0% found this document useful (0 votes)
17 views11 pages

Aggregate Design of A Conference Management System in Object-Oriented Database

This paper discusses the design of a Conference Management System (CMS) using aggregate design principles within object-oriented databases to simplify complex data interactions. It emphasizes the importance of maintaining consistency and effective communication between object-oriented processes and data, while outlining the operational parameters and functionalities of a CMS. The study aims to enhance data storage and retrieval processes for academic conferences, addressing challenges in managing submissions, reviews, and overall conference organization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views11 pages

Aggregate Design of A Conference Management System in Object-Oriented Database

This paper discusses the design of a Conference Management System (CMS) using aggregate design principles within object-oriented databases to simplify complex data interactions. It emphasizes the importance of maintaining consistency and effective communication between object-oriented processes and data, while outlining the operational parameters and functionalities of a CMS. The study aims to enhance data storage and retrieval processes for academic conferences, addressing challenges in managing submissions, reviews, and overall conference organization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

Aggregate Design of a Conference Management


System in Object-Oriented Database
Emecheta N. C.
Dept. of Computer Science, University of Port Harcourt
Choba, Port Harcourt, Nigeria

Publication Date: 2025/02/13

Abstract: This paper presents a design strategy that may be used to aggregate a set of things with complex interactions
into a unified construct that is simple to use and understand. The architectural design of object-oriented databases in data
storage systems uses this architecture. This research was driven by the need to enhance the object data and object process
communication in a data storage system. The object-oriented system analysis and design methodology (OOADM) is the
setting in which it is utilised. Conference Management System (CMS) was chosen as the study's use case to demonstrate
how the object-database aggregate architecture is used to address the complexity of information representation utilising
object-oriented database systems. The conditions that apply in a CMS system's operational environment served as the
basis for the system development parameters. The system's outcome demonstrates how an intricate system may be created
by employing aggregate design to streamline the system modelling and facilitate effective communication between object-
oriented processes and object-oriented data.

Keywords: Aggregate, Object-Oriented, System Analysis and Design Methodology, Conference Management System.

How to Cite: Emecheta N. C. (2025). Aggregate Design of a Conference Management System in Object-Oriented Database.
International Journal of Innovative Science and Research Technology,
10(1), 2347-2357. https://doi.org/10.5281/zenodo.14863099.

I. INTRODUCTION applications, this is especially acute. In a model with


ambiguous object borders and complicated associations, it
Since complicated data is not mapped to relational is challenging to ensure the consistency of changes made to
rows and columns before being stored, object databases are the objects. While treating each object as though it were
well suited for applications that deal with extremely independent of the others is not a sound strategy, refreshing
complex data. Large volumes of complicated data are each object after a change is also impractical. Finding a
needed by many contemporary business applications. balanced answer is necessary.
Therefore, it is necessary to store a lot of complicated data
and combine it with simple data in a single application. In We may use the Aggregate pattern to assist us with
order for data to be inherited, extended, polymorphed, and this tricky issue. An aggregate is a lifecycle pattern
hidden (protected) from external programmes, it is also originally described by Eric Evans (Eric, 2003). It is a
necessary to make databases simple to integrate into the group of related items that are taken into account as a single
way contemporary programmes are produced. This entity for the purposes of data updates. A collection of
suggests novel methods for simultaneously storing, things with complex relationships can be aggregated into a
processing, and retrieving simple and complicated data, as unified construct that is simple to use and make sense of.
well as leveraging aggregate design to make the design and Each aggregate has a boundary and a root that defines what
integration of such systems simpler. belongs inside of it. Any number of objects can be included
in an aggregate, but one entity is always the root. A
A. Aggregate Design particular Entity found within the aggregate is known as the
The majority of business areas have Entities that are aggregate root. It is the only Aggregate Entity that client
extremely intertwined, sometimes to the point where there objects can hold references to because it is the sole
is always a path connecting any two Entities. We can Aggregate Entry-Point. Only the context of the aggregate
attempt to reduce the amount of associations in our design, root provides access to other aggregate objects.
which is a good idea, but it may result in a loss of
translation between business and software. It is challenging Nothing can hold a reference to anything inside the
to distinguish between the limits of a change in a standard confines of the aggregate. This indicates that the root serves
object model. In systems with concurrent access, like Web as the conduit for all of the aggregate's capabilities. Roots

