You are on page 1of 26

ANDROID MOBILE PHONE-BASED PATIENT TRACKER

By

AHWERA ATENSA

2020/BCS/O14/PS

DEPARTMENT OF COMUTER SCIENCCE

FACULTY OF COMPUTING AND INFORMATOCS

ahweraatensa@gmail.com / 2020bcs014@std.must.ac.ug

+256784257126/ +256756111215

A Project Proposal Submitted to the Faculty of Computing and Informatics for the Study
Leading to a Project in Partial Fulfilment of the Requirements for the Award of the Degree of
Bachelor of Science in Computer Science Mbarara University of Science and Technology.

October, 2022.
CHAPTER ONE

1. Introduction

The personal health monitoring of every individual is considered very important because of
the rising health problems in today's world. COVID-19 scenario has made a tremendous
increase in patients which is resulting in a vicious cycle. COVID-19, a rather infectious
disease, made its first appearance in December,’19 in Wuhan [1- 3], China. The Coronavirus
(the cause of the disease) made its way around the world within a few months and was
declared a global pandemic by the World Health Organization (WHO) [4]. The symptoms
were mostly low to moderate in majority of the population which including dry cough,
fever, and loss of taste or smell, etc. However, in the elderly and people with cardiovascular
disease, diabetes, chronic respiratory diseases, etc., the symptoms were rather serious,
even resulting in the death of the individual in most cases. The lack of proper isolation and
tracking of the numbers has resulted in a higher growth rate of patients. With the predicted
second wave of COVID-19 as well as the development of new variants of Corona Virus,
social distancing has become a new normal. In these circumstances, regular physical
medical visits for a check-up might not be the most efficient option during this time [5-7]. In
this situation, there is an urgent need for social distancing, staying from crowd and
lockdown is essential to stop its spread. However, if online facilities and health tracking
were made easier, it could result in an improvement in the patients’ health conditions.
Globally, there have been 79.8 million confirmed cases of COVID-19, including 1.75 million
deaths as of December 2020 [8-10]. The following system is motivated by the world-wide
pandemic, to handle the current situation as well as, tackle any major health concern in the
future. This paper proposes a system that continuously monitors the patient through a
mobile application (app) that is connected to a wristband that continuously monitors the
temperature, heartbeat rate, and blood pressure and is continuously updated in the
application without any delay. Whenever any discrepancy is found in the patient’s health or
if the patient has come in contact with a COVID positive person, an alarm is triggered in the
patients and the patients care takers mobile phone. Then the patient is automatically
assigned to a doctor and the treatment is carried over the application itself. This system is
described as the following:-
Continuous monitoring of the patient’s health through an app which is connected to a wrist-
band that continuously monitors the temperature, heartbeat rate, and Blood pressure and
is updated in the app right away. The smart band can calculate temperature anytime
without sitting or standing in an appropriate posture. It monitors the body temperature
using a temperature sensor, the heart-rate monitor is based on Photo Plethysmography
(PPG), which basically uses green LED lights paired with light-sensitive photodiodes to
illuminate the skin and measures changes in light absorption and there also exists a cuff-less
method called Pulse Transit Time (PTT). PTT is the time it takes for one pulse to travel from
the heart to a peripheral point on the body (in this case, the wrist). It requires a PPG sensor
to detect the pulse on the wrist and an ECG sensor to know detect the heart-beat. Any
discrepancy is found in the patient’s health, is immediately notified to the patient and the
family members, an appointment with the doctor is immediately scheduled and continuous
health updates are sent to the doctor from then till the patient cures. Though there are
already many android patient tracking applications, most of them either measure the
different health conditions of patients or only track the location of patients, if there is any
contact with a COVID positive person. On contrary, CODOC contains the features of health
monitoring using sensors as well as proper information delivery to the hospital database.
The presence of a system for continuous storage of health data of an individual makes
individual, resulting in the prediction of major health conditions. This system also features
the emergency option, through which alerts can be sent concerning serious ill-health
conditions to the nearest health facility for the faster health service delivery. This also
ensures proper effective treatment of the patient while assuring higher rates of survival.
The presence of a thermal sensor, a pulse rate monitoring system provide efficient
information regarding the patients’ health.

