SlideShare a Scribd company logo
1 of 45
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
1
Chapter 1
THE PROBLEM AND ITS SCOPE
Introduction
Internet system today is very relevant and useful to access different forms
and kinds of information that the users are expected to retrieve and gather. In
fact, it provides bigger opportunities to all aspects of human lives. Thus, internet
cafés are built and established to cater the needs of the clienteles to access
relevant information programmed in the World Wide Web (WWW). Naturally, the
internet cafes’ of the University are built for income generating project (IGP) in
order to produce and earn income as well as to respond the needs of the
students, stakeholders and community. In this context, computer technology as
well as internet has brought significance and advancement to our lives. It is one
of the main reasons why almost everything becomes so simple and easy from
difficult and complicated way of accomplishing each job almost everything now is
being operated and manage through computers and internet connection. Today,
it is widely recognized that most organizations need information systems to
survive and succeed in the competitive business environment.
According to Zebra Technologies, (2013) using barcode technology today
helps in manufacturing cost reduction, quality improvement and cycle-time
reduction. This however varied based on the skill levels of various barcode users.
Barcode systems have been used before by employing wristbands in order to
improve patient safety in hospitals, internet café’s, hotels, motels and other
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
2
commercial establishments. Thus, an Internet Café Log in and Log out Request
System in barcode technology is a new development in internet server log in and
log out request system using the barcoded internet access card to read, decode
and analyze in order to access on the web without the server intervention to
share internet connection. Thus, the internet-users are automatically accessed
on the internet through barcode-based log in and log-out request system. With
respect to barcode is a set of bars and spaces representing alphabet or numeric
data for identification of a particular product, service or a process.
Barcode technology is the best-known and most widely used method of
Automatic Identification. Automatic identification or “Auto ID” encompasses the
automatic recognition and recording of data, most commonly through the printing
and reading of information encoded in barcodes thereby eliminating risk of
human error. Early applications of bar code scanning, which included retail point-
of-sale, item tracking and inventory control, have been expanded to include more
advanced applications such as time and attendance, work-in process, quality
control, sorting, order entry, document tracking, shipping and receiving, and
controlling access to secure areas.
At present, the University uses its manual process of logging in and
logging out the internet use through server intervention. The proposed barcode-
based system for logging in and logging out of internet without the internet’s
attendant assistance to open the internet server to help access all the clients
who need an internet connection inside the internet café of the University will be
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
3
properly accommodated. Also, the design of this system is done through access
card for internet connection attached with barcode technology to access internet
connection to open internet server.
Conceptual Framework
Barcode technology is fitted for automating the Internet Café log in and log
out request system. Barcodes and barcode scanners offer a quick and accurate
way for each lecturer to complete time-tracking transactions. Barcode-based log
in and log out request system is a good substitute for manual systems for internet
server. The manual processes of logging in/out are replaced with automated
barcode readers.
Since barcodes can carry a lot of information either by referring to the
source of information or by encoding all the information in it, they are used in
several applications like point of sale, inventory control, shipping, packaging and
data collection. Medical and dental practices rely on complex patient forms and
barcodes can help in entering the detailed information in the computer, making it
an easy task of gathering large amount of information. It also reduces data
collection costs and better services are the results.
Barcodes are primarily used for entering data into a system, efficiently and
reliably, thereby improving the productivity [6]. Nowadays 2D barcodes can
embed a lot of data which can be used to provide useful information. 1D barcode
does not provide such static information; rather it refers to an external database
to collect the information. However, 2D barcode contains information, which
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
4
cannot be updated but the information referred by 1D barcode can be easily
modified. Therefore, if we use barcodes for carrying information we should come
up with a way to get the benefits of both the 1D and 2D barcodes.
Barcode can be easily scanned because of the use of camera and the
barcode scanning applications on the cell phones whereas RFID requires a RFID
reader to read the information. Most of the 2D barcodes encode URL, which can
further lead to a web page or website. Moreover, a 2D barcode can encode much
more information than a URL and can contain large amount of text information.
Therefore, there should be some applications that can encode different
kinds of information inside a 2D barcode and use it for different purposes.
Currently, there is no application, which can take the benefits of 1D and 2D
barcodes to manage information not only related to medicine or food but about
anything and any domain and categorizes it accordingly. In addition, such system
can provide a way to assist the cell phone user including elderly in collecting and
viewing the information, provides functionalities according to the type of
information, which would be of great public use.
One of the challenging problems of pervasive computing is to link a
physical object with digital information because many of the pervasive computing
applications require manual inputs or complex image processing to obtain
information related to a real object. The use of 2D barcodes eliminates such
excess processing to acquire the needed information. The 2D barcodes have
high capacity to store data, are less prone to human input error and act as a tool
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
5
to acquire information on site without network access. The currently available
solutions use 1D barcodes to represent dynamic information residing in a
database and use 2D barcodes to represent only static information that also
encode only URLs. In all such applications, the source of information gets
restricted to either a database or the static data encoded inside a 2D barcode.
None of such solutions takes advantage of 2D barcode capabilities to collect
information from different sources and attach it to the real world entity. Moreover,
a 2D barcode can also represent and categorize complex text information.
Our approach integrates the capabilities of barcode technology to
represent and classify the complex digital information collected from different
sources. We design and implement an information management system on a
handheld device that has image processing and barcode decoding capabilities to
address the above-mentioned problem. Our prototype provides a generic
framework to decode either 1D or 2D barcode, parse the complex information
(both dynamic and static) inside the 2D barcode, differentiate the complex
information based on content types and classify the image based on the barcode
format. It also assists users in decision-making and information analysis. An
example system application can be deployed in grocery stores as a part of the
enterprise information management system.
Due to recent technological development and integration of mobile and
barcode technologies, several new mobile applications are developed every now
and then. Nowadays various barcodes are used in mobile applications other than
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
6
the traditional commercial systems. Digital barcodes provide a great means to
store information in a portable way. Barcodes represent machine-readable
information that can be easily stored, transferred and processed. Barcodes have
the capability to improve the productivity and reliability of nearly all applications
as they are printed and processed by machines. They are processed faster than
human data entry and have a higher degree of accuracy. Barcodes have many
applications and are mainly used for product identification, inventory marking,
shipping container marking, and much more. Barcodes not only provide a simple
and inexpensive method to present diverse commercial data, but also improve
mobile user experience by reducing their manual inputs.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
7
Table 1. Schematic Diagram of the Present Study
Figure 1 shows the schematic diagram of the present study which
includes the development and description parameters of the Internet Café’ Log
in and Log out request system which involves the functions, analyses, design,
installation, coding and maintainability of the request system of internet server
access. Meanwhile, the barcode-based log in and log out internet server system
Development
and Description
Parameters of
Internet Log in
and Log out
system in terms
of:
: Functions
: Analyses
: Design
: Installation
: Testing
: Maintainability
Barcoded
Internet Access
Card
Internet Cafe’
log in and Log
out Request
System Barcode
Technology
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
8
is attached/programmed with barcode technology which encodes and decodes
information of internet-user to access on the internet. . The Internet Café log in
and log out request system barcode-based technology is the output of the study
which will present general features and instructions of request system using the
barcoded access card to provide easy access on internet connection.
Significance of the Study
The results/findings of this study are essential and beneficial to the
following entities and group of individuals.
Computer Technology Students. This study will give them enough
information on barcode-based log in and log out request system for internet
connection in order that they will know on how to design a program with barcode
technology which is very useful and effective to access on the internet without
disturbing the internet server of the internet café’.
Computer Technology Instructors: This study will provide them
information with respect to the development and description parameters of
internet log in and log out system in terms of: functions, analyses, design,
installation, testing and maintainability on how these entities and features work to
respond the needs of the clienteles in internet connection. Meanwhile, this study
is very helpful to their instruction in order that their students will be given the
opportunity to design their system program using barcode technology particularly
in the log in and log out request system for internet café.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
9
University Administrators. This study will help them understand that
barcode technology is very useful and efficient for university transactions and in
the delivery of quality services to their stakeholders and clienteles. Meanwhile,
the University has its internet café for all the students to research and gather
information in which the internet server is connected and monitored. Thus, this
study will give further background and inputs for the University to include and
implement this kind of service to access internet connection using the barcode
technology without the internet’s attendant assistance to open the internet server
for the internet café of the University since it is programmed in the access card
all the requirements and data needed for internet access connection.
Future Researchers: This study will help them informed the importance
of barcode technology in office transactions and operations so that they will be
able to understand the development and description parameters of internet log in
and log out system in terms of functions, analyses, design, installation, testing
and maintainability. Furthermore, this study will give them the opportunity to learn
on barcode technology in terms of log in and log out request system of the
internet café.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
10
Statement of the Problem
This study is focused on the design and development of the internet café
log in and log out request system that will help the internet-users to access on
the web without the server intervention since it is connected, programmed and
supported with barcode technology system.
Specifically, this study aims to answer the following questions:
1. Development and Description Parameters of the internet café log in and
log out request system in terms of: functions, analyses, design,
installation, testing and maintainability.
2. How does the system work/function in terms of log in and log out of
internet connection in the internet server?
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
11
3. What is the sample prototype of internet access card with barcode
technology used in log in and log out request system of internet
connection?
4. What are examples of activities and tests involved in the log in and log out
request system using the access card programmed with barcode
technology?
Scope and Limitations of the Study
This research is actually focused on the development and design of
Internet Café’ Log in and Log out request system with barcode technology which
was conducted at Computer Laboratory Room II of Surigao del Sur State
University-Cagwait Campus, Cagwait, Surigao del Sur from Academic Year
2014-2015. It is aimed to establish an effective and efficient delivery of services
in accessing internet connection in the internet server without the internet
attendant’s assistance to open the internet server for internet connection and it is
further highlighted in this study the development and design parameters of
development and description parameters of internet log in and log out system in
terms of functions, analyses, design, installation, testing and maintainability.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
12
Definition of Terms
For clearer and more comprehensive definition of the following terms, the
researchers have conceptually and operationally the terms the below.
Development refers to the designing and creating of a barcoded access
card for logging in and logging out for internet server of the internet café.
Description refers to the attributes and external features of a barcoded
access card including its functions of the request system.
Parameter refers to the scope and boundary of the study which highlights
the development of barcoded access for internet server for internet access
connection.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
13
Internet refers to the medium where information is arranged and
programmed in the World Wide Web (WWW).
Log in refers to enter user in accessing the internet connection using the
barcoded internet access card.
Log out refers to exit the user in closing the program or internet
connection using the barcoded internet access card.
Request system refers to the log in and log out system for internet server
with barcoded internet access card.
Function refers to the organized operations and activities which involved
the log in and log out request system.
Analysis refers to the systematic functions of the barcoded internet
access card on how the internet server detects and monitors internet connection.
Design refers to the entire structure and system plan and set up for log in
and log out request for internet connection.
Installation refers to the assemblage of a barcoded internet access card
including the attachment of barcode reader in the internet server.
Testing refers to the different set of activities conducted to show the trial
and error scheme of the study.
Maintainability refers to the ability of the barcoded internet access card to
maintain its functions in log in and log request system in the internet server.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
14
Chapter 2
REVIEW OF THE RELATED LITERATURE AND STUDIES
This chapter presents the Review of Related Literature and Related
Studies of the present study.
Related Literature
Foreign
Barcode Enabled Event Management System for Logistics and
Consumables Management Aswin Chandrasekharan1, Nikhail Venkat2,
Aniruddha P.B3, Siva Rama Krishnan Somayaji4
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
15
School of Information Technology and Engineering, VIT University,
Vellore, India Center of Ambient Intelligent and Advanced Networking, VIT
University, Vellore, India Radio Frequency Identification (RFID)-based quality
management system functions as a platform for gathering, filtering and
managing, monitoring and sharing quality data. The integration of promising
information technologies such as RFID technology, mobile devices (PDAs) and
web portals can help enhance the effectiveness and flexibility of information flow
in material test management (Lu Chang Wang, 2008).The RFID technology and
its data management challenges have been reviewed. There are research
problems faced in data capture layer and business process layer under the RFID
data management layer and there is a need to propose the inference rule
materialization in order to achieve better query response time and also use
lineage tracing process to trace back the history of inference rules in order to find
the source of uncertainties (RoozbehDerakhshan, 2007).
There are various advantages and disadvantages of using Barcode in
Supply Chain Management (SCM). Based on a comparative study (L. McCathie
and K. Michael, 2005), barcodes play an important role in SCM by streamlining
inventory management practices. Barcodes eliminate the need of manual data
entry, thereby providing automation throughout the supply chain, wherein the
information collection and its processing is greatly simplified and hence the
speed and efficiency is amplified. Data can be recorded in real-time and
accuracy is maintained. Barcodes also help improve effectiveness of labor and
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
16
therefore contribute to cost-cutting. Based on a study of a large number of
manufacturing plants (Paul M Swamidass, 1998), organizations who are users of
barcode in their manufacturing plant process showed greater profitability as
against to non-users of barcode.
In addition, using barcode technology helps in manufacturing cost
reduction, quality improvement and cycle-time reduction. This however varied
based on the skill levels of various barcode users. Barcode systems have been
used before by employing wristbands in order to improve patient safety in
hospitals (Zebra Technologies, 2013). They reported that use of barcodes
guarantees accuracy in patient information and keeps system error free. The
barcode contained two forms of information to identify patients: patient name and
identification number. Applications can be used to perform tasks like
identification, data collection and tracking purely based on the barcode data.
They inferred that due to time savings and accuracy of barcodes, use of
barcodes in any environment is a beneficial option and fosters productivity. The
decisions to be made before creating the barcode ids and ensuring its
uniqueness are also highlighted in this paper. They are: the kind and type of
information to be included on the ID, and the kind of barcode to be used for
encoding the information, e.g.: 1D or 2D barcodes. The use of Auto-ID system
such as 2D-barcode and Radio Frequency Identification (RFID) system may be
used for a conference (KullaprapaNavanugraha, 2010).
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
17
These systems are used to manage the conference sessions, observe the
participant behavior, and record their interests. The authors also portray the
advantages in using “RFID in UHF band” than 2D-barcode where former would
need no personnel while the latter would need personnel to control the barcode
reader event. This data is stored in the Database Server through the internet
using the Registration System over the internet. A seat allocation system
intelligently allocates seats based on the categories of delegates, speakers and
other attendees depending on the availability of seat in that particular category.
In case of unavailability, this system tries to accommodate the seat in a higher
category. If this is also unavailable, then the priority seats in the delegate
category are automatically allocated.
The staff interface provides a medium with which the barcode data is
collected from the ID tags using barcode readers and is forwarded to the servers
for further processing across the internet. Staff and other team personnel
deployed at these counters may either validate venue access using the Venue
access system or manage consumable stocking and deployment using the
consumables Monitoring System. A reply is received to confirm whether the
delegate is authorized for that activity. This reply has been facilitated using AJAX
to ensure quick response and not reload the whole website, thereby reducing
data usage for each transaction.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
18
An admin interface interprets the data being collected to the administrator
and key personnel and provides real-time information to this team helping them
make timely decisions.
Image Processing Based Barcode Recognition Systems
Use of image processing based barcode recognition systems are
expected to increase the performance in barcode reading. Moreover, this
