physical functionalities of the device

and its graphical user interface (GUI) will be put to the test. Button functionality is tested

if it correctly corresponds to the operation assigned to it. Device functionality is also

tested if it sent the SMS notification to the legal guardian about the biographical profile

of the minor such as the first name, last name, age, contact number, location as well as

the custom message that might be of use.

The researchers utilize this method if it could be applied to all levels of software

testing such as unit, integration, functional, system, and acceptance. It comprises most, if

not all testing at higher levels, but can dominate unit testing as well.

System Evaluation

The Curfew “Anti-Tambay” System with Mobile Application performance were

evaluated based on ISO/IEC 25010 in terms of the system functional suitability,

performance efficiency, compatibility, usability, reliability, security, maintainability, and

portability. The Curfew “Anti-Tambay” System with Mobile Application will be evaluated

by fifteen (15) policemen and (15) IT personnel who served as respondents.

41
Before the evaluation started, the researchers explain to the respondents the flow of

Curfew and the Anti-Tambay System with Mobile Application. After they used the

application, an evaluation was conducted by the researchers by giving close-ended

questionnaires. The scale that was utilized by the researchers was the Likert scale which

was a psychometric scale commonly used in questioners and was the most widely used in

the survey research. Respondents specified their level of agreement in the statement which

corresponds to a Likert questionnaires item.

The researchers gathered the questionnaires to solve its arithmetic mean. Getting

the arithmetic mean was by adding up the set of scores and divide it by the number of

scores thus getting the average. The mean scale for evaluating the Curfew “Anti-Tambay”

System with Mobile Application is shown in Table 1 wherein there is a corresponding

interpretation.

Table 1: Mean scale for Evaluating the Curfew “Anti-Tambay” System with Mobile

Application

Mean Scale Description

4.21-5.00 Very Satisfactory

3.41– 4.20 Satisfactory

2.61– 3.40 Good

1.81 – 2.60 Fair

1.0 – 1.80 Poor

42
Table 1 shows the Likert scale used for evaluating the Curfew “Anti-Tambay”

System with Mobile Application for purpose of the study. The computed arithmetic mean

will help the researchers determine the Curfew “Anti-Tambay” System with Mobile

Application to develop it within the standard as specified in ISO 25010.

43
CHAPTER 4
Results and Discussions

This chapter presents the results and information of the study, the structure that

made up the project, and the capabilities and limitations of the project. The analysis of the

results based on the evaluation of the system.

Manage Users Account

The admin police has the authority to create account for sub-admin in the system

as shown in figure 9 and application police user shown in figure 10. The admin will register

the personal information and the preferred user ID and password. The admin must click

the add button first in order to enable the textbox fields and click save button to save the

information. Edit button for modification and delete button for deletion of the account.

Navigation buttons are also available for viewing next or previous account and search box

for quick results in both figures 9 and 10.

Figure 9: Register Sub-Admin

44
Figure 10: Register application police user

The admin login where the admin can log in using his/her username and password

to start using the system. The admin will input his/her username and password then click

the “Login”. If the username and password are correct, he/she will see message shown in

figure 11.

45
Figure 11: Admin login

The admin can now access the home page and perform the task in the menu bar:

admin to manage sub-admin account, police to manage police profile and manage arrest

details shown in figure 12.

Figure 12: Admin system homepage


46
Figure: Police user login

Police user will also login using his/her the badge no as username and the

password to start using the application. If the badge no and the password do not match,

dialog box will appear to enter the correct badge no and password shown above.

47
Figure: Search violator’s record

Manage Violator’s Details

The application police user has two ways to search and retrieve violator’s record.

The first method is typing the name in the search box and pressing the “search” button

The second option is using the “search using fingerprint” shown above.

48
Figure: No violator record found

Dialog box will prompt if the violator has no existing record when searched. Police

user will press “add” button to add violator record and cancel button to cancel.

49
Figure: Encode violator’s information

Police user will encode the violator’s first name, middle, last name, birthday,

address, parent’s name, parent’s contact number, and violator’s gender.