IJISRT25JAN1205 www.ijisrt.com 2347


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

may occasionally return a reference to an item inside the this should generally be the aim. This is the main
border, but they can only be momentarily used by the justification for using aggregates in modelling.
client. The roots of other aggregates can be referenced by
objects inside the aggregate. All of the aggregates' A graph of objects that serves as a consistency limit
invariants must be guaranteed by the root object. An for our domain regulations is what we mean by an
aggregate's items are all deleted when the aggregate's root aggregate. We can either enforce them (making them
is removed. invariant) or be compelled to have corrective policies in
place, depending on how the aggregate is designed. Since
A properly designed aggregate is one that can be they affect the behaviours that are modelled in our domain,
modified in any way required by the business with its it is crucial to carefully define aggregate boundary limits.
invariants completely consistent within a single transaction.
Since aggregate must be designed with a consistency focus, D. A Conference management system is the application
it implies that the user interface should concentrate each area.
request to execute a single command on just one aggregate The usage of pointers allows for the many-to-many
instance. If user request to accomplish too much, it will access to objects. A collection of entities and value objects
force the application to modify multiple instances at once. (domain objects) that theoretically belong together is
Therefore aggregate are chiefly about consistency referred to as an aggregation. It is a group of related items
boundaries and not driven by a desire to design object that are taken into account as a single entity for the
graphs (Yoder and Barcalow,2019). purposes of data updates. It also includes a set of operations
that can be performed on those domain objects. As a user
B. Rules Applying to Aggregates case, we'll use a conference management system. Object-
Role Modelling (ORM) is a technique for conceptually
 The aggregate root is in charge of examining invariants modelling, querying, and mapping an information system to
within the aggregate and has a global identity. logical (e.g. relational) levels. The Natural Language
 Non-root entities contained within an aggregate have a Information Analysis Method (NIAM) is one of many
local identity that is exclusive to that entity. flavours of ORM.
 Only references to the aggregate root may be contained
in external code. The root can provide references to II. ANALYSIS
internal things, but these references are only used
momentarily and the root holds onto them. Value Analysis is the breakdown of the activities needed to
Objects can be given without worry because they are construct a system in order to identify the component parts
unchangeable and unaffected by side effects. needed for the system's design. This will entail breaking
 The persistence can only be directly loaded from down the individual components required for a database
aggregate roots. The traversal of associations must be item to communicate with a piece of code that manipulates
used to locate all other items. it.
 All aggregate invariants must be satisfied for any
change to occur within the aggregate border. A. The Universe of Discourse (UoD)
In this study, we emphasise the data perspective and
C. Typologies of Aggregate presumptively develop a formal model of the application
To create a model for a particular business domain, domain or universe of discourse (UoD) as part of the design
there are practically unlimited design options. Each of these process. The UoD must be understood thoroughly in order
approaches will have unique qualities in terms of to be done correctly, and there must be a way to define this
effectiveness, reliability, simplicity, and other factors. To understanding in a straightforward manner. By using plain
construct a system that will have the appropriate language and intuitive diagrams that can be filled with
characteristics, good aggregate design is essential. examples, as well as by analysing the material in terms of
basic or simple facts, Object-Role Modelling (ORM)
There must be consistency at the aggregate level. This streamlines the design process. It offers a conceptual
implies that it is the responsibility of an aggregate root to method of modelling by expressing the model in terms of
ensure that business invariants—i.e., business rules that common notions like objects and roles. The research's
must be true at all times—are satisfied. This implies that a chosen application domain or discourse universe is a
system that is correctly constructed always alters a single conference management system. This was chosen because
instance of Aggregate per transaction. Although it may paper reviews in a dispersed context need multitasking.
seem rigid, this should generally be the aim. This is the
main justification for using aggregates in modelling. B. Analysis of UoD -Conference Management System
A conference is a gathering of people where they can
There must be consistency at the aggregate level. This present and talk about their work. The topic may be
implies that it is the responsibility of an aggregate root to intellectual or relate to other spheres of life. Academic
ensure that business invariants (i.e., business rules that must conferences provide as a forum for researchers to discuss
be true at all times) are satisfied. This implies that a system their findings. Work is typically presented in the form of a
that is correctly constructed always alters a single instance brief, succinct presentation lasting between 10 and 30
of Aggregate per transaction. Although it may seem rigid, minutes, usually with time for discussion. The work may be

