Design and Implementation of Lecture Alert System for Computer Science Department (a Case Study of Computer Science Department Akanu Ibiam Federal Polytechnic Unwana, Afikpo Ebonyi State)
Chapter One
1.3 AIMS AND OBJECTIVE OF THE STUDY
This project is developed to accomplish certain objective such as
- To show how a new method of checking lectures using mobile phone short messaging service work.
- To highlight the existing problems associated with checking lectures on notice boards.
- To design a conventional lecture alert system using short messaging service (SMS).
1. 4 SIGNIFICANCE OF THE STUDY
The general benefits that will be derived from the new system are as follows:
- This project will help serve as a research material for future or prospective researchers.
- It would help to reduce the rate at which there is a clash between lecturers by ensuring that one message is sent per period, per venue.
- It would help to generate update and reminder from the time schedule stored in the database thereby making the system a time triggered application.
CHAPTER TWO
RELATED LITERATURE REVIEW
The short message service (SMS) is a feature of second generation (2G) mobile technology and it must not be longer than 140/160 alphanumeric characters without images or graphics. It is s relatively simple messaging system supported by global service of mobile communication (GSM), time multiple access (CDMA) based mobile phone networks. said that sms based service are more attractive to service providers and users as a result of the recent penetration of mobile phone and the large scale adoption of the existing service by users.
(Yonan, 2009) stated that several SMS based applications have been developed and are used for various purposes in fields such as health, business, security monitoring, and supply chain management.
As SMS examination result notification system was designed to enable students have remote access to their examination result via mobile phones. Students a very the database by sending SMS commands to the retrieve their results. The mobile operator and charges for the message as if it was performed directly on a mobile phone by supporting an extended AT command set for sending and receiving SMS messages according to defined specification Hence, there is the need to develop a system that will combine available resources and reach people through SMS using GSM module. Some of the client protocols used by SMS include: simple mail transfer protocol (SMTP), universal communication processor/ Electromagnetic inference (UCI/EML) etc and application connectivity for SMS submission or server side protocols SMPP, Hypertext protocol (HTTP) and simple mail transfer protocol (SMTP).
(Morris & Pinchot 2010) said that with emailing, in the 2010s, the sending of SMS has become accepted part of many cultures. Initially growth of text messaging was slow, with customers in 1995 sending an average of 0.4 message per GSM customer, per month.
SMS forms on integral part of signaling system NO 7 (SS7) and it is a state” with a 160 character data, coded in the ITU-T text format, that has a sequence lead in to determine different languages codes.
Elektor (2011) and Elekor (2012) said some amateurs have also built own system to control some of their appliances via SMS. Other method such as group Messaging, which was patented in 2012 by the GM of Andrew Ferry, Devin Peterson et al are used to involve more than two people into a text message conversation. A flash SMS is a type text messaging that appears directly on the main screen without user iteration and is not automatically stored in the inbox. It can be useful in cases such as emergency (e.g fire alarm). Some practical uses of text message include the use of SMS for confirming delivery or other tasks eg communication between a service provider and a client and for sending alert several universities have implemented as system of testing student and facilities campus alert (Penn, 2012).
Mohammad and Norhayati (2003) developed an sms service system for student collaboration on campus. The approach achieved quick message communication and delivery among students.
Krishna, Anurag and Prabhune (2014) presented a model which focuses on the use of SMS as a way of sending data and substituting packets in a network. The system was to improve existing levels of communication between teachers and students of an academic institution.
Bin Haji Sidek (2010) stated that an SMS application system along with corresponding server was developed. It was aimed at providing a system that can avoid the reliance of content delivery SMS application for student examination result to SMS gateway provider and the commercial SMS application develop which can be managed totally by the school staff.
Markett, Sanchez, Weber and Tangney (2005) proposed an sms technology that supports classroom interaction between students and the lecturers. Students send SMS via their mobile phone which are viewed, replied and addressed by the lecturers through a developed software connected with modem. The system was closely related with mobile notice board project for the delivery of urgent information of students but could not ascertain a feedback module in the deployment.
AL-Ali, Rousan and Mohandes (2004) and Al-Shaikh (2003) also proposed a patient and house monitoring system to ease the ordering and delivery of house equipment using SMS technology via mobile phone the system contributed immensely to the use of SMS technology foe message delivery but was limited by high implementation cost.
Obea and Fernandez (2004) argued that an SMS tool to exchange information in medical area was proposed and the work was developed as a radiological information system where physician can send messages to their patients.
