Professional Documents
Culture Documents
BY
FPA/CS/21/3-0169
SUPERVISED BY:
MR OGUNLOLA OKUNOLA
OCTOBER, 2023
CERTIFICATION
I certify that this project was carried out under my supervision by OJO OLAMIDE
TIMILEHIN with Matric Number FPA/CS/21/3-0169 in the Department of
Computer Science, Federal Polytechnic Ado-Ekiti, Ekiti state, Nigeria.
…………………………….. …………………………
MR OGUNLOLA OKUNOLA DATE
Project Supervisor
………………………………... …………………………
DR. MRS. FALUYI DATE
(HOD) Head of Department
……………………………….. …………………………
External Supervisor DATE
DEDICATION
I dedicate this project report to almighty God whose love and grace towards my
Academic pursuit is endless and also to my wonderful parent MR. and MRS. OJO
especially my precious mother for her moral and financial support and relentless effort
in prayer their love and contribution.
ACKNOWLEDGMENT
This work will not make a meaning without me giving honor to whom it is due,
therefore I thank THE ALMIGHTY GOD for his mercy, provision, protection and
guidance in all my undertakings.
However, words are not enough for me to express my profound gratitude goes to my
project supervisor, MR OGUNLOLA OKUNOLA for making this project a learning
process, and also a guidance, high sense of direction and suggestions at various phase
of the work, Sir may God grant you peace and prosperity in your entire endeavors.
I heartily express my gratitude to my adorable parents Mr. And Mrs. OJO for their
spiritual and financial support which has helped me achieved this feat in my academic
career. I pray that God will grant you long life with sound an perfect health to reap the
fruit of your labor.
CERTIFICATION……………………………………………………………… ii
DEDICATION…………………………….…………………………………… iii
ACKNOWLEDMENT………………………………………………………… iv
TABLE OF CONTENT.…………………………………………………… v – vi
ABSTRACT…………………………………………………..………………… vii
CHAPTER ONE
INRODUCTION …………………..……………………………………………..1
1.6 Limitations…………………………………..…………………………………5
CHAPTER TWO
CHAPTER THREE
3.0 Methodology………………………………………………………………… 15
CHAPTER FOUR
Summary …………………………………………………………………... 31
Conclusion ………………………………………………………………. 32
References ……………………………………………………………….. 33
Appendix …………………………………………….……………….. 34
ABSTRACT
The rapid growth in technology, has initiated a new era of asset management. From e-
commerce and e-services, paperless environment, mobile technologies, applications
development, and automation to become a regional center for the training of top-
quality ICT professionals and researchers. In today’s world where every transaction
and administrative procedures require the use of ICT, managing asset effectively is
important for any organization. It is a generally held opinion that where asset
management by any organization is poor, delivery of maintenance and service
delivery are normally affected. Hence, this study is aimed at implementing an asset
management system to help check this deficiency of managing assets.
This study is aimed at developing a web asset management application for recording
assets and sending reports across. The proposed system begins with a statement of
problem which identifies the challenges observed from the existing system. Objective
and Research questions for the study were stated to direct the emphasis of the work.
Rapid application development (RAD) is a software development technique was used
to design and develop this application.
CHAPTER ONE
1.0 INTRODUCTION
Asset Management System is an application used by the student to automate and keep
track of the equipment and inventory that are vital to the day-to-day operation of their
businesses. Exactly how those assets are managed, though, is highly variable.
A lot of organizations are managing their equipment and inventory through a manual
process, including spreadsheets over which an employee or employees are tasked with
the responsibility of maintaining. So, this application helps to keep track of these vital
assets and manages efficiently and provides an ease to use for Federal Polytechnic
Ado-Ekiti, Ekiti State.
This project is intended to replace the manually managed system and provide a
platform that is more efficient, reliable and robust.
The School Asset Management System (SAMS) is proposed to be used by the Federal
Polytechnic Ado-Ekiti, Ekiti State. Asset in school is divided by two categories the
first is inventory stationery and second modal asset. Inventory asset is defined as any
materials, such as paper, envelopes, pens, ink, rulers, etc. System is defined as an
organized and coordinated method, or a set object or phenomena grouped together for
classification or registration. The financial management and asset the school has been
discovered by management of Ministry of education.