IJISRT25JAN1205 www.ijisrt.com 2348


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

collected in writing form as academic papers that are We will examine all conference-related activities in
assessed by a group of chosen scholars from a wide this work and identify the most important ones to include in
geographic area and then published as conference a computerized and automated "information system". In
proceedings. this context, the activity entails managing the conference
"information system" in a way that minimizes and gets rid
A web-based program called a conference of known bottlenecks related to the local and manual
management system aids in the planning of academic handling of such information. The following are some of
conferences. It supports the relevant tasks of the program the conference tasks and workflows that conference
chair(s), conference organizers, writers, and reviewers. A management systems support:
conference management system can be regarded as a
domain-specific content management system. Similar  Getting paper submissions (uploading PDFs, gathering
systems are used today by editors of various journals metadata from sources)
(Barrett, 2000).  Submissions to Zing anonymously
 Gathering the preferred topics for reviews
In this paper, we will investigate conference activities  Keeping track of conflicts of interest
and use their domain components to create a conference  Giving papers a reviewer's name
management system that can automate the processes that  Making submissions available to reviewers
make up a conference system's domain content.  Gathering ratings
 Keeping track of review coverage
There may be one or more keynote speakers at
conferences, who are typically renowned academics. The  Review exchanges within the program committee
conference may include panel discussions, round tables on  Ensuring the impartiality of reviews (reviewers cannot
diverse topics, and workshops, the latter ones in particular see other reviews for a submission before they have
if the conference is focused on the performing arts. Before submitted their own)
their presentation is approved for the meeting, prospective  Offering the reviewers a discussion board for each
presenters are typically required to provide a brief abstract submission
of it. Depending on the discipline, presenters may be  Review evaluation and threshold-setting
required to submit a paper of between 6 and 5 pages for  Reporting program committee feedback and reviewers'
peer review by the program committee or a referee of their comments
choosing. Presenters frequently build their talks in  Choice of authors
particular areas, such as the sciences, on a visual  Assembling the final, approved versions
presentation that highlights crucial statistics and research
findings. A meeting can have one session at a time or many  Some Systems Include Further Features in Addition to
sessions; the former has just one session at a time, while the Just Facilitating the Peer-Review Procedure:
latter has multiple concurrent sessions with speakers in
various rooms speaking simultaneously. Depending on the  Developing the conference's website and schedule
conference's focus, social or recreational activities might  Registering participants
also be provided. If the conference is big enough, academic  Publishing results
publishing houses might set up booths with discounted
books. Business meetings for academic organizations or Therefore, when seen from the perspective of the
groups may also be held at a bigger conference. Themed conference organizers and managers, it is evident that
conferences, general conferences, and professional conference management system is a subset of information
conferences are the three types of academic conferences. management system and also connected to management
information system.
Small gatherings with a particular theme are known as
themed conferences. C. The Database Infrastructure.
A data infrastructure is created by the database. They
The general conference is a larger meeting with offer data storage for one or more organizational operations
sessions covering a wide range of subjects. These and one or more functions. Numerous databases based on
conferences are frequently hosted annually or on another organizational activity will exist. In order to plan the
regular schedule by regional, national, or international database infrastructures, it is necessary to decide what
learned societies. information should be saved, how those data should be
related, and how access should be controlled. The ability to
Large conference with professional themes that is not supply data for both application and ad hoc needs is the end
just for academics but also deals with topics relating to result of database strategy and implementation with
academia. The 'call for papers' or 'call for abstracts', which database management system. Data warehouses are
defines the meeting's subjects and instructs potential extensive databases created for ad hoc use.
speakers on how to submit their abstract or papers, is used
to publicise academic conferences. Online submissions are
becoming more and more popular.

