0% found this document useful (0 votes)
65 views

Computer Laboratory Inventory and Monitoring System123

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Computer Laboratory Inventory and Monitoring System123

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

COMPUTER LABORATORY INVENTORY AND MONITORING SYSTEM FOR

COMPUTER SCIENCE AND INFORMATION TECHNOLOGY


DEPARTMENT

A Thesis
Presented to the Faculty of the
Computer Science and Information Technology Department,
College of Arts and Sciences,
Negros Oriental State University Bais City Campus

In Partial Fulfillment of the Requirements


for the degree
Bachelor of Science in Computer Science

By:

SYLVESTER O. AGUILAR
PETER GIL B. BUSTILLO
BERNARD A. MAPESO
RINARGED K. ORTEGA
RUBEN C. VERBO III

JUNE 2024
APPROVAL SHEET

In partial fulfillment of the requirements of the course for the degree of


Bachelor of Science in Computer Science, this Thesis Project Entitled: “COMPUTER
LABORATORY INVENTORY AND MONITORING SYSTEM FOR COMPUTER SCIENCE
AND INFORMATION TECHNOLOGY DEPARTMENT’’ has been prepared and submitted
by AGUILAR, SYLVESTER O., BUSTILLO, PETER GIL B., MAPESO, BERNARD A., ORTEGA,
RINARGED K., VERBO, RUBEN III C. and is hereby recommended for oral examination.

SHERAMIE C. REYES ZENAIDA D. CALUMPANG, MSIT, Ed.D.


English Critic CAS Dean

MARK ANTHONY C. CATALUÑA


Project Adviser

Approved by the committee on the oral examination for the degree of


Bachelor of Science in Computer Science with the grade of _____________.

MARILYN B. BELOIRA
Member
JETTY A. CASIDO MICHAEL C. YLEAÑA
Member Member

Accepted and approved in partial fulfillment of the requirements for the


degree of Bachelor of Science in Computer Science.

MA. SARAH FATIMA P. VALENCIA, Ed. D., Ph. D.


OIC – Campus Administrator

ii
DEDICATION

This study is a testament to the unwavering support and love of our beloved
parents. They have been our guiding light, our source of strength, and our inspiration
to persevere. Their moral, spiritual, emotional, and financial support has been the
bedrock of our journey. This work is dedicated to them, as a token of our deep
gratitude and love.
To our brothers, sisters, relatives, adviser, mentors, and classmates, this study
is a testament to the power of collective effort. Your advice and encouragement, like
a symphony of support, have been invaluable in helping us reach this milestone. Each
of you has played a unique role in shaping this research, and we are deeply grateful
for your contributions.
Finally, we dedicate this book to the Almighty God, our constant companion
on this journey. We are deeply grateful for your guidance, strength, protection, and
the blessings of a healthy life. We humbly offer you all of these.

iii
ACKNOWLEDGEMENT

The researchers acknowledge the assistance of the following individuals,


whose contributions were instrumental in making this work possible. It may not be
feasible to mention everyone, so special thanks are extended to:
To Dr. Joel P. Limson, University President, thank you for the leadership and
commitment to academic excellence have been invaluable to our Thesis Project.
To Dr. Zenaida D. Calumpang, Dean of the College of Arts and Sciences, for
providing moral support that helped the researchers navigate the study and being a
good adviser in the Thesis Project.
To Mrs. Marilyn B. Beloira for her comments, thought-provoking questions,
and participation as the chairwoman of the panelist.
To Mr. Jetty A. Casido, thank you for his encouragement, suggestions, and final
announcement.
To Mr. Michael C. Yleaña for his insightful comments and motivation and for
serving as a panelist.
To Mr. Mark Anthony C. Cataluña, Thesis Project adviser and Consultant, for
his unwavering support, invaluable expertise in the technical aspects of this research,
for boosting the Researcher’s morale to complete this work, time and effort in
supervising the researchers, and most of all the techniques and strategies to do in
terms of any circumstances.
The Researcher’s family for their love, understanding, and financial support in
completing this work.
To our friends, classmates, and relatives, thank you for your encouragement
and criticisms, which boosted the researchers in pursuing our goal.
And above all, our Dearest Almighty God, who is the source of life, to whom
this humble work is dedicated. The researchers are grateful for His guidance and the
inspiration of His words.

iv
ABSTRACT

Title: COMPUTER LABORATORY INVENTORY AND MONITORING


SYSTEM FOR COMPUTER SCIENCE AND INFORMATION
TECHNOLOGY DEPARTMENT
Proponents: Aguilar, Sylvester O., Bustillo, Peter Gil B., Mapeso,
Bernard A., Ortega, Rinarged K., Verbo, Ruben III C.
School: Negros Oriental State University – Bais Campus
School Address: Sitio San Jose, Brgy. II, Bais City, Negros Oriental
Year Completed: 2024

This research focused on improving the inventory management system for the
Computer Science and Information Technology Department at NORSU - Bais Campus
1. The authors argue that technology can significantly improve our daily operations by
making them more efficient and effective. They view technology as a powerful tool
that allows for instant communication and information sharing. This study emphasizes
the importance of using technology to optimize resource allocation, maximize time
usage, and improve overall organization. By addressing the current inventory
management issues, the department can achieve a more streamlined and productive
future.

The research findings revealed the need for better organization and allocation of
department property. It also highlighted the importance of implementing technology-
based solutions, such as barcode systems or cloud-based software, to create a digital
inventory for better management and monitoring. The authors encourage the
department to embrace technology's potential to foster collaboration and innovation,
especially as the digital landscape continues to evolve. By leveraging these
advancements, the department can cultivate a more collaborative and successful
environment.

The research acknowledges that both modern technology and human input are crucial
for driving innovation within institutions. In this study, the conclusions drawn from
data analysis and observations are referred to as "constructed deductions" and are
considered the best practical approach to ensure the department's easy access to, and
long-term sustainability of, its property.

v
The research presents the methods and procedures for the thesis project. The
proponents conducted descriptive qualitative methods including interviews, focus
groups, observations, document analysis, and case studies. The proponents use VS
Code software, XAMPP, and Google Chrome and uses PHP, JavaScript, CSS and MySQL
programing languages to create and develop the system.

vi
TABLE OF CONTENTS
TITLE PAGE .................................................................................................. i
APPROVAL SHEET ........................................................................................ ii
DEDICATION ................................................................................................ iii
ACKNOWLEDGEMENT ................................................................................. iv
ABSTRACT .................................................................................................... v
TABLE OF CONTENTS................................................................................... vii
LIST OF TABLES ............................................................................................ ix
LIST OF FIGURES .......................................................................................... x
CHAPTER I: INTRODUCTION
Project Context ........................................................................................... 1
Objectives of the Project ............................................................................ 3
Scope and Limitation .................................................................................. 3
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
Review of Related Literature ...................................................................... 4
Related Studies ........................................................................................... 7
Theoretical Framework of the Study .......................................................... 9
Conceptual Framework of the Study .......................................................... 12
CHAPTER III: TECHNICAL BACKGROUND
Technical Background ................................................................................. 14
Details of the technologies to be used ....................................................... 14
How the project works................................................................................ 15
CHAPTER IV: METHODOLOGY
Methodology............................................................................................... 16
Locale .......................................................................................................... 16
Organizational Chart/Profile ....................................................................... 17
Operational Feasibility ................................................................................ 18
Fishbone Diagram ........................................................................... 18
Functional Decomposition Diagram ............................................... 19
Technical Feasibility .................................................................................... 20
Software Compatibility ................................................................... 20
Hardware Compatibility .................................................................. 20