enables PDA and MP users to be able to obtain barcode information via their
devices. There exist some commercial image processing based barcode reading
softwares. “Softek Barcode Reader” [3] and “DTK Barcode Reader SDK” [4] are
two examples developed by DTK Software and Softek Software companies.
However, in the literature, there exist few research works on that field. For the
purpose of increasing the system performance and decreasing the computation
time, the problem is generally divided into two parts; Barcode Localization and
Decoding. The first part of the system finds the location of the barcode. The
second part decodes the barcode information embedded in the barcode. As a
result of localization, decoding algorithm only considers the barcode area but not
the whole image.
In the literature, part of the works merely considers Barcode Localization
some only consider Barcode Decoding [8, 9, 10] and the others consider the
whole problem. In this Chapter, review of the Barcode Localization and Decoding
techniques in the literature are presented. Limitations and drawback of those
systems are mentioned.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
19
Barcode Localization
Multichannel Gabor filtering technique has been used for many texture
classification and segmentation tasks. In [5], this technique is used for barcode
localization. Firstly input image is filtered by using Multichannel Gabor filter in
eight orientations (0°, 22.5°, 45°, 67.5°, 90°, 112.5°, 135° and 157.5°). Thus,
eight Gabor filtered images or feature images are obtained. Then, local energy of
the feature images is examined by using either unsupervised method (K-Mean
Clustering) or supervised method. As a result of this operation, barcode location
and barcode orientation are found.
Barcode Decoding
After finding the location of the barcode, the remaining problem is to
decipher the barcode. In order to decode the barcode information barcode
resolution has a key role in decoding. It is assumed that barcode resolution
quality is high enough in [8, 11, 12, 13]. High quality barcode samples are
obtained from low resolution ones by using super-resolution techniques in [9, 10].
To decode barcode information, widths of the dark and light regions on the
barcode must be known. Peak locations of the dark and light regions are found
with statistical pattern recognition in [8]. Barcode information is deciphered based
on the distance between the peak locations. In [11], simple thresholding is
applied to all pixels. If the pixel value is less than threshold, it is replaced by zero.
Then, number of zeros is counted to obtain widths of the barcode lines. Detection
of the transition between the two barcode regions is used in [13]. Transition
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
20
values are obtained by zero-crossings of the second derivative of the barcode.
Then, distance measurement is performed between the light and dark barcode
lines and barcode is decoded using the distance information. Finally, neural
network is used for decoding in [12]. However, the performance of these
methods depends severely on the image quality. In [9, 10] a super-resolution
method is proposed which enables the reconstruction of a higher quality barcode
sample from a low resolution or low quality sample. [9] only considers the
improvement of the barcode image but does not try to decipher it.
For this purpose Fourier Transform phase information and the truth that
each scan line of a barcode codes the same information are used for
improvement. In [10] super resolution algorithm generates a perfect resolution
barcode sample from estimated start and end points and tilt angle and tries to
estimate to minimize the mean square error between the generated and original
samples.
Barcode System
A barcode is an optical machine readable representation of data, which
shows certain data on certain products. There are different types of barcodes,
some of them have to be worldwide unique and need license. We chose
‘‘code39’’ because first of all, code39 does not need license, have the possibility
to print for unlimited products, supports full ASCII, number, letter and special
character usage (capacity of 26 capital letters, 10 numbers, 7 special
characters). And also it was the easiest to read and was the best fit for the
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
21
barcode generators for PHP. As the barcode generator, we found one
compatible with PHP. It is using PHP’s GD Graphics Library. We got the script
and modified it to be able to print serial barcodes. It prints barcodes in increasing
order (in multiple prints) on the screen, and sends to the printer. The script is
distributed under GNU License. And the hardware part of the system is out of a
label printer and a barcode scanner. Barcode scanner is a USB connected
model. It scans the barcode, writes to the field where the cursor is, and presses
enter. This function eases the usage. So the only extra hardware to be used by
the staff will be a barcode scanner after the system is implemented to the
enterprise.
Barcodes
A barcode is a graphical representation of data easily readable by optical
devices. There are many code standards, but only four are used for product
tagging: EAN-13, EAN-8, UPC-A, UPC-E. The global, non-profit organization
called GS1 has chosen these codes as GTIN (Global Trade Item Number). The
cooperation between GS1 and manufacturers can guarantee worldwide unique
product identification numbers. UPC family codes are currently used in Canada
and USA while EAN codes are used in all the 26 other countries. This chapter
will describe the barcode decoding process with EAN-13 as example and only
this code will be taken into consideration. [18, 19] EAN codes EAN (originally
European Article Number, but now changed to International Article Number) can
appear in two formats: EAN-13 (Figure 3.7) and EAN-8 (Figure 3.8). EAN-13 is
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
22
commonly used for marking products, it encodes 13 digits, from which 12 are for
the product number and 1 is for the checksum. EAN-8 (7 + 1 digits), which is a
shortened version, is intended for small packages i.e. pocket tissues, chewing
gums and elsewhere where a 13 digits long code does not fit.
Code properties
Barcode properties are enumerated below:1D - code readable in 1
dimension, Continuous - no breaks between digits, Numeric - encodes only digits
in decimal notation, Many-width - different bars and spacing height and
Checksum - additional digit for checksum
Digits meanings
The GS1 Prefix, the first 2 or 3 digits usually identifying the country code
where the manufacturer is registered (590 for Poland), The Company number,
4,5 or 6 digits, that GS1 assigns to the company depending on the number of
different products lines, Item reference, from 2 up to 6 digits, provided by the
manufacturer and Checksum, the very last digit.
Code structure
EAN family codes always start and end with a guard pattern, three bars:
black, white and black, which are longer than the other bars, as shown on figure
3.9. The middle sign, which is built from five longer bars that alternate white and
black, splits the code into two equal parts. Each module encoding a digit contains
seven bars matching bits, the white bar is treated as binary ‘0’ and the black one
as ‘1’. In table 3.1 the encoding of digits is shown. All digits are divided into three
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
23
groups: the first digit, the digits from number two up to number seven and the last
six digits. The first digit is encoded by parity of the following six digits, as those
digits have two possible encodings, L-code with odd parity and G-code with even
parity. The last six digits are encoded in R-code, which is a mirror reflection of G-
code. Figures 3.10 - 3.12 show actual each digit encoding using bars, in
accordance to L-code, G-code, R-code.
Geolocation
Geolocation is the ability to identify the geographic coordinates, in other
words the location, of the user’s smartphone. This is an important feature of the
ShopDroid application. It is needed in order to customize the user experience
according to his location. In this case, the application will only show the product
prices from the stores close to him. The Android platform makes it possible to
use two location providers, which have been successfully implemented in this
application: GPS provider and Network provider
GPS Provider
All Android phones are GPS enabled. GPS would be the most accurate
way of knowing the location of the user. It should be accurate to about 15 meters
(this depends on each device). Getting a fix (that means that the device acquires
the needed satellite signals, navigation data and calculates the position) with this
provider might take some time - during tests, the fastest fix was in 5 seconds,
while the slowest was around 2 minutes. Using this provider also requires that
users have to be outdoors or close to a window if they are indoors. It also shows
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
24
a GPS icon in the notification bar, indicating users that the GPS is active and
being used by the application
Network provider
When the better GPS provider does not work or it is not enabled in the
phone (Android disallows an application to turn on the GPS for the user) then the
application can use the Network provider, which can get the location coordinates
from GSM (Global System for Mobile Communications) triangulation or if
connected to a wireless network, it could get the location from the IP address of
the network. It should be noted that this last option (getting the location from a
wireless network) depends on Google’s internal database, and the accuracy level
of this may vary. A location listener must be created per each provider.
Having created the listeners, the application can request location updates.
A problem aroused when implementing this in the application, was that creating
and using the location listeners in an activity, made them unusable by other
activities. With Android, each screen can be understood as an individual activity,
with almost not reference at all to any previous or subsequent activity, only some
parameters can be passed between activities, which are some primitive types
and strings. Android FAQs (Frequently Asked Questions) provide a solution for
this: The android.app.Application is a base class for those who need to maintain
global application state. It can be accessed via getApplication() from any Activity
or Service. It has a couple of life-cycle methods and will be instantiated by
Android automatically if your register it in AndroidManifest.xml [21].
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
25
The Application class is similar to a singleton; it lives throughout the entire
life of the application, no matter which activity is in the foreground. With this
functionality it seemed obvious to implement the location listeners inside the
Application class. All Android applications provide a default Application class, but
if need one can create a new one to add application specific features. This is
implemented in the ShopDroidApplication.java file. The listeners are created as
soon as the application is started, inside the on Create() method of the
application. Every activity can get the current location by calling get Location()
method:
Avoiding Location updates when the application is in the background
Enabling the location listeners makes them active throughout the life of the
application, unless disabling them manually. This can cause some battery
drainage, which is not positive for the user. This can be seen as soon as the user
switches the application, or goes to the device’s home screen, the GPS icon will
still be shown in the notification area, indicating that it is active and that it might
request new location updates. This is also true for the Network provider listener,
which doesn’t show any icon in the status bar, but nonetheless it will still be
active. In order to avoid this, the listeners must be disabled when the application
is paused. Unfortunately Android’s Application class does not provide any way to
check if the application was paused. This can only be done per each activity. So
in Shop Droid, each activity enables these listeners, which were already created
once the application started, whenever resuming, inside the activity’s on
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
26
Resume() method. This method will even be called the first time the activity is
created. Also, these listeners are disabled whenever any activity goes into the
background, this is implemented inside the activity’s on Pause() method. For
debugging and testing purposes, an option to mock the location was
implemented. ShopDroid’s Application class will check on start, if the mock
location option is activated, and if so, then it will return the mock location to
whatever activity that requests the location. By doing like this, none of the
activities code needed to be modified.
Barcodes are a way of representing information, which is machine
readable. They allow collecting data quickly and accurately. Barcodes can be
read by optical scanners called barcode readers, or scanned from an image by
special software. They are of two types: 1D and 2D. The 1D barcodes hold
information about a product item such as a product code or any other ID.
Commonly 1D barcodes are used in shops and supermarkets where there is a
barcode on each product. The barcode is read at the checkout to retrieve the
price from a central database and update customer and stock information. 2D
barcodes allow more information to be stored in small amount of space. They are
generally used in storing name, address, and other information on business reply
cards and website or web page address to connect to a particular site. i.
Barcodes are much quicker, more efficient entry of information and are
inexpensive and easy to implement. As barcodes are printed and processed by
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
27
machines, they are processed much faster than standard human data entry and
with a much higher degree of accuracy.
Barcodes have the potential of dramatically improving productivity and
reliability of nearly all applications. For an example, on an average it takes 6
seconds for an operator to enter 12 characters of data, whereas scanning a 12
character barcode takes only 300 milliseconds. The 12 error rate for typing is
higher than scanning barcodes. A data entry error will translate into additional
costs for a business that ranges from the cost of re-keying the data to shipping
the wrong product to the wrong customer [6]. ii. There is another technology
termed as RFID technology other than the barcodes, which is used for carrying
information. Radio frequency Identification (RFID) uses radio waves as means of
identification. The most common way to use RFID is to store a serial number that
identifies a person or an object, and perhaps a few other pieces of information,
on a microchip that is attached to an antenna. The chip and the antenna together
are called a RFID transponder or a RFID tag. The antenna enables the chip to
transmit the identification information to a reader that converts the radio waves
reflected back from the RFID tag into digital information. This information can
then be passed on to computers that can make use of it.
The primary difference between the two technologies is that barcode
scans a printed label with optical laser or imaging technology, while RFID reader
interrogates a tag using radio frequency signals. Barcode requires a line of sight
whereas RFID does not. Barcodes can be read only in a smaller range but RFID
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
28
tags can be read at a much greater distance. RFID tags have a read and write
capability but barcodes can only be read. Barcodes may be easily damaged but
RFID are more durable. Cost and privacy are two big concerns with RFID. For
instance, a RFID implanted in running shoes could be used as a tracking device.
Barcodes are used to efficiently and reliably enter data into a system with
little or no human interaction, effectively eliminating the humanerror element from
data entry. For instance, if the user needs to visit a website on his cell phone he
can easily do it by scanning and decoding a barcode containing a long URL
rather than typing which might lead to some errors. Barcodes, as machine-
readable representation of information in a visual format, can be easily stored,
transferred, processed, and validated.
Barcodes have countless applications and are widely used for product
identification, inventory marking, shipping container marking, and much more. 2D
barcodes are almost like 1D barcodes - They identify an object uniquely. The big
difference is that 2D codes can be used to virtually identify anything. Barcodes
are extremely common and can be found in all types of industries, government
organizations and public services. Barcodes provide a simple and inexpensive
method of encoding text information which can be easily read using electronic
readers. Barcode technology and processing provide a fast and accurate tool to
enter data without keyboard data entry.
The traditional barcodes are called one-dimensional barcodes. This is
because they are scanned, or "read", in only one direction - horizontally. The
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
29
vertical height of the barcode makes for easy scanning, but in itself does not add
any additional information. The next generation of barcodes is generally referred
to as 2D, two-dimensional, barcodes. These new style barcodes get their names
from the ability to be read both horizontally and vertically, therefore 14 increasing
the density of information that can be encoded in the same amount of space.
Barcodes hold a limited amount of information (generally less than 40 characters
although there are exceptions) while 2D barcodes can hold considerably more (in
some case up to 2000 characters), A 1D barcode only encodes data along the
width of the barcode, while 2D barcodes encode data along both the width and
height. 2D barcodes are therefore much denser than 1D barcodes and encode
much more data in the same space. 2D barcodes are also much better at
detecting and correcting errors in damaged barcodes.
However, 2D barcodes require more expensive barcode scanners to read
the barcode, and in many cases, such scanners do not operate through the
computer's keyboard input - and so may not interface readily to your specific
application. Many 1D-barcode scanners (known as keyboard wedge scanners)
connect in series with the keyboard - so, from an application's point of view,
scanning a barcode is just like typing on the keyboard [12], [13], [14]. ix. A one-
dimensional (1D) barcode is used to reference an external database. Essentially,
the 1D barcode contains no meaningful data, e.g. a packet of cornflakes is
scanned at the checkout in a store, the reference number contained in the 1D
code is checked against an external database, and only at this time do we get a
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
30
description/price for the article. A 2D code typically contains the data. There is no
need to reference an external database, so a 2D barcode has much higher data
capacity, and therefore it is not mandatory to reference an external 15 database.
A 2D code can serve as a portable data file. While 2Dbarcodes are much
more powerful than 1D barcodes and are able to encode more data in the same
space, some applications may not require the added functionality that 2D
barcodes provide. 1D barcode is often cheaper alternative to 2D barcode and is
easier to print as it is less dense than 2D barcode. 1D barcode scanner is
typically less expensive than 2D barcode scanner [12], [13], [14] .x. Two
dimensional codes offer higher data capacity, a better fit in tiny spaces (matrix
symbols) and depending on the scanning device, the ability to be read without
regard to orientation. Even with these advantages, 2D symbology developments
may not replace most linear bar code applications. The scanning performance
tradeoffs should be weighed when choosing 2D over 1D. In general if the
application requires encoding less than 50 characters or space is limited to
aninch, linear codes should be considered unless a supplier compliance directive
to use a specific 2D symbology is either strongly encouraged or required.
Local
Internet cafés, or better known as computer shops in the Philippines, are
found on every street in major cities and there is at least one in most
municipalities or towns. There are also internet cafés in coffee shops and malls.
High-end restaurants and fast food chains also provide free broadband to diners.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
31
Rates range from P10 on streets, up to P100 in
malls.(http://en.wikipilipinas.org/index.php?title=BC_Websight_Internet_Cafe.
Retrieved: September 9, 2013)
In the article “Why Internet Cafe Business in the Philippines” (2009,
March), internet cafes are also a dominant access point for user from the lower
socio-economic classes. This kind of business may earn you extra money.
Notmany people can afford to buy their own PCs so they are turning to the
Internetfor information or to solve problems. Putting your business to capture
them willset you apart from the rest.(http://www.orientexpat.com/25518-internet-
cafe-as-a-business-in-the-philippines/. Retrieved: September 11, 2013)
Establishing internet cafe business or simply computer rental shops in the
Philippines requires adherence to certain regulations. Internet cafe industry
despite being primary access point of the community to the internet is still
considered to be backyard industry thus the LGUs classifies internet cafes as an
entertainment and recreational center along with billiard halls, karaoke bars and
other center for vices (Morada, 2010).
This classification provides some problems like distance requirements,