IJISRT25JAN1205 www.ijisrt.com 2349


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

D. Development of Conference Strategies elements are: Innovation: Systemic thinking Analysis of


Like any other business activity, strategic planning sensitivity and modeling.
starts with deciding on social responsibility before defining
the vision and goals of the company and the means by  Creativity
which they will be attained. The social and economic duties An individual or group of people's experiences,
of the organization must be established and communicated judgments, and intuitions are the sources of creativity. The
to all parties involved from the very beginning of the only method for handling the decision-making challenge
planning process in order to fulfill these obligations. The when it arises in a circumstance where there is no
goal of the organization for which it works must be precedence is innovation. An individual's conceptual
decided. Many businesses refer to it as their mission. abilities lead to creativity. The following skills are included
Setting the organization's goals is the next step after under conceptional abilities:
agreeing on the mission or aim. The objective is more
precise and has a deadline. The top management uses the  The capacity to quickly come up with several concepts.
goals as a guide for planning the company's operations. The  The capacity to shift quickly between frames of
next step is to define numerous goals for the organization reference.
after deciding on its mission and goals. The objective is laid  Originality in analyzing a situation and coming up with
out in terms of business outcomes to be attained in a year or new perspectives.
two. With the aid of business tools and technologies, the  The capacity to handle a complex interaction between
objectives can be measured and tracked. When the many aspects in a given scenario with clarity and ease.
objectives are accomplished, the aims and consequently the
mission will be accomplished as well. The next step in the One who exhibits these abilities is referred to as
planning process is to set targets for more detailed working conceptually fluent. A group of individuals with conceptual
and reference. The objective of the business is to be fluency, at least in important positions, transforms a
translated in terms of functional and operational units for company into a creative one. Such a company develops
easy communication and decision making. The targets will fresh concepts and innovative business plans. Plans are
be the direct descendants of the objective(s) (Doyle, 2000). created using experience and conceptual fluency as a
The management's strategies directly affect whether the foundation.
aims and objectives are accomplished. An organization's
resources are put to use in the game of evolving strategies  Systems Approach
and winning counterstrategies. The systems approach to planning takes into account
all the pertinent variables and how they interact. It leads to
 Types of Strategies an analytical examination of the entire system, generates
A strategy is a precise choice made, typically but not potential courses of action, and aids in the decision of
always, in order to allocate resources in a way that which is best under the circumstances. It is applied in risky
advances the organization's mission or goals. While a poor or unclear situations and considers several options for
strategy fails to accomplish the goals, a good strategy action. It is beneficial to resolve issues.
outperforms the competitors and ensures goal achievement.
A bad plan can be corrected and improved, but doing so The systems approach aids in a clear understanding of
comes at a very high cost; this is referred to as a strategic the situation. The principles of important and non-critical,
failure. A strategy is considered fixed if it only takes into substantial and inconsequential, relevant and irrelevant, and
account one point of attack and one technique of attack. A lastly controllable and uncontrollable are useful for
strategy is considered mixed if it employs a variety of classifying the factors. It evaluates the viability of the
tactics to engage multiple fronts. Multiple external technological, operational, and financial options. It
influences could be managed simultaneously by a variety of investigates the issues with the use of the remedy in further
pure business strategies. Therefore, the strategy may apply detail. The systems approach generally possesses the
to any part of the firm and could cover any topics. following traits:
 Tools of Planning  It makes use of all the disciplines and knowledge
Long-range, short-range, tactical, or strategic planning branches.
all requires managers in the organization to make a number  To pinpoint the issue, a scientific analysis is used.
of decisions. Therefore, when we discuss planning tools,
 To solve the issue, a model of a complicated
we also discuss decision-making tools in relation to circumstance is used.
planning. Various parts of corporate business planning are
 To evaluate the choices, it compares cost and benefit.
impacted by decisions. While planning a firm, there are
 It addresses issues where a futuristic temporal context
numerous alternatives, choices, and options available.
exists.
Additionally, resources are chosen and allocated in the best
way possible to maximize earnings. The choice of method  It takes into account the surroundings and how it affects
is the next step, which involves coordinating the efforts at the problematic issue.
all scales in the direction of a single objective. As a result,  Each solution is put to the test for feasibility and
using tools to make decisions is part of planning. These rationalism, and it accepts a predetermined standard for
instruments are founded on one or more variables. These choosing the best option.

