Design and Implementation of Lecture Alert System for Computer Science Department-2
Design and Implementation of Lecture Alert System for Computer Science Department-2
INTRODUCTION
1.1 INTRODUCTION
Computers with the power of the internet have aid communication among people. The telephone
system which was invented several years ago, had undergone a great improvement so much that
today we have fixed wireless phones mobile phone and the likes with the rapid development of
mobile phones came several services like the short messaging service (SMS), Multi-media
messaging (MMS) which are readily available and add to the usefulness of mobile phones. SMS
is a mobile technology that allows for sending and receiving text or even binary messages to and
Argued that short messaging service (SMS) based services are now more attractive to service
providers and users as a result of the recent mobile phone use penetration and the large scale
adoption of the existing services by users. The major advantage of shot messaging service (SMS)
is its cost effectiveness and availability as most individuals own phone. The level of internet
availability in less developed countries is where homes are internet access, short messaging
The lecture alert system will not only allow lecturers to know when they have lecturers but it
also message the venue of the lecture and department to be handled. This is done by pushing the
alert to the lectures (sending it to their phones) or working on a request sent from a lecturer to
technologies that have made significant revolution in communications. The fast development of
1
communication and computer technology led to the merging of the public switched telephone
network (PSTN) and the internet to become global information network of integrated services.
Network services are becoming a more important way of information exchange and
communications turning telephone and mobile telephone toward internet service one o the
efficiencies of mobile phone is the availability of network services. The result carried out before
the development of the short messaging service (SMS) alert system show that mobile phone
Computer integration (CTI) is a system application that integrates advantages of telephone and
the internet by connecting phone services together. System application is any program, or group
of programs, that are desired for the end-user. EMA (Electronic Messaging Association) system
will inform the arrival of the new short messaging series (SMS) system are summarized as
follows:
• Lack of effective record system or database system to store the record of the timetable
• The consistent reports of error in the process of filling and allocating the lectures on the
time table.
• Stressful: this means causing a lot of anxiety and worry, therefore the existing causes
The problem faced or noted in the course of studying the existing systems of lecture alert system
1. Lack of effective record system or database system to store the record of time table.
2. The consistence report of errors in the process of filling and allocating the lectures on the time
table.
2
3. There will be clashes of lecture because one venue can be allocated to different lecturers at the
same time.
The aim of the study is to design and implement a student lecture alert system for the Reminder
System that will notify the student and lecturer about the scheduled lecture date, time and Venus.
• To show how a new method of checking lectures using mobile phone short messaging
• To highlight the existing problems associated with checking lectures on notice boards.
• To design a conventional lecture alert system using short messaging service (SMS).
The general benefits that will be derived from the new system are as follows:
• This project will help serve as a research material for future or prospective researchers.
• It would help to reduce the rate at which there is a clash between lecturers by ensuring
• It would help to generate update and reminder from the time schedule stored in the
This project work borders on the development of application software for sending one message
per period, per venue to the lecturers using short messaging service alert.
In carrying out this research work, some problems were encountered among which are
3
• Time: The time given for the completion of the research work was too short hence the
researcher had speed up the research work to meet up and this has an impact on the study.
• Limited Material: Few material were found pertaining to the research area and this
• Finance: the high cost of textbooks, internet browsing and transportation to different
• Independent Service: this involves using solely a mobile phone and the application
server (The system running the SMS application). This option offers limited benefit but it
• Dependent Service: this involves having the application server connect to the service
• Mobile Orientated (MO): SMS-Mo is sent from a mobile phone and could sent be sent
either to another mobile phones (such as when subscriber sends a personal message to
mobile phone. It also could be sent by another mobile phone or generated by a computer
application.
4
CHAPTER TWO
LITERATURE REVIEW
2.1 INTRODUCTION
The short message service (SMS) is a feature of second generation (2G) mobile technology and
it must not be longer than 140/160 alphanumeric characters without images or graphics. It is s
(GSM), time multiple access (CDMA) based mobile phone networks. said that SMS based
service are more attractive to service providers and users as a result of the recent penetration of
mobile phone and the large scale adoption of the existing service by users.
