0% found this document useful (0 votes)
90 views

Design and Implementation of Lecture Alert System for Computer Science Department-2

The document discusses the development of a student lecture alert system that utilizes Short Message Service (SMS) to notify students and lecturers about scheduled lectures, addressing issues like timetable errors and clashes. It highlights the significance of SMS in communication, especially in less developed countries, and outlines the project's objectives, methodology, and limitations. The study aims to improve the efficiency of lecture notifications and reduce stress associated with existing systems.

Uploaded by

ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views

Design and Implementation of Lecture Alert System for Computer Science Department-2

The document discusses the development of a student lecture alert system that utilizes Short Message Service (SMS) to notify students and lecturers about scheduled lectures, addressing issues like timetable errors and clashes. It highlights the significance of SMS in communication, especially in less developed countries, and outlines the project's objectives, methodology, and limitations. The study aims to improve the efficiency of lecture notifications and reduce stress associated with existing systems.

Uploaded by

ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

CHAPTER ONE

INTRODUCTION

1.1 INTRODUCTION

Computers with the power of the internet have aid communication among people. The telephone

system which was invented several years ago, had undergone a great improvement so much that

today we have fixed wireless phones mobile phone and the likes with the rapid development of

mobile phones came several services like the short messaging service (SMS), Multi-media

messaging (MMS) which are readily available and add to the usefulness of mobile phones. SMS

is a mobile technology that allows for sending and receiving text or even binary messages to and

from a mobile phone.

Argued that short messaging service (SMS) based services are now more attractive to service

providers and users as a result of the recent mobile phone use penetration and the large scale

adoption of the existing services by users. The major advantage of shot messaging service (SMS)

is its cost effectiveness and availability as most individuals own phone. The level of internet

availability in less developed countries is where homes are internet access, short messaging

service (SMS) is still faster and cheaper means of spreading information.

The lecture alert system will not only allow lecturers to know when they have lecturers but it

also message the venue of the lecture and department to be handled. This is done by pushing the

alert to the lectures (sending it to their phones) or working on a request sent from a lecturer to

produce the alert (pulling).

1.2 BACKGROUND OF THE STUDY

Today we are witnessing fast changes in telecommunications computer and telephone

technologies that have made significant revolution in communications. The fast development of

1
communication and computer technology led to the merging of the public switched telephone

network (PSTN) and the internet to become global information network of integrated services.

Network services are becoming a more important way of information exchange and

communications turning telephone and mobile telephone toward internet service one o the

efficiencies of mobile phone is the availability of network services. The result carried out before

the development of the short messaging service (SMS) alert system show that mobile phone

users receive an average at five to six SMS every day.

Computer integration (CTI) is a system application that integrates advantages of telephone and

the internet by connecting phone services together. System application is any program, or group

of programs, that are desired for the end-user. EMA (Electronic Messaging Association) system

will inform the arrival of the new short messaging series (SMS) system are summarized as

follows:

• Lack of effective record system or database system to store the record of the timetable

• The consistent reports of error in the process of filling and allocating the lectures on the

time table.

• Stressful: this means causing a lot of anxiety and worry, therefore the existing causes

stress to the users of the system.

1.3 STATEMENT OF THE PROBLEM

The problem faced or noted in the course of studying the existing systems of lecture alert system

are summarized as followed:

1. Lack of effective record system or database system to store the record of time table.

2. The consistence report of errors in the process of filling and allocating the lectures on the time

table.

2
3. There will be clashes of lecture because one venue can be allocated to different lecturers at the

same time.

1.4 AIM AND OBJECTIVE OF THE STUDY

The aim of the study is to design and implement a student lecture alert system for the Reminder

System that will notify the student and lecturer about the scheduled lecture date, time and Venus.

This project is developed to accomplish certain objective such as

• To show how a new method of checking lectures using mobile phone short messaging

service (SMS) work.

• To highlight the existing problems associated with checking lectures on notice boards.

• To design a conventional lecture alert system using short messaging service (SMS).

1.5 SIGNIFICANCE OF THE STUDY

The general benefits that will be derived from the new system are as follows:

• This project will help serve as a research material for future or prospective researchers.

• It would help to reduce the rate at which there is a clash between lecturers by ensuring

that one message is sent per period, per venue.

• It would help to generate update and reminder from the time schedule stored in the

database thereby making the system a time triggered application

1.6 SCOPE OF THE STUDY

This project work borders on the development of application software for sending one message

per period, per venue to the lecturers using short messaging service alert.

1.7 LIMITATION OF THE STUDY

In carrying out this research work, some problems were encountered among which are

3
• Time: The time given for the completion of the research work was too short hence the

researcher had speed up the research work to meet up and this has an impact on the study.

