0% found this document useful (0 votes)
100 views43 pages

Simcard Management Using Biometric System

This chapter introduces the background, problem statement, purpose, objectives, scope, and significance of researching the use of fingerprint recognition technology for SIM card identification in Somalia. The key points are: 1) The current SIM card identification process in Somalia is insecure and allows for fraud, while biometrics could provide secure identification. 2) The study aims to evaluate the technical, financial, and social feasibility of implementing fingerprint recognition for SIM registration and renewals. 3) The objectives are to assess technical requirements, evaluate effectiveness, and facilitate renewals using fingerprints to improve SIM security in Somalia.

Uploaded by

Mohamed Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views43 pages

Simcard Management Using Biometric System

This chapter introduces the background, problem statement, purpose, objectives, scope, and significance of researching the use of fingerprint recognition technology for SIM card identification in Somalia. The key points are: 1) The current SIM card identification process in Somalia is insecure and allows for fraud, while biometrics could provide secure identification. 2) The study aims to evaluate the technical, financial, and social feasibility of implementing fingerprint recognition for SIM registration and renewals. 3) The objectives are to assess technical requirements, evaluate effectiveness, and facilitate renewals using fingerprints to improve SIM security in Somalia.

Uploaded by

Mohamed Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

CHAPTER ONE

INTRODUCTION

1.0 Introduction

This chapter covers the background of the study, the problem statement, the
research purpose, the research questions, the scope of the inquiry, the
significance of the study, and the project organization are all covered in this
chapter.

1.1 Background of the system

Sim cards play a crucial role in providing mobile services to the people in
Somalia. The mobile telecommunications industry has grown rapidly in
Somalia in recent years, with a significant increase in the number of mobile
phone users. The use of sim cards has become a crucial part of daily life,
facilitating communication, commerce, and the transfer of information.
However, the current process of sim card identification is not secure, and there
have been instances of sim cardfraud and illegal activities, and issue related
Sim card lose they face daily the Somali people in city and all the other regions
and they don’t get fast the renew of the sim card by asking in chargeassociated
with them.The process of sim card identification in Somalia involves
presenting identification documents, such as a national ID card or passport, to
the service provider. This information is then recorded in a database and linked
to the sim card. However, there have been instances of fraudulent individuals
using fake identification documents to obtain sim cards for illegal activities,
such as

1
money laundering, terrorism, and human trafficking. In addition, the lack of
proper regulation andenforcement mechanisms has made it difficult to track
and prevent such illegal activities.

To improve the security of sim card identification and prevent such illegal
activities, the use of biometric authentication systems has been proposed.
Biometric authentication systems use unique physical or behavioural
characteristics, such as fingerprints, facial recognition, and iris scans, to verify
an individual's identity. The use of biometric authentication systems provides
a secure andreliable method of identification, as it is difficult to forge or tamper
with biometric data.

Fingerprint recognition technology is one of the most widely used biometric


authentication systems. It works by capturing an image of an individual's
fingerprint and using it to create a unique digital template. This template is then
used to verify the individual's identity whenever theyneed to access a service or
device that requires authentication. Fingerprint recognition technologyis fast,
accurate, and reliable, making it a suitable solution for sim card identification
in Somalia.

However, the implementation of fingerprint recognition technology for sim


card identification in Somalia requires significant investment and resources,
including the development of a database of fingerprints, the installation of
biometric devices, and the training of personnel. In addition, there are also
privacy and security concerns associated with the use of biometric data, as well
as culturaland social attitudes towards the use of biometrics.In conclusion, the
use of fingerprint recognition technology for sim card identification in Somalia
has the potential to improve the security of the sim card identification process
and prevent illegal activities associated with sim cards. However, the
implementation of this technology requires careful consideration of the
technical, financial, and social implications. Further research is needed to fully
understand the feasibility and effectiveness of using fingerprint recognition
technology forsim card identification in Somalia.

2
1.2 Problem statement

The current process of sim card identification in Somalia is not secure, and
there is a need for a more reliable and secure system to prevent sim card fraud
and illegal activities. The current process of sim card identification involves
presenting identification documents, such as his/her number also basic
information needed, to the service provider. This information is then recorded
in a database and linked to the sim card. However, this process has several
limitations that make it vulnerable to fraud and illegal activities.

First, the use of identification documents for sim card identification is not a
secure method of verifying an individual's identity. There have been instances
of fraudulent individuals using fake identification documents to obtain sim
cards for illegal activities, such as money laundering, terrorism, and human
trafficking. This makes it difficult to track and prevent such activities.

Second, the lack of proper regulation and enforcement mechanisms in Somalia


makes it challenging to prevent and detect sim card fraud and illegal activities.
The current system does notprovide sufficient mechanisms for monitoring and
verifying the information provided by individuals during the sim card
registration process. This makes it difficult to detect and prevent fraudulent
activities, even if they are reported.