1.2 BACKGROUND
According to Daniel Losen (2016), about 2.8 million American children were told at
least once during the 2013-2014 school year to leave public school for bad behavior. In
the United States, forcing a student to leave school is a punishment known as suspension.
It is designed to stop misbehaving students from interfering with classroom activities. But
a number of recent studies suggest the punishment does not work. One group, for
example, found that suspended students are more likely to be arrested by police or drop
out of school. The Council of State Government carried out the study. Another
survey found that suspensions in 10th grade alone cost U.S. taxpayers $35 billion for extra
prison and social welfare spending. That finding came from researchers at the University
of California Los Angeles (UCLA).And suspensions may unfairly target African-
Americans, according to the U.S. Department of Education. It reported in June that
African-Americans are 3.8 times more likely to receive one or more suspensions as white
students. Education officials across the country are debating what to do with students,
who talk loudly in class, throw things at other students or arrive late. There is more
agreement that a student who physically attacks a fellow student or teacher should be
expelled.

Students are placed at-risk for later low achievement and eventual drop out (Neild,
Stoner-Eby, & Furstenberg, 2008). They are likely to continue to receive discipline
referrals (Atkins et al., 2002) and be perceived by their teachers as uncooperative and
defiant (Gregory & Weinstein, 2008). This all-encompassing view of risk obscures a
more nuanced view of individuals within context (American Psychological Association
[APA] Task Force, 2008). Most low-achieving, African American adolescents likely
have a textured experience of their classroom teachers. Their perceptions of teachers and
their behavior may, in fact, vary from classroom to classroom. Yet, little is known about
what factors could help explain such variability. Given the deleterious effects of
perceived discrimination (Neblett, Philip, Cogburn, & Sellers, 2006), one promising
explanatory factor is student perceptions of unfair treatment. The current study follows a
cohort of African American high school students with a focus on variability in their
cooperative and defiant behavior with multiple classroom teachers. The study also
examines whether student perceptions of specific teachers as unfair are linked to
increased risk for disciplinary referrals and being perceived as defiant and uncooperative
in those classrooms.

In Africa according to Wiley Periodicals (2010), many African adolescents who enter
high school with low achievement are at-risk for being perceived as defiant and
uncooperative by their classroom teachers. This generalized view of risk, however, offers
little understanding of the differentiated behavior these students have with their teachers.
The study followed 35 African students, who have a history of low achievement, across
multiple classrooms in their school day. Hierarchical linear modeling showed that there
was greater variability in teacher-perceived defiance, cooperation, and office discipline
referrals ‘‘within-student’’ compared with ‘‘between-students.’’ This shows that
individual students tended to be perceived differently across their teachers. Similarly, the
study found that students also tended to differentiate their teachers. Students who
reported unfair treatment with a particular teacher were more likely to receive a discipline
referral and be perceived as defiant and uncooperative by that teacher. Implications for a
strengths-based approach to classroom behavior are discussed.

According to DoubleGist (2013), indiscipline is a great problem facing effectiveness of


work in the public and private sectors and in the school’s system in particular. It has
generated bribery, corruption, discrimination, hooliganism, absenteeism in the wider
society in general and destruction of property, cheating, examination mal-practices in
most of the secondary schools in Africa at large. Edwin(1974) Asserts that, the causes of
indiscipline are numerous and diverse that no individual can catalogue them. He says,
indiscipline emanates from inadequate home training on the part of the students, harsh
school rules and regulations that students look at as obstacles and sources of frustration
and others. Weismann et al (October 29, 2009) asserts that, it is notable that schools
collect disciplinary information from applicants not to use it as a basis for denying
admission but as a solution to curb down indiscipline in schools. He adds that indiscipline
records have to be disclosed in order to trigger additional screening during admissions
rather than automatic disqualification. Using student disciplinary information is not
trying to keep students out but trying to find students who pose a significant risk to the
community.