IJISRT25JAN1205 www.ijisrt.com 2350


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

 If the problem is clearly stated, operations research  General Role Consideration


models are used. There are some information and principles which are
common to all roles. These are mentioned in this part, and
The systems approach is a method of systematic later specific roles are explained (Sarah, 2020).
problem-solving that applies the principles of rational
decision-making along with scientific methodology.  Personal Data
Personal data includes:
 Modeling
A model is a realistic, scaled-down representation of  Title, name, last name, institution/affiliation, nation,
the real world in which only the key elements are address, e-mail, and areas of interest (choose several
highlighted. A model's goal is to simplify a complex from a list of conference interest areas) are all required.
situation so that only the most important elements are  Department, fax, phone, and home page URL are all
considered. Models come in a variety of forms. An actual optional.
model of a house, a park, a sports complex, etc. could be  Password and user name. Both the username and the
the model. A scale model that shrinks a large body to a password must be distinctive. They establish a person's
small one could be the model. The model could be duties within the system so that the proper modules can
mathematical model like break even analysis model, linear be displayed.
programming model, queuing model, network model, etc.
(Yoder and Barcalow, 2019). Personal data is presented to all roles. Some roles can
have additional items related to their functionality. Users
E. Conference Management System can change their personal data later after login (Plasmeijer
Every step of the conference organization process & Achten, 2006).
needs to be supported by a web application. This comprises
handling conference participant registration, assigning Activating accounts and invitations new roles can be
reviewers, submitting amended and camera-ready papers, assigned in two ways:
and submitting papers for consideration.
1 An email invitation with an active link to the
 Software Interfaces account activation page is sent by a user with authority. The
The DBMS shall be one of the external systems. To invited party can next fill out his own personal details. If a
provide database calls independent of the DBMS suppliers, person is already registered with the system, all they need
there must be an abstract layer between the system and the to enter is their login and password in order to be given a
DBMS. The JDBC 3.x driver type 4 accomplishes that. new position. The user should include the following
Such drivers are usually developed by the corresponding information about the invited person before sending this
database vendors (e.g. MySQL DBMS provides such a mail:
driver) (Plasmeijer & Achten, 2005).
 Individual's name
 Product Functions and Features  Individual's last name
 Individual's email
 The system must support numerous sub-conferences.  Title (optional)
 Special sessions shall be supported by the system.
 Tutorials must be supported by the system.  Note: This method of registration is used for all
 The system must support plenary or invited talks. subsequent roles.
 Paper submissions will be supported by the system.
 System support for review processes is required.  By filling up the form and selecting the relevant role, a
user with authority provides an account. Form consists
 The system must support the construction of conference
of:
programs.
 Registration must be supported by the system.
 Individual's name
 The system will assist in the development of  Individual's last name
proceedings.  Individual's email
 On-site participation shall be supported by the system.  Individual's username
 Individual's password
 Security Requirements  Title (optional)
All user-provided information that will be used in the
SQL query must be preprocessed so that a backslash (an After filling the form and activating account user
escape character) comes before a single or double quote. sends an email which informs an invited person about filled
Otherwise, because these letters are a component of the data and given account. Note: That way of registering is
SQL syntax, the SQL query could be misinterpreted. only available to Conference administrator. User gets
account when visiting web site.