vii
Relevance of the Technology .......................................................... 20
Schedule Feasibility..................................................................................... 21
Gantt Chart...................................................................................... 21
Economic Feasibility.................................................................................... 22
Cost-Benefit Analysis ...................................................................... 22
Requirements Modelling ............................................................................ 23
Inputs, Process, Outputs ................................................................. 23
Data and Process Modelling ....................................................................... 24
Context Diagram ............................................................................. 24
Data Flow Diagram .......................................................................... 25
System Flowchart ............................................................................ 26
Program Flowchart ......................................................................... 27
Object Modelling......................................................................................... 28
Use Case Diagram ........................................................................... 28
Class Diagram .................................................................................. 29
Sequence Diagram .......................................................................... 30
Activity Diagram .............................................................................. 31
Entity Relationship Diagram ........................................................... 32
Data Dictionary ............................................................................... 33
Development............................................................................................... 35
Software Specification .................................................................... 35
Hardware Specification ................................................................... 36
User Interface ................................................................................. 37
REFERENCES ............................................................................................................ 46
APPENCICES ............................................................................................................ 49
Appendix A. Source Code ............................................................................ 50
Appendix B. Communication Letters........................................................... 51
Appendix C. Minutes During Final Oral Defense ......................................... 54
Appendix D. Pre-Proposal Statement Template ......................................... 55
Appendix E. Working Title Form ................................................................. 57
Appendix F. Grammarian’s Certificate........................................................ 58
CURRICULUM VITAE ............................................................................................... 59

viii
LIST OF TABLES
Table Title Page
1 Gantt Chart ....................................................................... 21
2 Cost-Benefit Analysis ........................................................ 22
3 Inputs, Process, Outputs ................................................... 23
4 Data Dictionary ................................................................ 33
5 Software Specification ...................................................... 35
6 Hardware Specification ..................................................... 36

ix
LIST OF FIGURES
Figure Title Page
1 Theoretical Framework of the Study ................................ 9
2 Conceptual Framework of the Study ................................ 12
3 Organizational Chart/Profile ............................................ 17
4 Fishbone Diagram ............................................................. 18
5 Functional Decomposition Diagram ................................. 19
6 Gantt Chart ....................................................................... 21
7 Cost and Benefit Analysis .................................................. 22
8 Requirement Modeling ..................................................... 23
9 Context Diagram ............................................................... 24
10 Data Flow Diagram ........................................................... 25
11 System Flowchart ............................................................. 26
12 Program Flowchart ........................................................... 27
13 Use Case Diagram............................................................. 28
14 Class Diagram ................................................................... 29
15 Sequence Diagram ............................................................ 30
16 Activity Diagram ............................................................... 31
17 Entity Diagram .................................................................. 32
18 Sign in Page ...................................................................... 37
19 Analytics Page................................................................... 38
20 Scanner Page .................................................................... 39
21 Borrower Page .................................................................. 40
22 Add Borrower Page ........................................................... 41
23 Items Page ........................................................................ 42
24 Add Items Page ................................................................. 43
25 Transactions Page ............................................................ 44
26 Inventory Logs Page ......................................................... 45

x
CHAPTER I
INTRODUCTION

Project Context
In the modern world, filled with constant and overflowing tasks, technology is
one of the most effective ways to do things more efficiently, easily, and quickly. In that
way, people will eventually finish their jobs with less hassle and maximize their time,
especially in educational operations such as proposals or agreements, approvals,
activities, etc. It could provide an efficient and effective exchange of information,
including materials. Technology like the Barcode is beneficial due to its utilization
process, mainly when recording crucial transactions or agreements compiled as
evidence to support a particular claim or documentation for a specific institution
where one can immediately access and manage tasks simultaneously.
According to Panganiban & Bermusa (2020), most working environments
require an inventory system, whether manual or computerized. This process in their
workplace is critical to tracking their activities, including raw materials, office supplies,
goods, and other tangible things. The inventory system is used for predictability to
ensure accurate demand forecasting; demand fluctuations require agile strategies.
Reliable supply chains minimize disruptions, and price protection guards against cost
fluctuations. Discounts influence demand and turnover rates, demanding careful
integration into sales strategies for optimal inventory control and customer
satisfaction. Inventory can be made of the work-in-process, raw materials, and
finished goods to help with inventory, quantity, and proper formatting, as well as in
receiving reports promptly and providing a better and exclusive communication
method.
By embracing technology, we can swiftly navigate through past events and
effectively plan future activities, a challenge many of us face in preserving vital
information. The proposed solution is not just a service, but a beacon of hope,
enabling you to easily locate and track the equipment crucial for your work or
experiments. This will prove invaluable for future references, providing a clear record
of equipment usage and availability, thereby preventing conflicts and ensuring
efficient use of resources.
1
The primary purpose of this research is to assist the faculties, staff, and
students in utilizing their work and to provide an immediate and less hassle course of
action when the time for the use of laboratory equipment is urgent. Your role in this
process is crucial, as your feedback and cooperation will help us refine and improve
the proposed solution. Due to the frequent equipment demands, it has been observed
that there needs to be more clarity and disorganized management when using a
particular piece of equipment. Consequently, the researchers working on this thesis
devised a solution to the abovementioned problem. The action taken from this point
was to utilize an existing blueprint for accuracy in organizing the system to address
the inventory stipulation, including monitoring laboratory equipment.

Through our research, we've come to understand the paramount importance


of an efficient sequence of order, securing and managing the institution's personal
property. We've also recognized the impact of both contained phenomena, such as
efficient inventory management leading to cost savings, and disordered phenomena,
such as misplaced or lost equipment leading to delays and additional costs. But what's
equally important is your comfort and understanding in dealing with these
occurrences. That's why we're emphasizing the importance of user-friendly systems
and clear communication, to ensure you feel confident and reassured in the proposed
solution.
The overall aim is to prioritize and give importance to every property that
demonstrates an imperative detail and contributes to the efficacy of learning
attainment. The objective is to display the advantages of a categorized label that will
aid the possible negative impact in all aspects of work.

2
Objectives of the Project
Objectives
The objectives of this study are to:
● Assist faculties and staff in efficiently utilizing laboratory inventory
management.
● Provide an immediate and less hassle course of action for urgent use of
laboratory items.
● Address difficulty, confusion, and disorganized management in item
usage.
● Address inventory security and monitor laboratory items.
The proposed system will make the borrowing of laboratory items a breeze,
especially for students, faculties, and staff within the campus. Its user-friendly
interface and efficient processes will ensure a smooth borrowing experience,
enhancing the overall efficiency of the laboratory operations.

Scope and Limitations

Scope
This system, designed specifically for the CSIT Laboratory Inventory and
Monitoring System, will empower you, the OIC, to revolutionize inventory
management in the CSIT laboratory and borrowing service at NORSU Bais Campus 1.
Operated by a Barcode scanner, it will enable you to efficiently track and control
laboratory equipment. You can access stock information through a Barcode scanner
and mobile devices with scanning capabilities, putting you in control of the system's
efficiency and maintenance. This will lead to streamlined operations and improved
resource utilization, all under your guidance.
Limitations
This system’s accuracy depends on the correct placement of barcodes on stock
items and may be affected by human errors. Any additional feature enhancements to
the system will not be accommodated further.