(Yonan, 2009) stated that several SMS based applications have been developed and are used for
various purposes in fields such as health, business, security monitoring, and supply chain
management.
As SMS examination result notification system was designed to enable students have remote
access to their examination result via mobile phones. Students a very the database by sending
SMS commands to the retrieve their results. The mobile operator and charges for the message as
if it was performed directly on a mobile phone by supporting an extended AT command set for
sending and receiving SMS messages according to defined specification Hence, there is the need
to develop a system that will combine available resources and reach people through SMS using
GSM module. Some of the client protocols used by SMS include: simple mail transfer protocol
application connectivity for SMS submission or server side protocols SMPP, Hypertext protocol
(HTTP) and simple mail transfer protocol (SMTP). (Morris & Pinchot 2010) said that with
emailing, in the 2010s, the sending of SMS has become accepted part of many cultures. Initially
5
growth of text messaging was slow, with customers in 1995 sending an average of 0.4 message
SMS forms on integral part of signaling system NO 7 (SS7) and it is a state” with a 160 character
data, coded in the ITU-T text format, that has a sequence lead in to determine different languages
codes.
Elektor (2011) and Elekor (2012) said some amateurs have also built own system to control
some of their appliances via SMS. Other method such as group Messaging, which was patented
in 2012 by the GM of Andrew Ferry, Devin Peterson et al are used to involve more than two
people into a text message conversation. A flash SMS is a type text messaging that appears
directly on the main screen without user iteration and is not automatically stored in the inbox. It
can be useful in cases such as emergency (e.g fire alarm). Some practical uses of text message
include the use of SMS for confirming delivery or other tasks e.g communication between a
service provider and a client and for sending alert several universities have implemented as
Mohammad and Norhayati (2003) developed a sms service system for student collaboration on
campus. The approach achieved quick message communication and delivery among students.
Krishna, Anurag and Prabhune (2014) presented a model which focuses on the use of SMS as a
way of sending data and substituting packets in a network. The system was to improve existing
Bin Haji Sidek (2010) stated that an SMS application system along with corresponding server
was developed. It was aimed at providing a system that can avoid the reliance of content delivery
SMS application for student examination result to SMS gateway provider and the commercial
SMS application develop which can be managed totally by the school staff.
6
Market, Sanchez, Weber and Tangney (2005) proposed a sms technology that supports
classroom interaction between students and the lecturers. Students send SMS via their mobile
phone which are viewed, replied and addressed by the lecturers through a developed software
connected with modem. The system was closely related with mobile notice board project for the
delivery of urgent information of students but could not ascertain a feedback module in the
deployment.
AL-Ali, Rousan and Mohandes (2004) and Al-Shaikh (2003) also proposed a patient and house
monitoring system to ease the ordering and delivery of house equipment using SMS technology
via mobile phone the system contributed immensely to the use of SMS technology foe message
Obea and Fernandez (2004) argued that an SMS tool to exchange information in medical area
was proposed and the work was developed as a radiological information system where physician
A push SMS application is one whereby a message is been sent from the application to the user.
It is a one way message in other words, it is the mobile application (In this case SMS and email
result checking application) that initiates message. An example could be a school that
automatically sends examination result to the students and their parents/ sponsors as soon as the
grades become available. The SMS would be delivered to them they are, as long as their mobile
7
2.3 PULL SMS APPLICATION
A pull SMS application is one whereby a user sends request and obtains a reply from the
Application. This is a full duplex scenario. An example is when a student request for his/her
Checking score by sending a request to 56677, or checking balance of your bank account by
Computers don’t make mistakes; mistakes are from humans who operates the system
These are caused by the operators of the computer as a result of mis-spelt Keyword, undefined
These occur during execution of program e.g. reference to non-existent variables and generation
The classic view of information systems found in the textbooks in the 1980s was of a pyramid of
systems that reflected the hierarchy of the organization, usually transaction processing system at
the bottom of the pyramid, followed by management information system decision support
systems and ending with executive information system at the top (Laudon, 2004). Although the
pyramid model remains useful since it was first formulated a number of a new technologies have
been emerged, some of which is no longer fit easily into the original pyramid model.