IJISRT25JAN1205 www.ijisrt.com 2351


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

 Administrator  Paper Management


All articles are collected by the program chair (PC)
 Personal Data from the corresponding authors. He delivers papers to sub-
Administrators of systems have usernames and conference programme chairs (for a specific sub
passwords. The System Administrator has initially conference) after reviewing paper metadata.
predefined these settings. You can get in touch with him via
email if you have any system-related issues.
 Creating Conference Program
Building the program from sessions is the topic of this
 Conference Creation
section of the paper chair. Each sub-conference PC
The system administrator has the highest position and
provides the PC with the prepared session plans. The PC
is responsible for ensuring that the system runs well. A new
chair compiles all of these sessions and creates the daily
conference must be created by the system administrator.
conference schedule. He completes these by hand, but a
The process of creating a conference involves filling out a
database is filled with all the information relating to where
questionnaire and the conference data (just the first tag
and when sessions are place. A list of sessions may be
from). The following items on the questionnaire have
updated with new events by the PC chair. Such as
options of yes or no. The questions are:
excursions, lunch breaks, and coffee breaks... The only way
to identify these events is by name. The special categories
 Is there a need for sub-conferences at the conference?
include invited speeches and tutorials.
 Are tutorials required for the conference?
 Is there a need for specific sessions at the conference? The PC chair will be able to designate presentation
 Does the conference call for plenary or invited talks? spaces and rooms. The only indication of these rooms is
their names. Sessions and events are the building blocks of
The answers to these queries activate or disable the program. Each session or event needs:
certain features.
 Date/day
Additionally, the system administrator must designate  Time of beginning (accurate to five minutes)
a conference administrator. Conference administrators will
 Finishing time, to the nearest five minutes
be able to explore conferences if there are multiple
 Allocated space
conferences in the database.
If there are any timetable conflicts, the system ought
 Browsing Conferences
to be able to detect them and issue a warning.
A system administrator must have access to the
database's list of current conferences. By selecting the
 Notification System
desired conference, the user takes on the role of conference
It is believed that all alerts are sent to PC Chair
administrator and has the power to modify all data.
immediately by email. If the author won't be attending, he
or she may notify the organizer that another person will
 Conference Administrator
give the paper, obtain an invitation letter showing that the
work has been accepted, or request specific presenting
Conference management
equipment.
All users and conference data can only be changed by
the conference administrator. He is granted the following
III. DESIGN
powers: All users can be listed by him. He is able to modify
user information and provide new login credentials.
Design entails the synthesis of a system's component
parts to produce a new system that gives a solution to a
 Conference Data given problem that has already been studied. The design
The following conference parameters can be set or and the tools used have a significant impact on the
changed by the administrator using a form: effectiveness of a solution that is proposed for a problem. It
is best to specify the design of the object-database
 Title, location, and dates that the conference will begin architecture for the construction of an object database
and end. system communication at the conceptual level first, using
 Date constraints. concepts and language that people can easily grasp, to
 Author registration assist assure accuracy, clarity, adaptability, and
 Author notification productivity. The actual database management system
 Paper submission. (DBMS) used to implement the design can be based on
 Instructional proposal object-oriented logical data model, and the conceptual
 Submission of the completed paper. design may encompass data, process, and behavioral
aspects.

IJISRT25JAN1205 www.ijisrt.com 2352


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

In this article, we emphasize the data perspective and The following features of the E-conf web conference
presumptively develop a universe of discourse (UoD). A management system will be implemented. The ability for
thorough comprehension of the UoD and the ability to users to:
articulate that understanding in a straightforward manner
are necessary for doing this well. By using plain language  Choose the thread in which they want to submit.
and intuitive diagrams that can be filled with examples, as  Responding to deadlines for paper submissions
well as by analyzing the material in terms of basic or  Examine the posted calls for papers.
simple facts, Object-Role Modeling (ORM) streamlines the  Review papers downloaded, and then post comments on
design process. It offers a conceptual method of modeling them.
by expressing the model in terms of common notions like  Send the author your thoughts and any necessary
objects and roles. revisions via email.
 Submitting updated versions
The research's chosen application domain or discourse  Author acceptance email
universe is a conference management system. This was
chosen because paper reviews in a dispersed context need
 Design Consideration of the CMS
multitasking. The primary stakeholders (users) for the conference
management system domain are represented by the papers,
When an old system becomes unusable, design is an authors, editors, and reviewers, as well as the conference's
unavoidable process of change; this is when a new system
program committee and chair. The user of the program
development is required and offered. The system design
chair is depicted as (PC), as are the reviewers of the papers
process will be carried out from two different perspectives and the publisher of the proceedings. Stake holders’ goals
in this chapter; the limitations and shortcomings of the
are then identified and, for every goal, the analyst can
manual system that is now in use will be used to develop decide, on the basis of the domain documentation, if the
the new system in order to address those issues. We use
goal is achievable by the actor itself or if the actor has to
PHP to implement the created system. Utilizing a design delegate it to another actors revealing a dependency
cue from an existing packaging is an alternative.
relationship between the two actors, such as in the case of
the dependency between Author and PC for the
A. UoD Design – Conference Management System Design
achievement of the goal publish proceedings (Schumacher
A conference is a gathering of people where they can et al., 2006).
present and talk about their work. The topic may be
intellectual or relate to other spheres of life. A conference
 The Late Requirement Phase
presentation could be collected in writing as academic This is meant to document the modifications made to
papers that are then examined by chosen academics from the domain as a result of the implementation of the system
various geographic areas and published as the conference as well as the system's actual characteristics. The phase
proceedings. A web-based program called a conference
begins by adding a new actor to the domain model to
management system aids in the planning of academic represent the future system.
conferences. This approach is based on conferences and
publications and is domain-specific. A conference
The system clearly demonstrates administration of
management system's concept comprises the submission of submission, reviews, judgment, and proceedings aggregate
conference papers, their review, and communication with to conference coordination in Figure 1, which presents a
authors regarding conference specifics. Each submission partial perspective of the model that was created. To handle
topic is treated as a thread. reviews, assign papers to reviewers and compile individual
reviews.