The asset inventories such as stationeries are used very commonly by people working
in an office. Stationaries are supplied for the use staffs. School Asset Management
System (SAMS) in an asset booking and registration system developed for staffs of
the school to take stationeries they need, keep booking and view the stationaries
available. Other than that administrator responsible to approve the booking asset item.
This system is a computerized the manual system asset management.
School Asset Management System is a web – based system developed by HTML,
PHP and JavaScript scripting languages. The system interacts with a database using
Server Query Language ( SQL ) (REGENT UNIVERSITY COLLEGE OF SCIENCE
AND TECHNOLOGY, 2018).
1.2 STATEMENT OF PROBLEM
The statement of problem described for the conflict asset management of the school
(Federal Polytechnic Ado-Ekiti, Ekiti State) and problem which manage to the need
simplify, record and printing certificate of each asset. Currently, a school asset
management system at the school is performed manually, through a manual process.
This, however makes the process laborious and time consuming.
The manual process normally will involve extensive paperwork and is prone to human
error. The Microsoft Word and Microsoft Excel which currently used to record
information of an asset sometimes can be mistaken, incomplete and miscalculate as
well as non-integrated. It is also troublesome tedious to trace the physical asset and
track their movement.
According the problem discovered above, vulnerabilities arise because of the manual
process flows and its effect on almost all categories of user such as the applicant, an
administration office and staff.
Basically, there are two foremost statement of the problem which is to be solved by a
proposed system:
i. How the School Asset Management System, can be used to be improved and
simplify the current process.
ii. How and what asset information can be integrated and shared among process or
user.
Seeing such problems exist among the users, it motivates the author to develop
SAMS, which is a computerized system solution that is developed based on Rapid
Application Development ( RAD ) (Mahavidyalaya, 2020).
Overview of PHP:
PHP is a programming language and at the same time works for web development. It
survives many purposes like web contents management systems, web template
systems and web frameworks. PHP codes are executed by CLP (Command-line
Interface).
Overview of HTML:
HTML standards for Hyper Text Markup Language, which is the structural
description of contents of a file. It is the arrangement of text, image and other
multimedia contents on the display.
Overview of CSS:
CSS is basically a style sheet language which presents a document written in a markup
language as like as HTML. It separates contents like layout colors, fronts and
improves control over the contents.
Overview of MYSQL:
MySQL is a relational database management system (RDBMS). The MySQL
Development Project has provided its source code. MySQL owns a single for-profit
student. Swedish student MySQL AB is now owned by Oracle Corporation (Zubaer et
al., 2020).
i. Administrator
a. School admin uses this system to insert, update and delete the information such as
asset details, and record all new assets issued.
b. Manages staff such as register new staff, updated staff details and delete staffs.
c. All school assets must to record and register for each asset such as computer,
laptop and so on.
d. Admin can view all request assets of the applicant before sending
e. Admin will have to handle the booking asset when that requested approved.
a. Staff can make bookings of items before taking them from the administrator.
b. View status booking of users taken items.
LITERATURE REVIEW
2.1 INTRODUCTION
The importance of this review is to make known of some other research made in
relevance to the project topic. Many researchers have made some findings on how this
problem can be solved and achieve the objective of the subject. As many institutions
in Nigeria have chosen to pursue the dynamic financial options available online, the
advantages of online transactions are now many. As people of this generation become
more dependent on the internet for information, the need for an automated system
becomes more apparent. The skills needed to access and comprehend information
online are becoming commonplace, and the flexibility of wireless computing means
that at any place in time e.g. Coffee shop, airport or bedroom can become an asset
hall. Online transactions and online treasury bill purchase.
The most profitable policy is not to optimize one of these at the expense of others. The
asset management system can control has to make value judgments. If profit is
lacking, the institution goes out of operation in the short term. If the Student service is
poor, then the Students disappear and the institution goes out of business in the longer
term. Balancing the financial and marketing aspects is the answer: the asset
management system must have a fine judgment to make decisions. The first target,
Student service, can be considered in several ways, depending on the type of demand.
In a general store environment, the service will normally be taken as “availability ex
stock”, whereas in supply to Student specification, the service expected would be
delivered on time against Student requested date. The second target, asset cost,
requires a minimum of cash tied up in the asset. This should be considered carefully
since there is often the feeling that having any assets in custody for a few periods is
bad practice. Minimizing the assets usually means attending to the major costs: very
low-value assets are not considered a significant problem. Low asset inventory can
also be considered in terms of space, or other critical resources. Where the item is
voluminous, or the store space restricted, the size of the items will also be a major
consideration.