• Limited Material: Few material were found pertaining to the research area and this

limited the bulk of the literature review

• Finance: the high cost of textbooks, internet browsing and transportation to different

libraries to gather material stood as a constraint to the research work.

1.8 DEFINITION OF TERMS

• Independent Service: this involves using solely a mobile phone and the application

server (The system running the SMS application). This option offers limited benefit but it

is easy and fast to set up.

• Dependent Service: this involves having the application server connect to the service

providers SMS center (SMSC).

• Mobile Orientated (MO): SMS-Mo is sent from a mobile phone and could sent be sent

either to another mobile phones (such as when subscriber sends a personal message to

another subscriber) or to a computer application that will process the message.

• Mobile Terminated (MT) short message service mobile terminated is transmitted to a

mobile phone. It also could be sent by another mobile phone or generated by a computer

application.

4
CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

The short message service (SMS) is a feature of second generation (2G) mobile technology and

it must not be longer than 140/160 alphanumeric characters without images or graphics. It is s

relatively simple messaging system supported by global service of mobile communication

(GSM), time multiple access (CDMA) based mobile phone networks. said that SMS based

service are more attractive to service providers and users as a result of the recent penetration of

mobile phone and the large scale adoption of the existing service by users.

(Yonan, 2009) stated that several SMS based applications have been developed and are used for

various purposes in fields such as health, business, security monitoring, and supply chain

management.

As SMS examination result notification system was designed to enable students have remote

access to their examination result via mobile phones. Students a very the database by sending

SMS commands to the retrieve their results. The mobile operator and charges for the message as

if it was performed directly on a mobile phone by supporting an extended AT command set for

sending and receiving SMS messages according to defined specification Hence, there is the need

to develop a system that will combine available resources and reach people through SMS using

GSM module. Some of the client protocols used by SMS include: simple mail transfer protocol

(SMTP), universal communication processor/ Electromagnetic inference (UCI/EML) etc and

application connectivity for SMS submission or server side protocols SMPP, Hypertext protocol

(HTTP) and simple mail transfer protocol (SMTP). (Morris & Pinchot 2010) said that with

emailing, in the 2010s, the sending of SMS has become accepted part of many cultures. Initially

5
growth of text messaging was slow, with customers in 1995 sending an average of 0.4 message

per GSM customer, per month.

SMS forms on integral part of signaling system NO 7 (SS7) and it is a state” with a 160 character

data, coded in the ITU-T text format, that has a sequence lead in to determine different languages

codes.

Elektor (2011) and Elekor (2012) said some amateurs have also built own system to control

some of their appliances via SMS. Other method such as group Messaging, which was patented

in 2012 by the GM of Andrew Ferry, Devin Peterson et al are used to involve more than two

people into a text message conversation. A flash SMS is a type text messaging that appears

directly on the main screen without user iteration and is not automatically stored in the inbox. It

can be useful in cases such as emergency (e.g fire alarm). Some practical uses of text message

include the use of SMS for confirming delivery or other tasks e.g communication between a

service provider and a client and for sending alert several universities have implemented as

system of testing student and facilities campus alert (Penn, 2012).

Mohammad and Norhayati (2003) developed a sms service system for student collaboration on

campus. The approach achieved quick message communication and delivery among students.

Krishna, Anurag and Prabhune (2014) presented a model which focuses on the use of SMS as a

way of sending data and substituting packets in a network. The system was to improve existing

levels of communication between teachers and students of an academic institution.

Bin Haji Sidek (2010) stated that an SMS application system along with corresponding server

was developed. It was aimed at providing a system that can avoid the reliance of content delivery

SMS application for student examination result to SMS gateway provider and the commercial

SMS application develop which can be managed totally by the school staff.

6
Market, Sanchez, Weber and Tangney (2005) proposed a sms technology that supports

classroom interaction between students and the lecturers. Students send SMS via their mobile

phone which are viewed, replied and addressed by the lecturers through a developed software

connected with modem. The system was closely related with mobile notice board project for the

delivery of urgent information of students but could not ascertain a feedback module in the

deployment.

AL-Ali, Rousan and Mohandes (2004) and Al-Shaikh (2003) also proposed a patient and house

monitoring system to ease the ordering and delivery of house equipment using SMS technology

via mobile phone the system contributed immensely to the use of SMS technology foe message

delivery but was limited by high implementation cost.

Obea and Fernandez (2004) argued that an SMS tool to exchange information in medical area

was proposed and the work was developed as a radiological information system where physician

can send messages to their patients.

2.2 A PUSH SMS APPLICATION

A push SMS application is one whereby a message is been sent from the application to the user.