3
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES
Related Literature
Block Chain Based Inventory Management by QR Code Using Open CV
Inventory management is a part of the supply chain where inventory and stock
quantities are tracked in and out of the stockroom. Proper inventory handling will lead
to successful supply chain management in any organization. QR codes make this
inventory management speedy. This fast information transfer will also reduce the
number of errors in inventory records and give accurate results to make informed
decisions during frequent reviews (Lakshmi et al., 2021).
An Innovative Approach to Developing a Multi-Domain Lab Inventory Management
System (LIMS)
Tracking field and laboratory samples and their associated data has long been
a desired tool for resource managers and researchers. Several proprietary software
platforms exist to assist with these tasks. However, their annual licensing costs,
coupled with the often narrow types of trackable samples (e.g., DNA or chemical
analyses only), make using proprietary software untenable. Wyoming Lab Inventory
Management System (WyoLIMS) was developed as an end-to-end system of software
and hardware designed to capture and track data from the initial sample collection
through each subsequent analysis, and after research has long since concluded,
regardless of the sample origin or types of laboratory analyses run. Samples may have
many relational types as they can be separated, replicated, aggregated, and destroyed
(Nicholas W Case. 2022).
Development of an Automated Laboratory Assets Inventory Control with Security
System
This study is developing an automated laboratory asset with an inventory
system and security features using passive Radio Frequency ID (RFID). The RFID, in
combination with barcode, is used for logging in and log-borrowed equipment during
laboratory and non-laboratory or research classes. With the automated system, the
dispensing process is reduced. A real-time inventory of equipment and utilization
reports are easily generated and accessed by authorized personnel. From the manual
system with a cycle time process of 15.45 minutes for dispensing of equipment, the

4
dispensing time was reduced to 2.92 minutes, and 5.17 minutes of returning of
equipment to 4.54 minutes, which are 81.10% and 12.19% improvement, respectively.
The inventory report requires a day to prepare and is generated in a minute. A user-
interface survey was deployed to the students to determine the system's
acceptability. Sixty respondents had high acceptability regarding user interface,
usefulness, and ease of use. The system has been tested for three semesters in the
Engineering Laboratory (Evelyn Raguindin et al., 2019).
Design of Smart Inventory Management System for Construction Sector Based on IoT
and Cloud Computing
Monitoring and managing raw materials and goods consumption in any
manufacturing industry is vital to operational sustainability and profitability. Given the
current state of global competition, manufacturing industries are almost always
looking for an inventory management system to help curtail costs and reduce the time
required to supply raw materials and goods to produce quickly and efficiently.
Therefore, it is paramount that continuous improvements be carried out to existing
inventory management designs to stay relevant (Rajesh Bose et al., 2022).
A Systematic Review on Android-Based Platform for Smart Inventory System
An effective inventory system can help prevent stockouts, manage different
locations effectively, and maintain accurate records in a business. Nowadays,
digitalization is a critical component of business operations. Digitalization is
implementing new digital technology into all aspects of a company's operations,
significantly changing how the business operates. A systematic mapping has been
performed on an Android-based innovative inventory system using digitalized
barcoding technology. The mapping is done by systematically analyzing related
research areas on barcode and inventory systems (Abdul Rahman et al., 2023).
Foreign Studies
A Robust Stochastic Decision-making Model for Inventory Allocation of Surgical
Supplies to Reduce Logistics Costs in Hospitals: A case study
In a hospital, surgical supplies can be stored in multiple locations, each with
limited space and different associated costs. The locations include central storage,
where items are retrieved to build a cart of supplies for each procedure; sterile storage
adjacent to the operating rooms; and within the operating rooms themselves. In

5
practice, allocating items to these locations is often based on the staff's experience
rather than through optimization methods. In this research, we have identified the
costs associated with each location to determine where each item should be stored
and in what quantities (E. Ahmadi et al., 2019).
In the study of Godichaud and Amodeo (2019), EOQ models with stock outs for
disassembly systems. Safety stock determines how much inventory is needed during
the Grace period to meet the demand. Inventory management can play a positive role
in small firms' growth. This has brought essential messages that the input markets and
the business environment in Vietnam have yet to stimulate economic activities, so
they exploit and create additional financial resources, such as borrowing, to
consolidate their endogenous resources (Park et al., 2020). "Government support and
small- and medium-sized enterprise (SME) performance: the moderating effects of
diagnostic and support services.
Design and Implementation of An Online Inventory Monitoring System
A significant part of Inventory Management is inventory monitoring. In recent
years, many inventory management systems have been created. These frameworks
allow stocks of products and items put away in amasses to be taken up. It is essential
to track the inventory, which is where inventory control systems come in. In some
current inventory management systems, the inventory information and monitoring
systems are coordinated and sent together at a fixed point at store locations. This
strategy does not facilitate efficient monitoring of stock levels and sales records
because a store manager can monitor the stock on-site despite managing more than
one store most of the time (Sulihat Ibrahim-Imam, 2020).
Local Studies
Development of a Hotel Inventory System through Agile Methodology
This paper presents the daily inventory experience of Hotel ABC, the problems
with their business operations, and the researchers' solutions to their problems.
Because Hotel ABC does not have an automated inventory system, all its data and
records are manually stored in Excel sheets or handwritten on paper. All inventory
processes are generally taken care of by the accounting department, which results in
a bottleneck in their operations. Another area for improvement is the delayed
generation of inventory reports. To solve the current problems, the researchers

6
proposed a hotel inventory system. The goal of the inventory system is to reduce the
inaccuracy and loss of data and eliminate the bottleneck in the hotel's daily
operations. (Alexis Janmarie Diaz et al., 2021).
Related Studies
The locations include central storage, where items are retrieved to build a cart
of supplies for each procedure; sterile storage adjacent to the operating rooms; and
within
the operating rooms themselves. In practice, the decision to allocate items to these
locations is often based on the staff's experience rather than through optimization
methods. In this research, we have identified the costs associated with each location
to determine where each item should be stored and in what quantities (E. Ahmadi et
al., 2019).
According to Faizah Zailani (2020), in line with technological advances, this
paper proposed smartphone-based QR codes to record staff presence in the Electrical
Engineering Department. The proposed system used a QR code to identify individuals
working in the department and a smartphone as a QR code mobile scanner. Each
Electrical Engineering Department staff card will be equipped with a unique QR code.
The QR code mobile application scanner interface was designed based on a real-time
scanner using MIT Apps Inventor software. The integration of Google Apps Script
applications and the Android Barco. The developed QR Code Attendance System is
efficient as it has portable scanners and database systems that management can
access online. An accurate report based on staff attendance can also be generated
quickly using Google Sheets. However, it's important to note that the system may
require initial setup and training, and there could be potential issues with smartphone
compatibility or network connectivity. Therefore, the staff attendance monitoring
system will be more effective and easier to control, but these factors should be
considered during implementation.
Safety stock determines how much inventory is needed during the Grace
period, a specific time frame after the demand is placed and before the new stock
arrives, to meet demand (Godichaud & Amodeo, 2019). This period is crucial in
ensuring uninterrupted supply and customer satisfaction. Inventory management can
play a positive role in small firms' growth. It has brought important messages that the

7
input markets and the business environment in Vietnam have yet to stimulate
economic activities, so they exploit and create additional financial resources, such as
borrowing, to consolidate their endogenous resources (Park et al., 2020).
Let's consider the daily inventory experience of Hotel ABC. The problems with
their business operations include the lack of an automated inventory system, leading
to all data and records being manually stored in Excel sheets or handwritten on paper.
This manual process is time-consuming and prone to errors. All inventory processes
are generally taken care of by the accounting department, which results in a
bottleneck in their operations. Another area for improvement is the delayed
generation of inventory reports, which hampers timely decision-making. To solve
these current problems, the researchers proposed a hotel inventory system. The goal
of the inventory system is to reduce the inaccuracy and loss of data by automating the
inventory tracking process and eliminate the bottleneck in the hotel's daily operations
by allowing different departments to access and update inventory data in real-time
(Alexis et al., 2021).