IJISRT25JAN1205 www.ijisrt.com 2353


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

Fig 1: Aggregate Design of Conference Coordination

Final papers, the format of the proceedings, and stored in various locations. The middleware in the system
accept-or-reject judgments are additional aggregation controller can conceptually link the objects when the
contributors. When these and other system components Author, Reviewer, or Editor interacts with the system since
come together, they create the Conference management the Controller clearly handles the simple data and allows
system, which advances system development from the the objects to be stored individually in the Object data
components of the analyzed requirement system to the real store.
system.
 Proposed System Process Design
B. Design Details of the CMS The proposed solution is a web application that is
The new system is built using the conference installed on a web server and accessible to authors and
components and their interactions as identified in the reviewers everywhere in the world. It has a client interface
design aggregation system. A database is also utilized as that the writers utilize to communicate with the computer
the system's resource base for storing all the data it will and other conference organizers. Additionally, the client
need to function. will be utilized for preconference call_for_paper
advertisements, which are typically. The routing
 Existing System Process Design application within the system will store the PDF files or
The CMS used as a use case in the design of the other file formats like pictures as files, and the system
system is first presented using the existing object relational information associated to the file submission such as the
database to illustrate the possible variation with the author, data of submission, and other associated
proposed design system that is deployed on web server so information are sent into the database for storage. Authors
that authors and reviewer can have access all over the submit their papers using the web browser in Figure 3.
globe. The key variation is clear from storage of data to the Other users can evaluate the information from their own
way the data is manipulated in the system. (Thomas et al., browsers, including PC users, reviewers, and conference
2021) coordinators. The publisher receives the accepted articles
to press electronically or in print after the reviewers have
Figure 2 depicts the design utilizing the current finished and decisions have been made on the chosen
system. The database in the proposed system design uses a papers. When the system is put into place, it will assist in
relational model to store simple data, and middleware is transforming academic and organizational conferences by
used to enable the media server to process objects that are showcasing all of the conferences in their shop on an online

IJISRT25JAN1205 www.ijisrt.com 2354


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

catalogue that is available from any web browser in the submission will also be well received from different
globe. By allowing reviewers who are specialists to regions of the world. The database management system
evaluate the papers because they may be gathered from all must handle the data and any related objects in a way that
around the world, it will also improve the quality of the promotes simple database access, storage, and querying.
papers. Since writers will be able to view and publish their The design makes it evident that objects are not divided
papers immediately online and the data and papers will be from simple data as they are in the current system
managed jointly as both objects and databases, paper architecture.

Fig 2: Process Design of the System Using Existing Object Relational Database

IJISRT25JAN1205 www.ijisrt.com 2355


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

Fig 3: Design of the Conference System using the Proposed System

IV. SUMMARY management system acts as a conduit for the delivery of


practical and reasonably priced solutions for bridging the
This essay has discussed the need for object databases gap between authors, conference organizers, and
and how they can handle complicated data. The study conference paper reviewers. This makes use of
examined the use of aggregate design to incorporate the communication technology, which enables the participation
elements into contemporary system development. A and empowerment of conference contributors from all over
conference management system was used as a use case in the world. Additionally, it promotes increased involvement
the study to evaluate this idea. The proposed concept, the in the conference and conference activities. Hence The
design, and the execution of the conference management creation of conference content using submission and
system were all used as the basis for the analysis. processing of pages, authoring based on content creation,
management of the site and its pages, as well as the
A conference management system improves the complete upkeep of conference web applications, is made
delivery of conference services for the purpose of simple with the aid of conference management systems,
streamlining and automating conference procedures. It which were developed using AMP technology. In general,
offers resources to improve the pre-conference, conference, the CMS system was chosen as a use case because to its
and post-conference activities. The provision of conference extensive database usage and the requirement that these
services also includes using information and databases connect with all user objects and application
communication technology to improve access to conference objects within the application usage environment.
material and submit and review papers. The conference