It is a one way message in other words, it is the mobile application (In this case SMS and email

result checking application) that initiates message. An example could be a school that

automatically sends examination result to the students and their parents/ sponsors as soon as the

grades become available. The SMS would be delivered to them they are, as long as their mobile

phone is within their network operators coverage.

7
2.3 PULL SMS APPLICATION

A pull SMS application is one whereby a user sends request and obtains a reply from the

Application. This is a full duplex scenario. An example is when a student request for his/her

Grades for recently concluded semester.

Checking score by sending a request to 56677, or checking balance of your bank account by

sending your account number to 51234, etc.

2.4 TYPES OF ERROR IN LECTURE TIME TABLE

Computers don’t make mistakes; mistakes are from humans who operates the system

(computer). The error in this case is:

2.4.1 SYNTAX ERRORS

These are caused by the operators of the computer as a result of mis-spelt Keyword, undefined

variables, incomplete parenthesis, introduction of storage characters, and incorrect punctuation.

2.4.2 RUNTIME OR EXECUTION ERRORS

These occur during execution of program e.g. reference to non-existent variables and generation

of larger excessive and square negative numbers.

2.5 TYPES OF INFORMATION SYSTEM IN LECTURE ALERT SYSTEM

The classic view of information systems found in the textbooks in the 1980s was of a pyramid of

systems that reflected the hierarchy of the organization, usually transaction processing system at

the bottom of the pyramid, followed by management information system decision support

systems and ending with executive information system at the top (Laudon, 2004). Although the

pyramid model remains useful since it was first formulated a number of a new technologies have

been emerged, some of which is no longer fit easily into the original pyramid model.

Some examples of such systems are:

• Data warehouses

8
• Enterprise systems

• Expert systems

• Search engines

A computer based information system is essentially using computer technology to carry out

some or all of its planned task. The basic components based information systems are:

• Hardware These are devices like the monitor, processor printer and keyboard of all which

work together to accept process, show data and information

• Software: is the program that allows the hardware to process the data.

• Data bases are the gathering of associated files on tables containing related data.

• Network is a connecting system that allows computers to distribute resources.

• Procedures are the commands for combining the components above the process

information and produce the proffered output.

The first four components (hardware, software, database and network) make up what is known as

the information technology platform. Information technology workers could then use these

components to create information systems that watch over safety measures, risk and the

management of data. These actions are known as information services (Archibald 2001).

2.6 THE CONCEPT OF INFORMATION SYSTEM IN LECTURE ALERT SYSTEM

As related to lecture alert system, an information system is a system composed of people and

computers that processor interprets information in relation to lectures (Kroenke, 2003).

The term is also sometimes used in more restricted senses to refer to only the software used to

run a computerized database. An information system is a work system whose activities are

denoted to processing (capturing, transmitting storing, retrieving, manipulating and displaying)

information.

9
As such, information systems inter-relate with data systems of the one hand and activity systems

on the other. An information system is a form of communication system in which data represent

and are processed as a form of social memory. An information system can also be considered a

semi-formal languages which supports are the primary focus of study for organizational

information.

2.7 FILE SECURITY TECHNOLOGIES IN A LECTURE ALERT SYSTEM

These are different ways to secure the data in a file such as:

• Disk encryption: refers to encryption technology that encrypts data on a hand disk drive.

Disk encryption typically takes from in either software or hardware.

• Backups: Backups are used to ensure data which is lost can be recovered.

• Data masking: Data masking of structured data ia the process of obscuring (masking)

specific data within a database table or cell to ensure that data security is maintained and

sensitive information is not exposed to unauthorized personnel.

• Data Erasure: Data erasure is a method of software based over writing that completely

destroys all electronic data residing on a hard drive or other digital media to ensure

sensitive data is leaked when an asset is retired or reversed.

10
CHAPTER THREE

SYSTEM INVESTIGATION AND ANALYSIS

3.1 INTRODUCTION

The objective of the system investigation and analysis is to collect information about the

current system, the method of data collection. It also gives a description of input design and

output specification. The analysis of the existing system therefore provides a firm basis for the

design of the new system. Through investigation, the scope of the problem and the effort

required to complete it. In this chapter, the methodology adopted is a waterfall methodology

whose steps comprise of:

WATERFALL MODEL

11
Fig 3.1: Waterfall Model

• Planning

• Analysis

• Design

• Implementation

• Testing

• System

Student lecture alert system for the department of computer science scheme as being an object

oriented project is exposed to use tools like the use case diagram, flowcharts and other tools for

development of this project in order to increase users’ confidence, by reassuring users that the analyst

fully understand the nature of the problem that the system must carry out.