50
Figure: Scan and add violator’s fingerprint

Scan the fingerprint of the violator by lightly tapping the finger on the screen to add

and profile it as shown above.

51
Figure: Profile successfully added dialog box

Press the “submit” button to save and submit then dialog box will prompt for

successful addition of profile shown in figure above.

52
Figure: Violator’s profile with violator field.

Police users can also manage violator’s violation details and history. After

submitting the violator’s record profile, he/she will go back to the search page to search

and retrieve the profile created. The profile will be displayed with the field for violation

details.

53
Figure: Add violation detail

To add violation, the police user will press the “add violation” button and enter the

violation details and press “add” button to add and save.

54
Figure: Add violation successfully added dialog box

After pressing the “add” button, dialog box will display that the violation

successfully added shown in figure 9.12.

55
Figure: Admin search and retrieve violator’s profile

The admin and/or sub-admin on duty can manage the account of the violators in

the system. Caught violators will be forwarded to the respective precinct. The admin

and/or sub-admin on duty will search and retrieve the record in the system shown in

figure 9.13. The admin/or sub-admin will click the “update” button to update the

violator’s profile.

56
Figure: Admin update violator’s profile

The information encoded and saved from the mobile application will be stored in

the database and will reflect in the system if retrieved. It is where the admin and/or sub-

admin will interview the violator, the other details that will be encoded and update in the

system before released or detained will be shown in the next figure.

57
Figure: Match fingerprint from existing record

The fingerprint is used for identifying individuals from the unique pattern of

whorls and lines. One cannot deny and fake his/her identity if the fingerprint is used. As

mentioned, using a fingerprint is the other way to search and retrieve a violator’s record.

If the fingerprint has a match in the existing record from the database, automatically the

profile and information of the violator will be displayed shown in the next figure.

58
Figure: Search and view monthly report by filter

View monthly report of apprehended violators

A monthly report is an essential document that police admins should turn in to

provide status updates on apprehended violators within one week after the end of a

month. These reports will track past and present records. The police admin and/or sub-

admin can generate monthly reports of apprehended violators in the system. Police

admins can filter the reports by date, precinct, violation, name, age, birthday, gender, and

address.

59
System Evaluation and Results

The Curfew “Anti-Tambay” System with Mobile Application is evaluated by IT

personnel and policemen to determine its capacity. The system evaluation purpose is to

determine whether the developed system pass the standard.

Table 1 includes the criteria of functionality, the mean, overall mean, and the

verbal description affecting the system standard as evaluated by the respondents.

Table 1. Functional Suitability of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Functionality Mean Verbal Description

The system set of function covers all the 4.25 Very Satisfactory

specified task and user objectives.

The system provides the correct results with 4.28 Very Satisfactory

the needed degree of precision.

The system functions facilitate the 4.27 Very Satisfactory

accomplishment of specified task.

Overall mean: 4.27 Very Satisfactory

Table 1 shows that the respondents rated the system in terms of functional

suitability as the result presented in the table. The system rated “very satisfactory” (mean

= 4.27) in functionality since all the objectives are functioning well.

The study correlates with the study of Boicov (2012) had developed worked

properly and satisfied the preferences of the users of the system and the system can perform

the task required.


60
Table 2 includes the criteria for efficiency in statement form, the mean, overall

mean, and the verbal description affecting the system standard as evaluated by the

respondents.

Table 2. Efficiency of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Efficiency Mean Verbal Description

The system has more time processing 4.30 Very Satisfactory

The system needs additional hardware or 4.40 Very Satisfactory

software

The system parameter maximum limit meets 4.35 Very Satisfactory

the requirements.

Overall mean: 4.35 Very Satisfactory

Table 2 shows that the system efficiency which composes of the time and

resource behavior is rated “very satisfactory” (mean=4.35) by the user. The system

capability responds quickly to the user interface which requires performance with time

and resources.

The study correlates to Techtarget (2018) where the developed system worked

properly and satisfied the preferences of the user of the system.

61
Table 3 includes the criteria for compatibility in statement form, the mean, overall

mean, and the verbal description affecting the system standard as evaluated by the

respondents.