IJISRT25JAN1205 www.ijisrt.com 2356


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14863099

V. CONCLUSION REFERENCES

In this study, an aggregate design for the creation of [1]. Doyle, L. (2000) Content Management System work
object database systems was created utilizing the shop Report, Fourth Institutional web management,
Conference Management System (CMS) as a use case for University of Bath, UK.
object-role modeling. The development of practical object [2]. Eric E. (2003). Domain-Diven Design- Tackling
database systems for use in enterprises and organizations Complexity in the Heart of Software.
will be guided by this model, which will be used as a guide AddisonWesley, ISBN 0-321-12521-5.
by database management vendors and researchers. The [3]. Plasmeijer R. and P. Achten (2005). Generic Editors
system that has been put into place serves as a tool for for the World Wide Web. In Cenrtal-European
conference communication and publication information European Functional Programming School,
dissemination that empowers both writers and publishers EÄotvÄos Lorand University.
and fills the gap between the call for conference papers and [4]. Plasmeijer R. and P. Achten.(2006) The
the release of conference proceedings. By expanding the Implementation of iData - A Case Study in Generic
submission and paper review scopes for submitted papers, Programming. In A. Butterfield, editor, Proceedings
this can improve conference quality. Additionally, it offers Implementation and Application of Functional
a level of expertise, information, and conference quality Languages - Revised Selected Papers, 17th
that was previously impossible. Conference planners have International Workshop, IFL05, LNCS 4015.
an obligation to deliver services as effectively as they can [5]. Sarah A. (2020) UISA: User Interface Security
and to ensure that attendees get the most out of their time Assessment, USENIX Symposium on Usable
and financial investments in attending conferences. As a Privacy and Security (SOUPS) 2020. August 9 -- 11,
result, creating a conference management system entails 2020, Boston, MA, USA.
more than just creating a web application; it also entails [6]. Thomas Fischer, Ahmad-Reza Sadeghi, Marcel
creating a fundamental tool to govern how pages function Winandy (2021 ) A Pattern for Secure Graphical
when information is transferred, allowing for the efficient User Interface Systems, Schumacher M, Fernandez-
provision of conference services. Buglioni E., Hybertson D, Buschmann F, and
Sommerlad P., (2006) Security Patterns: Integrating
 Contribution to Knowledge Security and Systems Engineering. John Wiley &
This project has contributed in the following ways: Sons, 2006.
[7]. Yoder J. and Barcalow J,(2019) “Architectural
 The system also produced object role models, a cutting- patterns for enabling application security,” in
edge tool for displaying object database entity PLoP’97: Conference on Pattern Languages of
relationships in an understandable model. Programs.
 To illustrate the ideas put forth in the thesis, we also [8]. Arbaugh, W. A., Farber, D. J. and J. M. Smith,
constructed a conference management system. The (1997) “A secure and reliable bootstrap
program might be helpful in managing conferences, architecture,” in Proceedings of the IEEE
particularly in Nigeria, and programmers can use the Symposium on Research in Security and Privacy.
system as an example for creating programs that are far Oakland, CA: IEEE Computer Society, May 1997,
more difficult. pp. 65–71.

 Recommendation
We advise academics who need to streamline their
development processes or deploy systems that require
complicated data to look at the research presented in this
paper. Academic conferences can also benefit from the
conference management system built in this study, and the
development approach can be applied to the creation of
more complicated systems leveraging AMP technology and
other resources used in this paper. The approach created via
this research can help improve how efficiently and
effectively academic institutions and other organizations
manage conferences based on paper submissions. We
recommend this study to academic conference planners as
well as professional organizations like the Computer
Society of Nigeria (NCS) and other groups that plan
conferences on various topics for actual deployment in
order to reap the benefits for our society.

IJISRT25JAN1205 www.ijisrt.com 2357

You might also like