On the ugandan scene according to Abaasa(2005), says that hardly a term passes without
a Ugandan school striking and the pattern is becoming bizarre with school property being
destroyed by students. For example Ngabo academy School students went on rampage
destroying property worth millions of shillings, computers with their accessories were
stolen, others destroyed, dormitory windows smashed, school bus destroyed. By the time
the police from the nearby post arrived, the students were heading for the school
administration block with petrol to blaze it down. A good number was rounded up and
are cooling off in kyamugolani government prison. The police notified schools against
admitting those students. Since no school entertains indiscipline in its premises, they are
on watch and strict about new students presenting a report of good conduct as a
requirement for admission.

It is therefore on this note that the researcher looks forward to designing “A student
behavior information management system” for Sentah college Mbarara which for a past
few years has proved to be one of the notorious striking schools in western Uganda and
being a last resort for most students who are dismissed from different schools due to
misbehavior, that will keep track of the record of the misconduct students display during
their academic journey in various schools. The records will be centrally managed and
accessed by various administrators during admissions. This will enlighten schools of the
kind of students they admit as well as class teacher’s decision on whether to admit,
promote a student, which stream to allocate a student, when to call a student’s parent and
when to expel a student.
1.2 Problem Statement

Indiscipline cases such as chronic avoidance of work, interfering with teaching activities,
harassing schoolmates, verbal insults, and rudeness to teachers, defiance, and strikes have
led to frequent underperformance in academics. Currently the school uses a manual
system of recording indiscipline cases in box files which is not efficient and the school
finds it hard to access the students conduct of misbehaving from previous schools, hard to
determine the most disciplined students in case they are awarding prizes, undisciplined
students and at a risk of losing all records in case of fire break out.

The proposed student behavior information management system is meant to link up


different schools which will help them share information regarding student’s behavior
hence improving the management of misconduct among students in schools and also
enlighten schools of the kind of students they admit and help in taming the untamed
students to make them behave as expected.

1.3 Main Objective

To improve the management of student’s behavior information using a web-based


behavior information management system.

1.4 Specific Objectives

 Review related literature in order to gather requirements for the system.


 To design and develop a web-based management system for student’s behavior.
 Test and validate the system.
 To provide recommendations for the implementation of the developed system.

1.5 Scope

1.5.1Geographical scope
The system will basically be designed and installed for use on the servers of Sentah
College Mbarara which is located in Mbarara Municipality, Mbarara town in the western
part of Uganda. It is from here that the school will connect with the servers of other
different potential schools from which they most receive new students to evaluate their
behavioral conduct before admission.

1.5.2Functional scope

This project will focus on students’ behaviors in secondary schools within Mbarara
Town. The system will capture students’ behavior inserted by the institution
administrators, compute and rank them, then store the data and process it to give off or
produce analytical and accurate information that can guide the institution administrators
in proper decision making.

1.5.3Time scope

This study will last for five months from the time of writing the concept paper up to when
the system will be designed and installed for use by the specified stake holders.

1.6Hypothesis

 Easy trucking of misconduct behaviors within secondary schools in Mbarara town.


 It will be made simple in trying to find students who pose a significant risk to the
community.
 Administrators of different secondary schools will be enlightened of their
students’ conduct and also help them in the context of admissions decision-
making.
 The continuous tracking of student’s misconduct is believed to reduce the rate of
misbehavior in secondary schools since it will be affecting their other steps taken in the
education career.

1.7 Research Questions

 What perceptions do teachers and administrators hold about importance of discipline?


 What forms of behaviors are regarded as indiscipline in this school?

 What are the environmental causes of indiscipline?

1.8 Significance

 The rationale of this project is to develop a system that will help the administrators
of institutions in Uganda to capture, access statistical and analytical data on
students’ behaviors.
 In addition to knowledge gained during this development, the researcher will get
in position to enhance her communication, reasoning and writing skills since all
these will be greatly deployed while carrying out this project.
 The system will also help the institution administrators to manage data and make
clear decisions basing on the analytical data.

 Enlighten schools of the kind of students they admit as well as class teacher’s
decision on whether to admit, promote a student, which stream to allocate a
student, when to call a student’s parent and when to expel a student.

Chapter 2

Literature Review

2.1 Introduction

This chapter includes a critical look at the existing research and case studies that have
significance with this research project. In conducting literature review, scholarly articles,
books and other sources relevant to a particular issue, area of research or theory are to be
surveyed. After reviewing all materials, a description, summary, and critical evaluation of
each work is granted.