The third target, avoiding operating cost, has become more of an issue as the focus has
been placed on inventory management. The prime operating costs are those associated
with the store's operations, inventory control, purchasing, and the associated services.
The development of logistics, linking distribution costs with inventory, has added this
new set of transportation costs to the analysis. The research done by J. Småros et al
(2003) on the impact of increasing demand
visibility on production and inventory control efficiency reveals that for products with
stable demand a partial improvement of demand visibility can improve production and
inventory control efficiency, but that the value of visibility greatly depends on the
target products’ replenishment frequencies and the production planning cycle
employed by the manufacturer.
Asset management is the active control program which allows the management of
sales, purchases, and payments. According to Coyle et al (2003), the asset is acritical
factor for success in many Institution’s.
They further stressed that asset management plays a dual role in Federal Polytechnic
Ado-Ekiti, Ekiti State. Asset management impacts the cost of sales, but it also
supports order fulfillment (Students service). As stated earlier in chapter one, asset
management is vital for the successful operation of most organizations due to the cost
inventory represents.
Effective management of asset is a major concern for firms in all Institutions
(Mentzer, et al., 2007). To achieve this, there is, therefore, the need for firms to
effectively and efficiently manage their assets. There are two main concerns about
asset management. First, the asset inventory management concerns the level of the
organizational services, that is, to have the right items in sufficient quantities, in the
right place and at the right time. Another concern is the cost of ordering and carrying
assets (Stevenson, et al., 2009).
i. There exist high redundancies between files which result from the fact that the
information is replicated in different places, and that these replications are not
controlled by a central monitor.
ii. Inconsistencies might result from the possibilities that a program makes changes
on the files it uses without these changes being made (at the same time) by all
other programs that use the files.
iii. There exist inflexibility against changes in the application: if new actions or
event arise in the cause of time, these can be realized at a substantial expense of
time.
iv. The work of many programmers involved is characterized by low productivity,
seems program maintenance is expensive: if the structure of an existing file must
be modified during its lifetime, then all application program should modify
correspondently.
v. Finally, there is the problem of adopting and maintaining standard (with respect
to coding data format etc.), which is important for exchanging data or for
migration to new operating system released, or even to a new computer system.
Specify the need for a database, O’leary (1996) listed the following advantages:
i. Sharing: in an organization, information from one department can be readily
shared with others.
ii. Security: users are giving password or access only to the kind information they
need to know.
iii. Fewer files: with several departments having access to one file, there are fewer
files, therefore, excess storage or what is called redundancy is reduced.
iv. Data Integrity: older filing system many times did not have integrity i.e. a change
made in the file in one department might not be made in the file in another
department. In these days of integrated networks, the database appeared as the
most logical method for organizing the operational data of large organizations.
One may as well say that these advantages give the database the attraction over the
traditional file processing method.
CHAPTER THREE
METHODOLOGY
2.0 INTRODUCTION
This chapter includes the research method and procedures prepared by the researcher
in order to develop the Asset Management System for Federal Polytechnic Ado-Ekiti,
Ekiti State. This comprises the general analysis of the current system, recommended
hardware and software requirements, the conceptualization and the research approach
used. It will also include an overview of how to treat research data gathered by the
researcher.
i. Primary Source: This refers to the source of collecting original data in which the
researcher made use of an empirical approaches such as personal interview and
questionnaires.
ii. Secondary Source: The secondary data were obtained by the researcher from
journals, books, school library, and internet downloads. The data collected from
this means have been covered in the literature review in chapter two.
3.2.1 ORAL INTERVIEW
This was done between the researcher and the staff of the Federal Polytechnic Ado-
Ekiti, Ekiti State. Also, various departmental heads were interviewed reliable facts
were got based on the questions posed to the staffs by the researcher.