student’s restriction and licensing of software programs. In line with the
regulations and stakeholders concerns, City Council of Manila provides
Ordinance 8168: “Ordinance Regulating the Operation of Interactive
Entertainment and Over the Internet Shops within the City of Mainland for Other
Purposes. As stated in Section 1 of the ordinance.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
32
It is hereby declared the policy of the City Government of Manila to bring
order to the operation of commercial establishments involved in certain
computer-aided and electronic endeavours in the course of affirming thegeneral
welfare under Section 16 and 458(a) of Republic Act Number 7160, otherwise
known as the Local Government Code, by guiding themaway from certain forms
of entertainment which are potentially detrimental to their intellectual and moral
well-being that may lead to truancy.
In addition,
Section 3 of Ordinance 8168 prohibits elementary and high schools
students to have access to any form of video games and not allowed toenter any
rental center for no definite purpose during class hours. Also, in nocase shall
pornography or online gambling be allowed to any customers. The ordinance
authored by Hon. Victoriano Melendez mandates allowners/proprietors and staff
of computer rental centers to: a). Positively determine the presence of
elementary and high school students by their uniforms or similar clothing,
identification cards, study materials and other similar items aswell as their
familiarity of regular customers. The physical features of out-of-school minors
shall qualify for prohibition purposes. b). Provide transparency of the frontage of
such establishments as well as adequate standard lighting of theinterior premises
to allow unimpeded outside view. c). Program, ac.tivate or otherwise install a
security system on all computer terminals or networks toprevent any access to
pornographic sites or online gambling (Section 4).Documentation and
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
33
requirement for acquiring business license includes DTI registration, barangay
clearance and in most cases undertaking a “Deed of Undertaking”. After securing
business permit, is registration with the BIR for business TIN.
It is certain to accomplish the following things: a). Registration of business
establishments, b). Registration of book of accounts and, c). Request for permit
to issue receipts and invoices. Computer rental shops owners are required to pay
income tax to the BIR on a monthly basis, computed as 3% of monthly gross
sales.Just like any other businesses, computer rental business also experienced
problems that affect its operations and productivity. Santiago (2007) enumerates
five common problems in the computer rental business. 1). Competition - when
there are more internet cafes near the shop that means there’s indeed a market
for the products and services. However, there is also bigger the probability
thatthe number of people going in your shop will be drastically reduced, likewise
your profit. 2). Expenses computers evolve into something better and faster
every few months, thus upgrading computers is often necessary to accommodate
new delivery of quality services.
Related Studies
Foreign
Barcode Technology
Significant work has been done on the topic of barcode technology and
mobile applications. With the advancement of technology, a new technique came
to enhance the capability of 1D barcodes especially in data capacity [15], termed
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
34
as 2D barcodes. 2D barcode can carry a lot more information and can act as a
small record of a 16 database itself without requiring any data access. It has the
capacity to encode alphanumeric data [1].
Just like 2D barcodes, another technology that gained popularity is smart
hand held device with high computing capabilities because of the size and
portability. These mobile phones act as pervasive computing tools and they are
always available to the users, provide connectivity and also one can access the
Internet [16]. Nowadays mobile phones come with variety of sensors like
accelerometer, GPS, camera etc. Camera has now become a very powerful
sensor to interact with physical objects including two dimensional barcode [16].
Barcode and Cell Phone Technology
Earlier a lot of work regarding the recognition of 1D barcodes using
camera phones has already been made. Steffen et al [17] had presented an
algorithm for recognizing 1D barcodes using camera phones which was highly
robust regarding image distortions. Barcodes are ubiquitous and are powerful
way to link information and services with physical world. Although, the demand of
RFID technology has increased in recent years but using this technology for
product identification and labeling especially using RFID tags on retail products is
very unlikely in the upcoming years. Robert Adelman [8] describes the work with
the barcode technology and built in camera that enable a simple and fast
interaction of user with every day products while shopping.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
35
As mentioned before, cell phones with camera can capture image and
process it, therefore many 2D barcodes have also been developed for mobile
phone users [9]. H. Hahn and J.K. Joung came up with an algorithm to decode
2D-bacode PDF-417 [18] in 2002. In 2004, E. Ohbuchi et al [19] presented an
algorithm for decoding QR code. 2D barcodes can store data in both vertical and
horizontal directions and have the capability for error detection and fault
correction. There are many different barcode symbologies in use today and many
of them are introduced specifically to achieve higher data density such as
PDF417, MaxiCode, Data Matrix, Code 49 and Quick Response (QR) code [1].
Robert Adelmann et al [20] created a free, easily usable, and robust
barcode recognition system for mobile phones, together with an open resolving
framework that facilitates rapid prototyping and deployment. Madhavapeddy et
al. [21] used SpotCodes for enhancing human computer interaction by using a
camera-phone as a pointing and selection device. Seven 2D-barcodes namely
QR Code ,VeriCode, Data Matrix, mCode, Visual Code, ShotCode and
ColorCode are used nowadays for camera phone applications. The first four
barcode in addition to their higher data capacities can enhance the reading
robustness of the codes by error detection and correction capability.
Hence, these 2D-barcodes can operate as robust and portable data files.
With these barcodes, users can access the information they need at anytime,
anywhere, regardless of network connectivity. As for the last three 2D-Barcodes,
they focus more on robust and reliable reading, taking into account the reading
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
36
limitations of built-in cameras in mobile phones. They differ greatly from the other
barcodes in terms of data capacity [3]. H. Kato and K.T. Tan identified three key
factors to improve the robustness of 2D-barcode reading, the range of the
reading distance and the stability of the readers [3]. Teoh Chin Yew et al. [22]
conducted a study which performs spatial analysis on several 2D barcodes using
various size data sets. In addition the work also includes the analysis of several
compression applications which can be used in minimizing barcode’s size.
The combination of barcodes with mobile phones opens a door way for
new applications. Tsung-Yu Liu et al. [23] constructed a 2D barcode and
handheld augmented reality supported learning system called HELLO (Handheld
English Language Learning Organization), to improve students’ English level.
Mobile phones with Internet capability are very popular among students in Japan,
so Naomi Fujimura and Masahiro Doi [24] implemented a classroom support
system to collect students’ degree of comprehension of course content using
mobile phones. They devised this system to offer better ease of use for both
students and teachers. Jun Rekimoto et al. [25] describes examples of
augmented reality applications based on CyberCode, and discusses some key
characteristics of tagging technologies that must be taken into account when
designing augmented reality environments.
With the swift increase in the number of mobile device users, more
wireless information services and mobile commerce applications are needed.
Jerry Zeyu et al. [1] discuss 2D barcode concepts, types and classifications,
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
37
major technology players, and applications in mobile commerce. They also report
a research project to develop a 2D barcode processing solution to support mobile
applications. S. Lisa, G. Piersantelli describes the features, applications,
functionalities and benefits of the 2D barcodes, pictorial machine-readable
representations of information and data [26]. Jonathan M. McCune et al. [27]
present and analyse seeing-Is- Believing, a system that utilizes 2D barcodes and
camera phones to implement a visual channel for authentication and
demonstrative identification of devices.
The server-based system consists of a request processor subsystem that
handles the request sent by the mobile client and generates response. The
request processor processes the request sent and interacts with the database
connector for further processing. The other component, termed as database
connector, connects to the external database to query the database for the
appropriate data asked by the request processor and sends the results back
Usage of Barcode and XML Technologies in System Design
In this project, we try to emphasize on how digital barcodes can provide
an effective means for mobile E-commerce application. Our system can decode
both 1D and 2D barcodes. We use Qrcode (2D barcode) for encoding food
product information as well as 1D barcode data displayed on the food product to
provide useful information to the user of the system. We embed the data
associated with 1D barcode along with the other information in a 2D barcode. So
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
38
a 2D barcode not only represent static information embedded inside it but
dynamic information (the one that can be obtained from external sources) as
well. It is dynamic because we can use the 1D barcode data for accessing the
external database. So we are not only providing the user with contents encoded
inside the 2D barcode but also the contents that can be accessed from external
sources through the use of data encoded inside 1D barcode.
For accessing the data from outside, we may or may not connect to the
Internet and it depends on the location from where we are trying to access the
information. If we are trying to access the food item related data inside the
grocery store then we may not require Internet otherwise we need to.
Barcode Generation and Decoding
In order to test whether the system properly decodes the barcode or not,
we used some online free barcode generators to generate barcode images.
There are many free generators available in the market some of which are online
and others can be downloaded. These generators allow you to encode data of
your choice in the barcode. Some of them also generate image of any type in 1D
or 2D. One of the online generators that we used is [34] and the other one is [35]
for 1D barcode.
We also used another generator provided by ZXing from Google to
generate 2D barcode images and of QR Code type. This is the one, which is
used heavily in the development and testing of the system. The advantage of this
QR Code generator is that you can encode information belonging to certain
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
39
category of text. It provides the user an option to choose the content type or the
kind of information needed to encode.
These options include calendar event, contact information, URL, email
address, geographical location, phone number and text that can be anything [36].
Depending upon the option or the content type chosen, the generator asks the
user to enter certain information that can be encoded. It then selects the specific
standard format for that particular content type, formats the information entered
by the user according to the standard, encodes it inside the barcode and creates
a barcode. Once the barcode is created, image can be easily downloaded. For
example if the user selects contact information, the generator will automatically
provide text boxes for the user to enter data for name, address, phone number
and then use all this data to create a specific format. This specific format is
visible when we decode the barcode image. Since the options available to the
user for the content type is fixed, the generator knows how to format the contents
according to the standard for a particular content type.
Moreover, if the user selects the content type as text, he can encode any
information and there is no specific format used by the generator to encode the
data. One can see the same data after decoding without any format. Thereforein
this case, the user has to come up with his own way of formatting the contents
and then providing the formatted information to the generator to build a barcode
image. Since the generator provides a single textbox to enter data for text
content type, one can enter data of any complexity as well as in any format. In
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
40
our project, we used the “text” content type to encode the complex information
type. We have also defined some categories to represent such complex
information and came up with our own standard of formatting this information.
This formatted information can be fed to the generator [36] to generate the 2D
barcode image. There are many barcode decoding softwares available in the
market. To build this project we used the APIs provided by Google known as
ZXing [11]. As mentioned before, ZXing is a multi-format 1D/2D barcode reader
library implemented in Java. Out of all the packages of the APIs we are using
com.google.zxing,com.google.zxing.client,com.google.zxing.common,com.googe
.zxing.oned, com.google.zxing.datamatrix, com.google.zxing.qrcode packages in
implementing the system.
External server based sub-system
Request processor: It listens for request and if needed performs data
processing. The mobile-based client sends a request by setting up an HTTP
connection with this component. Once it receives the data, it connects to the
database and generates query according to the data sent by the client. It queries
the database, receives the desired data from database, generates an XML
response file by filling the data received from the database in the file and sends
the response back to the client.
Database connector: It is used to create connection between the server
and the database. The database can be present at the local machine or it can be
accessed remotely. Database: It contains the data that is required by the
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
41
application to generate results. For instance, the database at grocery store will
contain the product related information like price, expiration date. On the other
hand, the repository at home will contain the user specific data related to
allergies and conflicts for food. This system uses unique barcode to mark
different components. The barcode is a very important part of a WMS, which
highly improves work efficiency for management. This system not only can use
barcode scanners to read and search for components, but also can generate
barcode labels and then print them.
Local
In Crisanta’s (2010) study, developing a system that can efficiently
manage the task in an internet cafe, she explained that an internet cafe can
function well by applying computerized system or networking in monitoring the
use of computers rather than manual system. In applying such, tasks become
more manageable, accurate and reliable to their business.
In conducting the study, Lincoln Internet Cafe located at Bato-Bato St.,
Riverside, Commonwealth Avenue serves the sample. The internet cafe uses
manual system in recording the usage of their computers. They use a log-book
that contains the following list: computer number, time in and out, time to be
consumed and the amount to be paid. Aside from this task, the assistant is also
obliged to ask or remind the customer if they are going to extend their time or
they are about to end their transaction. After that, they encircle the computer
number, calculate it by computing the time the customer have consumed.
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
42
Crisanta (2010) conclude that LIC (Lincoln Internet Cafe) system is time
consuming and difficult. Sometimes, customers exceeded their usage because
they are not guarded properly and having this kind of negligence causes an
income lost to the business.
In the study of Añes, Bamba, Geronimo (2011) entitled “Highlighting the
Operational Concerns and Accounting System of Selected Computer Rental
Shops in Sta. Mesa, Manila”, the company’s accounting concepts and policies
are in accordance with the existing accounting standards and properly directed
by the management. With regards to the general accounting procedures, the
results show that all business transactions are done accordingly. Business forms
and financial reports are with agreement with the business transactions done.
Financial reports and business forms are catered with the company’s
requirements. Thus, encompassing good accounting practices is beneficial and is
helpful in efficiently conducting the day to day operations of the company.
The company has strong control with regards to all cash procedures and
transactions. The receipts and deposits of cash are properly supported by a
source documents.
Daily summary report is prepared to account for daily revenue, assuring
that revenue transactions are recorded as they take place. Employees’ payrolls
are accounted for accordingly, amount and balances are checked and reconciled
with number or hours worked. Consequently, payroll amounts are corrected if
any errors or changes occur. In the light of the findings presented in the study of
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
43
Equillo, Macarubbo and Rongavilla (2009) entitled “Leading Principles and
Practices of Internal Control among selected State Universities and Colleges”,
the study show that an essential measurement that ensures that internal control
systems remained unchanged is the proper and regular monitoring. Proper
monitoring is aimed to ensure that controls are operating as intended. Ongoing
monitoring is regularly performed to cover up all internal control components.
This is undertaken in a real-time basis and responds dynamically. This is very
important to the internal control people as it ranks first among all related
monitoring procedures.
In line with having a good accounting system, it is also important to
consider the operational concerns of a business. This is the main concern of the
undergraduate thesis of Apellado, Santos and Valdez (2010) entitled
“Highlighting the Operational Management and Accounting System of Laundry
Shops in San Juan”. Findings of the study includes establishing a petty cash fund
for controlling the expenses, regular monitoring of everyday transactions
affecting different areas of business and communicating problems encountered
in operating the business.
Chapter 3
Research Methodology
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
44
Research Approach
The researchers have used the System Development Life Cycle (SDLC)
in planning, conceptualizing, brainstorming, creating and designing the internet
café log in and log out request system with barcode technology which is a
systematic approach to program development and system analysis and design
with respect to computer technology and software engineering.
Systems Development Methodology
The Structured System Analysis and Design Methodology was a system
approach used to the system analysis and design of internet café log in and log
out request system-barcode based. It involves the sequence applications and
executions of events as wells to the analyses of data and appropriate
documentations involved in analyzing, decoding and interpreting the present
system and the proposed system and there were series of steps to be followed in
gathering information in terms of the development and design of the internet
café log in and log out request system-barcode based.
Data Gathering Procedure and Output
In designing and developing the log in and log out request system, the
researchers asked permission in writing to the office of the Campus Director and
informed the research adviser as well as internet attendant about the study. After
the approval was secured, the gathering of information to the present
operation/transaction involved relevant to the study was actually begun. The
researchers actually have identified the Internet Café of the University as partner
SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
45
in conducting the study that deals with the internet log in and log out with server
intervention. Gathering of data from the present transactions and operations to
Internet café was smoothly started.
Research Locale
This study was conducted at the Internet Café of Surigao del Sur State
University-Cagwait Campus, Poblacion, Cagwait, Surigao del Sur.
Research Planning and Procedure
A letter asking permission to conduct the study entitled” Internet Café
Log in and Log out Request System-Barcode Technology” was sent to the
Office of the Campus Director of this University which allowed the student
researchers to use the internet café for their research activities. After the
approval was secured, the design and development of the program was initiated
and commenced.
Research Time Target
The time target accomplishment of this research will be on November to
March of the Academic Year 2015-2016. Furthermore, visual basic 6.0 software
is used to the development and design of this system program and there will be a
trial and error approach in order to apply all necessary requirements of this study.