8
Theoretical Framework of the Study

Figure 1. UTAUT Model


The UTAUT Model, or Unified Theory of Acceptance and Use of Technology, is
a comprehensive framework for explaining user perceptions and acceptance behavior
in technology adoption (Venkatesh et al., 2003). It was developed based on a synthesis
of eight prominent technology acceptance theories and has been widely used in
various industries, including the growth of an e-commerce sector, emerging digital
technologies, such as big data, Artificial Intelligence, cloud computing and robotics,
drive the implementation of new technologies in organizations (Verhoef et al., 2021).
According to this theoretical model, actual technology usage is influenced by
behavioral intention, which is, in turn, determined by the direct impact of four critical
constructs: performance expectancy, effort expectancy, social influence, and
facilitating conditions. Additionally, the influence of these predictors is moderated by
individual factors such as age, gender, experience, and voluntariness of use
(Venkatesh et al., 2003).
Performance expectancy, a key concept in the UTAUT model, refers to the
belief that using a system will enhance job performance. This is a unique feature of

9
the UTAUT model, distinguishing it from other technology acceptance theories such
as Venkatesh et al. planned to extend the UTAUT model with new constructs, tackling
behavioral and attitudinal determinants of the utilization of technology in the non-
organizational context (Venkatesh, Thong & Xu, 2012). Rooted in various technology
acceptance theories, including TAM, TAM2, CTAMTPB, MM, MPCU, IDT, and SCT, it
encompasses factors like perceived usefulness, extrinsic motivation, job fit, relative
advantage, and outcome expectations. This expectancy is a robust predictor of usage
intention in voluntary and mandatory settings. Effort expectancy, denoting the ease
of system use, is another UTAUT construct. It diminishes in significance after
prolonged technology use. Social influence gauges the impact of others' perceptions
on system use, especially in mandatory contexts. Facilitating conditions reflect the
belief in organizational and technical support for system use. Moderating factors such
as age, gender, experience, and voluntariness of use influence the strength of
predictors on intention. UTAUT, comparing prominent technology acceptance
theories, demonstrates significant predictive power, accounting for 70 percent of the
variance in use intention. The model underscores the interactive complexities
involving personal and demographic factors in the technology acceptance process.
By applying the UTAUT model to an Inventory Management and Monitoring
System, you can gain valuable insights into the factors that influence user acceptance
and utilization. This process involves starting by identifying stakeholders and defining
the technology being introduced. Analyze data to identify patterns and address
barriers while leveraging enhancers. Develop a clear implementation plan with
training and support mechanisms in place. Continuously monitor and evaluate the
adoption process, adjusting as needed. Celebrate successes and communicate
benefits to reinforce positive outcomes. This structured approach ensures a smooth
transition and maximizes the benefits of technology adoption within the organization,
which can lead to more effective implementation strategies, improved user
experiences, and, ultimately, enhanced system performance.
By leveraging the UTAUT model, one can significantly enhance staff
acceptance and utilization of an inventory management and monitoring system. This
model highlights the core factors influencing user experience, such as Performance
Expectancy, where staff believe the system improves tasks. Functionalities like real-

10
time stock levels, automatic reordering suggestions, and stock analysis can address
this, leading to a more efficient operation and a significant reduction in stockouts.
Effort Expectancy emphasizes a user-friendly system with a straightforward interface,
easy navigation, and intuitive data entry. By leveraging these insights, users can
empower their staff to embrace and utilize the system more effectively.
Social influence plays a crucial role in the successful adoption of the system.
Observing colleagues successfully using the system and receiving positive feedback
from managers can significantly encourage wider adoption. Training sessions
showcasing best practices can leverage this to promote benefits. Facilitating
Conditions ensure staff trust the system's reliability, data security, and seamless
integration with existing workflows. Reliable data backups, explicit access control, and
compatibility with other business systems are crucial. UTAUT also considers additional
constructs: Habit, where regular use becomes ingrained in daily routines for optimal
efficiency. Technology Anxiety is minimized through clear instructions, readily
available help resources, and user-friendly interfaces to address concerns of users
with varying technical skill sets.
Finally, Perceived Biased Treatment ensures the system is perceived as fair and
unbiased in task automation or data presentation. This fosters staff trust in the
information provided and avoids feelings of being replaced by technology. By aligning
the inventory management and monitoring system with these UTAUT considerations,
institutions can achieve significant benefits such as increased staff productivity,
improved inventory accuracy, enhanced decision-making through data-driven
insights, and reduced costs through optimized stock levels. However, it's important to
note that implementing the UTAUT model can also pose challenges, such as resistance
to change and the need for additional training. Regular user feedback and system
updates based on usage patterns will ensure continuous improvement and maximize
the system's effectiveness over time. We will work closely to address these challenges
and ensure a smooth implementation process.

11
Conceptual Framework

INPUT

• Equipment
• Barcode
• Barcode Scanner
• Execution Difficulties
• Alignment
• Clarity
• Devices Penetration
• Incompatible
• Malfunction

PROCESS
WATERFALL MODEL

Requirement & Analysis

Design

Implementation

Testing

Deployment

Maintenance

OUTPUT

COMPUTER LABORATORY INVENTORY AND MONITORING SYSTEM


FORCOMPUTER SCIENCE AND INFORMATION TECHNOLOGY
DEPARTMENT

Figure 2. Conceptual Framework of the Study

12
This conceptual framework presents a comprehensive and systematic
approach to enhancing inventory management and laboratory efficiency. It begins
with inputs such as barcode equipment and scanners, taking into account potential
execution difficulties like alignment and clarity and issues with device penetration
such as incompatibility and malfunction. The process involves intensified system
penetration, followed by data collection, organization, analysis, and interpretation,
leading to findings, results, and conclusions. The outputs of this framework include
improved inventory accuracy, streamlined procurement processes, reduced inventory
costs, enhanced visibility of inventory, refined laboratory efficiency, and timely actions
to address identified issues and opportunities for improvement.

The waterfall model is a linear security assessment process: identify


vulnerabilities (penetration testing), collect data, organize it, analyze it, interpret the
findings, and draw conclusions.

13
CHAPTER III
TECHNICAL BACKGROUND
The CSIT Laboratory Inventory and Monitoring system is powered by a local
web server development tool, a robust solution that grants access to a web portal via
any web browser on computers or laptops. The project incorporates a range of
technical terms, each chosen for its efficiency and effectiveness. These include VS
Code: Text Editor, Server-client side: PHP, HTML, CSS, Database: Xampp, MySQL, and
Functionality: Web application, PhpMyAdmin. Each of these terms represents a
technology carefully selected for its role in the project's success.
Details of the technologies to be used
This project is designed to be accessible across a variety of platforms, including
mobile phones, laptops, and computers running the system. The technology tools
used in developing the project are equally versatile, ensuring the system's adaptability
and usability.
VS Code – Visual Studio Code (VS Code) is a versatile code editor used by front-
end and back-end developers. In the development of the system, we used Visual
Studio Code to encode the source code system to be the accurate and fast acquisition
of data and information.
PHP – is a server-side scripting language primarily used for web development.
PHP is widely used to create dynamic web pages, handle form data, interact with
databases, and perform server-side tasks.
Xampp – provides a user-friendly way to set up a local server environment on
a computer. Developers will find this tool intuitive and easy to use, allowing them to
develop and test web applications without the need for a live internet connection.
MySQL – is an open-source relational database management system and one
of the system development-compatible databases. This means that it can seamlessly
integrate with other technologies used in the CSIT Laboratory Inventory and
Monitoring system, ensuring smooth data management and retrieval.
HTML – is the standard markup language used to create and design documents
on Web pages. It is the backbone of web content, providing the structure and
semantics. HTML uses tags to define elements within a document, specifying
headings, paragraphs, links, images, tables, and other components.