According to B.F. Skinner and Carl Rogers, behavior management is similar to behavior
modification. It is a less intensive version of behavior therapy. In behavior modification,
the focus is on changing behavior, while in behavior management the focus is on
maintaining order. Behavior management skills are of particular importance to teachers in
the educational system. Behavior management include all of the actions and conscious in
actions to enhance the probability people, individually and in groups, choose behaviors
which are personally fulfilling, productive, and socially acceptable. Information Systems
according to Silver et al. (1995) are any organized system for the collection, organization,
storage and communication of information. More specifically, they are the study of
complementary networks that people and organizations use to collect, filter, process,
create and distribute data. An information system is a group of components that interact
to produce information. Any specific information system aims to support operations,
management and decision making in organisations in this case schools, and business
processes. Information systems are used to manage behaviour by providing acts of
misconduct and ranks of various individuals regarding their previous indiscipline records.
Having this information shared among different schools helps in controlling and
monitoring student’s behaviour and at the end totally cubing out the acts of indiscipline in
secondary schools.

2.2 Definition of Indiscipline and some of the causes related to secondary schools.

The term “indiscipline” is a household word in Uganda today (Danuma, 2010). In fact, it
is a word that is found in government offices, private sectors, in politics and in all levels
of educational institutions. The trend in secondary schools in the present time is
indiscipline of all sorts. The trouble with the term is that every individual may know what
they mean when they talk about it, but individual meanings can still differ in a sense,
therefore, we will at this juncture present some of the meaning giving to the term by
scholar in the literature.

Indiscipline according to Timothy,( 2008) is the direct opposite of discipline i.e. lack of
discipline. He further quoted Ditinuiya (1995) who defined it as any act that does not
conform to the societal value and norms. He went further to cite Otu (1995) who also
define indiscipline as unruly acts and behaviors, acts of lawlessness and disobedience to
school rules and regulation. Tuluchi & Bello, (1985) asserts that indiscipline is the
breaking of rules and regulations of institutions. Individuals willingly or unwillingly
violate laid down rules of an institutions, which hamper the smooth running of the
institution. To this end, indiscipline can simply be seen as mode of life NOT in
conformity with rules and non-subjection to control. By extension, the term connotes the
violations of school rules and regulations capable of obstructing the smooth and orderly
functioning of the school system (Adeyemo, 1985) submitted. To cap it all, indiscipline
can be defined as any act, habit or behavior exhibited by the learners or students within
the school premises and outside the school, which attract condemnation (instead of
praise) by the public and/or the school staff.

2.3 Review of existing Student Discipline Tracking Systems

Classroom Management

The teacher is a facilitator of learning, who must create a welcoming classroom


environment for students. His or her behavior will foster a conducive classroom learning
environment, by delivering lessons that foster students’ thinking at every level.
According to Dr. John Bwayo, consistence, flexibility, objectivity, friendliness and
foresight are some of the qualities of a successful tutor. “A teacher should enhance
student’s self-understanding” said John who stressed that creating a sufficient
environment for learners is paramount. He cited the challenge of having to deliver lessons
to up to 1000 students, where even clearly crafted lessons aren’t always well received.
According to the TISSA report released in August 2013, a review of some PTC
curriculum shows that a school year consists of three terms (11-13weeks) with an annual
student workload averaging 1,400 hours per week; 35 weeks per year.) The curriculum
consists of a mixture of academic and practical studies, with professional education
studies, mathematics, English, Science health and social studies absorbing 50 percent of
the teaching time. He went on to elaborate that engagement, planning, mastery of the
subject knowledge of student’s names are all strategies that can be implemented by
teachers today. Ellen Watkinson the Head of Studies Faculty of Education and
International Studies then addressed the participants on a national project in Norway,
detailing the Norwegian School system, home to one of the largest vocational training
institutes. She explained a 5-year strategy set in motion on teacher principal ad school
owner on competence building citing professional training, development of description of
good class management, local development facilitation and working on exchange of
experiences. The Uganda Bureau Of statistics 2014 states that the 2013/13 Uganda
National Household survey showed an overall literacy rate of 71 percent among persons
aged 10 years and above. Findings reveal that men are literate than their female
counterparts with literacy rates of 77 and 65 percent respectively. A trend analysis
indicates a slight increase in the literacy rate over the years for persons 10 years and
above from 69 percent in 2005/06 to 71 percent in 2012/13. A detailed presentation on
schools from the Norwegian perspective was delivered by two Norwegian teacher-
students, which later opened up a platform for further discussions between Ugandan and
Norwegian teacher students. Their presentation dwelled on their experiences teaching in
various practice schools over their 3-4 months stay in Uganda.