Table 3. Compatibility of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Compatibility Mean Verbal Descriptions

The system performs its required functions 4.23 Very Satisfactory

efficiently

The system exchange information and use 4.25 Very Satisfactory

the information that has been exchanged.

Overall mean: 4.24 Very Satisfactory

Table 3 shows that the respondents rated the system in terms of compatibility as the

result presented in the table. The system rated “very satisfactory” (mean = 4.24) since all

the objectives are functioning well.

The study conformed to Camat et al (2014) worked properly and satisfied the

preferences of the users of the system and the system can perform the task required.

62
Table 4 includes the criteria for usability, the mean, overall mean, and the verbal

description affecting the system evaluation as evaluated by the respondents.

Table 4. Usability of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Usability Mean Verbal Description

The system provides easy recognize logical 4.13 Satisfactory

concepts.

The system easy to use (i.e consistent navigation). 4.47 Very Satisfactory

The system easily operable on any environment. 4.25 Very Satisfactory

The system protects users against making errors. 4.0 Satisfactory

The system user interface enables pleasing and 4.27 Very Satisfactory

satisfying interaction for the user.

The system can be used by the people with the 4.4 Very Satisfactory

widest range of characteristics and capabilities.

Overall mean: 4.25 Very Satisfactory

Table 4 shows that the system usability which composed of appropriateness,

familiarity, learnability, operability, user error protection, user interface aesthetics, and

accessibility was rated by the user “very satisfactory” (mean = 4.25) because the system

enables the user to manipulate the system easy and convenient.

63
The study correlates to what Dela Torre et al, (2016) had studied where the

system developed worked properly and satisfied the preferences of the user of the system

and the system is easy to use.

Table 5 includes the criteria for reliability, the mean, overall mean, and the verbal

description affecting the system standard as evaluated by the respondents.

Table 5. Reliability of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Reliability Mean Verbal Description

The system provide correct link processing. 4.25 Very Satisfactory

The software have less crashes resulting from 4.13 Very Satisfactory

SQL or Java Script.

The system re-establishes or recovers date in case 4.25 Very Satisfactory

of failure.

Overall mean: 4.21 Very Satisfactory

Table 5 shows that the respondent rated the system in terms of reliability as the

result presented in the table. The system rated “very satisfactory” (mean = 4.21) in

reliability since all the objectives are functioning well.

This study conformed Camat et al (2014) worked properly and satisfied the

preferences of the users of the system and the system can perform the task required.

64
Table 6 includes the criteria for security, the mean, overall mean, and the verbal

description affecting the system standard as evaluated by the respondents.

Table 6. Security of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Security Mean Verbal Descriptions

The system ensures that the data are accessible 4.23 Very Satisfactory

only to those authorized to have access.

The system prevents unauthorized access to, or 4.24 Very Satisfactory

modification of, computer programs or data.

The system events or actions cannot be 3.85 Satisfactory

repudiated later.

The system entity is unique. 4.40 Very Satisfactory

The system entity can be proved to be the one 4.40 Very Satisfactory

claimed.

Overall mean: 4.22 Very Satisfactory

Table 6 shows that the respondents rated the system in terms of security as the result

presented in the table. The system rated “very satisfactory” (mean = 4.22) in security since

all the objectives are functioning well.

This study conformed to Coberiza, (2013) worked properly and satisfied the

preferences of the users of the system and the system can perform the task required.

65
Table 7 includes the criteria for maintainability, the mean, overall mean, and the

verbal description affecting the system standard as evaluated by the respondents.

Table 7. Maintainability of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Maintainability Mean Verbal Description

The system components has minimal impact on 4.23 Very Satisfactory

other components.

The system used an asset on the other system. 4.25 Very Satisfactory

The system diagnose deficiency and identify parts 4.24 Very Satisfactory

to be modified.

The system can be effectively and efficiently 4.23 Very Satisfactory

modified without introducing defects or

degrading existing product quality.

The system execute instruction modified during 4.27 Very Satisfactory

testing.

