Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
system handles every aspect of student related information in school as well as its
services rendered by the school to make its transactions easier and convenient.
The ever-changing trend in technology brought the necessity for the automation of
are one of the leading users of computer applications in order to manage student
data.
Kudarat, as the SKSU counts its growing years, so as the number of students,
problem to most organizations, either from the service sector or other academic
periods, taking into account organizational and legal rules, employees’ skills and
1
complex problem and a top concern for human resource management. Even
nowadays, it is still done manually in several activity sectors, consuming time and
generators.
According to Thompson (2013), points out three reasons for caring about
staff scheduling: the time spent developing a schedule by hand leaves the
manager less time for managing the employees and interacting with the
good schedule work is assigned in the most effective manner, leading to a cost
timetables for its security personnel so that an organization can satisfy the demand
for its goods or services. The first part of this process involves determining the
number of staff, with particular skills, needed to meet the service demand.
Individual staff members are allocated to shifts so as to meet the required staffing
levels at different times, and duties are then assigned to individuals for each shift.
All industrial regulations associated with the relevant workplace agreements must
these highly constrained and complex problems and even more difficult to
distribute shifts equitably among employees and satisfy all the workplace
2
decision support tools to help provide the right employees at the right time and at
the right cost while achieving a high level of employee job satisfaction. The
and database tools and possibly rostering tools developed from appropriate
mathematical models and algorithms. The rostering tools are the main focus of this
review.
Based on the demands and needs of this study, the researchers will be
web based system is very versatile and can be enhanced by adding more functions
and modified graphics for use with administration and security guards of the
university.
General Objective
Generally, this study aims to develop and evaluate the study entitled
“Campus Personnel Monitoring and Support System”. This system will help the
school security guard to easily manage and monitor daily work schedules, e-
3
Specific Objectives
Incident reports.
9.1. Functionality
9.2. Acceptability
9.3. Accessibility
9.4. Accuracy
4
Significance of the Study
The study entitled “Campus Personnel Monitoring and Support System” would be
To the Administration
The system would help them to improve their services to give quality services in
institution.
The system would help them to easily manage logbook and spot reports
conveniently. This would help them to easily update and monitor their working
To the Researchers
It helps then understand the nature and procedure of the existing system of
This would help them in their studies as references and basis in gathering data to
5
This study aims to develop a system entitled “Campus Personnel Monitoring
and Support System”. This system provides interfaces for administrator and
security personnel.
interface, the administrator can access their interface by having an account on the
system; this user can manage users’ accounts. The system administrator can
perform create, read, update, delete and search information. It can also administer
guard’s information (last name, first name, license number, contact, email,
campus, date from, date to, time). The administrator can also view guard’s logbook
for official and spot reports. The administrator and assigned security personnel can
Also, the assigned security personnel can monitor visitor’s appointment daily,
Allow visitors to set appointment: In the visitor’s interface, the user can set
appointment schedule upon visiting the area. The user can fill-up the appointment
form provided by the system, information required the following; visitor’s last name,
first name, mi, gender, address, email, contact, subject person, and purpose. Upon
entering the gate of the building, the visitor is required to present the valid ID as
In the guard’s interface, the user can access their interface by having an
the system is needed before to access the respective account profile, this will allow
6
user to view work schedules. The guard also can manage logbook for official, spot
reporting and visitor’s appointment schedules. The system can auto display work
schedule based on the date of the day and next day schedule for assigned guard
personnel.
Provide SMS Appointment Notification: the system will provide this feature
logbook feature. The user can perform create, update, delete and search
information.
Provide e-spot reporting tool: the system will provide a feature where the
conditions that may have an immediate and significant effect on current planning
consistent with requisite security in an e-logbook feature. The user can perform
format, individual work schedules, daily log sheets, daily spot reports and list of
appointment schedules.
7
Definition of Terms
computer systems.
job vacancy.
8
have an immediate and significant effect on current
requisite security
together.
Wide Web.
Work Shift - the time period during which you are at work.