3.2 FACT FINDING METHODOLOGY

There are some techniques that were used in investigation of the existing system and resulted in a

set of data structures of the current systems data and the initial problem list for the project. Some

of the techniques include:

• Interview Method: this process involves asking question to relevant personnel’s who

gave out vital information to the researcher. The researcher engaged on face to face

contact which enabled the author to distinguish between facts and opinions from the

interview. Although majority of the respondents were in affirmation while few were of

diverse opinion.

12
• Observation of the system operation: This process involves watching while the system

is operation to discover things without being told. During operation I discovered that the

existing method of allocating lecture time table is done manually using paper and pen. I

also observed that there is usually clash of lecture between the lecturers on existing

system i.e. Allocation of one venue to different lecturers at a time.

• Studying the current system documentation: this is about studying the documentation

already recorded by previous or traditional system which is already in existence. Some of

the documents studied were: Organizational chart, Lecture time table and Lecture time

table procedural chart and I found out that all are done manually using pen and paper.

3.3 COMPUTER SCIENCE DEPARTMENT AND ITS ENVIRONMENT

Since the establishment of the Kebbi state university of science and technology Aliero in

2006, KSUSTA offers programmer in Computer science and amount others.it was the 79 th

university in Nigeria

The institution presently has over twenty three department of which one of it is computer

science department which has goal in graduating students who have been found worthy and

deserving a character and in learning and awards of Degree to such students.

3.4 DEMOGRAPHIC AND OWNER VARIABLES

Computer science department is one of the departments that has a big population numbering

hundreds of students every semester. They offer provisional admission for the award of

Degree respectively.

Grades: the performance of students is evaluated using attendance, continuous assessment

and exams which students are graded accordingly. Computer science department is practical

13
based students learn different programming skills through practical session conducted. The

qualified lecturer and staff who worked so hard to see the department at the level they are

now.

The department has the opportunity to run post graduate degree programmer as one of the

first in the institution, all to the credit of its staff.

3.5 ORGANIZATIONAL CHART

Dean

Head of, Computer Science Department

Secretary

Assistant
Laboratory
technologist

Executing
officers
Chief Technologist

Laboratory
Attendants

Lecturers

Fig 3.2: Organizational chart of computer science department

Functions of some personnel of computer science department

14
• Head of Department: The HOD is responsible for ensuring that information which the

head receives from the other is appropriately acted upon and for dissemination within the

department.

• Secretary: This is a person that takes document of the department and takes care of the

minutes when organization is holding a meeting.

• Academic staff: These are those responsible for teaching the students courses that as

allocated to them by the head of the department and take care of the minute when

organization is holding a meetings

• Technologist: a scientist who specializes in a particular technology or who uses

technology in particular field. They are also responsible for taking practical in the

department.

• Instructor: The instructor is responsible to help others acquire knowledge, competence

or value or is a person whose occupation is teaching.

• Admin officer: administrative officer manages office stock, preparing regular reports

e.g. (expenses and office budgets) and organizing company records.

• Higher executive officer: he is a person who manages people and dealing with

performances issues

• Assistant executive’s officer: executive assistant performs duties that can have effects

on the success or profitability of an organization.

• Laboratory assistant: lab assistant assist staff with laboratory facility management and

maintaining issues related to safety, equipment utilization, wt lab operations, keys,

15
• Dormitory administration building storage and boat operation.

3.6 ANALYSIS OF THE EXISTING SYSTEM

In existing system lecture alert system is done manually using pen and paper i.e he/she will drift it on a

paper in a tabular form with columns and row which contains lecturers name, department, days, course

code, course table, programmer, venue and time which usually subject to errors and duplicate allocation

of course to a particular time and day.

There is no existing alert system. The lecture depends on his own ability to remember. He

may consult with time table etc. some of them who have sophisticated phones or who are

friendly with using their phones alarm system may use phone alarms, reminders, to do list

etc on their phone as a form of alert system. Others wait to get call from students reminding

them of the lectures.