• Data warehouses
8
• Enterprise systems
• Expert systems
• Search engines
A computer based information system is essentially using computer technology to carry out
some or all of its planned task. The basic components based information systems are:
• Hardware These are devices like the monitor, processor printer and keyboard of all which
• Software: is the program that allows the hardware to process the data.
• Data bases are the gathering of associated files on tables containing related data.
• Procedures are the commands for combining the components above the process
The first four components (hardware, software, database and network) make up what is known as
the information technology platform. Information technology workers could then use these
components to create information systems that watch over safety measures, risk and the
management of data. These actions are known as information services (Archibald 2001).
As related to lecture alert system, an information system is a system composed of people and
The term is also sometimes used in more restricted senses to refer to only the software used to
run a computerized database. An information system is a work system whose activities are
information.
9
As such, information systems inter-relate with data systems of the one hand and activity systems
on the other. An information system is a form of communication system in which data represent
and are processed as a form of social memory. An information system can also be considered a
semi-formal languages which supports are the primary focus of study for organizational
information.
These are different ways to secure the data in a file such as:
• Disk encryption: refers to encryption technology that encrypts data on a hand disk drive.
• Backups: Backups are used to ensure data which is lost can be recovered.
• Data masking: Data masking of structured data ia the process of obscuring (masking)
specific data within a database table or cell to ensure that data security is maintained and
• Data Erasure: Data erasure is a method of software based over writing that completely
destroys all electronic data residing on a hard drive or other digital media to ensure
10
CHAPTER THREE
3.1 INTRODUCTION
The objective of the system investigation and analysis is to collect information about the
current system, the method of data collection. It also gives a description of input design and
output specification. The analysis of the existing system therefore provides a firm basis for the
design of the new system. Through investigation, the scope of the problem and the effort
required to complete it. In this chapter, the methodology adopted is a waterfall methodology
WATERFALL MODEL
11
Fig 3.1: Waterfall Model
• Planning
• Analysis
• Design
• Implementation
• Testing
• System
Student lecture alert system for the department of computer science scheme as being an object
oriented project is exposed to use tools like the use case diagram, flowcharts and other tools for
development of this project in order to increase users’ confidence, by reassuring users that the analyst
fully understand the nature of the problem that the system must carry out.
There are some techniques that were used in investigation of the existing system and resulted in a
set of data structures of the current systems data and the initial problem list for the project. Some
• Interview Method: this process involves asking question to relevant personnel’s who
gave out vital information to the researcher. The researcher engaged on face to face
contact which enabled the author to distinguish between facts and opinions from the
interview. Although majority of the respondents were in affirmation while few were of
diverse opinion.
12
• Observation of the system operation: This process involves watching while the system
is operation to discover things without being told. During operation I discovered that the
existing method of allocating lecture time table is done manually using paper and pen. I
also observed that there is usually clash of lecture between the lecturers on existing
• Studying the current system documentation: this is about studying the documentation
the documents studied were: Organizational chart, Lecture time table and Lecture time
table procedural chart and I found out that all are done manually using pen and paper.
Since the establishment of the Kebbi state university of science and technology Aliero in
2006, KSUSTA offers programmer in Computer science and amount others.it was the 79 th
university in Nigeria
The institution presently has over twenty three department of which one of it is computer
science department which has goal in graduating students who have been found worthy and
Computer science department is one of the departments that has a big population numbering
hundreds of students every semester. They offer provisional admission for the award of
Degree respectively.
and exams which students are graded accordingly. Computer science department is practical
13
based students learn different programming skills through practical session conducted. The
qualified lecturer and staff who worked so hard to see the department at the level they are
now.
The department has the opportunity to run post graduate degree programmer as one of the
Dean
Secretary
Assistant
Laboratory
technologist
Executing
officers
Chief Technologist
Laboratory
Attendants
Lecturers
14
• Head of Department: The HOD is responsible for ensuring that information which the
head receives from the other is appropriately acted upon and for dissemination within the
department.
• Secretary: This is a person that takes document of the department and takes care of the
• Academic staff: These are those responsible for teaching the students courses that as
allocated to them by the head of the department and take care of the minute when
technology in particular field. They are also responsible for taking practical in the
department.