14
CSS – Cascading Style Sheets, is used for styling and visually formatting HTML
documents. The layout of Web pages is used to define text styles, table sizes, and
other aspects of Web pages that previously could only be in a page's HTML. CSS helps
Web developers create a uniform look across several pages of a Web site.
Bootstrap – is a popular front-end framework for web pages. It is used to
design and build the graphical user interface of web-based applications.
JavaScript is a versatile programming language primarily used to create interactive and
dynamic website content. It allows developers to create pop-ups, drop-down menus,
animations, and user-friendly interfaces.
How the project works
After granting permission for the requested equipment from the students, the
laboratory staff will now record the borrowed items via a scanner device, which scans
the Barcode from the laboratory's equipment printed poster and inputs the exact
quantity of the borrowed item. The scanning and input process is repeated for any
additional items. Once the Barcode scan and quantity input are complete, the system
will provide a form for the staff to fill out the borrower's contact details, such as name,
year, course, and contact number. Upon form completion, the system records all
scanned and input data about borrowed items and their respective borrowers.

15
CHAPTER IV
METHODOLOGY

This chapter presents the methods and procedures for the thesis
project. The proponents conducted descriptive qualitative methods including
interviews, focus groups, observations, document analysis, and case studies.
Locale
In 1907, Governor Hermenegildo Villanueva proposed industrial arts education
at Negros Oriental Provincial School (NOPS), a precursor to Negros Oriental High
School (NOHS), marking the origins of Negros Oriental State University. It led to the
addition of woodworking to the curriculum. In 1927, the woodworking class evolved
into Negros Oriental Trade School (NOTS), gaining its campus in 1932. Closed during
WWII, NOTS reopened in 1946, becoming co-educational in 1950. Renamed East
Visayan School of Arts and Trades (EVSAT) in 1956, it expanded its technical
curriculum. EVSAT later offered teacher education and graduate programs. In 1983, it
merged with other institutions, including Genaro Goñi Memorial College in the City of
Bais, Siaton Community College in the Municipality of Siaton, and Mabinay Institute
of Technology in the Municipality of Mabinay, to form Central Visayas Polytechnic
College (CVPC). Dr. Marcelo C. Jalandoon led CVPC through post-martial Law
challenges. Dr. Henry A. Sojor, appointed in 1991, prioritized academic development.
By 2004, CVPC transformed into Negros Oriental State University (NORSU), integrating
the three mentioned colleges. Presently, Dr. Joel P. Limson leads the university.

16
Organizational Chart/Profile

Figure 3. Organizational Chart of the College of Arts and Sciences


The figure above shows the hierarchy of the College of Arts and Sciences positions,
from the college's dean down to instructors.

17
Operational Feasibility
Evaluating user acceptance, workflow integration, training requirements,
resource allocation, and the system's impact on performance. By conducting this
assessment, they ensure that the proposed system is practical, beneficial, and
conducive to achieving operational objectives.
Fishbone Diagram

Process People

Lost of inventory record.


Inefficient scanning workflows
leading to delays.

LABORATORY
INVENTORY AND
MONITORING
SYSTEM

Insufficient storage conditions.


Equipment malfunction
affecting data accuracy.

Environment
Equipment

Figure 4. Fishbone Diagram


The figure above addresses factors such as staff training, equipment selection,
label quality, and procedural clarity. By addressing these factors, laboratories can
optimize barcode scanning processes and enhance overall inventory management
capabilities.

18
Functional Decomposition Diagram

COMPUTER LABORATORY INVENTORY AND


MONITORING SYSTEM FORCOMPUTER SCIENCE
AND INFORMATION TECHNOLOGY
DEPARTMENT

LOGIN

ADMIN

TRANSACTION INVENTORY
ANALYTICS SCANNER BORROWERS ITEMS
S LOGS

ADD
ITEMS BARCODE ID ADD PRODUCT SEARCH PRINT
BORROWER

BORROWER ITEM SEARCH SEARCH RETURN EXCEL

TRANSACTIONS ITEM DETAILS EDIT BARCODE PDF

INVENTORY
BORROWER DELETE ADD QUANTITY SEARCH
LOGS

QUANTITY EDIT

DELETE

Figure 5. Functional Decomposition Diagram


The diagram above shows the Laboratory Inventory and Monitoring System for
the Computer Science and Information Technology (CSIT) Department's computer
Laboratory. The admin/faculty and staff can process the students' request
transactions.
A Functional Decomposition Diagram (FDD) shows the breakdown structure of
a system's components. The researchers developed it after studying the data gathered
in the feasibility and planning phases. It would help track the system's functionality
and identify the features added to it.

19
Technical Feasibility
Implementing a Laboratory Inventory and Monitoring System (LIMS) with
barcode scanners involves acquiring compatible hardware, such as scanners and
computers, and choosing suitable software for integration. It also includes designing
an easy-to-use interface and securing data through encryption and authentication.
Compatibility Checking (Hardware/software and other Technologies)
Verify that the selected barcode scanners are compatible with the chosen
computing devices and can communicate effectively. Additionally, the LIMS software
must be capable of integrating seamlessly with both the barcode scanning hardware
and any other required technologies, such as label printers or database management
systems. Conducting thorough compatibility checks during planning helps prevent
technical issues and ensures smooth system operation.
Relevance of Technologies
Choosing hardware and software that fit the lab's needs and goals, like
compatible barcode scanning systems. Emerging options, such as cloud-based
solutions or mobile apps, can boost accessibility and scalability. By selecting the right
technologies, labs can ensure the system works efficiently and meets their
requirements effectively.

20
Schedule Feasibility
Table 1
Gantt Chart
2023 2024
Task
Sept Oct Nov Dec Jan Feb Mar Apr
Creating Title
(September 16)
Presentation of
Proposed Title
Title Defense
(October 26)
Revision of
Correction
Passing Of Chapter
1-3
Continuation of
Doing a System
Discussion of the
System
Finalization and
Finish Product of
the System
Chapter IV
Scheduling of Final
Defense
Final Defense

Figure 6. Ghantt Chart


The figure above shows the display tasks scheduled over time.

21
Economic Feasibility
Table 2
Cost Analysis
DEVELOPMENTAL COST
ITEM PRICE
Scanner 750
Printer 8,000
Developmental Labor 2,500
Computer Set 24,000
Total 35,250

Figure 7. Cost and Benefit Analysis


The figure above shows financial viability by comparing the expected costs
against the anticipated benefits.

Benefit Analysis
1. Improved Service
2. Easy Data Access
3. Information Security
4. Fast Navigation
5. Storage-wise

22
Requirements Modeling
A thorough finding describes the current system and identifies the
requirements for the new system, such as Input, Process, Output, Performance,
Control, and Data and Process Modelling.
Table 3

Input Process Output

• Equipment • Conducting of COMPUTER


Intensified
System LABORATORY
• Barcode Penetration INVENTORY AND
• Barcode Scanner
• Collecting of Data MONITORING SYSTEM
FOR COMPUTER
• Organizing of
• Execution
Data SCIENCE AND
Difficulties
• Analyzing of Data INFORMATION
TECHNOLOGY
• Alignment • Interpreting of
Data DEPARTMENT
• Clarity
• Findings
• Devices
• Results
Penetration • Conclusion

• Incompatible Figure 8. Requirements Modeling


• The
Malfunction
figure above shows how to gather and analyze user requirements to create
a detailed blueprint that guides the development and ensures the final product meets
the intended goals and functionalities.

23
DATA AND PROCESS MODELLING
Context Diagram

LABORATORY
Inventory Status Item Information INVENTORY
INFORMATION
SYSTEM

Admin

Transaction Receipt

Figure 9. Context Diagram


The figure above shows the interactions between a system and other actors
(external factors) with which the system is designed to interface.