Third, the current system does not provide a secure method of linking an
individual's identity to their sim card. This makes it easier for fraudulent
individuals to obtain sim cards using false identities and use them for illegal
activities. To address these limitations, the use of biometric authentication
systems, such as fingerprint recognition, has been proposed as a solution to this
problem. Biometric authentication systems useunique physical or behavioural
characteristics, such as fingerprints, facial recognition, and iris scans, to verify

3
an individual's identity. The use of biometric authentication systems provides
a secure and reliable method of identification, as it is difficult to forge or
tamper with biometric data.

1.3 Purpose of the project

Purpose of this Simcard Management Using Biometric is for society


is that the personsare to use a system to storage of data Movements
and keep all records related to the actions and Performance by teaching
to use a book this system allows you to insert, modify and delete of
data, this system allows you to see previous saved records, thereis no
duplicate data, this system is able to perform all of the information
report or individual data report.
1.4 Project objectives

The main objective of this research is to evaluate the feasibility and


effectiveness of using Simcard Management Using Biometric In Somalia for
sim card identification in Somalia. To achieve this objective, the following
specific research objectives have been identified

4
i. To assess the technical requirements for implementing fingerprint
recognition technology for sim card identification in Somalia,
including the development of a database offingerprints, the installation
of biometric devices, and the training of personnel.
ii. To evaluate the effectiveness of using fingerprint recognition
technology for sim card identification in Somalia, including the
accuracy and reliability of the system, the speed and efficiency of the
authentication process.
iii. To Facilitate the renewing Sim cards in Somalia using techniques such
as fingerprint in an effectiveness way.

By achieving these objectives, the research aims to provide a comprehensive


evaluation of the feasibility and effectiveness of using fingerprint recognition
technology for sim card identification

in Somalia. The findings of this research will inform the development of


policies and practices for implementing secure and reliable sim card
identification systems in Somalia

1.5 Project Scope

The scope of this Study is to stop challenges related the renewing Sim cards by using
fingerprint method. By implementing easy and safe way to renew Sim cards every time
and everywhere, andour main goal is to avoid asking citizens for in a charge to renew
their Sim cards when they loss, this system will be used to register any data that can need
to tomorrow for the citizens like his/heridentification by fingerprint

5
1.6 Significance of the project

The Simcard Management Using Biometric In Somalia for sim card


identification in Somalia has the potential to bring significant benefits and
improve the security and reliability of the sim card identification process. This
research is significant for several reasons:

1. Enhancing the efficiency of the identification process: The use of


fingerprint recognition technology is fast, accurate, and reliable,
making it a suitable solution for sim card identification. This will
enhance the efficiency of the identification process and reduce thetime
and resources required to verify an individual's identity.
2. Protecting personal Sim card : The use of biometric data for sim card
identification requires careful consideration of privacy and security
concerns.
3. To produce appropriate way to solve all the needs related Sim card
registration and renewing.

In conclusion, the research on the feasibility and effectiveness of Simcard


Management Using Biometric for sim card identification in Somalia is
significant for improving the security and reliability of the sim card
identification process, protecting personal information, informing policy and
practice, and contributing to academic research. The findings of this research
will have important implications for the development of secure and reliable
identification systems inSomalia and other developing countries

6
1.7 REPORT ORGANIZATION

In this research, it is organized chapters as follows:

Chapter One: describes an introduction and background of Simcard Management Using


Biometric Furthermore, this chapter will cover the objectives, scope as well as significance
of the study and how the project was organized.

Chapter Two: This chapter also discusses the introduction of relevant literature of
Simcard Management Using Biometric with listing concepts and opinions from experts or
authors. This chapter deals with previous work or existing systems for based Simcard
Management Using Biometric Gab analysis will be displayed using tabulated form.

Chapter Three: Defines how the data collected, analyzed, how the interview has been
done and the finding of the analyzed data and also the chapter will discuss how the system
was analyzed using UML (use case diagram).

Chapter Four : is the last phase of the project and describes the implementation of this
project and testing it to produce complete functioning system.

Chapter Five: Finally, this chapter provides conclusion and recommendations by


describing the strengths and achievements of the projects. This chapter also gives the
weaknesses of the Simcard Management Using Biometric and its future enhancements.

7
CHAPTER TWO

LITERATURE REVIEW

2.0 Introduction

A literature review is a critical and in-depth evaluation of previous research.