• Admin officer: administrative officer manages office stock, preparing regular reports
• Higher executive officer: he is a person who manages people and dealing with
performances issues
• Assistant executive’s officer: executive assistant performs duties that can have effects
• Laboratory assistant: lab assistant assist staff with laboratory facility management and
15
• Dormitory administration building storage and boat operation.
In existing system lecture alert system is done manually using pen and paper i.e he/she will drift it on a
paper in a tabular form with columns and row which contains lecturers name, department, days, course
code, course table, programmer, venue and time which usually subject to errors and duplicate allocation
There is no existing alert system. The lecture depends on his own ability to remember. He
may consult with time table etc. some of them who have sophisticated phones or who are
friendly with using their phones alarm system may use phone alarms, reminders, to do list
etc on their phone as a form of alert system. Others wait to get call from students reminding
UG2
UG3 CSC302(B2)
UG4 CSC412(B2)
UG4 CSC422(A1)
16
WEDNESDAY UG1
UG2 CSC206(SLH2) CSC208(SLH2)
CSC202(SLH2)
UG3 CSC314(SLH1) CSC316(SLH1)
UG2 CSC208(STT2)
UG2 CSC210(SLH2)
UG3 CSC302(STT2)
17
3.6.2 PROCEDURAL CHART OF THE EXISTING SYSTEM
Display main-
menu
DATA ENTRY
ONLINE PROCESSING
DATA ON
DISK
RESULT
ON DISK
REPORT
GENERATION DOCUMENTS
(SCREEN)
TRANSACTION
18
FIG 3.4: Procedural chart
The existing system has no format as the output therefore, lecture notes, jotters and
attendance book as an evidence of the lecture serves as the output of the current system.
• Smooth and orderly working: the time table makes the school work smooth, systematic
and orderly, work of the lecturer and the students are clearly specified everybody knows
• Eliminates waste: Time table specifies every item of work clearly. It deal attention of
• Lack of effective record system or database system to store the records of time table
• Regular clash of period or duplicate allocation of time to more than one course
• Misplacement and loss of time table to unauthorized users of the time table.
• The speed of processing and allocation of courses on courses on the time table is low and
19
3.7 PROPOSAL FOR A NEW SYSTEM
Due to many problems encountered in the lecture time table, a lecture alert system is
proposed, it is an online system computerized and designed in a way that it sends SMS to a
lecturer for a particular period and venue. The new system if well implemented, it will serve
Since experience has shown that using a system brings to light its short comings. The suggest
improvement especially in a case where the system is no longer satisfactory to the user. So in
this case a lecture alert system is suggested in replacement of manual based system which
already exists. A lecture alert system will help to increase the effectiveness and efficiency in
service and reduce the problem associated with the current system.
20
3.7.2 HIGH LEVEL MODEL OF THE PROPOSED SYSTEM
MENU
Schedule Timetable
Add lecturers
View Timetable
21
CHAPTER FOUR
4.1 INRODUCTION
System design is a process of defining the architecture modules, interface and data for a system
to satisfy specified requirements. The system being proposed will in this section be designed to
• To develop a system that will reduce numerous problem and stress encountered in
• Security: the system should be able to guard against intrusion and unauthorized
This is system block diagram that shows how the new system works. It also describes
how information moves or are being circulated around the new system. The block
diagram will show briefly the process that will be carried out in the lecture alert system.
22
COURSES
INPUT DATA
VENUES
ALLOCATE CLASSES
CHECK TIMETABLE
TIME
LECTURER
ALERT TIME TABLE
ADMIN
This is where all the sub system that are developed from, it shows the sequence in which the
system design is maintained and achieved. It also specifies all programs that will run the
identified modules. It also shows how each component is related to others forming the sub
system.
23
Homepage
View Timetable
• The homepage module: This is the first page that appears when the system is
launched from the browser. It provides navigation to other modules of the system
of adding new users (recipients) he can as well update, delete the user record. It is
also the duty of administrator to send out notification to users when they have a
• The lecture module: The user of the system (Recipient) will be able to log in and
out of the system, view notifications about the information they have in their
24
boxes. They can as well accept the message on pick up of their messages in the
• The reminder module: The reminder module checks from time to time if a
specific message has been picked up by the user and confirmed by the
specified.