Overall mean: 4.24 Very Satisfactory

Table 7 shows the result of the system’s evaluation in terms of maintainability. The

user rated the system “very satisfactory” (mean = 4.24). It stores the data in the system to

be used for future purposes.

66
The study correlates to Coberiza, Fuentes, et al (2013) where the system developed

worked properly and satisfied the preferences of the user often system and software can be

tested easily.

Table 8 includes the criteria for portability, the mean, overall mean, and the verbal

description affecting the system standard as evaluated by the respondents.

Table 8. Portability of Curfew “Anti-Tambay” System with Mobile Application

Criteria for Portability Mean Verbal Description

The system operable on other operating system. 4.40 Very Satisfactory

The system can be used in an environment 4.30 Very Satisfactory

specified to other software.

The system can adapt to different environment 4.10 Satisfactory

without applying other functions.

Overall mean: 4.27 Very Satisfactory

Table 8 shows that the system evaluation in terms of portability resulted as “very

satisfactory” (mean = 4.27) rated by the user.

This study correlates to Boicov (2012) has developed where it worked properly and

satisfied the preferences of the user of the system and the system can perform the task

required.

67
Table 9 includes evaluation summary of each criteria, the mean, overall mean, and the

verbal description affecting the system standard as evaluated by the respondents

Table 9. Evaluation Summary of Curfew “Anti-Tambay” System with Mobile Application

Characteristics Mean Verbal Description

Functionality 4.27 Very Satisfactory

Efficiency 4.35 Very Satisfactory

Compatibility 4.24 Very Satisfactory

Usability 4.25 Very Satisfactory

Reliability 4.21 Very Satisfactory

Security 4.22 Very Satisfactory

Maintainability 4.24 Very Satisfactory

Portability 4.27 Very Satisfactory

OVERALL MEAN: 4.26 Very Satisfactory

Table 9 shows the Curfew “Anti-Tambay” System with Mobile Application an

overall rating of (mean = 4.26) as Very Satisfactory and it also shows that the system is

feasible to use for it passes the criteria for developing a successful system and it meets all

the requirements.

68
CHAPTER 5

Summary, Conclusions, and Recommendations

Summary of Findings

Based on the result of the study, the Curfew “Anti-Tambay” System with Mobile

Application a great addition to the traditional way of catching civilians violating rules or

ordinances in a certain place. The respondents were chosen through the use of a

convenience random sampling technique. There are a total of 30 respondents. The

participants of the study are comprised of fifteen (15) policemen and fifteen (15) IT

personnel within the vicinity of Iloilo City to evaluate the performance standard of the

system. To evaluate the system, ISO 25010 standards were utilized. The Curfew “Anti-

Tambay” System with Mobile Application got 4.27 mean in functionality, 4.35 in

efficiency, 4.24 in compatibility, 4.25 in usability, 4.21 in reliability, 4.22 in security, 4.24

in maintainability, and 4.27 in portability with an overall rating of 4.26 which translate to

"Very Satisfactory", making it acceptable and satisfactory to the end-users.

Conclusions

Based on the findings of this project, the following conclusions were achieved its

objectives.

• Following the process under manage user account, the system is responsible for the

creation of a policeman’s account, for which they can input their details to be able

to log in to their own individual account.

69
• Following the process under “manage violators’ details”, relevant information such

as name, age, address, contact number, and save location using Global Positioning

Satellite will need to be encoded to the system. It allows the administrator and

policeman to view existing details of a violators’ record such as history of

apprehension, place of apprehension and other pending violations they may have.

• Following the process under “match fingerprint from existing records”, there are

two ways to search and retrieve violators’ record. The first is typing the name in

the search box while the second option is using the “search using fingerprint”

feature found under the search tab. This determines if the offender has a previous

or existing record retrieved from the server.

• Following the process under “generating monthly report of apprehended violators”,

this is to provide an update on apprehended violators within one week and after the

end of the month. It can track both past and present records as well as filter

information by date, precinct, violation, name, age, birthday, gender, and address.

• The system is feasible to use based on the evaluation in terms of functional

suitability for passing all correct results with a degree of precision, performance

efficiency for easy and quick user interface which is easy to understand.