24
Data Flow Diagram

Save Scan Item


Borrower Borrower’s Barcode
Information Input Information
Item Barcode

Print Process Item


Receipt Transaction Preferenc
es

Figure 10. Data Flow Diagram


Figure 10 illustrates how a system processes data in terms of inputs and outputs.

25
System Flowchart

Figure 11. System Flowchart

The figure shows how parts of a system work together by displaying how data
flows through the system and how decisions affect this process.

26
Program Flowchart

START

SYSTEM
INITIALIZATION

BARCODE
SCAN

ITEM
IDENTIFICATION

ITEM
MODIFICATION

STORE AND
ANALYZE

PRINT
RECEIPT

STOP

Figure 12. Program Flowchart


Figure 12 describes the visualization tool used when creating a new program
to understand a process, workflow, or algorithm.

27
Object Modelling
Use Case Diagram

LOGIN

ADMIN

ANALYTICS

SCANNER

BORROWERS

ITEMS

TRANSACTION
S

INVENTORY
LOGS

Figure 13. Use Case Diagram


The figure above shows a graphical depiction of a user's interactions with the
system.

28
Class Diagram

Admin

Borrower
-username: String
-password: String
-name: String
-number: int
+view_analytics()
-itemscanned: String
+scanner()
+view_borrowers()
+receipt()
+view_items()
+edit_items()
+view_transactions()
+update_inventorylogs()

Items

-itembarcode: String
Printing
-itemname: String
-itemdescription:
-borrowerinfo:
String
String
-qty: int
-date: Date
-item: String
+ModifyItem()

+print()

Figure 14. Class Diagram


The figure shows a system's structure by showing its class systems, operations
(or methods), and relationships among objects.

29
Sequence Diagram

BORROWER SYSTEM APPLICATION RESULT


INTERFACE

Scan Barcode
Get Detail

Modify Item

Submit Item

Print Receipt

Figure 15. Sequence Diagram


The figure above illustrates an interaction diagram because it describes how—
and in what order—a group of objects works together.

30
Activity Diagram

LOGIN

False

Login successful? True

ADMIN

PROCEED TO

SCANNER

BORROWERS

ITEM

TRANSACTION

INVENTORY LOGS

Figure 16. Activity Diagram

The figure above represents the workflow and how objects interact with each
other.

31
Entity-Relationship Diagram

Figure 17. Entity Diagram

Figure 17 illustrates how “entities” such as people, objects, or concepts relate


to each other within a system.

32
Data Dictionary
Table 4

Data Description

An Entity Relationship Diagram (ERD) is a visual


representation of how entities or concepts relate to
each other in a database or application. ERDs are also
Entity-Relationship known as entity relationship models. Business analysts
Diagram often use them to understand business domains, clarify
terminology, and connect business concepts to database
structures.

These are the fundamental building blocks of an ERD,


representing real-world objects or concepts you want to
Entities store data about. Examples include "Customer" in a sales
database or "Product" in an inventory system. They are
depicted as rectangles in the diagram.
These are the specific characteristics that define an
entity. Each entity has a set of attributes that capture its
properties. For instance, a "Customer" entity might
Attributes
have attributes like "Customer ID," "Name," "Address,"
and "Email." Attributes are shown as ovals within the
entity rectangle.

Key A key uniquely identifies an entity instance within a


table. There are different types of keys:
Each entity should ideally have a primary key, which is a
minimal set of attributes that uniquely identifies each
Primary Key (PK)
instance. A table can only have one primary key, which I
often denoted as "PK" within the ERD.

An alternate key is another set of one or more attributes


Alternate Key (AK)
that can also uniquely identify an entity instance. A t le

33
can have multiple alternate keys, offering different ways
to find specific data.

This describes the association between two entities. For


example, an "Order" entity might have a "placed by"
Relationship relationship with a "Customer" entity. Relationships are
represented as diamonds connecting entities in the
diagram.

Cardinality defines the number of occurrences of one


entity about another entity within a relationship. There
are various cardinalities like:

One-to-One (1:1):One instance of


entity A relates to one example of
entity B (e.g., a student can have one ID
card, and an ID card belongs to one
student).
One-to-Many (1:N): One instance of
entity A relates to many instances of
entity B (e.g., a customer can place
Cardinality
many orders, but an order belongs to
one customer).
Many-to-One (N:1): Many instances
of entity A relate to one example of
entity B (e.g., many courses can be
taught by one instructor, but an
instructor teaches multiple classes).
Many-to-Many (N:N): Many instances
of entity A relate to many instances of
entity B (e.g., a student can enroll in
many courses, and a course can have
many students enrolled).

34
Development

Software Specification
Table 5
SOFTWARE USE

VS Code Encodes and debugs the web application

XXAMP Used as the main source of connection to the system

Google Chrome Views and checks the system if it functions properly or not

MySQL Serves as the local database for the web application

HTML Serves as the interface of the web application and used as a


language markup developer
CSS Enhances the web application by adding styles and color

JAVA Script Enhances user interface which provides user instructions

PHP Used as a web application tool. Writes dynamically generated


pages that automatically connects to MySQL
Bootstrap Designs and develops a responsive web application

Table 4 below shows the specification of software and its uses.

35
Hardware Specification
Table 6
HARDWARE SPECIFICATION

Barcode Scanner Small/Portable

Computer Set/Laptop Operating System at least Windows 10 and above


RAM at least 1 GB of Memory to 2 GB
HDD at least 250 GB
Processor at least i3
Printer Inkjet printing technology
Multi functioning printer type

Table 5 below shows the specification of software and its uses.

36
User Interface

Figure 18. CSIT Laboratory Inventory System Sign in Page

The figure above displays the CSIT Laboratory Inventory System Sign-in Page,
where the authorized Admin inputs the username and password.

37
Figure 19. Dashboard/Analytics Page

The figure above shows the Dashboard/Analytics Page. In the sidebar side bar
design, you can see the features where the Admin selects a particular process for
controlling and managing the borrowing.

38
Figure 20. Scanner Page

The figure above shows the system's Scanner Page, where the sidebar scans
the item's barcode to automatically fill out the necessary details and see today's
transactions.

39
Figure 21. Borrowers Page

The figure above shows the system's Borrowers Page, where the Admin can
see the list of borrower names and other details.

40
Figure 22. Add Borrower Page

The figure above shows the Add Borrower Page of the system, where the
Admin will input the name and other details of the laboratory's new borrower/s.

41
Figure 23. Items Page

The figure above shows the system's Items Page, where the Admin can see the
list of items and other details of them.

42
Figure 24. Add Items Page

The figure above shows the Add Items Page of the system, where the Admin
will input the name and other details of the laboratory's new item/s.

43
Figure 25. Transactions Page

The figure above shows the system's Transactions Page, all the transactions
that happened, and the status of the item that has already been returned or not yet.
See other details. Also, the Admin can search for specific transactions.

44
Figure 26. Inventory Logs Page

The figure above shows the Inventory Logs Page of the system, which displays
the accurate and complete logs of the CSIT Laboratory Inventory System.