9
Chapter II
REVIEW OF RELATED LITERATURE AND STUDIES
This chapter presents the related literature and studies that helped the
aspects of the people that are critical essential to the study and intended to
the days and times that he or she is expected to be working. In most cases, this
When looking for jobs, it is helpful to know what kind of work schedule you
are looking for. You can use this information to narrow your job search, and to help
Read below for descriptions of different work schedules, and for tips on how
to use information on job schedules to help you find the right job for you.
employees to work Monday through Friday, from 9am to 5pm. However, many jobs
differ slightly in their schedules. For example, some “9-5” jobs are Wednesday
through Sunday, rather than Monday through Friday. Others require employees
work from 8am to 6pm, or some other slightly different set of hours.
10
The variations in a work schedule are the result of the type of job and
Shift work schedules happen when a company divides the day into shifts,
and assigns employees to work set periods of time. Sometimes these shifts vary
day to day or week to week (these are known as rotating schedules), while other
times an employee is hired to work a specific shift (these are known as fixed
schedules).
There are also modified shift schedules, in which companies do not run
24/7, but instead open early and close late. Employees take shifts throughout the
day to cover these hours. For example, someone might have a shift from 7am to
4pm, while another person might have a shift from 1pm to 10pm.
Shift work is particularly common in medicine, where many doctors and nurses
Other careers that typically have shift schedules are law enforcement,
security, the military, transportation, and retail, among others. Shift schedules
might involve alternating day and night shifts, working four days of shifts and then
having three days off, working four twelve-hour shifts a week, or some other
combination of shifts.
11
Flexible Work Schedule
vary their arrival and departure, and sometimes even choose the days that they
work. For example, a company might allow employees to come in any time they
Other companies have slightly stricter, but still flexile, schedules. For example, an
organization might let employees arrive any time between 9am and 11am, and
leave any time between 5pm and 7pm. They might also be allowed to take a day
hour week, but there is no official, legal guideline. Similarly, there is no legal
guideline for the number of hours worked by part-time employees in a week – it's
simply defined as someone who works fewer hours per week than a full-time
full-time employees often have a set schedule, which does not vary from week-to-
week. Often, they do not have to clock in or clock out. While this can also be the
case for part-time employees, a part-time employee’s schedule often varies greatly
12
Another common difference is that full-time employees are more likely to receive
benefits such as health insurance, paid vacation time, and sick time. These are
Finally, most full-time employees are considered exempt, which means they
are not required to be paid overtime. Most part-time employees are considered
nonexempt, which means they receive overtime pay for any additional work after
https://www.thebalance.com/what-is-a-work-schedule-2062134
Personnel Scheduling
important for both public sectors and private companies. It is an extension to the
standard shift scheduling problem with some key limitations. But today, the
increased generality of this problem has lead to more complex model due to its
size and pure integer nature. So it has proven very difficult to solve optimally.
Numerous approaches for modeling and solving this problem have been proposed.
13
Staff scheduling and rostering: A review of applications, methods and
models
Optimized staff schedules can provide enormous benefits, but require carefully
addition, each industry sector has its own set of issues and must be viewed in its
own right. There are many computer software packages for staff scheduling,
specific application areas, and the models and algorithms that have been reported
in the literature for their solution. We also survey commonly used methods for
availability and flexible demand. In the system to be planned, there is a given set
belongs to one of various skill levels; each service requirement specifies the
requested employee skill level, timing of the service delivery, and a weight that
indicates its priority. Employees have individual flexible contracts with the
14
organization, which are characterized by weekly/monthly contracted work hours,
days the employee is available for work and availability of overtime. Furthermore,
there are regulations on maximum work hours and minimum rest requirements of
employees enforced by the government and the labor union. The problem that we
which (i) ensures that the maximum weighted number of service requirements are
met, (ii) satisfies government and labor union regulations, (iii) honors individual
employee contracts with minimum deviation from the contracted work hours, and
will be limited to the most relevant work. An introductory tutorial to staff scheduling
is given in Blöchliger that presents the basic concepts of the scheduling problem
introduce the following three definitions. For the first and the second definition we
definition.