Compatibility to satisfy users of the system and performs the task required.

Usability enabling the user to manipulate the system easy and conveniently.

Reliability resulting in less crashes from its programming and fast recovery.

70
Security to prevent confidential and unauthorized data from leaking out.

Maintainability for working properly and satisfying the end user testing the

software, and for portability being operable on other operating systems based in

ISO 25010.

Recommendations

Based on the conclusions, the researchers recommended the following:

1. The researcher recommended the system to be implemented not only in Iloilo City

Police Office but also in the province.

2. Future researchers can upgrade the system that can send an SMS notification to the

parents of the violators.

3. Future researchers can also upgrade and enhance the profile capture wherein the

application can use facial recognition.

71
REFERENCES

72
References

Herrera, John Noel (2022). Iloilo City back to shorter curfew hours for minors.

Retrieved from https://www.dailyguardian.com.ph/iloilo-city-back-to-shorter-

curfew-hours-for-minors/ Date retrieved October 15, 2022.

Cassavoy (2019). What Makes a Smartphone Smart. Retrieved from

https://www.lifewire.com/what-makes-a-smartphone-smart-579597. Date

retrieved January 16, 2020.

Vandeviver. (2014). Google Maps. Retrieved from

https://biblio.ugent.be/publication/5780243. Date retrieved October 20, 2019.

Chen. (2017). Android. Retrieved from

https://www.investopedia.com/terms/a/android-operating-system.asp. Date

retrieved October 21, 2019

“What is Biometrics?” Accessed (June 2019). Retrieved from

http://www.bioelectronix.com/what_is_biometrics.html. Date retrieved February

10, 2020

Gill, Charlotte; McClure, Dave; Olaghere, Ajima; Wilson, David (2016) Juvenile curfew

effects on criminal behavior and victimization. Retrieved from

https://ncvc.dspacedirect.org/handle/20.500.11990/932. Date retrieved October

21, 2019

73
Kaur, Anureet; Kaur, Kulwant (2018) Systematic literature review of mobile application

development and testing effort. Retrieved from.

https://www.researchgate.net/publication/328726677_Systematic_Literature_Revi

ew_of_Mobile_Application_Development_and_Testing_Effort_Estimation. Date

retrieved December 15, 2019.

Fingerprint Capture (2019) Live Scan API. Retrieved from

https://www.aware.com/biometrics/livescan-api/. Date retrieved. January 17, 2020

Garude, Mihir; Haldikar, Nirmal (2014) Real-Time Position Tracking System Using

Google Maps. Retrieved from http://www.ijsrp.org/research-paper-0914/ijrsp-

p3362.pdf. Date retrieved January 17, 2020

Ali, Mouad; Gaikwad, M.T., Mahale, Vivek; Yannawar, Pravin (2017) Process of

Fingerprint Recognition System. Retrieved from.

https://ieeexplore.ieee.org/document/7754900. Date retrieved. October 21, 2019.

Anata, Emichaella; Yee, Jovic. (2016) Mandaluyong intensifies curfew on minors.

Retrieved from. https://newsinfo.inquirer.net/788569/mandaluyong-intensifies-

curfew-on-minors. Date retrieved. October 21, 2019.

Bhardwaj, Aashish; Kumar, Vikas (2018) Identity Management Systems: A Comparative

Analysis. Retrieved from.

https://www.researchgate.net/publication/322878884_Identity_Management_Syst

ems_A_Comparative_Analysis. Date retrieved. January 17, 2020.

74
APPENDICES

75
APPENDIX A

Curfew “Anti-Tambay” System with Mobile Application

Name (Optional): _______________________________________

Position: ______________________________________________

Instruction: Please check the box provided to rate the quality of the system according to

your satisfaction.

1 – Poor

2 –Fair

3 – Good

4 – Satisfactory

5 – Very Satisfactory

ISO Software Quality Standards

Characteristics Questions Rating

1 2 3 4 5

1. Functional Sustainability

A. Functional completeness The system set of functions

covers all specified tasks and

user objectives.