3.5 REQUIREMENTS
I. Functional Requirement: Functional requirements for the asset management
system are:
a. Administration of Users: The system shall record a database of user accounts and
the domain on which the users can access the information. Technical users like
the system administrator who will be able to create new users, editing data, and
deleting a user.
b. User Authorization: The asset management system shall allow the user to be
authenticated by a domain association.
i. User Design: during the design phase of the RAD model, the developer
distinguishes the design and functionalities of asset management System
ii. Construction: it is one of the most fundamental phases where the programmer
starts coding the proposed system. The development of the asset management
System is based on the design presented by the developer.
iii. Cutover: this phase indicates the deployment stage. It covers the implementation
of the system where it is being tested to ensure that it is running correctly. The
developer conducted an evaluation to know if the system meets the requirements
of the institution.
a. System administrator
b. Users
Transfer ICT assets
View current assets Profile
View status of each asset
Print asset inventory list
Print asset location list
Print asset cost and vendor
Print asset warranty period
c. System auditors
The figure above shows the relationship of each entity on the table in the database of
the proposed asset management system. The relationship in the above tables is one-to-
one, one-to-many and many-to-many relationships
CHAPTER FOUR
RESULTS AND DISCUSSION
4.0 INTRODUCTION
To complete this study properly, it is necessary to discuss the achievements realized in
relation to the objectives of the project to answer the research questions as well as
limitations encountered during the project’s timeline. This chapter compasses the
interpretation of the finding resulting from this study as well as the discussion on the
development of the system.
4.1 RESULTS
For designing the asset management system, we operated on different stages like
graphical user interface (GUI), input data fields, Image upload bottoms, and forms. A
system for capturing assets details and information into a database and the users
authenticated via active directory system was developed successfully. A prototype of
the system was set up for a test run on the computer systems of the information and
communication units of Ghana Homes Loans. It was found out that, the system served
the purpose for which it was developed. Another test was run on one of their business
branches at different locations and the result was the same. This means Ghana Home
Loans will now use the system at their various branches were necessary to store data
and keep an inventory of their ICT assets.
4.2 DISCUSSION
The proposed asset management system will provide security to information files and
data files as well as ease the burden of tracking ICT assets. This will prevent
unauthorized allocation, transfer, and modification of any asset data files. In the long
term, this will protect information integrity, availability, authenticity and access.
The design phase is the primary phase, which gives a brief idea about the different
levels used for developing an application with the help of block diagrams. The
software is designed in a user-friendly manner. So, it is simple to use for developing a
prototype of the application. The most important phase in the project is the execution
phase. The execution phase is developed with the help of the design phase.
The program is designed using razor and java applets platform, the next part is
debugging the program. I faced some challenges when writing the code, but at last, I
am successful in executing the program without errors. I used different approaches for
testing the application, which helped me to know about the limitations. This project
gave me good experience in dealing with the information and data security issues in
theoretical as well as in technology. I did the project in a satisfactory level with the
help and good guidance from my supervisor Mr. Ogunlola Okunola.
4.4.3 REPORTS
Under this tab, system users get to see the various reports like;
a. Asset Report
b. Items
c. Customer
d. Vendor
Figure 4.3. Asset Reports
5.3 RECOMMENDATION
The research work carried out is limited to intranet network only. It would be better if
a full portal is developed for effective and wholesome of information management
technology of the Company. More can be done to enable this application to reach a
wider and broader area. Example of such improvement is
a. Mobile-based technology of such an application
b. Addition of an automated email report to supervisors of that branch
c. Barcode scanners and electronic QR gadgets can be introduced to made data taking
and retrieval easier.
5.2 CONCLUSION
Research and development are continuous processes; this is the same in computer and
software development. However, the effectiveness and efficiency of this new system
provide room for further improvement.
And lastly, the study concludes that the personnel of the company are the fundamental
barometers of the level of efficiency provided by the system. To develop an ultimate
asset inventory, a prior consultation among the employees would be advisable to cater
the needs of who and which department will use the
system.
REFERENCES
A market orientation in supply chain management S Min, JT Mentzer, RT Ladd -
Journal of the Academy of Marketing Science, 2007 – Springer.
Bibliography on object-oriented database management. G Vossen – ACM
Coyle et al (2003), Systematic review of the use and value of computer simulation
modelling in population health and health care delivery. A Weightman, K
Roberts, E Coyle… - Journal of Public …, 2003 -academic.oup.com
Database integration using neural networks: implementation and experiences. WS Li,
C Clifton, SY Liu - Knowledge and Information Systems, 2000-Springer
No Title. (2012). June.
Mahavidyalaya, B. V. (2020). Asset
Management System ( AMS ). 2019–2020.
REGENT UNIVERSITY COLLEGE OF SCIENCE AND TECHNOLOGY. (2018).