This is the overall comprehensive diagram of the system indicating the flow of data within the
25
FIG 4.3: Use case diagram
26
Data base file
Keying of (disk)
data
Processing
of data (CPU)
Display inputs
from keyboard
(VDU) Output
4.3.4 SPECIFICATION
Data specification comprises all the data field and records collected and analyzed to help
in creating a good database Management system for the new system. The database
Database tool used in the development of this system is MySql, the reason for the includes;
27
• It can create new in the database
The database structure is made up of the system which contains a platform with the following:
Field Type
Program Name String
Field Type
Contact No Integer
Email String
28
TABLE 4.3 Lecturers table
iv. Department
This table stores the department names used in the timetable allocations.
Field Type
Department Name String
v. Courses
This table stores the course names used in the timetable allocations.
Field Type
Course Code String
Unit Integer
Title String
Type Integer
Semester String
4.3.7 COMPUTATION
This system comprises two main modules which are the Administrator and User Module.
• The Administrator Module: the administrator provides full control and access for users’
• The User Module (Lecturers): this page is accessed by the user which will enable them
29
4.3.8. I. INPUT DESIGN
The input design gives an illustration of the requirements needed to log in to the system.
Below are the input designs for student lecture alert system.
30
FIG 4.6: Add new lecturer
31
FIG 4.6 Compose message form
Drawn from different tables of the database. In this case the generated SMS is the output of the
New system.
This comprises the list of most variables used in the development of the system and their
descriptions.
The most programming language used for the system design is PHP
• Pre hypertext preprocessor (PHP): It is used for creating a database in a system, for
• Hypertext Markup Language (HTML): This is used to build up the website and
The requirement of the full operation of system includes software and hardware requirements.
The essential hardware devices as well as software platform required for the efficient and
33
4.4.2 HARDWARE REQUIREMENT
The hardware requirements for successful execution of this project work include:
8. Personal computer.
3. Programming and scripting language such as PHP, HTML, text editor, mySQL. They enable
The following are the procedures to get the new software install on your system:
34
1. Boot and insert the software into the DVD/CD drive.
5. Click finish.
The software was tested exhaustively by creating plenty lecture fixtures with varying start times
and monitoring the dispatch of SMS to the intended recipients through the SMS API. The SMS
were successfully delivered with only very few exceptions as the results of network error in
which case the software would attempt to resend the SMS. SMS sent retry Window was set at
two .i.e if the sms is not sent at the first attempt: it's sending would be retried on the next loop
within the 5mins time bracket and before the start of the lecture. If offer the second attempt the
sending fails, the entry is tagged as sent because it forwarded by program but not delivered
because the SMS API did not receive a delivery report after which the GUI (graphic user
The tools used for the testing of the system include the following:
1. Browser: this interpret the instructions and displays it's equivalent to the users understandable
2 XAMP: This consists of a local server and database management system for testing the web
35
4.6.2 METHOD APPLIED
The design method applied on the project work is the top down design method when developing
a complex computerized system. It is often very useful to breakdown the programming effort of
the software design into smaller modules called sub system which further can be broken into
Having tested the system using software testing tools as listed above the result was properly recorded.
With the necessary input processed, the output which depends on the input, is retrieved based on
the details entered from this system. The lecture alert system for the next five years could be
The project ensures that there is security assurance activities such as penetration testing, code
review and architecture analysis are ensured. This application also ensures authentication,
confidentiality, authorization, integrity which ensures that the system prevent unauthorized user
The researcher provided necessary documents and other requirements that will be enable the
1. The operators will learn to take adequate measure such as installation and use of antivirus to
36
Parallel change over procedure is recommended and adopted for this work.