2.1A PUSH SMS APPLICATION
A push SMS application is one whereby a message is been sent from the application to the user. It is a one way message in other words, it is the mobile application (In this case SMS and email result checking application) that initiates message. An example could be a school that automatically sends examination result to the students and their parents/ sponsors as soon as the grades become available. The SMS would be delivered to them they are, as long as their mobile phone is within their network operators coverage.
CHAPTER THREE
SYSTEM INVESTIGATION AND ANALYSIS
3.1 SYSTEM INVESTIGATION AND ANALYSIS
The objective of the system investigation and analysis is to collect information about the current system, the method of data collection. It also gives a description of input design and output specification. The analysis of the existing system therefore provides a firm basis for the design of the new system. Through investigation, the scope of the problem and the effort required to complete it. In this chapter, the methodology adopted is a waterfall methodology whose steps comprise of:
- Planning
- Analysis
- Design
- Implementation
- Testing
- System
Lecture alert system for computer science department AIFPU being an object oriented project is exposed to use tools like the use case diagram, flowcharts and other tools for development of this project in order to increase users’ confidence, by reassuring users that the analyst fully understand the nature of the problem that the system must carry out.
3.2 FACT FINDING METHODOLOGY
There are some techniques that were used in investigation of the existing system and resulted in a set of data structures of the current systems data and the initial problem list for the project. Some of the techniques include:
- Interview Method: this process involves asking question to relevant personnel’s who gave out vital information to the researcher. The researcher engaged on face to face contact which enabled the author to distinguish between facts and opinions from the interview. Although majority of the respondents were in affirmation while few were of diverse opinion.
- Observation of the system operation: This process involves watching while the system is operation to discover things without being told. During operation I discovered that the existing method of allocating lecture time table is done manually using paper and pen. I also observed that there is usually clash of lecture between the lecturers on existing system ie allocation of one venue to different lecturers at a time.
- Studying the current system documentation: this is about studying the documentation already recorded by previous or traditional system which is already in existence. Some of the documents studied were: Organizational chart, Lecture time table and Lecture time table procedural chart and I found out that all are done manually using pen and paper.
- COMPUTER SCIENCE DEPARTMENT AND ITS ENVIRONMENT
Since the establishment of the first polytechnic Yaba Tech. in 1947, many other polytechnic institute have also been established amongst them is Akanu Ibiam federal Polytechnic Unwana, Afikpo Ebonyi State which was established in 1979 and had her first matriculation ceremony in 1981.
The institution presently has over twenty three department of which one of it is computer science department which has goal in graduating students who have been found worthy and deserving a character and in learning and awards national diploma and higher national diploma to such students.
The department also award best and second best student award to student who graduate with good grades. Computer science is an academic department and its client are students with certified and educated lecturers whose goal are to make the department one of the best in Akanu Ibiam Federal Polytechnic Unwana, Afikpo Ebonyi State.
- DEMOGRAPHIC AND OWNER VARIABLES
Computer science department is one of the departments that has a big population numbering hundreds of students every semester. They offer provisional admission for the award of National Diploma and Higher National Diploma (HND) respectively. The department also operates evening programs known as part time for workers and students and also offers morning programme known as regular for students.
Grades: the performance of students is evaluated using quiz, continuous assessment and exams which students are graded accordingly.
Computer science department is practical based students learn different programming skills through practical session conducted. The qualified lecturer and staff who worked so hard to see the department at the level they are now.
The department has the opportunity to run post graduate degree programme as one of the first in the institution, all to the credit of its staff. It is only course that can send a professor back to class room.
CHAPTER FOUR
SYSTEM DESIGN
System design is a process of defining the architecture modules, interface and data for a system to satisfy specified requirements. The system being proposed will in this section be designed to successfully handle the problems identified during the analysis.
4.1 OBJECTIVE OF THE DESIGN
The objectives of the design are:
- To develop a system that will reduce numerous problem and stress encountered in the course of using manual method of operation.
- To improve fast delivery of information
- Efficiency: the system should be able to produce a well organized and comprehensive output with little human assistance.
- Security: the system should be able to guard against intrusion and unauthorized person and limit fraud on loss of data stored in the file.
4.2 DECOMPOSITION AND COHENSION OF THE HIGH LEVEL MODEL
This is system block diagram that shows how the new system works. It also describes how information moves or are being circulated around the new system. The block diagram will show briefly the process that will be carried out in the lecture alert system.