76
B. Functional correctness The system provides correct

results with the needed

degree of precision.

C. Functional Appropriateness The system functions

facilitate the accomplishment

of the specific task.

2. Performance Efficiency 1 2 3 4 5

A. Time Behavior The system needs more time

‘processing

B. Resource Utilization The system needs additional

hardware or software.

C. Capacity The system parameter

maximum limits the

requirements.

3. Compatibility 1 2 3 4 5

A. Co-existence The system performs each

required functions

efficiently.

4. Usability 1 2 3 4 5

A. Appropriateness The system provides easy

Recognizability recognizable logical

concepts.

B. Learnability The system easy to use.

77
C. Operability The system is easily operable

on any environment.

D. User error protection The system protects users

against making errors.

E. User interface aesthetics The system user interface

enables pleasing and

satisfying interaction for the

user

F. Accessibility The system can be used by

people with the widest range

of characteristics and

capabilities.

5. Reliability 1 2 3 4 5

A. Maturity The system provides correct

link processing.

B. Availability

C. Fault Tolerance The system has less crashes

resulting from SQL or Visual

Basic.

D. Recoverability The system re-establishes or

recovers data in case of

failure.

6. Security 1 2 3 4 5

78
A. Confidentiality The system ensures that the

data are accessible only to

those authorized to have

access.

B. Integrity The system, prevents an

authorized access to, or

modification of, computer

programs or data.

C. Accountability The system’s entity is

unique.

D. Non-repudiation The system’s events or

actions cannot be repudiated

later.

E. Authenticity The system’s identity can be

proved to be the one claimed.

7. Maintainability 1 2 3 4 5

A. Modularity The system’s component has

minimal impact on the other

components.

B. Reusability The system uses an asset on

the other system.

79
C. Analyzability The system diagnoses

deficiency and identify parts

to be modified.

D. Modifiability The system can be

effectively and efficiently

modified without introducing

defects or degrading existing

products quality.

E. Testability The system executes

instruction modified during

testing.

8. Portability 1 2 3 4 5

A. Adaptability The system operable or

usable on other operating

system.

B. Installability The system can be used in an

environment specified to

software.

C. Replaceability The system can adapt to

different environment

without applying other

functions.

80
Comments / Suggestions / Recommendation:

_________________________________________________________________

_________________________________________________________________

Name of Evaluator:______________________________________________________

Signature:_____________________________________________________________

Date:_________________________________________________________________

81
APPENDIX B

Iloilo Science and Techniology University


College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City

March 5, 2019

CHARLES A. JARANILLA,MSCS
Faculty, Computer Department

Dear Sir:

Greetings!

The Bachelor of Science Information Technology students will be having a retitle


defense for the subject ICT 21 (Project Design and Management) in CEA-105 on March
8, 2019 at 12:00 -1:00 P.M.

In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.

Looking forward for the favor you can extend to us.

Thank you very much and God Bless.

Respectfully yours,

Robert John C. Lentija II


Project Manager

82
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City

March 5, 2019

MAUREEN NETTIE M. LINAN,DIT


Faculty, Computer Department

Dear Sir:

Greetings!

The Bachelor of Science Information Technology students will be having a retitle


defense for the subject ICT 21 (Project Design and Management) in CEA-105 on March
8, 2019 at 12:00 -1:00 P.M.

In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.

Looking forward for the favor you can extend to us.

Thank you very much and God Bless.

Respectfully yours,

Robert John C. Lentija II


Project Manager

83
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City

March 5, 2019

FRANCIS FRITZ B. ESPORTONO


Faculty, Computer Department

Dear Sir:

Greetings!

The Bachelor of Science Information Technology students will be having a retitle


defense for the subject ICT 21 (Project Design and Management) in CEA-105 on March
8, 2019 at 12:00 -1:00 P.M.

In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.

Looking forward for the favor you can extend to us.

Thank you very much and God Bless.