It is a summary and synopsis of a particular area of research, allowing
anybody reading thepaper to establish why you are pursuing this particular
research. A good literature review expands on the reasons behind selecting
a particular research question.(Shuttleworth, 2009) A literature review is a
survey and discussion of the literature in a given area of study. It is a concise
overview of what has been studied, argued, and established about a topic,
and it is usually organized chronologically or thematically. A literature
review is written in essay format. It is not an annotated bibliography,
because it groups related works together and discusses trends and
developments rather than focusing on one item at a time. It is not a summary;
rather, it evaluates previous and current research in regard to how relevant
and/or useful it is and how it relates to yourown research. (Mary’s, 2012)

8
Literature
Review

2.3 Compare
2.1 Theoretical
Between 2.4 Chapter
2.0 Introduction & Conceptual 2.2 Case Study
Existing Summary
Framework
Systems

Identification technologies

Agent structure

Figure 2.1: Literature review map

9
2.1 Theoretical and Conceptual Development

The following section. The research briefly illustrates in the concept

and ideas related to the Simcard Management Using Biometric system


used to dayaround the world.

previous work

Sim card security system is needed for convenience and safety. This system
invented to keep sim card safe from intruder. In this work, we present the
design and implementation of a GSM based wireless sim card security system,
which take a very less power. The system is a wireless sim cardnetwork which
contains a GSM modem and magnet with relay which are sim security nodes.
Thesystem can response rapidly as intruder detect and GSM module will do
alert sim card owner. This security system for alerting a Sim card owner
wherever he will. In this system a relay and magnetinstalled at entry point to
precedence produce a signal through a public telecom network and sends a
message or redirect a call that that tells about your sim card update or
predefined message whichis embedded in microcontroller. Suspected activities
are conveyed to remote user through SMS or Call using GSM technology.
(Castellano, 2005)

10
In this proposed work, RFID reader reads the ID number from passive tag and
sends to the microcontroller, if the id number is valid then only it gives the
access to the fingerprint scanner otherwise it stops the process, if the fingerprint
is matched then microcontroller sends the password to the authenticated 6-
person mobile number then the authenticated person enters the bothpasswords
in the keyboard which was already given by the user and received from the
microcontroller. if these two passwords are matched then the locker will be
opened otherwise the microcontroller sends the warning message to the
authenticated person mobile number and it willbe remained in locked position.

Security has been playing a key role in many of our places like offices,
institutions, libraries, laboratories etc. in order to keep our data confidentially
so that no other unauthorized person couldhave an access on them. Nowadays,
at every point of time, we need security systems for protectionof valuable data
and even money. This paper presents a fingerprint-based sim accessing system
which provides security which can be used for many banks, institutes and
various organizations etc..,. There are other methods of verifying authentication
through password, RFID but this method is most efficient and reliable. To
provide perfect security to the bank lockers and to make the workeasier, this
project is taking help of two different technologies viz. EMBEDDED
SYSTEMS and BIOMETRICS. Unauthorized access is prohibited by
designing a lock that stores the fingerprints of one or more authorized users.
Fingerprint is sensed by sensor and is validated for authentication. If the
fingerprint matches, the sim will be accessed automatically otherwise the
buzzer connectedto an audio amplifier will be activated so that the people near
the surroundings will get an alert.
(Aditya Shankar, 2015)

Fingerprint matching has been successfully used by law enforcement for more
than a century. Thetechnology is now finding lot of other applications such
as identity management and access

11
control. In this context, an automated fingerprint recognition system and
identification of key challenges are described along with the research
opportunities. The description is like a product design in this report
implementing RTOS. (Real time operating system) under the domain of
embedded system.

Fingerprint Recognition is a widely popular but a complex pattern recognition


problem. It is verydifficult to design accurate algorithms capable of extracting
salient features and matching them ina robust way. In this paper, we have come
with a novel approach to simplify the existing problems with a proper
Embedded System Design. (Devendra Kumar Yadav, 2015).

Security is the major issue faced by everyone when we are away from our
households. In the present scenario satisfactory solution for the above problem
is not yet discovered. Presented hereis an electronic locking system in which
Arduino plays the role of the processing unit. Arduino which is a
microcontroller board belongs to at mega family. It is an open-source simple
tool. It hasthe ability to sense, monitor, store and control applications.

These 8 papers propose an alternate approach for wireless control of a device


by incorporating a fingerprint identification module along with GPS and GSM
modules. The fingerprint module increases the authenticity of the device and
enables multiple users to control the device. These modules are integrated to a
simple Arduino microcontroller to demonstrate various functionalities.
The proposed approach finds its application in various fields like automobiles,
agriculture.

12
Management

Management is essential for an organized life and necessary to run all types
of management. Good management is the backbone of successful
organizations. Managing life means getting things done to achieve life’s
objectives and managing an organization means getting things done with
and through other people to achieveits objectives.