More Related Content

Similar to Barcode internet

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and dataIAEME Publication
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET Journal
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...IJECEIAES
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
 
IRJET- Online Canteen Automated System
IRJET-  	  Online Canteen Automated SystemIRJET-  	  Online Canteen Automated System
IRJET- Online Canteen Automated SystemIRJET Journal
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in ManufacturingPreran Prasad J M
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...Techugo
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalMOHAMED RIYAZUDEEN
 
Web Application for e commerce Using Django Framework
Web Application for e commerce Using Django FrameworkWeb Application for e commerce Using Django Framework
Web Application for e commerce Using Django Frameworkijtsrd
 
Web Application for e commerce Using Django Framework
Web Application for e commerce Using Django FrameworkWeb Application for e commerce Using Django Framework
Web Application for e commerce Using Django Frameworkijtsrd
 

Similar to Barcode internet (20)

IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and data
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
Barcoding 101: What You Need to Know
Barcoding 101: What You Need to KnowBarcoding 101: What You Need to Know
Barcoding 101: What You Need to Know
 
IRJET- Online Canteen Automated System
IRJET-  	  Online Canteen Automated SystemIRJET-  	  Online Canteen Automated System
IRJET- Online Canteen Automated System
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in Manufacturing
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...What is the significance of the QR Code Maintenance App for Your Business- He...
What is the significance of the QR Code Maintenance App for Your Business- He...
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
 
Web Application for e commerce Using Django Framework
Web Application for e commerce Using Django FrameworkWeb Application for e commerce Using Django Framework
Web Application for e commerce Using Django Framework
 
Web Application for e commerce Using Django Framework
Web Application for e commerce Using Django FrameworkWeb Application for e commerce Using Django Framework
Web Application for e commerce Using Django Framework
 

More from Angelito Pera

Official results of entrance exam 2019 2020-officialrelease
Official results of entrance exam 2019 2020-officialreleaseOfficial results of entrance exam 2019 2020-officialrelease
Official results of entrance exam 2019 2020-officialreleaseAngelito Pera
 
Peac cidam presentation 2019
Peac cidam presentation 2019Peac cidam presentation 2019
Peac cidam presentation 2019Angelito Pera
 
Sas entrance exam results 2019
Sas entrance exam results 2019Sas entrance exam results 2019
Sas entrance exam results 2019Angelito Pera
 