3.6.1 INPUT TO THE EXISTING SYSTEM SEMESTER LECTURE TABLE

COURSE 8-9AM-9- 10-11AM- 12-1PM-2- 3-4PM-4-6PM


DAYS LEVEL 10AM 11-12PM 3PM
MONDAY UG1 CSC206(ELH2)

UG2
UG3 CSC302(B2)

UG4 CSC412(B2)

TUESDAY UG1 CSC104(SLH1)

UG2 CSC202(SLH) CSC204(SLH2)

UG3 CSC310(B5) C314(SLH1)

UG4 CSC422(A1)

16
WEDNESDAY UG1
UG2 CSC206(SLH2) CSC208(SLH2)
CSC202(SLH2)
UG3 CSC314(SLH1) CSC316(SLH1)

UG4 CSC404(SLH1) CSC416(ELH1) CSC408(SLH1)

THURSDAY UG1 CSC102(SLT)

UG2 CSC208(STT2)

UG3 CSC312(SLH1) CSC313(SLH1) CSC303(SLH1)

UG4 CSC422(B6) CSC406(B1)

FRIDAY UG1 CSC204(ELT) CSC208(ELT)


CSC210(SLH2)
UG2
UG3
UG4 CSC410(TLT2) CSC402(SLH1)

SATURDAY UG1 CSC102(SLT)

UG2 CSC210(SLH2)

UG3 CSC302(STT2)

UG4 CSC412(B2) CSC402(SLH1) CSC406(ELH1)

FIG 3.3: Existing system of semester lecture table

KEYS: A1-A6 = CLASSES IN BLOCK A, FACULTY OF SCIENCE.


B1-B12 = CLASSES IN BLOCK B, FACULTY OF SCIENCE.
SLT = SCIENCE LECTURE THEATRE FACULTY OF SCIENCE.
ELT = ENGINEERING LECTURE THEATRE (250 CAPASITY), FACULTY OF
ENGINEERING.
SLH1&2 = SCIENCE LECTURE HALL, FACULTY OF SCIENCE.
ELH1&2 = ENGINEERING LECTURE HALL, FACULTY OF ENGINEERING.
TLT1&2 = TWIN LECTURE THEATERS, FACULTY OF SCIENCE.
STT1&2 = SCIENCE TWIN THEATERS, FACULTY OF SCINCE.

17
3.6.2 PROCEDURAL CHART OF THE EXISTING SYSTEM

Display main-
menu

DATA ENTRY

ONLINE PROCESSING

DATA ON
DISK

RESULT
ON DISK

REPORT
GENERATION DOCUMENTS
(SCREEN)

TRANSACTION

18
FIG 3.4: Procedural chart

3.6.3 OUTPUT OF THE EXISTING SYSTEM

The existing system has no format as the output therefore, lecture notes, jotters and

attendance book as an evidence of the lecture serves as the output of the current system.

3.6.4 ADVANTAGES OF THE EXISTING SYSTEM

Some of the advantages of the existing system are

• Smooth and orderly working: the time table makes the school work smooth, systematic

and orderly, work of the lecturer and the students are clearly specified everybody knows

what is to be at a particular time.

• Eliminates waste: Time table specifies every item of work clearly. It deal attention of

both the lecturers and the students for a particular time.

• It ensures that all lectures

3.6.5 DISADVANTAGES OF THE EXISTING SYSTEM

Some of the problems discovered in existing system are:

• Lack of effective record system or database system to store the records of time table

• Regular clash of period or duplicate allocation of time to more than one course

• Misplacement and loss of time table to unauthorized users of the time table.

• The speed of processing and allocation of courses on courses on the time table is low and

it’s prone to error.

19
3.7 PROPOSAL FOR A NEW SYSTEM

Due to many problems encountered in the lecture time table, a lecture alert system is

proposed, it is an online system computerized and designed in a way that it sends SMS to a

lecturer for a particular period and venue. The new system if well implemented, it will serve

as a remedy to the problems encountered in the old system.

3.7.1 JUSTIFICATION OF THE NEW SYSTEM

Since experience has shown that using a system brings to light its short comings. The suggest

improvement especially in a case where the system is no longer satisfactory to the user. So in

this case a lecture alert system is suggested in replacement of manual based system which

already exists. A lecture alert system will help to increase the effectiveness and efficiency in

service and reduce the problem associated with the current system.

20
3.7.2 HIGH LEVEL MODEL OF THE PROPOSED SYSTEM

MENU

Lecturers Add Subjects Class Allotment Generate View timetable


Rooms

Add Classes Allocate Courses

Schedule Timetable

Add lecturers
View Timetable

FIG 3.5 HIGH LEVEL MODEL

21
CHAPTER FOUR

SYSTEM DESIGN AND IMPLEMENTATION

4.1 INRODUCTION

System design is a process of defining the architecture modules, interface and data for a system

to satisfy specified requirements. The system being proposed will in this section be designed to

successfully handle the problems identified during the analysis.

4.2 OBJECTIVE OF THE DESIGN

The objectives of the design are:

• To develop a system that will reduce numerous problem and stress encountered in

the course of using manual method of operation.

• To improve fast delivery of information

• Efficiency: the system should be able to produce a well-organized and

comprehensive output with little human assistance.

• Security: the system should be able to guard against intrusion and unauthorized

person and limit fraud on loss of data stored in the file.