SIGMOD Record, 1991 - dl.acm.org
Zubaer, A. Al, Mondal, S. K., Islam, N., Hossain, A., & Hasan, M. (2020). Design
and Development a Website using HTML , CSS , PHP and MySQL Design
and Development a Website using HTML , CSS , PHP and MySQL.
December.
APPENDIX
<?php
session_start();
require_once('inc/config/constants.php');
require_once('inc/config/db.php');
require_once('inc/header.html');
?>
<body>
<?php
// Variable to store the action (login, register, passwordReset)
$action = '';
if(isset($_GET['action'])){
$action = $_GET['action'];
if($action == 'register'){
?>
<div class="container">
<div class="row justify-content-center">
<div class="col-sm-12 col-md-5 col-lg-5">
<div class="card">
<div class="card-header">
Register
</div>
<div class="card-body">
<form action="">
<div id="registerMessage"></div>
<div class="form-group">
<label for="registerFullName">Name<span
class="requiredIcon">*</span></label>
<input type="text" class="form-control"
id="registerFullName" name="registerFullName">
<!-- <small id="emailHelp" class="form-text
text-muted"></small> -->
</div>
<div class="form-group">
<label
for="registerUsername">Username<span
class="requiredIcon">*</span></label>
<input type="email" class="form-control"
id="registerUsername" name="registerUsername" autocomplete="on">
</div>
<div class="form-group">
<label
for="registerPassword1">Password<span
class="requiredIcon">*</span></label>
<input type="password" class="form-
control" id="registerPassword1" name="registerPassword1">
</div>
<div class="form-group">
<label for="registerPassword2">Re-enter
password<span class="requiredIcon">*</span></label>
<input type="password" class="form-
control" id="registerPassword2" name="registerPassword2">
</div>
<a href="login.php" class="btn btn-
primary">Login</a>
<button type="button" id="register" class="btn
btn-success">Register</button>
<a href="login.php?action=resetPassword"
class="btn btn-warning">Reset Password</a>
<button type="reset" class="btn">Clear</button>
</form>
</div>
</div>
</div>
</div>
</div>
<?php
require 'inc/footer.php';
echo '</body></html>';
exit();
} elseif($action == 'resetPassword'){
?>
<div class="container">
<div class="row justify-content-center">
<div class="col-sm-12 col-md-5 col-lg-5">
<div class="card">
<div class="card-header">
Reset Password
</div>
<div class="card-body">
<form action="">
<div id="resetPasswordMessage"></div>
<div class="form-group">
<label
for="resetPasswordUsername">Username</label>
<input type="text" class="form-control"
id="resetPasswordUsername" name="resetPasswordUsername">
</div>
<div class="form-group">
<label for="resetPasswordPassword1">New
Password</label>
<input type="password" class="form-
control" id="resetPasswordPassword1" name="resetPasswordPassword1">
</div>
<div class="form-group">
<label
for="resetPasswordPassword2">Confirm New Password</label>
<input type="password" class="form-
control" id="resetPasswordPassword2" name="resetPasswordPassword2">
</div>
<a href="login.php" class="btn btn-
primary">Login</a>
<a href="login.php?action=register" class="btn
btn-success">Register</a>
<button type="button" id="resetPasswordButton"
class="btn btn-warning">Reset Password</button>
<button type="reset" class="btn">Clear</button>
</form>
</div>
</div>
</div>
</div>
</div>
<?php
require 'inc/footer.php';
echo '</body></html>';
exit();
}
}
?>
<!-- Default Page Content (login form) -->
<div class="container">
<div class="row justify-content-center">
<div class="col-sm-12 col-md-5 col-lg-5">
<div class="card">
<div class="card-header">
Login
</div>
<div class="card-body">
<form action="">
<div id="loginMessage"></div>
<div class="form-group">
<label for="loginUsername">Username</label>
<input type="text" class="form-control"
id="loginUsername" name="loginUsername">
</div>
<div class="form-group">
<label for="loginPassword">Password</label>
<input type="password" class="form-control"
id="loginPassword" name="loginPassword">
</div>
<button type="button" id="login" class="btn btn-
primary">Login</button>
<a href="login.php?action=register" class="btn btn-
success">Register</a>
<a href="login.php?action=resetPassword" class="btn btn-
warning">Reset Password</a>
<button type="reset" class="btn">Clear</button>
</form>
</div>
</div>
</div>
</div>
</div>
<?php
require 'inc/footer.php';
?>
</body>
</html>