Entrance Exam 2019-2020-1st Batch
Entrance Exam 2019-2020-1st BatchEntrance Exam 2019-2020-1st Batch
Entrance Exam 2019-2020-1st BatchAngelito Pera
 
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1Angelito Pera
 
Sample in response to Req. 1
Sample in response to Req. 1Sample in response to Req. 1
Sample in response to Req. 1Angelito Pera
 
Top performing shs department
Top performing shs departmentTop performing shs department
Top performing shs departmentAngelito Pera
 
Top performing jhs english 7 and ict 7
Top performing jhs english 7 and ict 7Top performing jhs english 7 and ict 7
Top performing jhs english 7 and ict 7Angelito Pera
 
Social media platforms
Social media platformsSocial media platforms
Social media platformsAngelito Pera
 
Css research project-12
Css research project-12Css research project-12
Css research project-12Angelito Pera
 
Readingcomprehension final-170802012749
Readingcomprehension final-170802012749Readingcomprehension final-170802012749
Readingcomprehension final-170802012749Angelito Pera
 
Reportcard 170802012709
Reportcard 170802012709Reportcard 170802012709
Reportcard 170802012709Angelito Pera
 
Rubric cle anest and most disciplined sas
Rubric cle anest and most disciplined sasRubric cle anest and most disciplined sas
Rubric cle anest and most disciplined sasAngelito Pera
 
Reading comprehension final
Reading comprehension finalReading comprehension final
Reading comprehension finalAngelito Pera
 

More from Angelito Pera (20)

Official results of entrance exam 2019 2020-officialrelease
Official results of entrance exam 2019 2020-officialreleaseOfficial results of entrance exam 2019 2020-officialrelease
Official results of entrance exam 2019 2020-officialrelease
 
Peac cidam presentation 2019
Peac cidam presentation 2019Peac cidam presentation 2019
Peac cidam presentation 2019
 
Sas entrance exam results 2019
Sas entrance exam results 2019Sas entrance exam results 2019
Sas entrance exam results 2019
 
Entrance Exam 2019-2020-1st Batch
Entrance Exam 2019-2020-1st BatchEntrance Exam 2019-2020-1st Batch
Entrance Exam 2019-2020-1st Batch
 
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1
FINAL REQUIREMENTS OF EMPOWERMENT TECHNOLOGIES AND PRACTICAL RES. 1
 
Sample in response to Req. 1
Sample in response to Req. 1Sample in response to Req. 1
Sample in response to Req. 1
 
Top performing shs department
Top performing shs departmentTop performing shs department
Top performing shs department
 
Top performing jhs english 7 and ict 7
Top performing jhs english 7 and ict 7Top performing jhs english 7 and ict 7
Top performing jhs english 7 and ict 7
 
Social media platforms
Social media platformsSocial media platforms
Social media platforms
 
Css research project-12
Css research project-12Css research project-12
Css research project-12
 
Topnotchers
TopnotchersTopnotchers
Topnotchers
 
Official grades
Official gradesOfficial grades
Official grades
 
Oral recitations
Oral recitationsOral recitations
Oral recitations
 
Readingcomprehension final-170802012749
Readingcomprehension final-170802012749Readingcomprehension final-170802012749
Readingcomprehension final-170802012749
 
Reportcard 170802012709
Reportcard 170802012709Reportcard 170802012709
Reportcard 170802012709
 
Rubric cle anest and most disciplined sas
Rubric cle anest and most disciplined sasRubric cle anest and most disciplined sas
Rubric cle anest and most disciplined sas
 
Reading comprehension final
Reading comprehension finalReading comprehension final
Reading comprehension final
 
Report card
Report cardReport card
Report card
 
Poetry
PoetryPoetry
Poetry
 
Imagery
ImageryImagery
Imagery
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Barcode internet