4.3 DECOMPOSITION AND COHENSION OF THE HIGH LEVEL MODEL

This is system block diagram that shows how the new system works. It also describes

how information moves or are being circulated around the new system. The block

diagram will show briefly the process that will be carried out in the lecture alert system.

22
COURSES
INPUT DATA

VENUES

ALLOCATE CLASSES

ALLOCATE COURSES GENERATE TIMETABLE

CHECK TIMETABLE
TIME

LECTURER
ALERT TIME TABLE

ADMIN

FIG 4.1 System block diagram

4.3.1 MAIN MENU/CONTROL CENTER

This is where all the sub system that are developed from, it shows the sequence in which the

system design is maintained and achieved. It also specifies all programs that will run the

identified modules. It also shows how each component is related to others forming the sub

system.

23
Homepage

LOGIN Admin Select MANAGE


Timetable Select faculty
lecturer ADMIN

View Timetable

PASSWORD Admin section

FIG 4.2 System control center

4.3.2 THE SUB MENUS/SUBSYSTEM

The system is composed of the following modules as explained below:

• The homepage module: This is the first page that appears when the system is

launched from the browser. It provides navigation to other modules of the system

such as the administrator interface and the reminder interface.

• The Administrator Module: The administrator is saddled with the responsibility

of adding new users (recipients) he can as well update, delete the user record. It is

also the duty of administrator to send out notification to users when they have a

pending message in their boxes.

• The lecture module: The user of the system (Recipient) will be able to log in and

out of the system, view notifications about the information they have in their

24
boxes. They can as well accept the message on pick up of their messages in the

box which will also be verified by the administrator.

• The reminder module: The reminder module checks from time to time if a

specific message has been picked up by the user and confirmed by the

administrator. This module checks pending messages over duration of time

specified.

4.3.3 OVERALL OBJECT DIAGRAM OF THE NEW SYSTEM

This is the overall comprehensive diagram of the system indicating the flow of data within the

whole system. It is illustrated using Use Case diagram.

25
FIG 4.3: Use case diagram

SYSTEM FLOW CHART

26
Data base file
Keying of (disk)
data

Processing
of data (CPU)

Display inputs
from keyboard
(VDU) Output

Fig 4.4 System Flowchart

4.3.4 SPECIFICATION

Data specification comprises all the data field and records collected and analyzed to help

in creating a good database Management system for the new system. The database

design involves two tasks which includes

• Defining the structure of the file

• Assigning a unique name to the database file

4.3.5 DATABASE DEVELOPMENT TOOL

Database tool used in the development of this system is MySql, the reason for the includes;

• It can delete data record in the database

• It can create view in the database

27
• It can create new in the database

• It can retrieve data

• It can update records already existing in the database.

4.3.6 DATABASE DESIGN AND STRUCTURE

The database structure is made up of the system which contains a platform with the following:

Class venue, Programs, Lecturers, Department and Courses.

i. Class Venue Table


This table stores the information about each hall used in the timetable allocations.
Field Type
Hall Name String
Hall Capacity Integer

TABLE 4.1 Class table

ii. Programs Table


This table stores the program names used in the timetable allocations.

Field Type
Program Name String

TABLE 4.2 Degree courses

iii. Lecturers Table


This table stores the Lecturer names used in the timetable allocations.

Field Type

Lecture Name String


Designation String

Contact No Integer

Email String

28
TABLE 4.3 Lecturers table

iv. Department
This table stores the department names used in the timetable allocations.

Field Type
Department Name String

TABLE 4.4 Department table

v. Courses
This table stores the course names used in the timetable allocations.

Field Type
Course Code String
Unit Integer
Title String
Type Integer
Semester String

TABLE 4.5 Courses table

4.3.7 COMPUTATION

There is no computation to the effect of the program

4.3.8 PROGRAM MODULE SPECIFICATION

This system comprises two main modules which are the Administrator and User Module.

• The Administrator Module: the administrator provides full control and access for users’

update, information, view records and also delete the user

• The User Module (Lecturers): this page is accessed by the user which will enable them

to view notification about the information they have in their box.

29
4.3.8. I. INPUT DESIGN

The input design gives an illustration of the requirements needed to log in to the system.

Below are the input designs for student lecture alert system.

FIG 4.4 Login form

FIG 4.5 Add user form

30
FIG 4.6: Add new lecturer

FIG 4.7 Add new venue

31
FIG 4.6 Compose message form

4.3.8 II. OUTPUT DESIGN


The output design contains all the necessary details of the processed input by the system which is

Drawn from different tables of the database. In this case the generated SMS is the output of the

New system.