Shift: A set of consecutive periods within a day. Its length is the total
15
000000011111111000000000
0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 (day 1 shift)0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 (day 2 off)
0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 (day 3 shift)
Flexibility: For each employee, the ability to assign arbitrary shift lengths, shift
An observation from the above given literature is that virtually all models are
used as an input to the problem and then used as the basic element of constraint
construction. Three 8-h shifts, two 12-h shifts and various combinations are
commonly used in practice to cover the demand during an arbitrary day. A few
authors, though, have tackled the shift scheduling problem, at least in part, with
implicit modeling techniques. Furthermore, Bechtold and Jacobs show that implicit
optimal modeling for shift scheduling has size and runtime benefits over the
16
Conceptual Framework of the Study
Manual Determine
Transactions
Procedures The existing system is time
consuming
Security Assess
Personnel
Information The system is inefficient
and unproductive
Working
Schedules Identify
Recommend
FEEDBACK
17
Figure1 shows the conceptual framework of the study through input,
Input
The input contains the basic manual knowledge requirements for the
Process
The researchers understand the problem by determining, assessing,
identifying the best solutions to the current manual system in order to recommend
the proposed study. The process contained the following activities and procedures
in order to develop the system. The Agile Software Development Methodology will
Output
The output will be the proposed system entitled 4S: School Surveillance and
Security System
Feedback
The feedback loops take the system output into consideration with the end-users,
which enables the system to adjust its performance to meet a desired output
response.
18
Chapter III
C
METHODOLOGY
H
A
P
This chapter presented the methods that the researchers undertook to
T
E
conduct the study with the system of development life cycle as basis.
R
I
Project Development I
I
The following materials would be used inMthe development of the proposed system
E
entitled 4S: School Surveillance and Security
T System
H
Table 1. Hardware Requirements O
D
ITEM O SPECIFICATIONS
Processor L Intel Core i5 Processor
O H61m-DS2 R3/P8H61-m LX3 R2.0
Memory G 4GB DDR3
Hard Disk Y 1TB HDD
Power Supply ATX Casing w/ Power Supply 600W
Monitor 15.6 LED Monitor
KB, Mouse, Mouse Pad, AVR
Printer Inkjet
Table 1 shows the hardware requirements needed for the system; this includes the
system.
ITEM SPECIFICATIONS
Programming Language (front-end)
Web Scripting Languages HTML, CSS, JavaScript , PHP
Web Designing Tools Notepad ++, Eclipse
Adobe Photoshop CS6
Database Application (back-end) MySQL
Operating System Linux
Domain Name (URL) www.sksu-sgmis.com
19
Table 2 shows the software requirements needed to develop the system; this
includes the minimum operating system, front end and backend software as well
given period along with proposal for financing during a period of the study.
20
Project Schedule of the Study
Figure 2 shows the timeline, tasks and duration of the project and the expected
completion date.
implementation, testing of the system follows logical approach and technical ways.
21
The researchers provided a letter of permission to conduct a study to the
initial step. The researchers started from identifying the requirements and
determining the problem. The researchers found out that the needs to enhance the
logbook and spot reports. After conducting and gathering relevant information, the
project.
development of the proposed system entitled 4S: School Surveillance and Security
System
Plan: the researchers will design as interface for administrator and security
knowledge base method in which the researchers gathered the information. The
22
researchers came up with the design prototype of the proposed study. In the
following interfaces, it has login and account verification form for administrator, and
security personnel.
Build: the researcher used the proposed prototype and following tools such as,
Context Diagram, Data Flow Diagram, File Structure and Database Structure in
the process of system development. The researchers will utilize the PHP5 server-
side scripting language as frontend and MySQL as backend, Also, the following
Test and Review: in the system testing, the researchers will test and train
the end-users based on its requirements and functionality in order to ensure the
Build: in the development of the system, the researchers came up with the
design output of the proposed study, it has features where it can perform add, edit,
delete, update and search function. The researcher follows its prototype to come
up with the feature. The researchers utilized the PHP5 server-side scripting
application in designing the proposed system such as; Adobe Dreamweaver CS6,
23
Test and Review: in the system testing, the researchers will test and train
the end-users based on its requirements and functionality in order to ensure the
personnel where user can login to the system before can access its respective
interface; the security guard inquire working schedules, shifting assignments, also
Build: in this development of the system, the researchers use the manual
method as basis in which the researchers gathered the information from the
current system. It has features where it can perform add, delete, update and
search function. The researcher used the proposed prototype and the following
tools such as, Context Diagram, and Data Flow Diagram in the process of system
development. The researchers came up with the design output of the proposed
study then applied the procedures based on the flow of transactions. The
proposed system such as; Adobe Dreamweaver CS6, Adobe Photoshop CS6.