  • 1. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 1 Chapter 1 THE PROBLEM AND ITS SCOPE Introduction Internet system today is very relevant and useful to access different forms and kinds of information that the users are expected to retrieve and gather. In fact, it provides bigger opportunities to all aspects of human lives. Thus, internet cafés are built and established to cater the needs of the clienteles to access relevant information programmed in the World Wide Web (WWW). Naturally, the internet cafes’ of the University are built for income generating project (IGP) in order to produce and earn income as well as to respond the needs of the students, stakeholders and community. In this context, computer technology as well as internet has brought significance and advancement to our lives. It is one of the main reasons why almost everything becomes so simple and easy from difficult and complicated way of accomplishing each job almost everything now is being operated and manage through computers and internet connection. Today, it is widely recognized that most organizations need information systems to survive and succeed in the competitive business environment. According to Zebra Technologies, (2013) using barcode technology today helps in manufacturing cost reduction, quality improvement and cycle-time reduction. This however varied based on the skill levels of various barcode users. Barcode systems have been used before by employing wristbands in order to improve patient safety in hospitals, internet café’s, hotels, motels and other
  • 2. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 2 commercial establishments. Thus, an Internet Café Log in and Log out Request System in barcode technology is a new development in internet server log in and log out request system using the barcoded internet access card to read, decode and analyze in order to access on the web without the server intervention to share internet connection. Thus, the internet-users are automatically accessed on the internet through barcode-based log in and log-out request system. With respect to barcode is a set of bars and spaces representing alphabet or numeric data for identification of a particular product, service or a process. Barcode technology is the best-known and most widely used method of Automatic Identification. Automatic identification or “Auto ID” encompasses the automatic recognition and recording of data, most commonly through the printing and reading of information encoded in barcodes thereby eliminating risk of human error. Early applications of bar code scanning, which included retail point- of-sale, item tracking and inventory control, have been expanded to include more advanced applications such as time and attendance, work-in process, quality control, sorting, order entry, document tracking, shipping and receiving, and controlling access to secure areas. At present, the University uses its manual process of logging in and logging out the internet use through server intervention. The proposed barcode- based system for logging in and logging out of internet without the internet’s attendant assistance to open the internet server to help access all the clients who need an internet connection inside the internet café of the University will be
  • 3. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 3 properly accommodated. Also, the design of this system is done through access card for internet connection attached with barcode technology to access internet connection to open internet server. Conceptual Framework Barcode technology is fitted for automating the Internet Café log in and log out request system. Barcodes and barcode scanners offer a quick and accurate way for each lecturer to complete time-tracking transactions. Barcode-based log in and log out request system is a good substitute for manual systems for internet server. The manual processes of logging in/out are replaced with automated barcode readers. Since barcodes can carry a lot of information either by referring to the source of information or by encoding all the information in it, they are used in several applications like point of sale, inventory control, shipping, packaging and data collection. Medical and dental practices rely on complex patient forms and barcodes can help in entering the detailed information in the computer, making it an easy task of gathering large amount of information. It also reduces data collection costs and better services are the results. Barcodes are primarily used for entering data into a system, efficiently and reliably, thereby improving the productivity [6]. Nowadays 2D barcodes can embed a lot of data which can be used to provide useful information. 1D barcode does not provide such static information; rather it refers to an external database to collect the information. However, 2D barcode contains information, which
  • 4. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 4 cannot be updated but the information referred by 1D barcode can be easily modified. Therefore, if we use barcodes for carrying information we should come up with a way to get the benefits of both the 1D and 2D barcodes. Barcode can be easily scanned because of the use of camera and the barcode scanning applications on the cell phones whereas RFID requires a RFID reader to read the information. Most of the 2D barcodes encode URL, which can further lead to a web page or website. Moreover, a 2D barcode can encode much more information than a URL and can contain large amount of text information. Therefore, there should be some applications that can encode different kinds of information inside a 2D barcode and use it for different purposes. Currently, there is no application, which can take the benefits of 1D and 2D barcodes to manage information not only related to medicine or food but about anything and any domain and categorizes it accordingly. In addition, such system can provide a way to assist the cell phone user including elderly in collecting and viewing the information, provides functionalities according to the type of information, which would be of great public use. One of the challenging problems of pervasive computing is to link a physical object with digital information because many of the pervasive computing applications require manual inputs or complex image processing to obtain information related to a real object. The use of 2D barcodes eliminates such excess processing to acquire the needed information. The 2D barcodes have high capacity to store data, are less prone to human input error and act as a tool
  • 5. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 5 to acquire information on site without network access. The currently available solutions use 1D barcodes to represent dynamic information residing in a database and use 2D barcodes to represent only static information that also encode only URLs. In all such applications, the source of information gets restricted to either a database or the static data encoded inside a 2D barcode. None of such solutions takes advantage of 2D barcode capabilities to collect information from different sources and attach it to the real world entity. Moreover, a 2D barcode can also represent and categorize complex text information. Our approach integrates the capabilities of barcode technology to represent and classify the complex digital information collected from different sources. We design and implement an information management system on a handheld device that has image processing and barcode decoding capabilities to address the above-mentioned problem. Our prototype provides a generic framework to decode either 1D or 2D barcode, parse the complex information (both dynamic and static) inside the 2D barcode, differentiate the complex information based on content types and classify the image based on the barcode format. It also assists users in decision-making and information analysis. An example system application can be deployed in grocery stores as a part of the enterprise information management system. Due to recent technological development and integration of mobile and barcode technologies, several new mobile applications are developed every now and then. Nowadays various barcodes are used in mobile applications other than
  • 6. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 6 the traditional commercial systems. Digital barcodes provide a great means to store information in a portable way. Barcodes represent machine-readable information that can be easily stored, transferred and processed. Barcodes have the capability to improve the productivity and reliability of nearly all applications as they are printed and processed by machines. They are processed faster than human data entry and have a higher degree of accuracy. Barcodes have many applications and are mainly used for product identification, inventory marking, shipping container marking, and much more. Barcodes not only provide a simple and inexpensive method to present diverse commercial data, but also improve mobile user experience by reducing their manual inputs.
  • 7. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 7 Table 1. Schematic Diagram of the Present Study Figure 1 shows the schematic diagram of the present study which includes the development and description parameters of the Internet Café’ Log in and Log out request system which involves the functions, analyses, design, installation, coding and maintainability of the request system of internet server access. Meanwhile, the barcode-based log in and log out internet server system Development and Description Parameters of Internet Log in and Log out system in terms of: : Functions : Analyses : Design : Installation : Testing : Maintainability Barcoded Internet Access Card Internet Cafe’ log in and Log out Request System Barcode Technology
  • 8. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 8 is attached/programmed with barcode technology which encodes and decodes information of internet-user to access on the internet. . The Internet Café log in and log out request system barcode-based technology is the output of the study which will present general features and instructions of request system using the barcoded access card to provide easy access on internet connection. Significance of the Study The results/findings of this study are essential and beneficial to the following entities and group of individuals. Computer Technology Students. This study will give them enough information on barcode-based log in and log out request system for internet connection in order that they will know on how to design a program with barcode technology which is very useful and effective to access on the internet without disturbing the internet server of the internet café’. Computer Technology Instructors: This study will provide them information with respect to the development and description parameters of internet log in and log out system in terms of: functions, analyses, design, installation, testing and maintainability on how these entities and features work to respond the needs of the clienteles in internet connection. Meanwhile, this study is very helpful to their instruction in order that their students will be given the opportunity to design their system program using barcode technology particularly in the log in and log out request system for internet café.
  • 9. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 9 University Administrators. This study will help them understand that barcode technology is very useful and efficient for university transactions and in the delivery of quality services to their stakeholders and clienteles. Meanwhile, the University has its internet café for all the students to research and gather information in which the internet server is connected and monitored. Thus, this study will give further background and inputs for the University to include and implement this kind of service to access internet connection using the barcode technology without the internet’s attendant assistance to open the internet server for the internet café of the University since it is programmed in the access card all the requirements and data needed for internet access connection. Future Researchers: This study will help them informed the importance of barcode technology in office transactions and operations so that they will be able to understand the development and description parameters of internet log in and log out system in terms of functions, analyses, design, installation, testing and maintainability. Furthermore, this study will give them the opportunity to learn on barcode technology in terms of log in and log out request system of the internet café.
  • 10. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 10 Statement of the Problem This study is focused on the design and development of the internet café log in and log out request system that will help the internet-users to access on the web without the server intervention since it is connected, programmed and supported with barcode technology system. Specifically, this study aims to answer the following questions: 1. Development and Description Parameters of the internet café log in and log out request system in terms of: functions, analyses, design, installation, testing and maintainability. 2. How does the system work/function in terms of log in and log out of internet connection in the internet server?
  • 11. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 11 3. What is the sample prototype of internet access card with barcode technology used in log in and log out request system of internet connection? 4. What are examples of activities and tests involved in the log in and log out request system using the access card programmed with barcode technology? Scope and Limitations of the Study This research is actually focused on the development and design of Internet Café’ Log in and Log out request system with barcode technology which was conducted at Computer Laboratory Room II of Surigao del Sur State University-Cagwait Campus, Cagwait, Surigao del Sur from Academic Year 2014-2015. It is aimed to establish an effective and efficient delivery of services in accessing internet connection in the internet server without the internet attendant’s assistance to open the internet server for internet connection and it is further highlighted in this study the development and design parameters of development and description parameters of internet log in and log out system in terms of functions, analyses, design, installation, testing and maintainability.
  • 12. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 12 Definition of Terms For clearer and more comprehensive definition of the following terms, the researchers have conceptually and operationally the terms the below. Development refers to the designing and creating of a barcoded access card for logging in and logging out for internet server of the internet café. Description refers to the attributes and external features of a barcoded access card including its functions of the request system. Parameter refers to the scope and boundary of the study which highlights the development of barcoded access for internet server for internet access connection.
  • 13. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 13 Internet refers to the medium where information is arranged and programmed in the World Wide Web (WWW). Log in refers to enter user in accessing the internet connection using the barcoded internet access card. Log out refers to exit the user in closing the program or internet connection using the barcoded internet access card. Request system refers to the log in and log out system for internet server with barcoded internet access card. Function refers to the organized operations and activities which involved the log in and log out request system. Analysis refers to the systematic functions of the barcoded internet access card on how the internet server detects and monitors internet connection. Design refers to the entire structure and system plan and set up for log in and log out request for internet connection. Installation refers to the assemblage of a barcoded internet access card including the attachment of barcode reader in the internet server. Testing refers to the different set of activities conducted to show the trial and error scheme of the study. Maintainability refers to the ability of the barcoded internet access card to maintain its functions in log in and log request system in the internet server.
  • 14. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 14 Chapter 2 REVIEW OF THE RELATED LITERATURE AND STUDIES This chapter presents the Review of Related Literature and Related Studies of the present study. Related Literature Foreign Barcode Enabled Event Management System for Logistics and Consumables Management Aswin Chandrasekharan1, Nikhail Venkat2, Aniruddha P.B3, Siva Rama Krishnan Somayaji4
  • 15. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 15 School of Information Technology and Engineering, VIT University, Vellore, India Center of Ambient Intelligent and Advanced Networking, VIT University, Vellore, India Radio Frequency Identification (RFID)-based quality management system functions as a platform for gathering, filtering and managing, monitoring and sharing quality data. The integration of promising information technologies such as RFID technology, mobile devices (PDAs) and web portals can help enhance the effectiveness and flexibility of information flow in material test management (Lu Chang Wang, 2008).The RFID technology and its data management challenges have been reviewed. There are research problems faced in data capture layer and business process layer under the RFID data management layer and there is a need to propose the inference rule materialization in order to achieve better query response time and also use lineage tracing process to trace back the history of inference rules in order to find the source of uncertainties (RoozbehDerakhshan, 2007). There are various advantages and disadvantages of using Barcode in Supply Chain Management (SCM). Based on a comparative study (L. McCathie and K. Michael, 2005), barcodes play an important role in SCM by streamlining inventory management practices. Barcodes eliminate the need of manual data entry, thereby providing automation throughout the supply chain, wherein the information collection and its processing is greatly simplified and hence the speed and efficiency is amplified. Data can be recorded in real-time and accuracy is maintained. Barcodes also help improve effectiveness of labor and
  • 16. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 16 therefore contribute to cost-cutting. Based on a study of a large number of manufacturing plants (Paul M Swamidass, 1998), organizations who are users of barcode in their manufacturing plant process showed greater profitability as against to non-users of barcode. In addition, using barcode technology helps in manufacturing cost reduction, quality improvement and cycle-time reduction. This however varied based on the skill levels of various barcode users. Barcode systems have been used before by employing wristbands in order to improve patient safety in hospitals (Zebra Technologies, 2013). They reported that use of barcodes guarantees accuracy in patient information and keeps system error free. The barcode contained two forms of information to identify patients: patient name and identification number. Applications can be used to perform tasks like identification, data collection and tracking purely based on the barcode data. They inferred that due to time savings and accuracy of barcodes, use of barcodes in any environment is a beneficial option and fosters productivity. The decisions to be made before creating the barcode ids and ensuring its uniqueness are also highlighted in this paper. They are: the kind and type of information to be included on the ID, and the kind of barcode to be used for encoding the information, e.g.: 1D or 2D barcodes. The use of Auto-ID system such as 2D-barcode and Radio Frequency Identification (RFID) system may be used for a conference (KullaprapaNavanugraha, 2010).
  • 17. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 17 These systems are used to manage the conference sessions, observe the participant behavior, and record their interests. The authors also portray the advantages in using “RFID in UHF band” than 2D-barcode where former would need no personnel while the latter would need personnel to control the barcode reader event. This data is stored in the Database Server through the internet using the Registration System over the internet. A seat allocation system intelligently allocates seats based on the categories of delegates, speakers and other attendees depending on the availability of seat in that particular category. In case of unavailability, this system tries to accommodate the seat in a higher category. If this is also unavailable, then the priority seats in the delegate category are automatically allocated. The staff interface provides a medium with which the barcode data is collected from the ID tags using barcode readers and is forwarded to the servers for further processing across the internet. Staff and other team personnel deployed at these counters may either validate venue access using the Venue access system or manage consumable stocking and deployment using the consumables Monitoring System. A reply is received to confirm whether the delegate is authorized for that activity. This reply has been facilitated using AJAX to ensure quick response and not reload the whole website, thereby reducing data usage for each transaction.