FIG 4.7 Class time for a lecturer


32
4.3.9 DATA DICTIONARY

This comprises the list of most variables used in the development of the system and their

descriptions.

TABLE OF DATA DICTIONARY

Field name Description Data type Field length


Username Your log in Name Alpha numeric 20
Password It accept or Alphanumeric 15
recognizes a
password of a user
Lecturer It accepts and log Alphanumeric 15
in a lecturer
Log in It accepts the user Alphanumeric c 20
account detail
Phone number It accept users’ Numeric 11
phone number

4.4 CHOICE OF PROGRAMMING LANGUAGE/JUSTIFICATION

The most programming language used for the system design is PHP

• Pre hypertext preprocessor (PHP): It is used for creating a database in a system, for

scripting and making the site look dynamic

• Hypertext Markup Language (HTML): This is used to build up the website and

develop the web page for proper use.

• MySQL: It is a database management tool, it is a text editor used in sublime text.

4.4.1 SYSTEM REQUIREMENT

The requirement of the full operation of system includes software and hardware requirements.

The essential hardware devices as well as software platform required for the efficient and

effectiveness running of the systems are listed below:

33
4.4.2 HARDWARE REQUIREMENT

The hardware requirements for successful execution of this project work include:

1. Printer, scanner, modem, and cables.

2. Stabilizer and ups (uninterrupted power supply)

3.2GB RAM and above

4. Intel Pentium processor 500MHZ and above

5. Hard disk size 100GB and above.

6. Mouse and keyboard for data entering.

7. DVD/CD ROM drive.

8. Personal computer.

4.4.3 SOFTWARE REQUIREMENT

The following are the software requirements:

1. Backup software e.g. goggle drive and hard disk drive.

2. Browser e.g. chrome, and Firefox latest version.

3. Programming and scripting language such as PHP, HTML, text editor, mySQL. They enable

coding and execution of codes

4. Windows operating system (Windows 7 and above).

4.5 DEPLOYMENT PROCEDURE

The following are the procedures to get the new software install on your system:

34
1. Boot and insert the software into the DVD/CD drive.

2. Double click on my computer icon.

3. Click the installation setup.

4. Follow the installation wizard and then

5. Click finish.

4.6 PROGRAM TESTING

The software was tested exhaustively by creating plenty lecture fixtures with varying start times

and monitoring the dispatch of SMS to the intended recipients through the SMS API. The SMS

were successfully delivered with only very few exceptions as the results of network error in

which case the software would attempt to resend the SMS. SMS sent retry Window was set at

two .i.e if the sms is not sent at the first attempt: it's sending would be retried on the next loop

within the 5mins time bracket and before the start of the lecture. If offer the second attempt the

sending fails, the entry is tagged as sent because it forwarded by program but not delivered

because the SMS API did not receive a delivery report after which the GUI (graphic user

interface) gives up trying.

4.6.1 CHOICE OF TESTING TOOLS/JUSTIFICATION

The tools used for the testing of the system include the following:

1. Browser: this interpret the instructions and displays it's equivalent to the users understandable

format on the screen.

2 XAMP: This consists of a local server and database management system for testing the web

page and the database as well.

35
4.6.2 METHOD APPLIED

The design method applied on the project work is the top down design method when developing

a complex computerized system. It is often very useful to breakdown the programming effort of

the software design into smaller modules called sub system which further can be broken into

program modules during the design stage.

4.6.3 EVALUATION OF RESULT

Having tested the system using software testing tools as listed above the result was properly recorded.

4.6.4 DISCUSSION OF RESULT

With the necessary input processed, the output which depends on the input, is retrieved based on

the details entered from this system. The lecture alert system for the next five years could be

obtained only if the previous user makes it available.

4.7 SYSTEM SECURITY

The project ensures that there is security assurance activities such as penetration testing, code

review and architecture analysis are ensured. This application also ensures authentication,

confidentiality, authorization, integrity which ensures that the system prevent unauthorized user

to access the data.

4.7.1 TRAINING OF OPERATORS

The researcher provided necessary documents and other requirements that will be enable the

training of operation of the new system such as:

1. The operators will learn to take adequate measure such as installation and use of antivirus to

prevent the destruction of programs and files.

4.8 SYSTEM CONVERSION

36
Parallel change over procedure is recommended and adopted for this work.

This involves the operation of the old system and the new system alongside each other. Hence,

the current system and the proposed system will be in operation. This is because it is highly

reliable and less risk when compared with other procedures. This type of system conversion

allows for comparison between systems but is quiet expensive.