The Uganda Bureau Of statistics 2014 indicates that primary school enrolment was at 8
million in 2011 and has been increasing steadily to about 8.4 million pupils in 2013,
showing an upward trend for the last 3 years. With consideration of the diversity in
classroom dynamics at the different levels of education Primary school class management
was presented by Mr. Okiror Richard Headmaster Kabojja Primary School since 1977.
2.3.1 Mill Road Behavior System (MRBS)
The Mill Road Behavior System is based on the principles of applied behavior analysis,
primarily the principle of a token economy system. Positive reinforcement results in
increases in the rate of targeted behaviors. All students enter Mill Road School on a
“white point sheet” status. Contingent upon staying in class and maintaining academic
and social standards, students can earn a green sheet, gold sheet, gold card and platinum
card. As students move up in the system, they are afforded more responsibility and
receive discounts on all items that are offered within the school. (Almanza, H., &
Mosley, W. 1980)
The strength of Mill Road Behavior System is that it enables students to have different
privileges according to their code of conduct or behavior. However the Mill Road
Behavior System also like most web based systems has weaknesses that include; The
system uses paper-based cards which may end up getting spoilt, forged or lost and the
system is only operated or works for Mill Road Behavior System yet students misconduct
happens everywhere.

2.3.2 Sleuth
Sleuth is an electronic behavior tracking system that records and analyses behavior. It
provides an effective, consistent, whole school system for managing behavior, positive
and negative. Sleuth has been successful in contributing to improvements in behavior
management in hundreds of UK schools. Ames, C. (1992). Sleuth was designed
specifically to track behavior. It is not a whole school administration system or an add-on
module for behavior management. Sleuth shares data and works alongside MIS, Parent
Portal and VLE so there is no need to compromise ability to manage behavior by trying
to do everything in your MIS. Strengthen of Sleuth is that the system records
observations about student behavior in detail and, unlike other systems, also records all
staff responses to student behavior in detail. Reviewing staff response to behavior is
essential to know whether your behavior policy works in practice. Weakness of Sleuth is
that it does not consider student’s misbehaviors before admitting them.
2.3.3 Behavior Watch
Behavior watch is an advanced web-based system which allows schools to centralize
their own recording systems and log incidents online, eliminating the need for paper-
based reports. When incidents are logged automatic emails alert relevant staff and
intelligent analysis enable quick identification of areas of concern. Most importantly the
system is completely tailored to the individual school’s needs.

2.4 Comparison of the reviewed System with the Proposed System

The current behavior systems only take into account the disciplinary records of students
but do not suggest any disciplinary action to be taken in case a student has the highest
rank of behavior misconduct. The proposed system will take into account what the
standings of student’s behavior are, rank the students from the most notorious to the list
notorious and then give suggestion for any for on disciplinary action that can be taken
over an individual.

Proposed system capabilities

It will be web based, will allow real time access to information, there will be graphical
representation of data and data integrity.

The proposed system will further be capable of sharing information regarding student’s
behavior among different potential secondary schools around so that administrators are
sure of the kind of student being admitted discipline wise. There shall also be ranking of
students according to the acts of misbehavior exhibited and each rank will have a
disciplinary action suggested to be taken over those particular individuals that fall under
it. For example, determining whether to expel a student, give a suspension from school,
which stream to allocate a student, whether to admit a student referring to the previous
school’s report on the discipline of an individual and most of it all suggesting a reward
for the most disciplined student in the school.