CHAPTER FIVE
SYSTEM DOCUMENTATION AND IMPLEMENTATION
5.0 SYSTEM REQUIREMENT
The requirement of the full operation of system includes software and hardware requirements. the essential hardware devices as well as software platform required for the efficient and effectiveness running of the systems are listed below:
5.1. 1 HARDWARE REQUIREMENT
The hardware requirements for successful execution of this project work include:
1. Printer, scanner, modem, and cables.
2. Stabilizer and ups (uninterrupted power supply)
3.2GB RAM and above
4. Intel Pentium processor 500MHZ and above
5. Hard disk size 100GB and above.
6. Mouse and keyboard for data entering.
7. DVD/CD ROM drive.
8. Personal computer.
5.1.2 SOFTWARE REQUIREMENT
The following are the software requirements:
1. Backup software e.g. goggle drive and hard disk drive.
2. Browser e.g. chrome, and Firefox latest version.
3. Programming and scripting language such as PHP, HTML, text editor, mySQL. They enable coding and execution of codes
4. Windows operating system (Windows 7 and above).
5.2. DEPLOYMENT PROCEDURE
The following are the procedures to get the new software install on your system:
1. Boot and insert the software into the DVD/CD drive.
2. Double click on my computer icon.
3. Click the installation setup.
4. Follow the installation wizard and then
5. Click finish.
5.3. PROGRAM TESTING
The software was tested exhaustively by creating plenty lecture fixtures with varying start times and monitoring the dispatch of SMS to the intended recipients through the SMS API. The SMS were successfully delivered with only very few exceptions as the results of network error in which case the software would attempt to resend the SMS. SMS sent retry Window was set at two .i.e if the sms is not sent at the first attempt: it’s sending would be retried on the next loop within the 5mins time bracket and before the start of the lecture. If offer the second attempt the sending fails, the entry is tagged as sent because it forwarded by program but not delivered because the SMS API did not receive a delivery report after which the GUI (graphic user interface) gives up trying.
5.3.1. CHOICE OF TESTING TOOLS/JUSTIFICATION
The tools used for the testing of the system include the following:
1. Browser: this interpret the instructions and displays it’s equivalent to the users understandable format on the screen.
2 XAMP: This consists of a local server and database management system for testing the web page and the database as well.
5.3.2 METHOD APPLIED
The design method applied on the project work is the top down design method when developing a complex computerized system. it is often very useful to breakdown the programming effort of the software design into smaller modules called sub system which further can be broken into program modules during the design stage.
5.3.3 EVALUATION OF RESULT
Having tested the system using software testing tools as listed above the result was properly recorded.
5.3.4. DISCUSSION OF RESULT
With the necessary input processed, the output which depends on the input, is retrieved based on the details entered from this system. The lecture alert system for the next five years could be obtained only if the previous user makes it available.
5.4 SYSTEM SECURITY
The project ensures that there is security assurance activities such as penetration testing, code review and architecture analysis are ensured. This application also ensures authentication, confidentiality, authorization, integrity which ensures that the system prevent unauthorized user to access the data.
- TRAINING OF OPERATORS
The researcher provided necessary documents and other requirements that will be enable the training of operation of the new system such as:
1. The operators will learn to take adequate measure such as installation and use of antivirus to prevent the destruction of programs and files.
5.6 SYSTEM CONVERSION
Parallel change over procedure is recommended and adopted for this work.
This involves the operation of the old system and the new system alongside each other. Hence, the current system and the proposed system will be in operation. this is because it is highly reliable and less risk when compared with other procedures. This type of system conversion allows for comparison between system but is quiet expensive.
5.7 MAINTANCE DETAILS
These are different method of system maintenance but at the initial stage if this system, prevention maintenance should be ensured. This is a maintenance to prevent future failure or breakdown of the system .Such maintenance are as follows:
1. Hard drive optimization
2. Maintenance of power supply outlets.
3. Checking of all input and output devices regularly.
4. Random virus check and removal of the virus.
REFERENCES
- AL-Ali, A.R.,Rousan, M.A., & Mohandes, M. (2004),”GSM- based wired home appliances monitoring and control system” International conference on information and communication technologies.pp 237-238 (2004)
- AL-Shaikh, M. & Rousan, M.A. (2003), “Embedded system based mobile patient monitoring device”, in proceeding of 16th IEEE symposium computer based medical system, New York, USA June 26 2003 , pp. 355-360
- Archibald, J. A. (2001). Simulation modeling for time table planning. Milky press Toronto
- Bin Haji Sidek, S.F. (2010), “The development of the short messaging service application for the school usage”, international symposium on information technology.2010