  • 18. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 18 An admin interface interprets the data being collected to the administrator and key personnel and provides real-time information to this team helping them make timely decisions. Image Processing Based Barcode Recognition Systems Use of image processing based barcode recognition systems are expected to increase the performance in barcode reading. Moreover, this enables PDA and MP users to be able to obtain barcode information via their devices. There exist some commercial image processing based barcode reading softwares. “Softek Barcode Reader” [3] and “DTK Barcode Reader SDK” [4] are two examples developed by DTK Software and Softek Software companies. However, in the literature, there exist few research works on that field. For the purpose of increasing the system performance and decreasing the computation time, the problem is generally divided into two parts; Barcode Localization and Decoding. The first part of the system finds the location of the barcode. The second part decodes the barcode information embedded in the barcode. As a result of localization, decoding algorithm only considers the barcode area but not the whole image. In the literature, part of the works merely considers Barcode Localization some only consider Barcode Decoding [8, 9, 10] and the others consider the whole problem. In this Chapter, review of the Barcode Localization and Decoding techniques in the literature are presented. Limitations and drawback of those systems are mentioned.
  • 19. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 19 Barcode Localization Multichannel Gabor filtering technique has been used for many texture classification and segmentation tasks. In [5], this technique is used for barcode localization. Firstly input image is filtered by using Multichannel Gabor filter in eight orientations (0°, 22.5°, 45°, 67.5°, 90°, 112.5°, 135° and 157.5°). Thus, eight Gabor filtered images or feature images are obtained. Then, local energy of the feature images is examined by using either unsupervised method (K-Mean Clustering) or supervised method. As a result of this operation, barcode location and barcode orientation are found. Barcode Decoding After finding the location of the barcode, the remaining problem is to decipher the barcode. In order to decode the barcode information barcode resolution has a key role in decoding. It is assumed that barcode resolution quality is high enough in [8, 11, 12, 13]. High quality barcode samples are obtained from low resolution ones by using super-resolution techniques in [9, 10]. To decode barcode information, widths of the dark and light regions on the barcode must be known. Peak locations of the dark and light regions are found with statistical pattern recognition in [8]. Barcode information is deciphered based on the distance between the peak locations. In [11], simple thresholding is applied to all pixels. If the pixel value is less than threshold, it is replaced by zero. Then, number of zeros is counted to obtain widths of the barcode lines. Detection of the transition between the two barcode regions is used in [13]. Transition
  • 20. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 20 values are obtained by zero-crossings of the second derivative of the barcode. Then, distance measurement is performed between the light and dark barcode lines and barcode is decoded using the distance information. Finally, neural network is used for decoding in [12]. However, the performance of these methods depends severely on the image quality. In [9, 10] a super-resolution method is proposed which enables the reconstruction of a higher quality barcode sample from a low resolution or low quality sample. [9] only considers the improvement of the barcode image but does not try to decipher it. For this purpose Fourier Transform phase information and the truth that each scan line of a barcode codes the same information are used for improvement. In [10] super resolution algorithm generates a perfect resolution barcode sample from estimated start and end points and tilt angle and tries to estimate to minimize the mean square error between the generated and original samples. Barcode System A barcode is an optical machine readable representation of data, which shows certain data on certain products. There are different types of barcodes, some of them have to be worldwide unique and need license. We chose ‘‘code39’’ because first of all, code39 does not need license, have the possibility to print for unlimited products, supports full ASCII, number, letter and special character usage (capacity of 26 capital letters, 10 numbers, 7 special characters). And also it was the easiest to read and was the best fit for the
  • 21. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 21 barcode generators for PHP. As the barcode generator, we found one compatible with PHP. It is using PHP’s GD Graphics Library. We got the script and modified it to be able to print serial barcodes. It prints barcodes in increasing order (in multiple prints) on the screen, and sends to the printer. The script is distributed under GNU License. And the hardware part of the system is out of a label printer and a barcode scanner. Barcode scanner is a USB connected model. It scans the barcode, writes to the field where the cursor is, and presses enter. This function eases the usage. So the only extra hardware to be used by the staff will be a barcode scanner after the system is implemented to the enterprise. Barcodes A barcode is a graphical representation of data easily readable by optical devices. There are many code standards, but only four are used for product tagging: EAN-13, EAN-8, UPC-A, UPC-E. The global, non-profit organization called GS1 has chosen these codes as GTIN (Global Trade Item Number). The cooperation between GS1 and manufacturers can guarantee worldwide unique product identification numbers. UPC family codes are currently used in Canada and USA while EAN codes are used in all the 26 other countries. This chapter will describe the barcode decoding process with EAN-13 as example and only this code will be taken into consideration. [18, 19] EAN codes EAN (originally European Article Number, but now changed to International Article Number) can appear in two formats: EAN-13 (Figure 3.7) and EAN-8 (Figure 3.8). EAN-13 is
  • 22. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 22 commonly used for marking products, it encodes 13 digits, from which 12 are for the product number and 1 is for the checksum. EAN-8 (7 + 1 digits), which is a shortened version, is intended for small packages i.e. pocket tissues, chewing gums and elsewhere where a 13 digits long code does not fit. Code properties Barcode properties are enumerated below:1D - code readable in 1 dimension, Continuous - no breaks between digits, Numeric - encodes only digits in decimal notation, Many-width - different bars and spacing height and Checksum - additional digit for checksum Digits meanings The GS1 Prefix, the first 2 or 3 digits usually identifying the country code where the manufacturer is registered (590 for Poland), The Company number, 4,5 or 6 digits, that GS1 assigns to the company depending on the number of different products lines, Item reference, from 2 up to 6 digits, provided by the manufacturer and Checksum, the very last digit. Code structure EAN family codes always start and end with a guard pattern, three bars: black, white and black, which are longer than the other bars, as shown on figure 3.9. The middle sign, which is built from five longer bars that alternate white and black, splits the code into two equal parts. Each module encoding a digit contains seven bars matching bits, the white bar is treated as binary ‘0’ and the black one as ‘1’. In table 3.1 the encoding of digits is shown. All digits are divided into three
  • 23. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 23 groups: the first digit, the digits from number two up to number seven and the last six digits. The first digit is encoded by parity of the following six digits, as those digits have two possible encodings, L-code with odd parity and G-code with even parity. The last six digits are encoded in R-code, which is a mirror reflection of G- code. Figures 3.10 - 3.12 show actual each digit encoding using bars, in accordance to L-code, G-code, R-code. Geolocation Geolocation is the ability to identify the geographic coordinates, in other words the location, of the user’s smartphone. This is an important feature of the ShopDroid application. It is needed in order to customize the user experience according to his location. In this case, the application will only show the product prices from the stores close to him. The Android platform makes it possible to use two location providers, which have been successfully implemented in this application: GPS provider and Network provider GPS Provider All Android phones are GPS enabled. GPS would be the most accurate way of knowing the location of the user. It should be accurate to about 15 meters (this depends on each device). Getting a fix (that means that the device acquires the needed satellite signals, navigation data and calculates the position) with this provider might take some time - during tests, the fastest fix was in 5 seconds, while the slowest was around 2 minutes. Using this provider also requires that users have to be outdoors or close to a window if they are indoors. It also shows
  • 24. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 24 a GPS icon in the notification bar, indicating users that the GPS is active and being used by the application Network provider When the better GPS provider does not work or it is not enabled in the phone (Android disallows an application to turn on the GPS for the user) then the application can use the Network provider, which can get the location coordinates from GSM (Global System for Mobile Communications) triangulation or if connected to a wireless network, it could get the location from the IP address of the network. It should be noted that this last option (getting the location from a wireless network) depends on Google’s internal database, and the accuracy level of this may vary. A location listener must be created per each provider. Having created the listeners, the application can request location updates. A problem aroused when implementing this in the application, was that creating and using the location listeners in an activity, made them unusable by other activities. With Android, each screen can be understood as an individual activity, with almost not reference at all to any previous or subsequent activity, only some parameters can be passed between activities, which are some primitive types and strings. Android FAQs (Frequently Asked Questions) provide a solution for this: The android.app.Application is a base class for those who need to maintain global application state. It can be accessed via getApplication() from any Activity or Service. It has a couple of life-cycle methods and will be instantiated by Android automatically if your register it in AndroidManifest.xml [21].
  • 25. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 25 The Application class is similar to a singleton; it lives throughout the entire life of the application, no matter which activity is in the foreground. With this functionality it seemed obvious to implement the location listeners inside the Application class. All Android applications provide a default Application class, but if need one can create a new one to add application specific features. This is implemented in the ShopDroidApplication.java file. The listeners are created as soon as the application is started, inside the on Create() method of the application. Every activity can get the current location by calling get Location() method: Avoiding Location updates when the application is in the background Enabling the location listeners makes them active throughout the life of the application, unless disabling them manually. This can cause some battery drainage, which is not positive for the user. This can be seen as soon as the user switches the application, or goes to the device’s home screen, the GPS icon will still be shown in the notification area, indicating that it is active and that it might request new location updates. This is also true for the Network provider listener, which doesn’t show any icon in the status bar, but nonetheless it will still be active. In order to avoid this, the listeners must be disabled when the application is paused. Unfortunately Android’s Application class does not provide any way to check if the application was paused. This can only be done per each activity. So in Shop Droid, each activity enables these listeners, which were already created once the application started, whenever resuming, inside the activity’s on
  • 26. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 26 Resume() method. This method will even be called the first time the activity is created. Also, these listeners are disabled whenever any activity goes into the background, this is implemented inside the activity’s on Pause() method. For debugging and testing purposes, an option to mock the location was implemented. ShopDroid’s Application class will check on start, if the mock location option is activated, and if so, then it will return the mock location to whatever activity that requests the location. By doing like this, none of the activities code needed to be modified. Barcodes are a way of representing information, which is machine readable. They allow collecting data quickly and accurately. Barcodes can be read by optical scanners called barcode readers, or scanned from an image by special software. They are of two types: 1D and 2D. The 1D barcodes hold information about a product item such as a product code or any other ID. Commonly 1D barcodes are used in shops and supermarkets where there is a barcode on each product. The barcode is read at the checkout to retrieve the price from a central database and update customer and stock information. 2D barcodes allow more information to be stored in small amount of space. They are generally used in storing name, address, and other information on business reply cards and website or web page address to connect to a particular site. i. Barcodes are much quicker, more efficient entry of information and are inexpensive and easy to implement. As barcodes are printed and processed by
  • 27. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 27 machines, they are processed much faster than standard human data entry and with a much higher degree of accuracy. Barcodes have the potential of dramatically improving productivity and reliability of nearly all applications. For an example, on an average it takes 6 seconds for an operator to enter 12 characters of data, whereas scanning a 12 character barcode takes only 300 milliseconds. The 12 error rate for typing is higher than scanning barcodes. A data entry error will translate into additional costs for a business that ranges from the cost of re-keying the data to shipping the wrong product to the wrong customer [6]. ii. There is another technology termed as RFID technology other than the barcodes, which is used for carrying information. Radio frequency Identification (RFID) uses radio waves as means of identification. The most common way to use RFID is to store a serial number that identifies a person or an object, and perhaps a few other pieces of information, on a microchip that is attached to an antenna. The chip and the antenna together are called a RFID transponder or a RFID tag. The antenna enables the chip to transmit the identification information to a reader that converts the radio waves reflected back from the RFID tag into digital information. This information can then be passed on to computers that can make use of it. The primary difference between the two technologies is that barcode scans a printed label with optical laser or imaging technology, while RFID reader interrogates a tag using radio frequency signals. Barcode requires a line of sight whereas RFID does not. Barcodes can be read only in a smaller range but RFID
  • 28. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 28 tags can be read at a much greater distance. RFID tags have a read and write capability but barcodes can only be read. Barcodes may be easily damaged but RFID are more durable. Cost and privacy are two big concerns with RFID. For instance, a RFID implanted in running shoes could be used as a tracking device. Barcodes are used to efficiently and reliably enter data into a system with little or no human interaction, effectively eliminating the humanerror element from data entry. For instance, if the user needs to visit a website on his cell phone he can easily do it by scanning and decoding a barcode containing a long URL rather than typing which might lead to some errors. Barcodes, as machine- readable representation of information in a visual format, can be easily stored, transferred, processed, and validated. Barcodes have countless applications and are widely used for product identification, inventory marking, shipping container marking, and much more. 2D barcodes are almost like 1D barcodes - They identify an object uniquely. The big difference is that 2D codes can be used to virtually identify anything. Barcodes are extremely common and can be found in all types of industries, government organizations and public services. Barcodes provide a simple and inexpensive method of encoding text information which can be easily read using electronic readers. Barcode technology and processing provide a fast and accurate tool to enter data without keyboard data entry. The traditional barcodes are called one-dimensional barcodes. This is because they are scanned, or "read", in only one direction - horizontally. The
  • 29. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 29 vertical height of the barcode makes for easy scanning, but in itself does not add any additional information. The next generation of barcodes is generally referred to as 2D, two-dimensional, barcodes. These new style barcodes get their names from the ability to be read both horizontally and vertically, therefore 14 increasing the density of information that can be encoded in the same amount of space. Barcodes hold a limited amount of information (generally less than 40 characters although there are exceptions) while 2D barcodes can hold considerably more (in some case up to 2000 characters), A 1D barcode only encodes data along the width of the barcode, while 2D barcodes encode data along both the width and height. 2D barcodes are therefore much denser than 1D barcodes and encode much more data in the same space. 2D barcodes are also much better at detecting and correcting errors in damaged barcodes. However, 2D barcodes require more expensive barcode scanners to read the barcode, and in many cases, such scanners do not operate through the computer's keyboard input - and so may not interface readily to your specific application. Many 1D-barcode scanners (known as keyboard wedge scanners) connect in series with the keyboard - so, from an application's point of view, scanning a barcode is just like typing on the keyboard [12], [13], [14]. ix. A one- dimensional (1D) barcode is used to reference an external database. Essentially, the 1D barcode contains no meaningful data, e.g. a packet of cornflakes is scanned at the checkout in a store, the reference number contained in the 1D code is checked against an external database, and only at this time do we get a
  • 30. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 30 description/price for the article. A 2D code typically contains the data. There is no need to reference an external database, so a 2D barcode has much higher data capacity, and therefore it is not mandatory to reference an external 15 database. A 2D code can serve as a portable data file. While 2Dbarcodes are much more powerful than 1D barcodes and are able to encode more data in the same space, some applications may not require the added functionality that 2D barcodes provide. 1D barcode is often cheaper alternative to 2D barcode and is easier to print as it is less dense than 2D barcode. 1D barcode scanner is typically less expensive than 2D barcode scanner [12], [13], [14] .x. Two dimensional codes offer higher data capacity, a better fit in tiny spaces (matrix symbols) and depending on the scanning device, the ability to be read without regard to orientation. Even with these advantages, 2D symbology developments may not replace most linear bar code applications. The scanning performance tradeoffs should be weighed when choosing 2D over 1D. In general if the application requires encoding less than 50 characters or space is limited to aninch, linear codes should be considered unless a supplier compliance directive to use a specific 2D symbology is either strongly encouraged or required. Local Internet cafés, or better known as computer shops in the Philippines, are found on every street in major cities and there is at least one in most municipalities or towns. There are also internet cafés in coffee shops and malls. High-end restaurants and fast food chains also provide free broadband to diners.
  • 31. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 31 Rates range from P10 on streets, up to P100 in malls.(http://en.wikipilipinas.org/index.php?title=BC_Websight_Internet_Cafe. Retrieved: September 9, 2013) In the article “Why Internet Cafe Business in the Philippines” (2009, March), internet cafes are also a dominant access point for user from the lower socio-economic classes. This kind of business may earn you extra money. Notmany people can afford to buy their own PCs so they are turning to the Internetfor information or to solve problems. Putting your business to capture them willset you apart from the rest.(http://www.orientexpat.com/25518-internet- cafe-as-a-business-in-the-philippines/. Retrieved: September 11, 2013) Establishing internet cafe business or simply computer rental shops in the Philippines requires adherence to certain regulations. Internet cafe industry despite being primary access point of the community to the internet is still considered to be backyard industry thus the LGUs classifies internet cafes as an entertainment and recreational center along with billiard halls, karaoke bars and other center for vices (Morada, 2010). This classification provides some problems like distance requirements, student’s restriction and licensing of software programs. In line with the regulations and stakeholders concerns, City Council of Manila provides Ordinance 8168: “Ordinance Regulating the Operation of Interactive Entertainment and Over the Internet Shops within the City of Mainland for Other Purposes. As stated in Section 1 of the ordinance.