45
REFERENCES
Abdul Rahman, Ahmad Jefiruddin (2023). A Systematic Review on Android-Based
Platform for Smart Inventory System. Retrieved from
https://journal.ump.edu.my/ijsecs/article/view/8816

Ahmadi, Masel, T., & Hostetler. (2019). A robust stochastic decision-making model for
inventory allocation of surgical supplies to reduce logistics costs in hospitals: A case
study. Retrieved from https://bit.ly/4canECG

Alexis Janmarie Diaz, Thea Patrice Tajonera, Christel Anne Vallestero (2021).
Development of a Hotel Inventory System through Agile Methodology. Retrieved from
https://bit.ly/3RCcxKM

Bose, Mondal, Sarkar, & Roy. (2022). Design of smart inventory management system
for the construction sector based on IoT and cloud computing. Retrieved from
https://bit.ly/4bdARJC

Diaz, T., Tajonera, C., Vallestero, R., & Cruz, R. (2021). Development of a hotel
inventory system through agile methodology. *Innovatus*, 4(1), 13-19. Retrieved
from https://doi.org/10.5281/zenodo.4641541

Evelyn Raguindin, Q., & Ronquillo, J. (2019). Development of an automated laboratory


assets inventory control with security system. Retrieved from
https://ieeexplore.ieee.org/abstract/document/9004395

46
Faizah Zailani (2020). QR Code Attendance System. Retrieved from
https://www.scribd.com/document/527707313/Qr-Code-Attendance-System

G. Vidhya Lakshmi, Subbarao Gogulamudi, Bodapati Nagaeswari, Shaik Reehana


(2021). Blockchain-based inventory management by QR code using OpenCV. Retrieved
from https://ieeexplore.ieee.org/abstract/document/9402666

Godichaud, M., & Amodeo, L. (2019). EOQ models with stockouts for disassembly
systems. Retrieved from https://bit.ly/4bcQLE7

Ibrahim-Imam, S. (2020). Design and implementation of an online inventory


monitoring system. Retrieved from http://portal.bazeuniversity.edu.ng

Nicholas, W. Case. (2022). An innovative approach to developing a multi-domain lab


inventory management system (LIMS). Retrieved from
https://www.proquest.com/openview/

Panganiban & Bermusa (2020). Simplified Barcode-Based Point Of Sales And Inventory
Management System With Replenishment Decision. Retrieved from
https://bit.ly/4cctWli

Park, S., Lee, I. H., & Kim, J. E. (2020). Government support and small and medium
sized enterprise (SME) performance: The moderating effects of diagnostic and support
services. Retrieved from https://bit.ly/3KSfgM7

47
Rahman, J., Jefiruddin, S., Zukarnain, A., & Zin, A. (2023). A systematic review on
Android-based platform for smart inventory system. Retrieved from
https://journal.ump.edu.my/ijsecs/article/view/8816

Rajesh Bose, Haraprasad Mondal, Indranil Sarkar, Sandip Roy (2022). Design of Smart
Inventory Management System for Construction Sector Based on IoT and Cloud
Computing. Retrieved from
https://www.sciencedirect.com/science/article/pii/S2772671122000237

Sulihat Ibrahim-imam (2020). Design and Implementation of An Online Inventory


Monitoring System Retrieved from https://bit.ly/4eAM1LM

Viswanath Venkatesh (2003). User Acceptance of Information Technology: Toward a


Unified View. Retrieved from https://bit.ly/3VvpVS5

48
A P P E N D I C E S

49
Appendix A
Relevant Source Code

For the Details of the source code, please refer to the soft copy of this
documentation.

50
Appendix B

Letters
Negros Oriental State University
COLLEGE OF ARTS AND SCIENCES
Campus I, Bais City

24 April 2024

MARILYN B. BELOIRA,
Subject: ORAL DEFENSE FOR THESIS PROJECT

On behalf of the College of Arts and Sciences, I am pleased to invite you to


serve as a chairwoman of evaluators for the Thesis Oral Defense of our BS Computer
Science students Entitled: “COMPUTER LABORATORY INVENTORY AND MONITORING
SYSTEM FOR COMPUTER SCIENCE AND INFORMATION TECHNOLOGY DEPARTMENT’’.
Your expertise and insight would be invaluable to the evaluation of our work.
The details of the thesis and the oral defense are as follows:
● Date and Time: 26, April 2024 at 10:00 am
● Place: AVR Room
We have attached the manuscript of the thesis and an evaluation sheet for
your review. Your participation as a panelist will significantly contribute to maintaining
the high standards of academic excellence in our program.
Thank you for considering this invitation. We look forward to your positive
response and your valued participation in the defense panel.

Sincerely,

AGUILAR, SYLVESTER O.
The Researcher

51
Negros Oriental State University
COLLEGE OF ARTS AND SCIENCES
Campus I, Bais City

24 April 2024

JETTY A. CASIDO,
Subject: ORAL DEFENSE FOR THESIS PROJECT

On behalf of the College of Arts and Sciences, I am pleased to invite you to


serve as a member of the panel for the Thesis Oral Defense of our BS Computer
Science students Entitled: “COMPUTER LABORATORY INVENTORY AND MONITORING
SYSTEM FOR COMPUTER SCIENCE AND INFORMATION TECHNOLOGY DEPARTMENT’’.
Your expertise and insight would be invaluable to the evaluation of our work.
The details of the thesis and the oral defense are as follows:
● Date and Time: 26, April 2024 at 10:00 am
● Place: AVR Room
We have attached the manuscript of the thesis and an evaluation sheet for
your review. Your participation as a panelist will significantly contribute to maintaining
the high standards of academic excellence in our program.
Thank you for considering this invitation. We look forward to your positive
response and your valued participation in the defense panel.

Sincerely,

AGUILAR, SYLVESTER O.
The Researcher

52
Negros Oriental State University
COLLEGE OF ARTS AND SCIENCES
Campus I, Bais City

24 April 2024

MICHAEL C. YLEAÑA,
Subject: ORAL DEFENSE FOR THESIS PROJECT

On behalf of the College of Arts and Sciences, I am pleased to invite you to


serve as a chairperson of evaluators for the Thesis Oral Defense of our BS Computer
Science students Entitled: “COMPUTER LABORATORY INVENTORY AND MONITORING
SYSTEM FOR COMPUTER SCIENCE AND INFORMATION TECHNOLOGY DEPARTMENT”.
Your expertise and insight would be invaluable to the evaluation of our work.
The details of the thesis and the oral defense are as follows:
● Date and Time: 26, April 2024 at 10:00 am
● Place: AVR Room
We have attached the manuscript of the thesis and an evaluation sheet for
your review. Your participation as a panelist will significantly contribute to maintaining
the high standards of academic excellence in our program.
Thank you for considering this invitation. We look forward to your positive
response and your valued participation in the defense panel.

Sincerely,

AGUILAR, SYLVESTER O.
The Researcher

53
Appendix C
Minutes During Final Oral Defense

Date: April 26, 2024


Time: 10:00 am
Presenter: Computer Science, Thesis 1
Sylvester O. Aguilar
Peter Gil B. Bustillo
Bernard A. Mapeso
Rinarged K. Ortega
Ruben C. Verbo III

“COMPUTER LABORATORY INVENTORY AND MONITORING SYSTEM FOR


COMPUTER SCIENCE AND INFORMATION TECHNOLOGY DEPARTMENT”

COMMENTS:
● Mrs. Beloira and Dr. Calumpang asks about the date and who is responsible
for the release.
● Mrs. Beloira discussed alphabetized references, waterfall model, bullets.
● Mr. Casido discussed about emphasize some additional of the system.
● Mr. Yleaña discussed some need to site of the references, Dr. Calumpang
congratulate everyone.