Respectfully yours,

Robert John C. Lentija II


Project Manager

84
Iloilo Science and Techniology University
College of Arts and Science
Bachelor of Sciend and Information Technology
Burgos St. La Paz, Iloilo City

March 5, 2019

LORETO P. GABAWA, MSCS


Faculty, Computer Department

Dear Sir:

Greetings!

The Bachelor of Science Information Technology students will be having a retitle


defense for the subject ICT 21 (Project Design and Management) in CEA-105 on March
8, 2019 at 12:00 -1:00 P.M.

In line with this, the undresigned would like to invite you to be one of our panelist
during the said activity.

Looking forward for the favor you can extend to us.

Thank you very much and God Bless.

Respectfully yours,

Robert John C. Lentija II


Project Manager

85
APPENDIX C

Organization Structure

Robert John C. Lentija II


Project Manager/Researcher/
System Analyst

Hanzel V. Andrade Mark Anthony M. Sucaldito


Programmer/ Programmer/
Technical Writer System Analyst

Meschelle E. Ba-ang
Researcher/
Technical Writer

A Project Manager is the person responsible for leading a project from its

inception to execution. This includes planning, execution, and managing the people,

resources and scope of the project. Project manager must have the discipline to create and

attainable objectives and to see them through to successful completion. The project

manager has full responsibility and authority to complete the assigned project.

86
A System Analyst is the person who studies the software application domain and

prepares the software requirements and specification documents. A programmer refers to

a specialist in one area of computer programming or to generalist who writes codes for

many kinds of software.

A Technical Writer defines as the profession of preparing information which helps

the user. This documentation includes online helps, user guides/manuals, write papers

design specification, system manuals, project plans, test plans, etc.

A Researcher finds more information needed in developing the system.

87
APPENDIX D

Gantt Chart

88
APPENDIX E

Curriculum Vitae

Personal Information:

Name: Hanzel V. Andrade

Address: Mandurriao, Iloilo City

Birth Place: Iloilo City

Birth Date: November 22, 1992

Sex: 27

Age: Male

Educational Background:

College: Iloilo Science and Technology University

High School: Colegio De Las Hijas De Jesus

Elementary: Colegio De Las Hijas De Jesus

89
Curriculum Vitae

Personal Information:

Name: Meschelle E. Ba-ang

Address: Brgy. Calangag Batad, Iloilo

Birth Place: Batad, Iloilo

Birth Date: March 17, 1995

Sex: 25

Age: Female

Educational Background:

College: Iloilo Science and Technology University

High School: Jaro National High School

Elementary: Batad Central School

90
Curriculum Vitae

Personal Information:

Name: Robert John C. Lentija II

Address: New Lucena, Iloilo

Birth Place: New Lucena, Iloilo

Birth Date: October 18, 1998

Sex: Male

Age: 21

Educational Background:

College: Iloilo Science and Technology University

High School: New Lucena National Comprehensive High School

Elementary: Damires Elementary School

91
Curriculum Vitae

Personal Information:

Name: Mark Anthony M. Sucaldito

Address: Brgy. Buayahon, Sta. Barbara, Iloilo

Birth Place: Sta. Barbara, Iloilo

Birth Date: December 8, 1992

Sex: Male

Age: 27

Educational Background:

College: Iloilo Science and Technology University

High School: Sta. Barbara National Comprehensive High School

Elementary: Buayahon – Bantay Elementary School

92
Department: Computer Department
Republic of the Philippines
ILOILO SCIENCE AND TECHNOLOGY UNIVERSITY Document
La Paz, Iloilo City QF-ITEOP-03
Code:

THESIS/CAPSTONE PROJECT Rev. No.:


00
Effective
GRAMMARIAN’S CERTIFICATION June 20, 2019
Date:

CERTIFICATION
May 19, 2022

TO WHOM IT MAY CONCERN,


This is to certify that Capstone Project of, Mark Anthony M. Sucaldito, Robert
John C. Lentija, Hanzel V. Andrade and Meschelle E. Ba-ang, entitled Curfew “Anti-
Tambay” System with Mobile Application was edited by the undersigned as English
Critic.

Ma. Jessa J. Vergara


Research Teacher
PRC ID NO: 1820154

93

You might also like