4.9 MAINTANCE DETAILS

These are different method of system maintenance but at the initial stage if this system,

prevention maintenance should be ensured. This is a maintenance to prevent future failure or

breakdown of the system .Such maintenance are as follows:

1. Hard drive optimization

2. Maintenance of power supply outlets.

3. Checking of all input and output devices regularly.

4. Random virus check and removal of the virus.

37
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 SUMMARY

In summary, the use of computerized lecture alert system makes it possible for data to be

processed with great speed and efficiency without delay. Lecture alert system has been

developed using web based for its portability. This new system generates updates and reminder

from a time scheduled stored in a database thereby making the system a time triggered

application. The proposed system allowed for easy and enhanced communication between the

operator and the users, to ensure proper spreading of information.

5.2 CONTRIBUTION TO KNOWLEDGE

The computerized Lecture alert system has been a great benefit and has contributed to the

users in the following ways:

38
1. The use of computer has ease a lot of time wasting in using pen and paper to create lecture

time table because computer operators can login and send the SMS of lectures to the lecturers.

2. Since the research is web based system, it will encourage the computer scientist or investigator

more, so as to make the system more responsive easy to use and user friendly.

5.3 SUGGESTION FOR FURTHER RESEARCH

The researcher went further to suggest that if more research is made on this project work, it will

help to eliminate the use of pen and paper in creating lecture time table for computer science

department AIFPU. Also the computerized system will be more reliable and more efficient, and

does not require much from the user but only needs the input.

5.4 CONCLUSION

In bringing this work to a close, this system has become a very important assets that all should

embrace and ensure that it continue to exist so as to allow for easy lecture allocation. In addition,

this work has proved that computerized lecture alert system is a better substitute and also a

flexible option available to the lecturers at all time if it is properly put to use and based on the

guidelines of this research work coupled with the rule contained in the program (new system).

5.5 RECOMMENDATION

To further strength this work and for it to enjoy acceptability and popularity, the author

recommends the following:

1. The computer system available in the institution should be properly maintained to avoid

malfunction.

2. The limitations of this study should be tackled jointly.

39
3. Consistent power supply should be made available at all time to keep the system running.

4. The administrator account should not be kept open for non-administrator staff to have access

to it.

REFERENCES

AL-Ali, A.R.,Rousan, M.A., & Mohandes, M. (2004),"GSM- based wired home appliances
monitoring and control system" International conference on information and communication
technologies.pp 237-238 (2004)

AL-Shaikh, M. & Rousan, M.A. (2003), "Embedded system based mobile patient monitoring
device", in proceeding of 16th IEEE symposium computer based medical system,
New York, USA June 26 2003, pp. 355-360

Archibald, J. A. (2001). Simulation modeling for time table planning. Milky press Toronto

Bin Haji Sidek, S.F. (2010), "The development of the short messaging service application for the
school usage", international symposium on information technology.2010

Bodic, G. (2005). Mobile messaging technologies and service: SMS, EMS, MMS. Retrieved
from www.wiley.com/en-us/

Elekor N.L. (2011). An ATM 18 system for SMS: retrieved 29 March 2011.

Elektor C. (2012). Using SMS to control devices amateur, built system based on ATM 29 may,
2012
40
Heikki, K. (2005). UMTS networks architecture mobility and services, 2005, publisher John
Wiley.

Krishna, V., Anurag, R., & Prabhune, S.S. (2014), "short messaging service as an alternative for
pushing information to build efficient information passing system in academic
institution" Retrieved from www.doi.org/10.1109/ITSIM.2010.5561647

Kroenke, D. M. (2003). What is a time table allocation? Time table as a measure of resource
usage and demand in college’s better newsletter: Greece.

Laudon, K. C (2004). A stochastic model for an optimal time table distribution colleges.
Operation research institute, Otawa

Markett, C., Sanchez, L.A., Weber, S. & Tangney, B. (2005), "please turn your mobile on: short
message services (SMS) supporting intetactivity in the classroom", (2005)

Mohammad, M.A. & Norhayati, A. (2003), "A short message service for campus wide
information delivery". In proceeding of 4th National conference on
Telecommunication Technology, pp. 216-221 (2003)

Morris, R. & Jamie P. (2010). Content alert system using sms: A testimony of two collaborative
projects in Africa and Asia. Proceedings and report of the 6th Ubuntu net alliance
annual conference, 2010 Pg 5-12.

Obea, J.V., & Fernandez, J. (2004), SMS, a new tool in the Radiological information system
exchange", (2004)

Penn S. (2012). SMS Types on Rout Messaging.com” Wednesday, February 12th 2012: page 13.

Yonan, G. (2009). Design and Implementation of crisis and emergency reporting and response
system using SMS. June 6th 2009

41

You might also like