  • 32. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 32 It is hereby declared the policy of the City Government of Manila to bring order to the operation of commercial establishments involved in certain computer-aided and electronic endeavours in the course of affirming thegeneral welfare under Section 16 and 458(a) of Republic Act Number 7160, otherwise known as the Local Government Code, by guiding themaway from certain forms of entertainment which are potentially detrimental to their intellectual and moral well-being that may lead to truancy. In addition, Section 3 of Ordinance 8168 prohibits elementary and high schools students to have access to any form of video games and not allowed toenter any rental center for no definite purpose during class hours. Also, in nocase shall pornography or online gambling be allowed to any customers. The ordinance authored by Hon. Victoriano Melendez mandates allowners/proprietors and staff of computer rental centers to: a). Positively determine the presence of elementary and high school students by their uniforms or similar clothing, identification cards, study materials and other similar items aswell as their familiarity of regular customers. The physical features of out-of-school minors shall qualify for prohibition purposes. b). Provide transparency of the frontage of such establishments as well as adequate standard lighting of theinterior premises to allow unimpeded outside view. c). Program, ac.tivate or otherwise install a security system on all computer terminals or networks toprevent any access to pornographic sites or online gambling (Section 4).Documentation and
  • 33. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 33 requirement for acquiring business license includes DTI registration, barangay clearance and in most cases undertaking a “Deed of Undertaking”. After securing business permit, is registration with the BIR for business TIN. It is certain to accomplish the following things: a). Registration of business establishments, b). Registration of book of accounts and, c). Request for permit to issue receipts and invoices. Computer rental shops owners are required to pay income tax to the BIR on a monthly basis, computed as 3% of monthly gross sales.Just like any other businesses, computer rental business also experienced problems that affect its operations and productivity. Santiago (2007) enumerates five common problems in the computer rental business. 1). Competition - when there are more internet cafes near the shop that means there’s indeed a market for the products and services. However, there is also bigger the probability thatthe number of people going in your shop will be drastically reduced, likewise your profit. 2). Expenses computers evolve into something better and faster every few months, thus upgrading computers is often necessary to accommodate new delivery of quality services. Related Studies Foreign Barcode Technology Significant work has been done on the topic of barcode technology and mobile applications. With the advancement of technology, a new technique came to enhance the capability of 1D barcodes especially in data capacity [15], termed
  • 34. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 34 as 2D barcodes. 2D barcode can carry a lot more information and can act as a small record of a 16 database itself without requiring any data access. It has the capacity to encode alphanumeric data [1]. Just like 2D barcodes, another technology that gained popularity is smart hand held device with high computing capabilities because of the size and portability. These mobile phones act as pervasive computing tools and they are always available to the users, provide connectivity and also one can access the Internet [16]. Nowadays mobile phones come with variety of sensors like accelerometer, GPS, camera etc. Camera has now become a very powerful sensor to interact with physical objects including two dimensional barcode [16]. Barcode and Cell Phone Technology Earlier a lot of work regarding the recognition of 1D barcodes using camera phones has already been made. Steffen et al [17] had presented an algorithm for recognizing 1D barcodes using camera phones which was highly robust regarding image distortions. Barcodes are ubiquitous and are powerful way to link information and services with physical world. Although, the demand of RFID technology has increased in recent years but using this technology for product identification and labeling especially using RFID tags on retail products is very unlikely in the upcoming years. Robert Adelman [8] describes the work with the barcode technology and built in camera that enable a simple and fast interaction of user with every day products while shopping.
  • 35. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 35 As mentioned before, cell phones with camera can capture image and process it, therefore many 2D barcodes have also been developed for mobile phone users [9]. H. Hahn and J.K. Joung came up with an algorithm to decode 2D-bacode PDF-417 [18] in 2002. In 2004, E. Ohbuchi et al [19] presented an algorithm for decoding QR code. 2D barcodes can store data in both vertical and horizontal directions and have the capability for error detection and fault correction. There are many different barcode symbologies in use today and many of them are introduced specifically to achieve higher data density such as PDF417, MaxiCode, Data Matrix, Code 49 and Quick Response (QR) code [1]. Robert Adelmann et al [20] created a free, easily usable, and robust barcode recognition system for mobile phones, together with an open resolving framework that facilitates rapid prototyping and deployment. Madhavapeddy et al. [21] used SpotCodes for enhancing human computer interaction by using a camera-phone as a pointing and selection device. Seven 2D-barcodes namely QR Code ,VeriCode, Data Matrix, mCode, Visual Code, ShotCode and ColorCode are used nowadays for camera phone applications. The first four barcode in addition to their higher data capacities can enhance the reading robustness of the codes by error detection and correction capability. Hence, these 2D-barcodes can operate as robust and portable data files. With these barcodes, users can access the information they need at anytime, anywhere, regardless of network connectivity. As for the last three 2D-Barcodes, they focus more on robust and reliable reading, taking into account the reading
  • 36. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 36 limitations of built-in cameras in mobile phones. They differ greatly from the other barcodes in terms of data capacity [3]. H. Kato and K.T. Tan identified three key factors to improve the robustness of 2D-barcode reading, the range of the reading distance and the stability of the readers [3]. Teoh Chin Yew et al. [22] conducted a study which performs spatial analysis on several 2D barcodes using various size data sets. In addition the work also includes the analysis of several compression applications which can be used in minimizing barcode’s size. The combination of barcodes with mobile phones opens a door way for new applications. Tsung-Yu Liu et al. [23] constructed a 2D barcode and handheld augmented reality supported learning system called HELLO (Handheld English Language Learning Organization), to improve students’ English level. Mobile phones with Internet capability are very popular among students in Japan, so Naomi Fujimura and Masahiro Doi [24] implemented a classroom support system to collect students’ degree of comprehension of course content using mobile phones. They devised this system to offer better ease of use for both students and teachers. Jun Rekimoto et al. [25] describes examples of augmented reality applications based on CyberCode, and discusses some key characteristics of tagging technologies that must be taken into account when designing augmented reality environments. With the swift increase in the number of mobile device users, more wireless information services and mobile commerce applications are needed. Jerry Zeyu et al. [1] discuss 2D barcode concepts, types and classifications,
  • 37. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 37 major technology players, and applications in mobile commerce. They also report a research project to develop a 2D barcode processing solution to support mobile applications. S. Lisa, G. Piersantelli describes the features, applications, functionalities and benefits of the 2D barcodes, pictorial machine-readable representations of information and data [26]. Jonathan M. McCune et al. [27] present and analyse seeing-Is- Believing, a system that utilizes 2D barcodes and camera phones to implement a visual channel for authentication and demonstrative identification of devices. The server-based system consists of a request processor subsystem that handles the request sent by the mobile client and generates response. The request processor processes the request sent and interacts with the database connector for further processing. The other component, termed as database connector, connects to the external database to query the database for the appropriate data asked by the request processor and sends the results back Usage of Barcode and XML Technologies in System Design In this project, we try to emphasize on how digital barcodes can provide an effective means for mobile E-commerce application. Our system can decode both 1D and 2D barcodes. We use Qrcode (2D barcode) for encoding food product information as well as 1D barcode data displayed on the food product to provide useful information to the user of the system. We embed the data associated with 1D barcode along with the other information in a 2D barcode. So
  • 38. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 38 a 2D barcode not only represent static information embedded inside it but dynamic information (the one that can be obtained from external sources) as well. It is dynamic because we can use the 1D barcode data for accessing the external database. So we are not only providing the user with contents encoded inside the 2D barcode but also the contents that can be accessed from external sources through the use of data encoded inside 1D barcode. For accessing the data from outside, we may or may not connect to the Internet and it depends on the location from where we are trying to access the information. If we are trying to access the food item related data inside the grocery store then we may not require Internet otherwise we need to. Barcode Generation and Decoding In order to test whether the system properly decodes the barcode or not, we used some online free barcode generators to generate barcode images. There are many free generators available in the market some of which are online and others can be downloaded. These generators allow you to encode data of your choice in the barcode. Some of them also generate image of any type in 1D or 2D. One of the online generators that we used is [34] and the other one is [35] for 1D barcode. We also used another generator provided by ZXing from Google to generate 2D barcode images and of QR Code type. This is the one, which is used heavily in the development and testing of the system. The advantage of this QR Code generator is that you can encode information belonging to certain
  • 39. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 39 category of text. It provides the user an option to choose the content type or the kind of information needed to encode. These options include calendar event, contact information, URL, email address, geographical location, phone number and text that can be anything [36]. Depending upon the option or the content type chosen, the generator asks the user to enter certain information that can be encoded. It then selects the specific standard format for that particular content type, formats the information entered by the user according to the standard, encodes it inside the barcode and creates a barcode. Once the barcode is created, image can be easily downloaded. For example if the user selects contact information, the generator will automatically provide text boxes for the user to enter data for name, address, phone number and then use all this data to create a specific format. This specific format is visible when we decode the barcode image. Since the options available to the user for the content type is fixed, the generator knows how to format the contents according to the standard for a particular content type. Moreover, if the user selects the content type as text, he can encode any information and there is no specific format used by the generator to encode the data. One can see the same data after decoding without any format. Thereforein this case, the user has to come up with his own way of formatting the contents and then providing the formatted information to the generator to build a barcode image. Since the generator provides a single textbox to enter data for text content type, one can enter data of any complexity as well as in any format. In
  • 40. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 40 our project, we used the “text” content type to encode the complex information type. We have also defined some categories to represent such complex information and came up with our own standard of formatting this information. This formatted information can be fed to the generator [36] to generate the 2D barcode image. There are many barcode decoding softwares available in the market. To build this project we used the APIs provided by Google known as ZXing [11]. As mentioned before, ZXing is a multi-format 1D/2D barcode reader library implemented in Java. Out of all the packages of the APIs we are using com.google.zxing,com.google.zxing.client,com.google.zxing.common,com.googe .zxing.oned, com.google.zxing.datamatrix, com.google.zxing.qrcode packages in implementing the system. External server based sub-system Request processor: It listens for request and if needed performs data processing. The mobile-based client sends a request by setting up an HTTP connection with this component. Once it receives the data, it connects to the database and generates query according to the data sent by the client. It queries the database, receives the desired data from database, generates an XML response file by filling the data received from the database in the file and sends the response back to the client. Database connector: It is used to create connection between the server and the database. The database can be present at the local machine or it can be accessed remotely. Database: It contains the data that is required by the
  • 41. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 41 application to generate results. For instance, the database at grocery store will contain the product related information like price, expiration date. On the other hand, the repository at home will contain the user specific data related to allergies and conflicts for food. This system uses unique barcode to mark different components. The barcode is a very important part of a WMS, which highly improves work efficiency for management. This system not only can use barcode scanners to read and search for components, but also can generate barcode labels and then print them. Local In Crisanta’s (2010) study, developing a system that can efficiently manage the task in an internet cafe, she explained that an internet cafe can function well by applying computerized system or networking in monitoring the use of computers rather than manual system. In applying such, tasks become more manageable, accurate and reliable to their business. In conducting the study, Lincoln Internet Cafe located at Bato-Bato St., Riverside, Commonwealth Avenue serves the sample. The internet cafe uses manual system in recording the usage of their computers. They use a log-book that contains the following list: computer number, time in and out, time to be consumed and the amount to be paid. Aside from this task, the assistant is also obliged to ask or remind the customer if they are going to extend their time or they are about to end their transaction. After that, they encircle the computer number, calculate it by computing the time the customer have consumed.
  • 42. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 42 Crisanta (2010) conclude that LIC (Lincoln Internet Cafe) system is time consuming and difficult. Sometimes, customers exceeded their usage because they are not guarded properly and having this kind of negligence causes an income lost to the business. In the study of Añes, Bamba, Geronimo (2011) entitled “Highlighting the Operational Concerns and Accounting System of Selected Computer Rental Shops in Sta. Mesa, Manila”, the company’s accounting concepts and policies are in accordance with the existing accounting standards and properly directed by the management. With regards to the general accounting procedures, the results show that all business transactions are done accordingly. Business forms and financial reports are with agreement with the business transactions done. Financial reports and business forms are catered with the company’s requirements. Thus, encompassing good accounting practices is beneficial and is helpful in efficiently conducting the day to day operations of the company. The company has strong control with regards to all cash procedures and transactions. The receipts and deposits of cash are properly supported by a source documents. Daily summary report is prepared to account for daily revenue, assuring that revenue transactions are recorded as they take place. Employees’ payrolls are accounted for accordingly, amount and balances are checked and reconciled with number or hours worked. Consequently, payroll amounts are corrected if any errors or changes occur. In the light of the findings presented in the study of
  • 43. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 43 Equillo, Macarubbo and Rongavilla (2009) entitled “Leading Principles and Practices of Internal Control among selected State Universities and Colleges”, the study show that an essential measurement that ensures that internal control systems remained unchanged is the proper and regular monitoring. Proper monitoring is aimed to ensure that controls are operating as intended. Ongoing monitoring is regularly performed to cover up all internal control components. This is undertaken in a real-time basis and responds dynamically. This is very important to the internal control people as it ranks first among all related monitoring procedures. In line with having a good accounting system, it is also important to consider the operational concerns of a business. This is the main concern of the undergraduate thesis of Apellado, Santos and Valdez (2010) entitled “Highlighting the Operational Management and Accounting System of Laundry Shops in San Juan”. Findings of the study includes establishing a petty cash fund for controlling the expenses, regular monitoring of everyday transactions affecting different areas of business and communicating problems encountered in operating the business. Chapter 3 Research Methodology
  • 44. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 44 Research Approach The researchers have used the System Development Life Cycle (SDLC) in planning, conceptualizing, brainstorming, creating and designing the internet café log in and log out request system with barcode technology which is a systematic approach to program development and system analysis and design with respect to computer technology and software engineering. Systems Development Methodology The Structured System Analysis and Design Methodology was a system approach used to the system analysis and design of internet café log in and log out request system-barcode based. It involves the sequence applications and executions of events as wells to the analyses of data and appropriate documentations involved in analyzing, decoding and interpreting the present system and the proposed system and there were series of steps to be followed in gathering information in terms of the development and design of the internet café log in and log out request system-barcode based. Data Gathering Procedure and Output In designing and developing the log in and log out request system, the researchers asked permission in writing to the office of the Campus Director and informed the research adviser as well as internet attendant about the study. After the approval was secured, the gathering of information to the present operation/transaction involved relevant to the study was actually begun. The researchers actually have identified the Internet Café of the University as partner
  • 45. SURIGAO DEL SUR STATE UNIVERSITY CAGWAIT CAMPUS Cagwait, Surigao del Sur 45 in conducting the study that deals with the internet log in and log out with server intervention. Gathering of data from the present transactions and operations to Internet café was smoothly started. Research Locale This study was conducted at the Internet Café of Surigao del Sur State University-Cagwait Campus, Poblacion, Cagwait, Surigao del Sur. Research Planning and Procedure A letter asking permission to conduct the study entitled” Internet Café Log in and Log out Request System-Barcode Technology” was sent to the Office of the Campus Director of this University which allowed the student researchers to use the internet café for their research activities. After the approval was secured, the design and development of the program was initiated and commenced. Research Time Target The time target accomplishment of this research will be on November to March of the Academic Year 2015-2016. Furthermore, visual basic 6.0 software is used to the development and design of this system program and there will be a trial and error approach in order to apply all necessary requirements of this study.