Whether management is an art or science, will continue to be a subject of


debate. However, most management thinkers agree that some form of formal
academic management background helps in managing successfully.
Practically, all CEO’s are university graduates. Hence, the reason for
including business degree programs in allacademic institutions.
System
A system is a collection of elements or components that are organized for a common
purpose. The word sometimes describes the organization or plan itself (and is similar in
meaning to method, as in "I have my own little system") and sometimes describes the parts
in the system (as in "computer system"). A computer system consists of hardware
components that have been carefully chosen so that they work well together and software
components or programs that run in the computer.
The main software component is itself an operating system that manages and provides
services to other programs that can be run in the computer. A filing system is a group of
files organized with a plan (for example, alphabetical by customer). All of nature and the
universe can be said to be a system. We've coined a word, ecosystem, for the systems on
Earth that affect life systems. The term can be very useful because so many things can be
described as systems. It can also be very un-useful when a more specific term is needed
(Margaret, 2005).
System is a set of things working together as parts of a mechanism or an interconnecting
network; a complex whole. System is group of related hardware units or programs or both,
especially when dedicated to a single application. System is a set of organs in the body

13
with a common structure or function. System is a set of principles or procedures according
to which something is done; an organized scheme or method (system, 2014).
Arduino Microcontroller

Arduino is open-Source electronic prototyping platform based on flexible easy


tousle hardware and software. It is a single-board microcontroller to make using
electronics in multidisciplinary projects more accessible. The hardware consists of
a simple open-source hardware board designed around an 8-bit Atmel AVR
microcontroller, or a 32-bit Atmel ARM. The software consists of a standard
programming language compiler and a boot loader that executes on the
microcontroller.(Rupinder Saini, 2014)

MySQL

MySQL is an open-source relational database management system (RDBMS) based on


Structured Query Language (SQL).
MySQL runs on virtually all platforms, including Linux, UNIX, and Windows. Although
it can be used in a wide range of applications, MySQL is most often associated with web-
based applications and online publishing and is an important component of an open-source
enterprise stack called LAMP. LAMP is a Web development platform that uses Linux as
the operating system, Apache as the Web server, and MySQL as the relational database
management system and PHP as the object-oriented scripting language. (Sometimes Perl
or Python is used instead of PHP.)
MySQL, which was originally conceived by the Swedish company MySQL AB, was
acquired by Sun Microsystems in 2008 and then by Oracle when it bought Sun in 2010.
Developers can still use MySQL under the GNU General Public License (GPL), but
enterprises must obtain a commercial license from Oracle. (Margaret , MySQL, 2013)

14
2.2 Case study of the research

Somali tack established in 2023 by Somali Professionals supporting by the


government of Somali.

Somali tack has traditional system. It requires to have a good Design and
implementation and Simcard Management Using Biometric system Somali
immigration is located in the capital city of Somalia – Muqdisho.

❖ Vision
To work toward an equitable Somali tack by ensuring access to Design
and implementation and Simcard Management Using Biometric system
space and beauty full workers, and by educating beginning agents and
Somali tack of all ages.

❖ Mission
People cooperate to create and sustain needs communities by growing
Somali tack and we will promise to get any skills about Samoa Somali tack
in every country in the world

2.3 Compare Between exiting system

Purpose of this Design and implementation and Simcard Management


Using Biometric system is that the client is to usea system to storage of
data customers and keep all records related to the actions and chat by
transferring posts to use a book this system allows you.

15
2.3.1 Identification technologies

A fingerprint-based personal authentication system operates in two distinct


modes: enrolment and authentication (identification), as is shown in figure
(2.5). During enrolment, a fingerprint image is acquired from a finger presented
by an authorized user using a “fingerprint sensor,” and relevant features are
extracted by the feature’s extractor. The set of extracted features, also referred
to as a “template” is stored in a database, along with the user’s information
necessary for granting service,and some form of
ID assigned for the user. (Kaoru Uchida, 2015)

When the user seeks for a service, i.e., in authentication mode, the user inputs
his assigned ID andpresents his fingerprint to the sensor. The system captures
the image, extracts (input) features from it, and attempts to match the input
features to the template features corresponding to the subject’sID in the system
database. If the calculated similarity score between the input and the template
is larger than the predetermined threshold, the system determines that the
subject is who he claims to be and offer the service; otherwise, would reject
the claim. IN identification mode, on the other

15 hand, the user who seeks for a service presents his fingerprint only without
his ID, and the system may either be able to determine the identity of the
subject or decide the person is not enrolled in the database. (Kaoru Uchida,
2015)

16
Figure 2.3 identification technologies

2.3.2 Agent structure

This is where the whole process of SIM card registration occurs in the
proposed system. Here a prospective subscriber of a mobile operator brings a
national identity card. This card has a numberof unique features which can be
used to in scanning or reading for verification in the national identity or
centralized database. For example, a Malawian national identity card has; ID
number, QR code, computer chip and holder fingerprints. ID number and
computer chip are on the front of the card while QR code and holder’s
fingerprint are on the rear.

17
Figure 2.13 Sample
ID,

Malawi

Features identification Proposed System


technologies Agent structure
Login No Yes Yes
Registration No Yes Yes
nationality No No Yes
Report No No Yes
User access Yes No Yes
Modify Customer Yes Yes No
address No Yes Yes

18
2.4 CHAPTER SUMMARY
This chapter discussed Theoretical and Conceptual Development Using Biometric system
and, Case study of the research, Compare Between exiting system Chapter Summary.