Characteristics MRBS Sleuth Behavior Watch Proposed


system
Web based No Yes Yes Yes
Real time access to information No Yes No Yes
Graphical representation of No No No Yes
data
Data integrity No Yes Yes Yes
Efficiency and dependability No No No Yes
Time saving during information No No No Yes
retrieval.
Minimizing the risks of losing No No Yes Yes
information in case of fire
break out and theft.
Linking up different various No No No Yes
schools to share information
regarding student’s behavior.
Easy tracking of well No No No Yes
disciplined students for
rewarding.
Guide in decision making No No No Yes
Table 1: Comparison of the reviewed System with the Proposed System

2.5 Conclusion

There is need to review the literature because it is important to know exactly what is
going on, the systems in use and identification of gaps and inefficiencies so as to come up
with an appropriate solution that will lead to accurate capturing, storage of students’
behavioral information. Therefore, using different sources, we shall manage to analyze
and compare the existing students’ behavioral information systems and we conclude that
there is need for improvement.

According to the existing systems that we reviewed there is still need to develop a better
system to cater for the weakness of the existing system which is too manual as far as
Uganda is concerned.
Chapter 3

Methodology
3.1 Introduction
This section comprises of research/project design which describes the tools, instruments,
approaches, processes and techniques and data structures that are to be employed in the
research study, data collection, analysis, synthesis, design, logical flow, implementation,
testing, validation and many others. The methodology to be used in this project is
waterfall model. 

WATERFALL MODEL
This methodology is a coherent description of the steps taken in the development of information
systems. The reason why it is referred to as the waterfall model should be obvious from the
following figure (Horner, 1993):

Diagrammatic illustration of waterfall model process

Requirements

Analysis

Design

Coding

Testing

Implementation

Figure 1: waterfall model diagram


This model of SDLC is closely related to structured system analysis and design. Waterfall
method involves a series of steps as follows;

i. Requirement gathering and analysis phase.


ii. System design.
iii. Implementation phase.
iv. Integration and testing phase.
v. System deployment phase.
vi. Maintenance phase.
Waterfall model illustrates the software development process in a linear flow hence it is also
called linear-sequential cycle model (Winston, 1970). Any phase/ unit in the development
process begins only if the previous phase is completed hence phases in waterfall do not overlap
(Jonasson, 2008). Waterfall methodology is a sequential design process. This means that
as each of the eight stages (conception, initiation, analysis, design, construction, testing,
implementation, and maintenance) are completed, the developers move on to the next
step. As this process is sequential, once a step has been completed, developers can’t go
back to a previous step unless the whole project is scratched and then start from the
beginning. There’s no room for change or error, so a project outcome and an extensive
plan must be set in the beginning and then followed carefully. 
The researcher prefers waterfall model from other models like Rapid Application Development
(RAD), Prototyping, Dynamic System Development, Spiral and many more others because the
waterfall methodology stresses meticulous record keeping. Having such records allows
for the ability to improve upon the existing program in the future. It helps the client to
know what to expect. They’ll have an idea of the size, cost, and timeline for the project.
They’ll have a definite idea of what their program will do in the end. In the case of
employee turnover, waterfall’s strong documentation allows for minimal project impact.
However, waterfall model also has some draw backs; for example, Once a step has been

completed, developers can’t go back to a previous stage and make changes. Waterfall
methodology relies heavily on initial requirements. However, if these requirements are
faulty in any manner, the project is doomed.
Requirement gathering and analysis phase

3.2 Data Collection Techniques


The techniques that will be used to collect data will be interviews and document review.
These techniques are elaborated below:

3.2.1 Interviews
This method is going to be used to acquire information from the director of studies at
Sentah College Mbarara and Mary hill high school. This method is intended to attain hard
facts, goals and informal procedures. Interviews will be made because we could probe in
great depth about how schools captured and managed student’s behavior while at school.
Again, personal contacts will allow us to be responsive and adaptive to what the users of
the system say. And lastly a lot of time will be saved since the respondents are expected
to be cooperative being of the elite class and having encountered the problem that is
being solved on several occasions. This will prompt capturing of user requirements and
attaining necessary insight in problem domain.