Test and Review: in the system testing, the researchers will test and train
the end-users based on its requirements and functionality in order to ensure the
24
Sprint 4 (Allow the visitors to set appointment)
Plan: the researchers will plan and design an interface for the visitor where
Build: in this development of the system, the researchers use the manual
method as basis in which the researchers gathered the information from the
current system. It has features where it can perform send information by clicking
send button after filling up the required visitor’s information for appointment. The
researcher used the proposed prototype and the following tools such as, Context
Diagram, and Data Flow Diagram in the process of system development. The
researchers came up with the design output of the proposed study then applied
the procedures based on the flow of transactions. The researchers utilized the
the following software application in designing the proposed system such as;
Test and Review: In the system testing, the researchers will test and train
the end-users based on its requirements and functionality in order to ensure the
Further, the system will provide needed reports such as list of registered
in the system. When the system is already free from bugs or errors, it was
25
to know if it really meets the system requirements. The researchers will be pilot
tested and will conduct a training procedure of the system for user.
After meeting its deliverables and found out that the system functions
26
Use-Case Description
The Figure 4 shows the use case diagram of the system. It has 3 actors: system
administrator, security personnel and visitor; and 10 use cases: manage user’s
appointment.
In the manage user’s accounts, the system allows the system admninistrator to
add, update and view accounts. In the manage work schedules, the administrator
allows to add, edit, update, delete, search and view work schedules for security
personnel. In the manage visitor’s appointment use case, the security personnel
logbook, the security personnel is permitted to add, edit, update, delete and search
daily logbook. In the manage e-spot reporting, the security personnel permitted to
add, edit, update, delete and search daily e-spot report. In the appointment
schedule, the visitor are required to fill-up the appointment form, the user can
select date, time and purpose for visiting the school. In the manage reports use
case, the system allows the administrator to generate, update and view summary
reports. The administrator is only allowed to view the generated summary reports.
27
Use-Case Diagram of the System
28
Activity Diagram
29
Manage Personnel Information and Work Schedules
30
Manage Personnel Information and Work Schedules
Figure 6.1. Activity Diagram: Manage Personnel Information and Work Schedule
31
Allow visitors to set appointment schedules
32
Auto display work schedule
33
Provide SMS Appointment Notification
34
Provide e-logbook for personnel monitoring
35
Provide e-spot reporting tool
36
Provide statistical report on numbers of appointments and incident reports
37
Provide statistical report on numbers of appointments and incident reports
38
Generate Reports
Figure 11. Activity Diagram: Generate reports such as individual work schedules,
daily log sheet, daily spot reports and list of appointment schedules.
39
Database Schema
40
Figure 14. Database Schema of the System
The figure 14 shows the Database Schema for the system. It shows collection of
database.
EVALUATION METHODOLOGY
determined if the system works properly, meets the objectives, and satisfies the
users.
The respondents of the study were composed of thirty (30) security guards as
system users of the system entitled 4S: School Surveillance and Security System.
This study used a checklist and a rating scale questionnaire to gather the
The checklist were used to evaluate the functionality contains a list of all the
buttons, links, forms, dials, pages, etc. included in the system, and for
effectiveness, contains the list of all system objectives and deliverables that the
41
researchers want the respondents to check and evaluate. The frequency counts
Table 14. The mean was computed and interpreted using the table below.
42
Republic of the Philippines
SULTAN KUDARAT STATE UNIVERSITY
College of Computer Studies
Isulan Campus
Isulan, Sultan Kudarat
Survey Questionnaire
To my valued participants
We on the stage of testing the technology developed from our study entitled “4S:
School Surveillance and Security System”. Your generous help to evaluate the
system is highly appreciated. This gesture will help the researchers to improve the
system and deliver more satisfactory services to all the security guards especially
on the agency.
The Researchers
Instructions: Check the corresponding circle that corresponds to how the best
you agree to the statement provided.
43
Table 1. Rating scale used in the Study
44
FUNCTIONALITY 5 4 3 2 1
45
ACCEPTABILITY 5 4 3 2 1
ACCESSIBILITY 5 4 3 2 1
46
5. The visitor can access a page where can set
appointment schedule.
ACCURACY 5 4 3 2 1
Comments/Suggestions/Recommendations:
47
LITERATURE CITED
Online Sources
Unpublished Thesis
48