19
CHAPTER THREE

SOFTWARE PLANNING AND ANALYZING

3.0 Introduction

Software: in its most general sense, is a set of instructions or programs instructing a


computer to do specific tasks. Software is a generic term used to describe computer
programs. Scripts, applications, programs and a set of instructions are the terms often used
to describe software.

The word software was first used by John Turkey in 1958. The theory of software was first
proposed by Alan Turing in 1935.

Software is often divided into three categories:

1. System software serves as a base for application software. System software includes device
drivers, operating systems (OSs), compilers, disk formatters, text editors and utilities
helping the computer to operate more efficiently
2. Programming software is a set of tools to aid the developers to write programs. The various
tools available are compilers, linkers, debuggers, interpreters and text editors.
3. Application software is intended to perform certain tasks. Examples of application software
include office suites, gaming applications, database systems and educational software.
(software, n.d.)

20
Planning: A basic management function involving formulation of one or more detailed
plans to achieve optimum balance of needs or demands with the available resources.
(definition/planning.html, n.d.)

Software Analyses is Software analysis patterns or analysis patterns


in software engineering are conceptual models, which capture an abstraction of a situation
that can often be encountered in modeling.(Software_analysis_pattern, n.d.)

This chapter will include the following sections: Introduction, Operational Framework,
Work Break down structure (WBS), System Requirement, Problem Analysis
Identification, Requirements Gathering Techniques, Process Modeling, Data Modeling,
Suitable solution Strategies of the proposed system, System Feasibility and Chapter
Summary.

3.1 Operational Framework

The Operational Framework starts planning, proposal, chapter one introduction, chapter
two literature review, chapter three software planning & analyzing chapter four software
design, chapter five system implementation and finally chapter six conclusions &
enhancement

21
Initialization and planning
Phase one
Literature Review

Data gathering

Interview Observation
Phase Two

Analyzing

DESIGNING PROTOTYPE

NO
System
Acceptanc
Phase Three
e

YES

Test the Prototype

Report writing

Figure 3. 1 Operation Frame Work

22
3.2 Work Break down structure (WBS)

Work break down structure (WBS) is a vehicle for breaking an engineering project down
into subproject, tasks, subtasks, work packages, and so on. It is an important planning tool
which links objectives with resources and activities in a logical framework. It becomes an
important status monitor during the actual implementation as the completions of subtasks
are measured against the project plan. (Robert, 1984)

WBS is categorized into:

A) WBS product

Admin

divice Simcard Management addrss


Using Biometric system

Reports

Figure 3. 2 WBS

23
B) WBS process

Figure 3. 3 Work Break down Structure (WBS) Process

3.3 System Requirement

System requirement is a characteristic or feature that must be include in any information


system to satisfy users. Since the Administrator and the users are the main target collection
of our software, I will only concern about some important functions for the admin and the
user. the system needs Applications like web browsers safari, Mozilla Firefox, Google
chrome and internet connection. They include the following interfaces:

24
a) User Interfaces: The keyboard, mouse, menus of a computer system. The user interface
allows the user to communicate with the operating system.
b) Software Interfaces: The languages and codes that the applications use to communicate
with each other and with the hardware.
c) Hardware Interfaces: The wires, plugs and sockets that hardware devices use to
communicate with each other, computer systems, or any other medium of
communication. A physical interface is the interconnection between two items of
hardware or machinery.

3.3.1 Software Requirement Specification

One of the critical success factors in the development of high quality software product or
website is the deep understanding of the user’s real requirement as opposite to their
perceived requirements. This will make the product very easy to develop, maintain, and to
use the software properly by the end users.

User requirement is the process by which user desires, needs, and expectations are gathered
in order to establish what the users will actually use the software for, and recorded in a way
that will be meaningful both to the users and developments (Robert, 1984).

3.3.1.1 Software Requirements

Table 3. 1 Software Requirements

Operating System : Macintosh, Linux, Windows Xp,7,8,8.1, 10


Front End : PHP
Back End : MYSQL

25
3.3.1.2 Hardware Requirement

Table 3. 2 Hardware Requirements

1 Computer HB
2 Corei5 or Corei7
3 4GB or 8GB RAM
4 500 or 1 TB hard disk

3.3.2 User Requirements Definition

A document that defines what a proposed system must be capable of doing to solve the
problems of a defined set of potential users of such a system. Therefore it is most unlikely
to be created using a conventional requirements-analysis method, since these introduce
solution bias, representations, and concepts that are rarely understood by (and are irrelevant
to) the users (user-requirements, 2017).

A customer cannot demand features not in the user requirement document (URD), while
the software developer cannot Design and Implementation of Account Holders Information
System for Microfinance Bank the product is complete and ready if it does not meet even
one item of the user requirement document (URD).

3.4 Problem Analysis Identification

The current method in which the After observing the Design and Implementation of
Account Holders Information System for Microfinance Bank process in detail, I have
noticed the system had the following problems such as facilitates more functions that helps
everyone in our customers’

26
Somalia does not have Application Design and Implementation of Account Holders
Information System for Microfinance Bank. I made Application Design and
Implementation of Account Holders Information System for Microfinance Bank. that uses
in everyone
And also we create some of features to help users this App (hohner, 1984).