3.2.2 Document Review


This will be done by reviewing the documentation about the Student Behavior
Information Systems existing, studying the processing methods used to come up with the
accurate records. Through the use of written materials in form of internet materials and
journals we shall be able to gather information on concepts and challenges of the current
system. Reports from the manual system will be examined to identify the inputs,
processes and outputs of the system.
3.3 System Analysis
In system analysis, requirements will be determined. The requirements include functional
and non-functional requirements basing on the system study.
Systems analysis is the process of looking at and summarizing data with the intent to
extract useful information and develop conclusions.
3.4 System Design
(i) Process Modeling
This will be achieved by use of DFDs to show processes and external entities in the
system and the end product will be a Data dictionary.

(ii)Data Modeling
This will be achieved by using ERDs to show the data requirements, model the entities
and the end product will be the structure of the relations in the relational schema
(database).

3.4.1 Implementation Tools


In the implementation stage, the following tools are expected to be used; Wamp/Apache
server, MySQL, PHP, JavaScript and Windows operating system, and Sublime Text (as
the development environment).

3.4.2 Wamp/Apache Server


Wamp Server is a free server bundle that uses Apache server. When installed on the
system, it includes Apache, MySQL and PHP. Apache is a popular web server that many
ISP’s and individuals use to host web pages. When Apache is installed on the system, the
machine becomes a web server. Pages stored on the system in a special folder are
accessible on the Internet via the machine’s IP address. In order for pages to be viewed
on the Internet, the files must be stored in a special directory; this directory is usually
called www.

3.4.3 PHP
Hypertext Preprocessor is an open source server side programming language extensively
used for web scripts. It is a popular server-side scripting language designed specifically
for integration with HTML and is used (often in conjunction with MySQL) in content
Management System and other web applications. It is available on many platforms,
including Windows, Unix/Linux and Mac OS X, and any open source software.

3.4.4 MySQL
MySQL is an open source relational database management system (RDBMS) that uses
Structured Query Language (SQL), the most popular language for adding, accessing, and
processing data in a database. Because it is open source, anyone can download MySQL
and tailor it to their needs in accordance with general public license. MySQL is noted
mainly for its speed, reliability, and flexibility. MySQL is designed as a multi-tasking/
multi-user database, which is the main requirement for database.

3.4.5 HTML
HTML, referring to Hypertext Markup Language is the predominant markup language for
web pages. It provides a means to describe the structure of text-based information in a
document by denoting certain text as links, headings, paragraphs and lists among others
and to supplement that text with interactive forms, embedded images and other objects.
HTML is written in the form of tags, surrounded by angle brackets. HTML can also
describe to some degree the appearance and semantics of a document and include
embedded scripting language code which can affect the behavior of Web browsers and
other HTML processor.

3.5 System Implementation

This is whereby the physical realization of the database and the application design is
done. This involves the implementation of both the database and the application
programs. It will be achieved by using the Data Definition Language (DDL) as well as
the Data Manipulation Language (DML) of the selected Database Management System
(DBMS).
The system will capture students’ records data inserted by the institution administrators at
all levels of academic progress, compute and rank them as high, medium and low. They
are ranked by indicators of behavioural misconduct that fall in three categories such as;
A, B and C as shown in the table below. For each indicator a weight is assigned as shown
in table 2 below.

Table showing behavioral misconduct grouped into three categories A,B and C.

Category A crimes Category B crimes Category C crimes


 Striking  Examination malpractices  Late coming
 Drug abuse and Alcohol  Fighting  Disrespecting
consumption  Theft others
 Bullying  Coupling  Loitering in the
 Murder  Escaping from school compound
 Possession of weapons  Possession of unwanted  Having missing
 Dodging examinations properties class notes

 Vandalism  Missing classes  Intimidating others

 Impersonation  Abuse of school uniform


 Falsification of documents  Dodging duties(assigned
house work)
Table 2: Table showing behavioral misconduct grouped into three categories A,B
and C.