Noted by:

DR. ZENAIDA D. CALUMPANG


Subject Adviser PANEL:
MRS. MARILYN B. BELOIRA
MR. MICHAEL C. YLEAÑA
MR. JETTY A. CASIDO

54
Appendix D
Pre-proposal Statement Template
COMPUTER SCIENCE & INFORMATION TECHNOLOGY DEPARTMENT
CSC 402 / ITS 402 – Thesis Project 1
PROJECT TITLE: Computer Laboratory Inventory and
Monitoring System for Computer Science
and Information Technology Department
PROPONENTS/RESEARCHERS 1. Sylvester O. Aguilar
2. Peter Gil B. Bustillo
3. Bernard A. Mapeso
4. Rinarged K. Ortega
5. Ruben C. Verbo III

SCOPE OF THE STUDY This system only focuses on the CSIT


Laboratory Inventory and Monitoring
System which provides inventory
management in the CSIT laboratory and
borrowing service in NORSU Bais
Campus 1. The system will be operated
by Barcode scanner to track and control
of that laboratory equipment. The OIC
can access stock information through
Barcode scanner and mobile devices
with Barcode scanning capabilities.
Support will be provided to ensure the
efficiency of running and maintaining
the system.
LIMITATION OF THE STUDY This system’s accuracy depends on the
correct placement of Barcodes on stock
items and may be affected by human
errors. Any additional feature

55
enhancement with the system will not
be further accommodated.
PROJECT DESIGN/DEVELOPMENT PLAN
HARDWARE SPECIFICATION Barcode Scanner Small/Portable
Operating System at least Windows 10
and above
RAM at least 1 GB of Memory to 2 GB
HDD at least 250 GB
Processor at least i3
Inkjet printing technology
Multifunctioning printer type
SOFTWARE SPECIFICATION Windows 10 Or Higher, Xampp,
Chrome/Browser, C++, JavaScript, Vs
Code/Notepad++ And Php

56
Appendix E
Working Title Form
Project Working Title Form
Computer Science – CSC 402 – Thesis Project 1
Proponents/Researchers:
1. Sylvester O. Aguilar

2. Peter Gil B. Bustillo

3. Bernard A. Mapeso

4. Rinarged K. Ortega

5. Ruben C. Verbo III

Computer Laboratory Inventory and Monitoring System for


Computer Science and Information TechnologyDepartment
Proposed Project Title:
Submitted by: Noted by:

SYLVESTER O. AGUILAR DR. ZENAIDA D. CALUMPANG


Project Manager/Group Leader Subject Instructor
Date:___________ Date:_____________

Recommending Approval: Approved:

MRS. MARILYN B. BELOIRA DR. ZENAIDA D. CALUMPANG


Panel Member, CSIT Department OIC—Dean – College of Arts And Sciences
Date:___________ Date:_____________

MR. MICHAEL C. YLEAÑA MR. JETTY A. CASIDO


Panel Member, CSIT Department Panel Member, CSIT Department
Date:___________ Date:___________

57
GRAMMARIAN’S CERTIFICATE

This is to certify that the undersigned has reviewed and went through all the pages of
the thesis entitled “COMPUTER LABORATORY INVENTORY AND MONITORING
SYSTEM FORCOMPUTER SCIENCE AND INFORMATION TECHNOLOGY
DEPARTMENT” developed by SYLVESTER O. AGUILAR, PETER GIL B. BUSTILLO,
BERNARD A. MAPESO, RINARGED K. ORTEGA, RUBEN C. VERBO III, aligned with the
set of structural rules that govern the composition of sentences, phrases, and words
in the English language.

Signed:

Sheramie C. Reyes
English Critic

58
CURRICULUM VITAE

Name: Sylvester O. Aguilar


Address: Calasga-an, Bais City, Negros Oriental 6206
Email: [email protected]

EDUCATION:

College: Negros Oriental State University – Bais City Campus 1 (2020 - 2024)
Address: Sitio San Jose, Barangay 2, Bais City, Negros Oriental

Senior High School: Governor Julian L. Teves Memorial High School (2018 - 2020)
Address: Calasga-an, Bais City, Negros Oriental

High School: Governor Julian L. Teves Memorial High School (2014 - 2018)
Address: Calasga-an, Bais City, Negros Oriental

Elementary: Calasga-an Elementary School (2008 - 2014)


Address: Calasga-an, Bais City, Negros Oriental

SKILLS/INTEREST
- Photography
- Videography
- Editing Videos
- Baking/Cooking

TRAINING ATTENDED
- The NORSUnian – Bais Office
- NORSU Job Entry Skills Training (JEST)
- Events Management Services NC III Training
- Training in Microsoft Word, Excel and PowerPoint in St. Paul
University, Dumaguete City

59
CURRICULUM VITAE

Name: Peter Gil B. Bustillo


Address: Brgy.9 Tanjay City, Neg. Or. 6206
Email: [email protected]

EDUCATION:
College: Negros Oriental State University – Bais City Campus 1 (2020 - 2024)
Address: Sitio San Jose, Barangay 2, Bais City, Negros Oriental

Senior High School: Diaz College (2017 - 2019)


Address: Tanjay City, Negros Oriental

High School: Diaz College (2013 - 2017)


Address: Tanjay City, Negros Oriental

Elementary: Tanjay City South Central School (2007 - 2013)


Address: Brgy.9 Tanjay City, Negros Oriental

SKILLS/INTEREST

-Photography
-Editing Videos
-Microsoft Application

TRAINING ATTENDED

-PNP BAIS
-NORSU Job Entry Skills Training (JEST)

60
CURRICULUM VITAE

Name: Bernard A. Mapeso


Address: Poblacion, Bindoy, Negros Oriental 6209
Email: [email protected]

EDUCATION:

College: Negros Oriental State University – Bais City Campus 1 (2020 - 2024)
Address: Sitio San Jose, Barangay 2, Bais City, Negros Oriental

Senior High School: Demetrio L. Alviola National High School (2018 - 2020)
Address: Tinaogan, Bindoy, Negros Oriental

High School: Demetrio L. Alviola National High School (2014 - 2018)


Address: Poblacion, Bindoy, Negros Oriental

Elementary: Bindoy Central School (2008 - 2014)


Address: Poblacion, Bindoy, Negros Oriental
SKILLS/INTEREST

-Photography
-Editing Videos
-Microsoft Application

TRAINING ATTENDED

-NORECO 1
-NORSU Job Entry Skills Training (JEST)
-Events Management Services NC III Training

61
CURRICULUM VITAE

Name: Rinarged K. Ortega


Address: Butong, Manjuyod, Neg. Or. 6208
Email: [email protected]

EDUCATION:

College: Negros Oriental State University – Bais City Campus 1 (2020 - 2024)
Address: Sitio San Jose, Barangay 2, Bais City, Negros Oriental

Senior High School: Manjuyod Senior High School (2018 - 2020)


Address: Sundo-an, Manjuyod, Negros Oriental

High School: Manjuyod National High School (2014-2018)


Address: Sundo-an, Manjuyod, Negros Oriental

Elementary: Butong Elementary School (2008-2014)


Address: Butong, Manjuyod, Negros Oriental

SKILLS/INTEREST

- Photography
- Editing Videos
- Software and Hardware Troubleshooting
- Networking

TRAINING ATTENDED
- NORSU Bais Library Campus 2
- NORSU Job Entry Skills Training (JEST)
- Computer System Servicing NC II Training

62
CURRICULUM VITAE

Name: Ruben C. Verbo III


Address: Lup-Ac, San Jose, Manjuyod, Negros Oriental 6208
Email: [email protected]

EDUCATION:

College: Negros Oriental State University – Bais City Campus 1 (2020 - 2024)
Address: Sitio San Jose, Barangay 2, Bais City, Negros Oriental

Senior High School: Bais City National High School (2018 - 2020)
Address: Bais City, Negros Oriental

High School: Bais City National High School (2014 - 2018)


Address: Bais City National High School, Negros Oriental

Elementary: Bais City Pilot (2008 - 2014)


Address: Bais City, Negros Oriental

SKILLS/INTERESTS

-Video Editing
-Graphic Design
-English Literacy

TRAINING ATTENDED

-Bais PNP
-NORSU Job Entry Skills Training (JEST)
-Events Management Services NC III Training

63

You might also like