Admin Problem
➢ No direct role for the management.
➢ Lack of efficient and useful reports.

Procedural Problem

➢ Manual tracking of due Projects.


➢ No multiple accesses at the same time.

Technical Problem

➢ Lack of centralized storage and backup.


➢ Time consuming.
➢ Lack of security of data

3.5 Requirements Gathering Techniques

Requirements gathering techniques are a process of collecting data from different sources.
Data or (datum in singular) is valuable pieces of information collected during the research.
Data can be divided in to two categories: primary data and secondary data. First, the
observation will be carefully evaluated and to ensure its validity and reliability by pilot test
(chimer, 1984).
There are various methodologies for gathering data as the following:
✓ Interviews
✓ Observations

27
3.5.1 Interview

An interview is a formal face-to-face meeting, especially, one arranged for the assessment
of the qualifications of an applicant, as for employment or admission. A conversation, as
one conducted by a reporter, in which facts or statements are elicited from another, the
interview is the primary technique for information gathering during the systems analysis
phases of a development project. It is a skill which must be mastered by every analyst. The
interviewing skills of the analyst determine what information is gathered, and the quality
and depth of that information. Interviewing, observation, and research are the primary tools
of the analyst.
The interview is a specific form of meeting or conference, and is usually limited to two
persons, the interviewer and the interviewee. In special situations there may be more than
one interviewer or more than one interviewee in attendance (martymodel, 2017).

3.5.1.1 Advantages of interview

The main advantage of interviews is that the researcher (interviewer) can adapt the
questions as necessary, clarify doubt and ensure that the responses are properly understood,
by repeating or rephrasing the questions. The researcher/interviewer can also pick up
nonverbal cues from the respondent. Any discomfort, stress and problems that the
respondent experiences can be detected through frowns, nervous taping and other body
language, unconsciously exhibited by any person.

This would be impossible to detect in a telephone interview. So face-to-face helps the


interviewee to get the desired results and help them the expression of the person to whom
they are interviewing. By reading the facial expression of the respondent the interviewer
can easily understand what the respondent want to tell them about anything (answers-
yahoo, 2017)

28
3.5.1.2 Disadvantages of interview

The main disadvantages of face-to-face interviews are the geographically limitations they
may impose on the surveys and the vast resources needed if such surveys need to be done
nationally or internationally. The costs of training interviewers to minimize interviewer's
biases for example differences in questioning methods, interpretation of response are also
high. Another drawback is that respondents might feel uneasy about the anonymity of their
responses when they interact face to face interviews (somuiger, 1984).

3.5.2 Observation

An observation is a data collection method used to gather detailed information about a


situation or event. Observation data is used to describe the setting, activities, participants,
and the meaning of the observations from the observer's perspective. Observation in this
project will be based on facts which are both accurate and detailed, but left any irrelevant
or slight information that makes the description difficult to understand. This data allows
the reader to fully understand the situation.

3.5.2.1 Advantages of observation


a) Allows you to directly see what people do practically rather than relying on what people
say they did.
b) Observer’s document program activity takes time and cost gathering providing
documentation, rather than relying on recollections of the events (amilner, 1984).

3.5.2.2 Disadvantages of observations

a) Observer bias may occur. (Observer may only notice what interests him or her).
b) With participant’s observation, a skilled facilitator is needed to help participants present a
critical evaluation.

29
3.6 Process Modeling

A process model is a formal way of representing how a computer system operates. It


illustrates the processes or activities that are per-formed and how data move among them.
A process model can be used to document the current system (i.e. as-is system) or the new
system being developed (i.e. to-be system). Whether computerized. Process modeling is
the process and analysis of data and objects that are used in business or other context and
identification of the relationship among these data objects. Data modeling is a first step in
doing object oriented Programming and involves professional data modelers working
closely with business stakeholders, as well as potential users of information system
(sigened, 1984).

3.6.1 Data flow Diagram (DFD)

Data Flow Diagrams show information transfers and process steps of a system. The general
concept is an approach of a depicting how occurs input in a system, further processes and
what runs out. The aim of DFD is in accomplishing of understanding between developers
and users. Data flow diagrams are maintained with other methods of structured systems
analysis.

A data flow diagram (DFD) illustrates how data is processed by a system in terms of inputs
and outputs. As its name indicates its focus is on the flow of information, where data comes
from, where it goes and how it gets stored.

❖ Graphical representation of the "flow" of data through an information system;


❖ Modeling process aspects;
❖ An overview of the system;
❖ For the visualization of data processing (structured design);
❖ What kinds of information will be input to and output from the system;
❖ Where the data will come from and go to;
❖ Where the data will be stored.(conceptdraw, 2017).

30
Data Flow Diagrams notations:

The Data Flow Diagrams solution from the Software Development area of Concept Draw
Solution Park provides three vector stencils libraries for drawing DFD using the Concept
Draw PRO diagramming and vector drawing software.