Table 3
CATEGORY RANK WEIGHT
A High 3
B Moderate 2
C Low 1
Table 3: Table showing categories, Rank and weight

Administrators shall be able to make more effective and efficient decisions when they


have the right data in the right form at the right time.
The Student Behaviour Information system will provide institution administrators
with instant access to a student’s entire disciplinary history, user-defined behaviours,
behaviour categories and information they need to make decisions during the
admission process.
3.6 System Testing and Validation

3.6.1 Testing
This is the process of executing application programs with the intent of finding errors
using careful planned test strategies and realistic data the system will be methodically and
rigorously tested to uncover faults in the application programs and the database structure.
The faults will then be corrected and the process be repeated until the system is proven to
be working according to users’ specification and performance requirements. This will be
achieved by:

i. Testing the system performance, efficiency, disk space and its throughput to
ensure proper functioning of the system.
ii. Checking the compatibility of the system with different operating systems for
example Windows XP, Linux and Windows 7.
iii. Testing for security issues like resistance to remote attacks and authentication
procedures

3.6.2 Validation
The validation process for the Student Behavior information system provides a high
degree of assurance that specific processes will consistently provide information which
will meet predetermined specification and quality attributes.
It will involve identifying compliance to quality capturing, storage and easy accessibility
to data for example user requirements specification and functional specification
document controls and various items of documentation for example user manuals,
administrator documentation and testing procedures
Ethical Issues in System Development

These are a list of ethical issues that are to be considered during the project development
life cycle and the actual programming in coming up with the information management
system: Using open-source code without properly crediting the source. Consuming
illegal software to achieve and accomplish tasks. Recoding shifts in business
requirements. Not addressing business requirements. Producing a workable prototype on
time and within budget constraints safeguarding and protecting data privacy. These are a
list of ethical issues concerning the completion of an undergraduate project: Protection
and obscurity of participants. Break of certainty/confidence, whereby the researcher
might have access to commercially delicate data. Concerning the customer; to get the
consent of participants and educate them of the part they are to play in the project. The
behavior system will to some extent share information concerning student’s conduct
through apps and so when dealing with customers through app software, “it is essential to
use their information correctly and not falsely advertise their information” (Data
Protection Act 1998).

3.7 CONCLUSION
Conclusively, the student behavior information management system will generally cut across the
school’s processes of admission and the student’s way and acts of behavior bearing in mind that
any form of indiscipline will eventually affect them as they join other school hence improvement
on student’s discipline. This is hoped to be achieved by correctly following the phases laid out in
the methodology so as to get clear, efficient and reliable results at the end.
References

Almanza, H., & Mosley, W. (1980). Curriculum adaptations and modifications for
culturally diverse handicapped children. Exceptional Children, 46, 608-614.

American Psychological Association. (2000). Diagnostic and statistical manual of mental


disorders--Fourth edition--Text revision. Washington DC: American Psychiatric
Publishing.

Ames, C. (1992). Home and school cooperation in social and motivational development.
Champaign, IL: Illinois University. (ERIC Document Reproduction Service No. ED
411629).

Banks, J. (1988). Ethnicity, class, cognitive, and motivational styles. Journal of Negro
Education, 57,452-467.

Bateman, B. D., & Linden, M. A. (1997). Better IEPs. Reston, VA: Council for
Exceptional Children.

Bennett, C. (1989). Teaching students as they would be taught. In B. Shade (Ed), Culture,
style, and the educative process (pp. 71-86). Springfield, IL: Charles C. Thomas.

Bossert, S. T. (1988). Cooperative activities in the classroom. In E. Rothkopf (Ed.),


Review of research in education (Vol. 15, pp. 225-250). Washington, DC: American
Educational Research Association.

Burnette, J. (1999). Critical behaviors and strategies for teaching culturally diverse
students. ERIC/OSEP Digest E584. Reston, VA: ERIC Clearinghouse on Disabilities and
Gifted Education. (ERIC Document Reproduction Service ED 435147).

Cairns, E., & Green, J. (1978). How to assess personality and social patterns:
Observations or ratings? In R. Cairns (Ed.), The analysis of social interactions (pp. 209-
2261. Hillsdale, NJ: Lawrence Erlbaum.

Carta, J., Renauer, M., Schiefelbusch, J., & Terry, B. (1998). Effective instructional
strategies to facilitate Classroom transitions, group instruction, independent performance,
and self-assessment. Kansas City, KS: Juniper Gardens Children's Project.
Time Schedule

ACTIVITY FEBRUARY MARCH APRIL MAY JUNE

Feasibility study 
Proposal writing 
Data collection 

Data analysis 
System design 
Coding and 
Validation
System 
Implementation
Report Writing  
and Presentation
Closure 

Appendix 1: Time schedule

You might also like