This involves the operation of the old system and the new system alongside each other. Hence,
the current system and the proposed system will be in operation. This is because it is highly
reliable and less risk when compared with other procedures. This type of system conversion
These are different method of system maintenance but at the initial stage if this system,
37
CHAPTER FIVE
5.1 SUMMARY
In summary, the use of computerized lecture alert system makes it possible for data to be
processed with great speed and efficiency without delay. Lecture alert system has been
developed using web based for its portability. This new system generates updates and reminder
from a time scheduled stored in a database thereby making the system a time triggered
application. The proposed system allowed for easy and enhanced communication between the
The computerized Lecture alert system has been a great benefit and has contributed to the
38
1. The use of computer has ease a lot of time wasting in using pen and paper to create lecture
time table because computer operators can login and send the SMS of lectures to the lecturers.
2. Since the research is web based system, it will encourage the computer scientist or investigator
more, so as to make the system more responsive easy to use and user friendly.
The researcher went further to suggest that if more research is made on this project work, it will
help to eliminate the use of pen and paper in creating lecture time table for computer science
department AIFPU. Also the computerized system will be more reliable and more efficient, and
does not require much from the user but only needs the input.
5.4 CONCLUSION
In bringing this work to a close, this system has become a very important assets that all should
embrace and ensure that it continue to exist so as to allow for easy lecture allocation. In addition,
this work has proved that computerized lecture alert system is a better substitute and also a
flexible option available to the lecturers at all time if it is properly put to use and based on the
guidelines of this research work coupled with the rule contained in the program (new system).
5.5 RECOMMENDATION
To further strength this work and for it to enjoy acceptability and popularity, the author
1. The computer system available in the institution should be properly maintained to avoid
malfunction.
39
3. Consistent power supply should be made available at all time to keep the system running.
4. The administrator account should not be kept open for non-administrator staff to have access
to it.
REFERENCES
AL-Ali, A.R.,Rousan, M.A., & Mohandes, M. (2004),"GSM- based wired home appliances
monitoring and control system" International conference on information and communication
technologies.pp 237-238 (2004)
AL-Shaikh, M. & Rousan, M.A. (2003), "Embedded system based mobile patient monitoring
device", in proceeding of 16th IEEE symposium computer based medical system,
New York, USA June 26 2003, pp. 355-360
Archibald, J. A. (2001). Simulation modeling for time table planning. Milky press Toronto
Bin Haji Sidek, S.F. (2010), "The development of the short messaging service application for the
school usage", international symposium on information technology.2010
Bodic, G. (2005). Mobile messaging technologies and service: SMS, EMS, MMS. Retrieved
from www.wiley.com/en-us/
Elekor N.L. (2011). An ATM 18 system for SMS: retrieved 29 March 2011.
Elektor C. (2012). Using SMS to control devices amateur, built system based on ATM 29 may,
2012
40
Heikki, K. (2005). UMTS networks architecture mobility and services, 2005, publisher John
Wiley.
Krishna, V., Anurag, R., & Prabhune, S.S. (2014), "short messaging service as an alternative for
pushing information to build efficient information passing system in academic
institution" Retrieved from www.doi.org/10.1109/ITSIM.2010.5561647
Kroenke, D. M. (2003). What is a time table allocation? Time table as a measure of resource
usage and demand in college’s better newsletter: Greece.
Laudon, K. C (2004). A stochastic model for an optimal time table distribution colleges.
Operation research institute, Otawa
Markett, C., Sanchez, L.A., Weber, S. & Tangney, B. (2005), "please turn your mobile on: short
message services (SMS) supporting intetactivity in the classroom", (2005)
Mohammad, M.A. & Norhayati, A. (2003), "A short message service for campus wide
information delivery". In proceeding of 4th National conference on
Telecommunication Technology, pp. 216-221 (2003)
Morris, R. & Jamie P. (2010). Content alert system using sms: A testimony of two collaborative
projects in Africa and Asia. Proceedings and report of the 6th Ubuntu net alliance
annual conference, 2010 Pg 5-12.
Obea, J.V., & Fernandez, J. (2004), SMS, a new tool in the Radiological information system
exchange", (2004)
Penn S. (2012). SMS Types on Rout Messaging.com” Wednesday, February 12th 2012: page 13.
Yonan, G. (2009). Design and Implementation of crisis and emergency reporting and response
system using SMS. June 6th 2009
41