The design elements library Data flow diagram (DFD) contains 15 data flow diagram
symbols for drawing both context-level data flow diagram and Level 1 DFD.

The design elements library DFD, Ganesa’s notation contains 12 data flow diagram
symbols of Ganesa’s DFD notation.

The design elements library DFD, Yourdon and Coad notation contains 22 data flow
diagram symbols of Yourdon/ DeMarco DFD notation (conceptdraw, 2017)

Process

Data Storage

External Entity

Data Flow

31
Figure 3. 4 UCD
3.6.2 Unified Modeling Language (UML)

UML stands for Unified Modeling Language; UML is a way of visualizing a software
program using a collection of diagrams. The notation has evolved from the work of Grady
Booch, James Rumbaugh, Ivar Jacobson, and the Rational Software Corporation to be used
for object-oriented design, but it has since been extended to cover a wider variety of
software engineering projects. Today, UML is accepted by the Object Management Group
(OMG) as the standard for modeling software development (draw, 2017)

The key to making a UML diagram is connecting shapes that represent an object or class
with other shapes to illustrate relationships and the flow of information and data. To learn
more about creating UML diagrams (draw, 2017).

Types of UML Diagrams

The current UML standards call for 13 different types of diagrams: class, activity, object,
use case, sequence, package, state, component, communication, composite structure,
interaction overview, timing, and deployment.

These diagrams are organized into two distinct groups: structural diagrams and behavioral
or interaction diagrams (draw, 2017).

32
3.6.2.1 Use Case Diagram (UCD)

A use case is a methodology used in system analysis to identify, clarify, and organize
system requirements. The use case is made up of a set of possible sequences of interactions
between systems and users in a particular environment and related to a particular goal. It
consists of a group of elements (for example, classes and interfaces) that can be used
together in a way that will have an effect larger than the sum of the separate elements
combined (techtarget, 2017).

A use case diagram shows you some of the use cases in your system, some of the actors in
your system, and the relationships between them. A use case is a high – level piece of
functionality that the system will provide. An actor is anyone or anything that interacts
with the system being built.
Use case diagram is done in an early phase of a software development project. The use case
diagram describes the use case (functions of the system), Actors (users) and the relationship
between the actors and the use case is connective
Here are the Symbols of UCD:-

Actor Connector Use case System

Figure 3. 5 UCD

33
Log in

divice

Address

Customer

User
Admin

branches

Reports

Figure 3. 6 Use Case Diagram

34
3.7 Data Modeling

Data modeling is the analysis of data objects and their relationships to other data objects.
Data modeling is often the first step in database design and object-oriented
programming as the designers first create a conceptual model of how data items relate to
each other. Data modeling involves a progression from conceptual model to logical model
to physical schema(webo, 2017).

Data modeling is a first step in doing object-oriented Programming and involves


professional data modelers working closely with business stakeholders, as well as potential
users of information system (lucidchart, 2107).

3.7.1 ERD Diagram

An entity-relationship (ER) diagram is a specialized graphic that illustrates the


interrelationships between entities in a database. ERD show entities in a database and
relationships between tables within that database. It is essential to have one of these if you
want to create a good database design. The patterns help focus on how the database actually
works with all of the interactions and data flows, although another useful tool is a Data
Flow Diagram (DFD) which more directly describes this. ERD is a detailed, logical
representation of the entities, associations and data elements for an organization or
business. ERD is a graphical modeling tool to standardize ER modeling; the modeling can
be carried out with the help of pictorial representation of entities, attributes and
relationships (lucidchart, 2107).

The basic building blocks of ERD are Entity, Attributes, Relationship and lines entity is an
object that exists and is distinguishable from other object in other words Entity types or
Entity set is a collection of similar entities; an entity may belong to more than one entity
type. A relationship is an association of entities where the association includes one entity
from other particular types is meaningful association before entity types. Attributes are

35
properties of entity types in other words; entities are described in a data base by a set of
attributes (Peter Pin-Shan Chen, 1976)

3.7.1.1 ERD Symbols

The ERD is used to represent database schema, here are some symbols used to represent
ERD Symbols:

➢ A rectangle represents an Entity.


➢ An Ellipse represents an attribute.
➢ A diamond represents a relationship
➢ Lines represent linking of attributes to entity sets & of entity sets to relationship
sets.

Line
Attribute
Entity Relationship

Figure 3. 7 ERD

36
3.7.1.2 TYPES OF RELATIONSHIP

Relationship is an association among one or more entities. This relationship can be broadly
classified into one-to-one relation, one-to-many relation, many-to-many relation.

• One to many Relationship Type: Abbreviated 1:M, the relationship that associate one
entity to more than one entity is called one to many relationship: - Example is country
having states for one country there can be more than one states hence is an example
one to many relationships.
• One to one Relationship Type: Abbreviated 1:1, one to one relationship is a special
case of one to many relationships. True one to one relationship is rare. The relationship
between the president and Country is an example is one to one relationship.
• Many to Many Relationship Type: Abbreviated M: M, the relationship between
EMPLOYEE entity and PROJECT entity is an example of many to many relationships.
Many employees will be working in many projects hence the relationship between
employee and project is many to many relationships.
• Many to One Relationship Type: Abbreviated M: 1, the relationship between
EMPLOYEE and DEPARTMENT is an example of many to one relationship, there
may be EMPLOYEE working in one DEPARTMENT. Hence relationship between
EMPLOYEE and DEPARTMENT is many to one relationship (Aplim, 2010).

Table 3. 3 ERD Proposed System

Relation Type Representation

One-to-one

One-to-many

37
Many-to-many

Many-to-one

3.7.1.3 ERD of the Proposed System

Login Home Customer

1 * 1

Simcard
Management Using *
Biometric system address

Reports branches * 1 divice

Figure 3.3 ERD proposed system

3.8 Suitable Solution Strategies of the Proposed System

38
As we are reaching the development phase, this section would contemplate on other ways
project’s objectives can be achieved. As you may know, the system will be developed in
PHP. Programming language and it is the most used or popular.

3.9 System Feasibility

A feasibility study for an information system project is an in-depth look at the project in
order to determine whether or not an organization should proceed with its implementation.
Feasibility studies provide project managers with an overview of the primary issues related
to the project, as well as insights about the outcomes of the project, before the company
invests too much time and money (reference, 2017).
A feasibility study could be used to test a new working system, which could be used
because the Feasibility study is an analysis of possible alternative solutions to a problem
and a recommendation on the best alternative. It can decide whether a process be carried
out by a new system more efficiently than the existing one.

Feasibility study is divided into four types: -


1. Technical Feasibility.
2. Operational Feasibility.
3. Economic Feasibility.
4. Schedule Feasibility.

3.9.1 Technical Feasibility

Technical Feasibility is defining as the feasibility that is concerned with specifying


equipment and software that will successfully satisfy the requirement. It compasses the
technical needs of the system Configuration of the system is given a huge importance than
the actual make of hardware while examining technical feasibility (quora, 2017).

39
This can be counted in terms of volumes of data, trends, frequency of updating, etc. in
order to estimate whether the new system will perform sufficiently or not. Technological
feasibility is carried out to determine whether the company has the capability, in terms of
software, hardware, personal and expertise, to handle the completion of the project.

Table 3. 4 Technical Feasibility

No Item Description Quantity Cost Per Unit Amount

1. Laptop Corei7 1 $550.00 $550.00

2. Hp laserjet1563 MFP 1 $60.00 $60.00


3. Fingerprinter Sccaner 1 $50 $50

Total $660.00

Table 3. 5 Items

No Item Description Quantity Cost Per Unit Amount


1. Audrino & MYSQL 1 Free
Total Free
3.9.2 Operational Feasibility

Operational feasibility is the ability to utilize, support and perform the necessary tasks of a
system or program. It includes everyone who creates, operates or uses the system. To be
operationally feasible, the system must fulfill a need required by the business. The
following table will show the training cost of the user of the system.

40
41
Table 3. 6 Operational Feasibility

Activities Duration Expected Cost

Training Current 1 Week $400.00


Employee
Training New Employee 2 Week $600.00

Total $1000.00

3.9.3 Economic Feasibility

Economic analysis is the most frequently used evaluating the effectiveness of proposed
system, more commonly known as benefit analysis.
The benefit analysis is to determine benefits and saving which are expected from candidate
system and compare them with cost. If the benefits are more than the cost, the decision is
made to design and implement the system. The cost and benefits may be direct or indirect
and tangible or intangible.

Table 3. 7 Economic Feasibility

Types of feasibility Description Expect Cost

Technical feasibility Hardware & software $640.00


Operational Training with best option $1200.00
feasibility
Total $1840.00

42
3.9.4 Schedule Feasibility

Typically, this means estimating how long the system will take to develop, and if it can be
completed in a given time period using some methods like payback period. Schedule
feasibility is a measure of how reasonable the project timetable is.
This involves questions such as how much time is available to build the new system, when
it can be built, whether it interferes with normal business operation, number of resources
required, dependencies, can the system be developed in time etc. The project duration
schedule is explained in the following.

Table 3. 8 Schedule Feasibility

Level Phase Name Duration


1 Analysis phase 4 weeks
2 Design phase 3 weeks
3 Coding 6 weeks
4 Implementation and Testing 3 weeks
5 Operation and maintenance phase 2 weeks
Total 18 weeks

3.10 Chapter Summary

This chapter presented the following sections: Introduction, Operational Framework, Work
Break down structure (WBS), System Requirement, Problem Analysis Identification,
Requirements Gathering Techniques, Process Modeling, Data Modeling, Suitable solution
Strategies of the proposed system, System Feasibility and Chapter Summary.

43

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy