1. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
1
Chapter 1
THE PROBLEM AND ITS SCOPE
Introduction
Internet system today is very relevant and useful to access different forms
and kinds of information that the users are expected to retrieve and gather. In
fact, it provides bigger opportunities to all aspects of human lives. Thus, internet
cafés are built and established to cater the needs of the clienteles to access
relevant information programmed in the World Wide Web (WWW). Naturally, the
internet cafes’ of the University are built for income generating project (IGP) in
order to produce and earn income as well as to respond the needs of the
students, stakeholders and community. In this context, computer technology as
well as internet has brought significance and advancement to our lives. It is one
of the main reasons why almost everything becomes so simple and easy from
difficult and complicated way of accomplishing each job almost everything now is
being operated and manage through computers and internet connection. Today,
it is widely recognized that most organizations need information systems to
survive and succeed in the competitive business environment.
According to Zebra Technologies, (2013) using barcode technology today
helps in manufacturing cost reduction, quality improvement and cycle-time
reduction. This however varied based on the skill levels of various barcode users.
Barcode systems have been used before by employing wristbands in order to
improve patient safety in hospitals, internet café’s, hotels, motels and other
2. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
2
commercial establishments. Thus, an Internet Café Log in and Log out Request
System in barcode technology is a new development in internet server log in and
log out request system using the barcoded internet access card to read, decode
and analyze in order to access on the web without the server intervention to
share internet connection. Thus, the internet-users are automatically accessed
on the internet through barcode-based log in and log-out request system. With
respect to barcode is a set of bars and spaces representing alphabet or numeric
data for identification of a particular product, service or a process.
Barcode technology is the best-known and most widely used method of
Automatic Identification. Automatic identification or “Auto ID” encompasses the
automatic recognition and recording of data, most commonly through the printing
and reading of information encoded in barcodes thereby eliminating risk of
human error. Early applications of bar code scanning, which included retail point-
of-sale, item tracking and inventory control, have been expanded to include more
advanced applications such as time and attendance, work-in process, quality
control, sorting, order entry, document tracking, shipping and receiving, and
controlling access to secure areas.
At present, the University uses its manual process of logging in and
logging out the internet use through server intervention. The proposed barcode-
based system for logging in and logging out of internet without the internet’s
attendant assistance to open the internet server to help access all the clients
who need an internet connection inside the internet café of the University will be
3. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
3
properly accommodated. Also, the design of this system is done through access
card for internet connection attached with barcode technology to access internet
connection to open internet server.
Conceptual Framework
Barcode technology is fitted for automating the Internet Café log in and log
out request system. Barcodes and barcode scanners offer a quick and accurate
way for each lecturer to complete time-tracking transactions. Barcode-based log
in and log out request system is a good substitute for manual systems for internet
server. The manual processes of logging in/out are replaced with automated
barcode readers.
Since barcodes can carry a lot of information either by referring to the
source of information or by encoding all the information in it, they are used in
several applications like point of sale, inventory control, shipping, packaging and
data collection. Medical and dental practices rely on complex patient forms and
barcodes can help in entering the detailed information in the computer, making it
an easy task of gathering large amount of information. It also reduces data
collection costs and better services are the results.
Barcodes are primarily used for entering data into a system, efficiently and
reliably, thereby improving the productivity [6]. Nowadays 2D barcodes can
embed a lot of data which can be used to provide useful information. 1D barcode
does not provide such static information; rather it refers to an external database
to collect the information. However, 2D barcode contains information, which
4. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
4
cannot be updated but the information referred by 1D barcode can be easily
modified. Therefore, if we use barcodes for carrying information we should come
up with a way to get the benefits of both the 1D and 2D barcodes.
Barcode can be easily scanned because of the use of camera and the
barcode scanning applications on the cell phones whereas RFID requires a RFID
reader to read the information. Most of the 2D barcodes encode URL, which can
further lead to a web page or website. Moreover, a 2D barcode can encode much
more information than a URL and can contain large amount of text information.
Therefore, there should be some applications that can encode different
kinds of information inside a 2D barcode and use it for different purposes.
Currently, there is no application, which can take the benefits of 1D and 2D
barcodes to manage information not only related to medicine or food but about
anything and any domain and categorizes it accordingly. In addition, such system
can provide a way to assist the cell phone user including elderly in collecting and
viewing the information, provides functionalities according to the type of
information, which would be of great public use.
One of the challenging problems of pervasive computing is to link a
physical object with digital information because many of the pervasive computing
applications require manual inputs or complex image processing to obtain
information related to a real object. The use of 2D barcodes eliminates such
excess processing to acquire the needed information. The 2D barcodes have
high capacity to store data, are less prone to human input error and act as a tool
5. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
5
to acquire information on site without network access. The currently available
solutions use 1D barcodes to represent dynamic information residing in a
database and use 2D barcodes to represent only static information that also
encode only URLs. In all such applications, the source of information gets
restricted to either a database or the static data encoded inside a 2D barcode.
None of such solutions takes advantage of 2D barcode capabilities to collect
information from different sources and attach it to the real world entity. Moreover,
a 2D barcode can also represent and categorize complex text information.
Our approach integrates the capabilities of barcode technology to
represent and classify the complex digital information collected from different
sources. We design and implement an information management system on a
handheld device that has image processing and barcode decoding capabilities to
address the above-mentioned problem. Our prototype provides a generic
framework to decode either 1D or 2D barcode, parse the complex information
(both dynamic and static) inside the 2D barcode, differentiate the complex
information based on content types and classify the image based on the barcode
format. It also assists users in decision-making and information analysis. An
example system application can be deployed in grocery stores as a part of the
enterprise information management system.
Due to recent technological development and integration of mobile and
barcode technologies, several new mobile applications are developed every now
and then. Nowadays various barcodes are used in mobile applications other than
6. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
6
the traditional commercial systems. Digital barcodes provide a great means to
store information in a portable way. Barcodes represent machine-readable
information that can be easily stored, transferred and processed. Barcodes have
the capability to improve the productivity and reliability of nearly all applications
as they are printed and processed by machines. They are processed faster than
human data entry and have a higher degree of accuracy. Barcodes have many
applications and are mainly used for product identification, inventory marking,
shipping container marking, and much more. Barcodes not only provide a simple
and inexpensive method to present diverse commercial data, but also improve
mobile user experience by reducing their manual inputs.
7. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
7
Table 1. Schematic Diagram of the Present Study
Figure 1 shows the schematic diagram of the present study which
includes the development and description parameters of the Internet Café’ Log
in and Log out request system which involves the functions, analyses, design,
installation, coding and maintainability of the request system of internet server
access. Meanwhile, the barcode-based log in and log out internet server system
Development
and Description
Parameters of
Internet Log in
and Log out
system in terms
of:
: Functions
: Analyses
: Design
: Installation
: Testing
: Maintainability
Barcoded
Internet Access
Card
Internet Cafe’
log in and Log
out Request
System Barcode
Technology
8. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
8
is attached/programmed with barcode technology which encodes and decodes
information of internet-user to access on the internet. . The Internet Café log in
and log out request system barcode-based technology is the output of the study
which will present general features and instructions of request system using the
barcoded access card to provide easy access on internet connection.
Significance of the Study
The results/findings of this study are essential and beneficial to the
following entities and group of individuals.
Computer Technology Students. This study will give them enough
information on barcode-based log in and log out request system for internet
connection in order that they will know on how to design a program with barcode
technology which is very useful and effective to access on the internet without
disturbing the internet server of the internet café’.
Computer Technology Instructors: This study will provide them
information with respect to the development and description parameters of
internet log in and log out system in terms of: functions, analyses, design,
installation, testing and maintainability on how these entities and features work to
respond the needs of the clienteles in internet connection. Meanwhile, this study
is very helpful to their instruction in order that their students will be given the
opportunity to design their system program using barcode technology particularly
in the log in and log out request system for internet café.
9. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
9
University Administrators. This study will help them understand that
barcode technology is very useful and efficient for university transactions and in
the delivery of quality services to their stakeholders and clienteles. Meanwhile,
the University has its internet café for all the students to research and gather
information in which the internet server is connected and monitored. Thus, this
study will give further background and inputs for the University to include and
implement this kind of service to access internet connection using the barcode
technology without the internet’s attendant assistance to open the internet server
for the internet café of the University since it is programmed in the access card
all the requirements and data needed for internet access connection.
Future Researchers: This study will help them informed the importance
of barcode technology in office transactions and operations so that they will be
able to understand the development and description parameters of internet log in
and log out system in terms of functions, analyses, design, installation, testing
and maintainability. Furthermore, this study will give them the opportunity to learn
on barcode technology in terms of log in and log out request system of the
internet café.
10. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
10
Statement of the Problem
This study is focused on the design and development of the internet café
log in and log out request system that will help the internet-users to access on
the web without the server intervention since it is connected, programmed and
supported with barcode technology system.
Specifically, this study aims to answer the following questions:
1. Development and Description Parameters of the internet café log in and
log out request system in terms of: functions, analyses, design,
installation, testing and maintainability.
2. How does the system work/function in terms of log in and log out of
internet connection in the internet server?
11. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
11
3. What is the sample prototype of internet access card with barcode
technology used in log in and log out request system of internet
connection?
4. What are examples of activities and tests involved in the log in and log out
request system using the access card programmed with barcode
technology?
Scope and Limitations of the Study
This research is actually focused on the development and design of
Internet Café’ Log in and Log out request system with barcode technology which
was conducted at Computer Laboratory Room II of Surigao del Sur State
University-Cagwait Campus, Cagwait, Surigao del Sur from Academic Year
2014-2015. It is aimed to establish an effective and efficient delivery of services
in accessing internet connection in the internet server without the internet
attendant’s assistance to open the internet server for internet connection and it is
further highlighted in this study the development and design parameters of
development and description parameters of internet log in and log out system in
terms of functions, analyses, design, installation, testing and maintainability.
12. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
12
Definition of Terms
For clearer and more comprehensive definition of the following terms, the
researchers have conceptually and operationally the terms the below.
Development refers to the designing and creating of a barcoded access
card for logging in and logging out for internet server of the internet café.
Description refers to the attributes and external features of a barcoded
access card including its functions of the request system.
Parameter refers to the scope and boundary of the study which highlights
the development of barcoded access for internet server for internet access
connection.
13. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
13
Internet refers to the medium where information is arranged and
programmed in the World Wide Web (WWW).
Log in refers to enter user in accessing the internet connection using the
barcoded internet access card.
Log out refers to exit the user in closing the program or internet
connection using the barcoded internet access card.
Request system refers to the log in and log out system for internet server
with barcoded internet access card.
Function refers to the organized operations and activities which involved
the log in and log out request system.
Analysis refers to the systematic functions of the barcoded internet
access card on how the internet server detects and monitors internet connection.
Design refers to the entire structure and system plan and set up for log in
and log out request for internet connection.
Installation refers to the assemblage of a barcoded internet access card
including the attachment of barcode reader in the internet server.
Testing refers to the different set of activities conducted to show the trial
and error scheme of the study.
Maintainability refers to the ability of the barcoded internet access card to
maintain its functions in log in and log request system in the internet server.
14. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
14
Chapter 2
REVIEW OF THE RELATED LITERATURE AND STUDIES
This chapter presents the Review of Related Literature and Related
Studies of the present study.
Related Literature
Foreign
Barcode Enabled Event Management System for Logistics and
Consumables Management Aswin Chandrasekharan1, Nikhail Venkat2,
Aniruddha P.B3, Siva Rama Krishnan Somayaji4
15. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
15
School of Information Technology and Engineering, VIT University,
Vellore, India Center of Ambient Intelligent and Advanced Networking, VIT
University, Vellore, India Radio Frequency Identification (RFID)-based quality
management system functions as a platform for gathering, filtering and
managing, monitoring and sharing quality data. The integration of promising
information technologies such as RFID technology, mobile devices (PDAs) and
web portals can help enhance the effectiveness and flexibility of information flow
in material test management (Lu Chang Wang, 2008).The RFID technology and
its data management challenges have been reviewed. There are research
problems faced in data capture layer and business process layer under the RFID
data management layer and there is a need to propose the inference rule
materialization in order to achieve better query response time and also use
lineage tracing process to trace back the history of inference rules in order to find
the source of uncertainties (RoozbehDerakhshan, 2007).
There are various advantages and disadvantages of using Barcode in
Supply Chain Management (SCM). Based on a comparative study (L. McCathie
and K. Michael, 2005), barcodes play an important role in SCM by streamlining
inventory management practices. Barcodes eliminate the need of manual data
entry, thereby providing automation throughout the supply chain, wherein the
information collection and its processing is greatly simplified and hence the
speed and efficiency is amplified. Data can be recorded in real-time and
accuracy is maintained. Barcodes also help improve effectiveness of labor and
16. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
16
therefore contribute to cost-cutting. Based on a study of a large number of
manufacturing plants (Paul M Swamidass, 1998), organizations who are users of
barcode in their manufacturing plant process showed greater profitability as
against to non-users of barcode.
In addition, using barcode technology helps in manufacturing cost
reduction, quality improvement and cycle-time reduction. This however varied
based on the skill levels of various barcode users. Barcode systems have been
used before by employing wristbands in order to improve patient safety in
hospitals (Zebra Technologies, 2013). They reported that use of barcodes
guarantees accuracy in patient information and keeps system error free. The
barcode contained two forms of information to identify patients: patient name and
identification number. Applications can be used to perform tasks like
identification, data collection and tracking purely based on the barcode data.
They inferred that due to time savings and accuracy of barcodes, use of
barcodes in any environment is a beneficial option and fosters productivity. The
decisions to be made before creating the barcode ids and ensuring its
uniqueness are also highlighted in this paper. They are: the kind and type of
information to be included on the ID, and the kind of barcode to be used for
encoding the information, e.g.: 1D or 2D barcodes. The use of Auto-ID system
such as 2D-barcode and Radio Frequency Identification (RFID) system may be
used for a conference (KullaprapaNavanugraha, 2010).
17. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
17
These systems are used to manage the conference sessions, observe the
participant behavior, and record their interests. The authors also portray the
advantages in using “RFID in UHF band” than 2D-barcode where former would
need no personnel while the latter would need personnel to control the barcode
reader event. This data is stored in the Database Server through the internet
using the Registration System over the internet. A seat allocation system
intelligently allocates seats based on the categories of delegates, speakers and
other attendees depending on the availability of seat in that particular category.
In case of unavailability, this system tries to accommodate the seat in a higher
category. If this is also unavailable, then the priority seats in the delegate
category are automatically allocated.
The staff interface provides a medium with which the barcode data is
collected from the ID tags using barcode readers and is forwarded to the servers
for further processing across the internet. Staff and other team personnel
deployed at these counters may either validate venue access using the Venue
access system or manage consumable stocking and deployment using the
consumables Monitoring System. A reply is received to confirm whether the
delegate is authorized for that activity. This reply has been facilitated using AJAX
to ensure quick response and not reload the whole website, thereby reducing
data usage for each transaction.
18. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
18
An admin interface interprets the data being collected to the administrator
and key personnel and provides real-time information to this team helping them
make timely decisions.
Image Processing Based Barcode Recognition Systems
Use of image processing based barcode recognition systems are
expected to increase the performance in barcode reading. Moreover, this
enables PDA and MP users to be able to obtain barcode information via their
devices. There exist some commercial image processing based barcode reading
softwares. “Softek Barcode Reader” [3] and “DTK Barcode Reader SDK” [4] are
two examples developed by DTK Software and Softek Software companies.
However, in the literature, there exist few research works on that field. For the
purpose of increasing the system performance and decreasing the computation
time, the problem is generally divided into two parts; Barcode Localization and
Decoding. The first part of the system finds the location of the barcode. The
second part decodes the barcode information embedded in the barcode. As a
result of localization, decoding algorithm only considers the barcode area but not
the whole image.
In the literature, part of the works merely considers Barcode Localization
some only consider Barcode Decoding [8, 9, 10] and the others consider the
whole problem. In this Chapter, review of the Barcode Localization and Decoding
techniques in the literature are presented. Limitations and drawback of those
systems are mentioned.
19. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
19
Barcode Localization
Multichannel Gabor filtering technique has been used for many texture
classification and segmentation tasks. In [5], this technique is used for barcode
localization. Firstly input image is filtered by using Multichannel Gabor filter in
eight orientations (0°, 22.5°, 45°, 67.5°, 90°, 112.5°, 135° and 157.5°). Thus,
eight Gabor filtered images or feature images are obtained. Then, local energy of
the feature images is examined by using either unsupervised method (K-Mean
Clustering) or supervised method. As a result of this operation, barcode location
and barcode orientation are found.
Barcode Decoding
After finding the location of the barcode, the remaining problem is to
decipher the barcode. In order to decode the barcode information barcode
resolution has a key role in decoding. It is assumed that barcode resolution
quality is high enough in [8, 11, 12, 13]. High quality barcode samples are
obtained from low resolution ones by using super-resolution techniques in [9, 10].
To decode barcode information, widths of the dark and light regions on the
barcode must be known. Peak locations of the dark and light regions are found
with statistical pattern recognition in [8]. Barcode information is deciphered based
on the distance between the peak locations. In [11], simple thresholding is
applied to all pixels. If the pixel value is less than threshold, it is replaced by zero.
Then, number of zeros is counted to obtain widths of the barcode lines. Detection
of the transition between the two barcode regions is used in [13]. Transition
20. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
20
values are obtained by zero-crossings of the second derivative of the barcode.
Then, distance measurement is performed between the light and dark barcode
lines and barcode is decoded using the distance information. Finally, neural
network is used for decoding in [12]. However, the performance of these
methods depends severely on the image quality. In [9, 10] a super-resolution
method is proposed which enables the reconstruction of a higher quality barcode
sample from a low resolution or low quality sample. [9] only considers the
improvement of the barcode image but does not try to decipher it.
For this purpose Fourier Transform phase information and the truth that
each scan line of a barcode codes the same information are used for
improvement. In [10] super resolution algorithm generates a perfect resolution
barcode sample from estimated start and end points and tilt angle and tries to
estimate to minimize the mean square error between the generated and original
samples.
Barcode System
A barcode is an optical machine readable representation of data, which
shows certain data on certain products. There are different types of barcodes,
some of them have to be worldwide unique and need license. We chose
‘‘code39’’ because first of all, code39 does not need license, have the possibility
to print for unlimited products, supports full ASCII, number, letter and special
character usage (capacity of 26 capital letters, 10 numbers, 7 special
characters). And also it was the easiest to read and was the best fit for the
21. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
21
barcode generators for PHP. As the barcode generator, we found one
compatible with PHP. It is using PHP’s GD Graphics Library. We got the script
and modified it to be able to print serial barcodes. It prints barcodes in increasing
order (in multiple prints) on the screen, and sends to the printer. The script is
distributed under GNU License. And the hardware part of the system is out of a
label printer and a barcode scanner. Barcode scanner is a USB connected
model. It scans the barcode, writes to the field where the cursor is, and presses
enter. This function eases the usage. So the only extra hardware to be used by
the staff will be a barcode scanner after the system is implemented to the
enterprise.
Barcodes
A barcode is a graphical representation of data easily readable by optical
devices. There are many code standards, but only four are used for product
tagging: EAN-13, EAN-8, UPC-A, UPC-E. The global, non-profit organization
called GS1 has chosen these codes as GTIN (Global Trade Item Number). The
cooperation between GS1 and manufacturers can guarantee worldwide unique
product identification numbers. UPC family codes are currently used in Canada
and USA while EAN codes are used in all the 26 other countries. This chapter
will describe the barcode decoding process with EAN-13 as example and only
this code will be taken into consideration. [18, 19] EAN codes EAN (originally
European Article Number, but now changed to International Article Number) can
appear in two formats: EAN-13 (Figure 3.7) and EAN-8 (Figure 3.8). EAN-13 is
22. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
22
commonly used for marking products, it encodes 13 digits, from which 12 are for
the product number and 1 is for the checksum. EAN-8 (7 + 1 digits), which is a
shortened version, is intended for small packages i.e. pocket tissues, chewing
gums and elsewhere where a 13 digits long code does not fit.
Code properties
Barcode properties are enumerated below:1D - code readable in 1
dimension, Continuous - no breaks between digits, Numeric - encodes only digits
in decimal notation, Many-width - different bars and spacing height and
Checksum - additional digit for checksum
Digits meanings
The GS1 Prefix, the first 2 or 3 digits usually identifying the country code
where the manufacturer is registered (590 for Poland), The Company number,
4,5 or 6 digits, that GS1 assigns to the company depending on the number of
different products lines, Item reference, from 2 up to 6 digits, provided by the
manufacturer and Checksum, the very last digit.
Code structure
EAN family codes always start and end with a guard pattern, three bars:
black, white and black, which are longer than the other bars, as shown on figure
3.9. The middle sign, which is built from five longer bars that alternate white and
black, splits the code into two equal parts. Each module encoding a digit contains
seven bars matching bits, the white bar is treated as binary ‘0’ and the black one
as ‘1’. In table 3.1 the encoding of digits is shown. All digits are divided into three
23. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
23
groups: the first digit, the digits from number two up to number seven and the last
six digits. The first digit is encoded by parity of the following six digits, as those
digits have two possible encodings, L-code with odd parity and G-code with even
parity. The last six digits are encoded in R-code, which is a mirror reflection of G-
code. Figures 3.10 - 3.12 show actual each digit encoding using bars, in
accordance to L-code, G-code, R-code.
Geolocation
Geolocation is the ability to identify the geographic coordinates, in other
words the location, of the user’s smartphone. This is an important feature of the
ShopDroid application. It is needed in order to customize the user experience
according to his location. In this case, the application will only show the product
prices from the stores close to him. The Android platform makes it possible to
use two location providers, which have been successfully implemented in this
application: GPS provider and Network provider
GPS Provider
All Android phones are GPS enabled. GPS would be the most accurate
way of knowing the location of the user. It should be accurate to about 15 meters
(this depends on each device). Getting a fix (that means that the device acquires
the needed satellite signals, navigation data and calculates the position) with this
provider might take some time - during tests, the fastest fix was in 5 seconds,
while the slowest was around 2 minutes. Using this provider also requires that
users have to be outdoors or close to a window if they are indoors. It also shows
24. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
24
a GPS icon in the notification bar, indicating users that the GPS is active and
being used by the application
Network provider
When the better GPS provider does not work or it is not enabled in the
phone (Android disallows an application to turn on the GPS for the user) then the
application can use the Network provider, which can get the location coordinates
from GSM (Global System for Mobile Communications) triangulation or if
connected to a wireless network, it could get the location from the IP address of
the network. It should be noted that this last option (getting the location from a
wireless network) depends on Google’s internal database, and the accuracy level
of this may vary. A location listener must be created per each provider.
Having created the listeners, the application can request location updates.
A problem aroused when implementing this in the application, was that creating
and using the location listeners in an activity, made them unusable by other
activities. With Android, each screen can be understood as an individual activity,
with almost not reference at all to any previous or subsequent activity, only some
parameters can be passed between activities, which are some primitive types
and strings. Android FAQs (Frequently Asked Questions) provide a solution for
this: The android.app.Application is a base class for those who need to maintain
global application state. It can be accessed via getApplication() from any Activity
or Service. It has a couple of life-cycle methods and will be instantiated by
Android automatically if your register it in AndroidManifest.xml [21].
25. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
25
The Application class is similar to a singleton; it lives throughout the entire
life of the application, no matter which activity is in the foreground. With this
functionality it seemed obvious to implement the location listeners inside the
Application class. All Android applications provide a default Application class, but
if need one can create a new one to add application specific features. This is
implemented in the ShopDroidApplication.java file. The listeners are created as
soon as the application is started, inside the on Create() method of the
application. Every activity can get the current location by calling get Location()
method:
Avoiding Location updates when the application is in the background
Enabling the location listeners makes them active throughout the life of the
application, unless disabling them manually. This can cause some battery
drainage, which is not positive for the user. This can be seen as soon as the user
switches the application, or goes to the device’s home screen, the GPS icon will
still be shown in the notification area, indicating that it is active and that it might
request new location updates. This is also true for the Network provider listener,
which doesn’t show any icon in the status bar, but nonetheless it will still be
active. In order to avoid this, the listeners must be disabled when the application
is paused. Unfortunately Android’s Application class does not provide any way to
check if the application was paused. This can only be done per each activity. So
in Shop Droid, each activity enables these listeners, which were already created
once the application started, whenever resuming, inside the activity’s on
26. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
26
Resume() method. This method will even be called the first time the activity is
created. Also, these listeners are disabled whenever any activity goes into the
background, this is implemented inside the activity’s on Pause() method. For
debugging and testing purposes, an option to mock the location was
implemented. ShopDroid’s Application class will check on start, if the mock
location option is activated, and if so, then it will return the mock location to
whatever activity that requests the location. By doing like this, none of the
activities code needed to be modified.
Barcodes are a way of representing information, which is machine
readable. They allow collecting data quickly and accurately. Barcodes can be
read by optical scanners called barcode readers, or scanned from an image by
special software. They are of two types: 1D and 2D. The 1D barcodes hold
information about a product item such as a product code or any other ID.
Commonly 1D barcodes are used in shops and supermarkets where there is a
barcode on each product. The barcode is read at the checkout to retrieve the
price from a central database and update customer and stock information. 2D
barcodes allow more information to be stored in small amount of space. They are
generally used in storing name, address, and other information on business reply
cards and website or web page address to connect to a particular site. i.
Barcodes are much quicker, more efficient entry of information and are
inexpensive and easy to implement. As barcodes are printed and processed by
27. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
27
machines, they are processed much faster than standard human data entry and
with a much higher degree of accuracy.
Barcodes have the potential of dramatically improving productivity and
reliability of nearly all applications. For an example, on an average it takes 6
seconds for an operator to enter 12 characters of data, whereas scanning a 12
character barcode takes only 300 milliseconds. The 12 error rate for typing is
higher than scanning barcodes. A data entry error will translate into additional
costs for a business that ranges from the cost of re-keying the data to shipping
the wrong product to the wrong customer [6]. ii. There is another technology
termed as RFID technology other than the barcodes, which is used for carrying
information. Radio frequency Identification (RFID) uses radio waves as means of
identification. The most common way to use RFID is to store a serial number that
identifies a person or an object, and perhaps a few other pieces of information,
on a microchip that is attached to an antenna. The chip and the antenna together
are called a RFID transponder or a RFID tag. The antenna enables the chip to
transmit the identification information to a reader that converts the radio waves
reflected back from the RFID tag into digital information. This information can
then be passed on to computers that can make use of it.
The primary difference between the two technologies is that barcode
scans a printed label with optical laser or imaging technology, while RFID reader
interrogates a tag using radio frequency signals. Barcode requires a line of sight
whereas RFID does not. Barcodes can be read only in a smaller range but RFID
28. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
28
tags can be read at a much greater distance. RFID tags have a read and write
capability but barcodes can only be read. Barcodes may be easily damaged but
RFID are more durable. Cost and privacy are two big concerns with RFID. For
instance, a RFID implanted in running shoes could be used as a tracking device.
Barcodes are used to efficiently and reliably enter data into a system with
little or no human interaction, effectively eliminating the humanerror element from
data entry. For instance, if the user needs to visit a website on his cell phone he
can easily do it by scanning and decoding a barcode containing a long URL
rather than typing which might lead to some errors. Barcodes, as machine-
readable representation of information in a visual format, can be easily stored,
transferred, processed, and validated.
Barcodes have countless applications and are widely used for product
identification, inventory marking, shipping container marking, and much more. 2D
barcodes are almost like 1D barcodes - They identify an object uniquely. The big
difference is that 2D codes can be used to virtually identify anything. Barcodes
are extremely common and can be found in all types of industries, government
organizations and public services. Barcodes provide a simple and inexpensive
method of encoding text information which can be easily read using electronic
readers. Barcode technology and processing provide a fast and accurate tool to
enter data without keyboard data entry.
The traditional barcodes are called one-dimensional barcodes. This is
because they are scanned, or "read", in only one direction - horizontally. The
29. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
29
vertical height of the barcode makes for easy scanning, but in itself does not add
any additional information. The next generation of barcodes is generally referred
to as 2D, two-dimensional, barcodes. These new style barcodes get their names
from the ability to be read both horizontally and vertically, therefore 14 increasing
the density of information that can be encoded in the same amount of space.
Barcodes hold a limited amount of information (generally less than 40 characters
although there are exceptions) while 2D barcodes can hold considerably more (in
some case up to 2000 characters), A 1D barcode only encodes data along the
width of the barcode, while 2D barcodes encode data along both the width and
height. 2D barcodes are therefore much denser than 1D barcodes and encode
much more data in the same space. 2D barcodes are also much better at
detecting and correcting errors in damaged barcodes.
However, 2D barcodes require more expensive barcode scanners to read
the barcode, and in many cases, such scanners do not operate through the
computer's keyboard input - and so may not interface readily to your specific
application. Many 1D-barcode scanners (known as keyboard wedge scanners)
connect in series with the keyboard - so, from an application's point of view,
scanning a barcode is just like typing on the keyboard [12], [13], [14]. ix. A one-
dimensional (1D) barcode is used to reference an external database. Essentially,
the 1D barcode contains no meaningful data, e.g. a packet of cornflakes is
scanned at the checkout in a store, the reference number contained in the 1D
code is checked against an external database, and only at this time do we get a
30. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
30
description/price for the article. A 2D code typically contains the data. There is no
need to reference an external database, so a 2D barcode has much higher data
capacity, and therefore it is not mandatory to reference an external 15 database.
A 2D code can serve as a portable data file. While 2Dbarcodes are much
more powerful than 1D barcodes and are able to encode more data in the same
space, some applications may not require the added functionality that 2D
barcodes provide. 1D barcode is often cheaper alternative to 2D barcode and is
easier to print as it is less dense than 2D barcode. 1D barcode scanner is
typically less expensive than 2D barcode scanner [12], [13], [14] .x. Two
dimensional codes offer higher data capacity, a better fit in tiny spaces (matrix
symbols) and depending on the scanning device, the ability to be read without
regard to orientation. Even with these advantages, 2D symbology developments
may not replace most linear bar code applications. The scanning performance
tradeoffs should be weighed when choosing 2D over 1D. In general if the
application requires encoding less than 50 characters or space is limited to
aninch, linear codes should be considered unless a supplier compliance directive
to use a specific 2D symbology is either strongly encouraged or required.
Local
Internet cafés, or better known as computer shops in the Philippines, are
found on every street in major cities and there is at least one in most
municipalities or towns. There are also internet cafés in coffee shops and malls.
High-end restaurants and fast food chains also provide free broadband to diners.
31. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
31
Rates range from P10 on streets, up to P100 in
malls.(http://en.wikipilipinas.org/index.php?title=BC_Websight_Internet_Cafe.
Retrieved: September 9, 2013)
In the article “Why Internet Cafe Business in the Philippines” (2009,
March), internet cafes are also a dominant access point for user from the lower
socio-economic classes. This kind of business may earn you extra money.
Notmany people can afford to buy their own PCs so they are turning to the
Internetfor information or to solve problems. Putting your business to capture
them willset you apart from the rest.(http://www.orientexpat.com/25518-internet-
cafe-as-a-business-in-the-philippines/. Retrieved: September 11, 2013)
Establishing internet cafe business or simply computer rental shops in the
Philippines requires adherence to certain regulations. Internet cafe industry
despite being primary access point of the community to the internet is still
considered to be backyard industry thus the LGUs classifies internet cafes as an
entertainment and recreational center along with billiard halls, karaoke bars and
other center for vices (Morada, 2010).
This classification provides some problems like distance requirements,
student’s restriction and licensing of software programs. In line with the
regulations and stakeholders concerns, City Council of Manila provides
Ordinance 8168: “Ordinance Regulating the Operation of Interactive
Entertainment and Over the Internet Shops within the City of Mainland for Other
Purposes. As stated in Section 1 of the ordinance.
32. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
32
It is hereby declared the policy of the City Government of Manila to bring
order to the operation of commercial establishments involved in certain
computer-aided and electronic endeavours in the course of affirming thegeneral
welfare under Section 16 and 458(a) of Republic Act Number 7160, otherwise
known as the Local Government Code, by guiding themaway from certain forms
of entertainment which are potentially detrimental to their intellectual and moral
well-being that may lead to truancy.
In addition,
Section 3 of Ordinance 8168 prohibits elementary and high schools
students to have access to any form of video games and not allowed toenter any
rental center for no definite purpose during class hours. Also, in nocase shall
pornography or online gambling be allowed to any customers. The ordinance
authored by Hon. Victoriano Melendez mandates allowners/proprietors and staff
of computer rental centers to: a). Positively determine the presence of
elementary and high school students by their uniforms or similar clothing,
identification cards, study materials and other similar items aswell as their
familiarity of regular customers. The physical features of out-of-school minors
shall qualify for prohibition purposes. b). Provide transparency of the frontage of
such establishments as well as adequate standard lighting of theinterior premises
to allow unimpeded outside view. c). Program, ac.tivate or otherwise install a
security system on all computer terminals or networks toprevent any access to
pornographic sites or online gambling (Section 4).Documentation and
33. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
33
requirement for acquiring business license includes DTI registration, barangay
clearance and in most cases undertaking a “Deed of Undertaking”. After securing
business permit, is registration with the BIR for business TIN.
It is certain to accomplish the following things: a). Registration of business
establishments, b). Registration of book of accounts and, c). Request for permit
to issue receipts and invoices. Computer rental shops owners are required to pay
income tax to the BIR on a monthly basis, computed as 3% of monthly gross
sales.Just like any other businesses, computer rental business also experienced
problems that affect its operations and productivity. Santiago (2007) enumerates
five common problems in the computer rental business. 1). Competition - when
there are more internet cafes near the shop that means there’s indeed a market
for the products and services. However, there is also bigger the probability
thatthe number of people going in your shop will be drastically reduced, likewise
your profit. 2). Expenses computers evolve into something better and faster
every few months, thus upgrading computers is often necessary to accommodate
new delivery of quality services.
Related Studies
Foreign
Barcode Technology
Significant work has been done on the topic of barcode technology and
mobile applications. With the advancement of technology, a new technique came
to enhance the capability of 1D barcodes especially in data capacity [15], termed
34. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
34
as 2D barcodes. 2D barcode can carry a lot more information and can act as a
small record of a 16 database itself without requiring any data access. It has the
capacity to encode alphanumeric data [1].
Just like 2D barcodes, another technology that gained popularity is smart
hand held device with high computing capabilities because of the size and
portability. These mobile phones act as pervasive computing tools and they are
always available to the users, provide connectivity and also one can access the
Internet [16]. Nowadays mobile phones come with variety of sensors like
accelerometer, GPS, camera etc. Camera has now become a very powerful
sensor to interact with physical objects including two dimensional barcode [16].
Barcode and Cell Phone Technology
Earlier a lot of work regarding the recognition of 1D barcodes using
camera phones has already been made. Steffen et al [17] had presented an
algorithm for recognizing 1D barcodes using camera phones which was highly
robust regarding image distortions. Barcodes are ubiquitous and are powerful
way to link information and services with physical world. Although, the demand of
RFID technology has increased in recent years but using this technology for
product identification and labeling especially using RFID tags on retail products is
very unlikely in the upcoming years. Robert Adelman [8] describes the work with
the barcode technology and built in camera that enable a simple and fast
interaction of user with every day products while shopping.
35. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
35
As mentioned before, cell phones with camera can capture image and
process it, therefore many 2D barcodes have also been developed for mobile
phone users [9]. H. Hahn and J.K. Joung came up with an algorithm to decode
2D-bacode PDF-417 [18] in 2002. In 2004, E. Ohbuchi et al [19] presented an
algorithm for decoding QR code. 2D barcodes can store data in both vertical and
horizontal directions and have the capability for error detection and fault
correction. There are many different barcode symbologies in use today and many
of them are introduced specifically to achieve higher data density such as
PDF417, MaxiCode, Data Matrix, Code 49 and Quick Response (QR) code [1].
Robert Adelmann et al [20] created a free, easily usable, and robust
barcode recognition system for mobile phones, together with an open resolving
framework that facilitates rapid prototyping and deployment. Madhavapeddy et
al. [21] used SpotCodes for enhancing human computer interaction by using a
camera-phone as a pointing and selection device. Seven 2D-barcodes namely
QR Code ,VeriCode, Data Matrix, mCode, Visual Code, ShotCode and
ColorCode are used nowadays for camera phone applications. The first four
barcode in addition to their higher data capacities can enhance the reading
robustness of the codes by error detection and correction capability.
Hence, these 2D-barcodes can operate as robust and portable data files.
With these barcodes, users can access the information they need at anytime,
anywhere, regardless of network connectivity. As for the last three 2D-Barcodes,
they focus more on robust and reliable reading, taking into account the reading
36. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
36
limitations of built-in cameras in mobile phones. They differ greatly from the other
barcodes in terms of data capacity [3]. H. Kato and K.T. Tan identified three key
factors to improve the robustness of 2D-barcode reading, the range of the
reading distance and the stability of the readers [3]. Teoh Chin Yew et al. [22]
conducted a study which performs spatial analysis on several 2D barcodes using
various size data sets. In addition the work also includes the analysis of several
compression applications which can be used in minimizing barcode’s size.
The combination of barcodes with mobile phones opens a door way for
new applications. Tsung-Yu Liu et al. [23] constructed a 2D barcode and
handheld augmented reality supported learning system called HELLO (Handheld
English Language Learning Organization), to improve students’ English level.
Mobile phones with Internet capability are very popular among students in Japan,
so Naomi Fujimura and Masahiro Doi [24] implemented a classroom support
system to collect students’ degree of comprehension of course content using
mobile phones. They devised this system to offer better ease of use for both
students and teachers. Jun Rekimoto et al. [25] describes examples of
augmented reality applications based on CyberCode, and discusses some key
characteristics of tagging technologies that must be taken into account when
designing augmented reality environments.
With the swift increase in the number of mobile device users, more
wireless information services and mobile commerce applications are needed.
Jerry Zeyu et al. [1] discuss 2D barcode concepts, types and classifications,
37. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
37
major technology players, and applications in mobile commerce. They also report
a research project to develop a 2D barcode processing solution to support mobile
applications. S. Lisa, G. Piersantelli describes the features, applications,
functionalities and benefits of the 2D barcodes, pictorial machine-readable
representations of information and data [26]. Jonathan M. McCune et al. [27]
present and analyse seeing-Is- Believing, a system that utilizes 2D barcodes and
camera phones to implement a visual channel for authentication and
demonstrative identification of devices.
The server-based system consists of a request processor subsystem that
handles the request sent by the mobile client and generates response. The
request processor processes the request sent and interacts with the database
connector for further processing. The other component, termed as database
connector, connects to the external database to query the database for the
appropriate data asked by the request processor and sends the results back
Usage of Barcode and XML Technologies in System Design
In this project, we try to emphasize on how digital barcodes can provide
an effective means for mobile E-commerce application. Our system can decode
both 1D and 2D barcodes. We use Qrcode (2D barcode) for encoding food
product information as well as 1D barcode data displayed on the food product to
provide useful information to the user of the system. We embed the data
associated with 1D barcode along with the other information in a 2D barcode. So
38. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
38
a 2D barcode not only represent static information embedded inside it but
dynamic information (the one that can be obtained from external sources) as
well. It is dynamic because we can use the 1D barcode data for accessing the
external database. So we are not only providing the user with contents encoded
inside the 2D barcode but also the contents that can be accessed from external
sources through the use of data encoded inside 1D barcode.
For accessing the data from outside, we may or may not connect to the
Internet and it depends on the location from where we are trying to access the
information. If we are trying to access the food item related data inside the
grocery store then we may not require Internet otherwise we need to.
Barcode Generation and Decoding
In order to test whether the system properly decodes the barcode or not,
we used some online free barcode generators to generate barcode images.
There are many free generators available in the market some of which are online
and others can be downloaded. These generators allow you to encode data of
your choice in the barcode. Some of them also generate image of any type in 1D
or 2D. One of the online generators that we used is [34] and the other one is [35]
for 1D barcode.
We also used another generator provided by ZXing from Google to
generate 2D barcode images and of QR Code type. This is the one, which is
used heavily in the development and testing of the system. The advantage of this
QR Code generator is that you can encode information belonging to certain
39. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
39
category of text. It provides the user an option to choose the content type or the
kind of information needed to encode.
These options include calendar event, contact information, URL, email
address, geographical location, phone number and text that can be anything [36].
Depending upon the option or the content type chosen, the generator asks the
user to enter certain information that can be encoded. It then selects the specific
standard format for that particular content type, formats the information entered
by the user according to the standard, encodes it inside the barcode and creates
a barcode. Once the barcode is created, image can be easily downloaded. For
example if the user selects contact information, the generator will automatically
provide text boxes for the user to enter data for name, address, phone number
and then use all this data to create a specific format. This specific format is
visible when we decode the barcode image. Since the options available to the
user for the content type is fixed, the generator knows how to format the contents
according to the standard for a particular content type.
Moreover, if the user selects the content type as text, he can encode any
information and there is no specific format used by the generator to encode the
data. One can see the same data after decoding without any format. Thereforein
this case, the user has to come up with his own way of formatting the contents
and then providing the formatted information to the generator to build a barcode
image. Since the generator provides a single textbox to enter data for text
content type, one can enter data of any complexity as well as in any format. In
40. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
40
our project, we used the “text” content type to encode the complex information
type. We have also defined some categories to represent such complex
information and came up with our own standard of formatting this information.
This formatted information can be fed to the generator [36] to generate the 2D
barcode image. There are many barcode decoding softwares available in the
market. To build this project we used the APIs provided by Google known as
ZXing [11]. As mentioned before, ZXing is a multi-format 1D/2D barcode reader
library implemented in Java. Out of all the packages of the APIs we are using
com.google.zxing,com.google.zxing.client,com.google.zxing.common,com.googe
.zxing.oned, com.google.zxing.datamatrix, com.google.zxing.qrcode packages in
implementing the system.
External server based sub-system
Request processor: It listens for request and if needed performs data
processing. The mobile-based client sends a request by setting up an HTTP
connection with this component. Once it receives the data, it connects to the
database and generates query according to the data sent by the client. It queries
the database, receives the desired data from database, generates an XML
response file by filling the data received from the database in the file and sends
the response back to the client.
Database connector: It is used to create connection between the server
and the database. The database can be present at the local machine or it can be
accessed remotely. Database: It contains the data that is required by the
41. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
41
application to generate results. For instance, the database at grocery store will
contain the product related information like price, expiration date. On the other
hand, the repository at home will contain the user specific data related to
allergies and conflicts for food. This system uses unique barcode to mark
different components. The barcode is a very important part of a WMS, which
highly improves work efficiency for management. This system not only can use
barcode scanners to read and search for components, but also can generate
barcode labels and then print them.
Local
In Crisanta’s (2010) study, developing a system that can efficiently
manage the task in an internet cafe, she explained that an internet cafe can
function well by applying computerized system or networking in monitoring the
use of computers rather than manual system. In applying such, tasks become
more manageable, accurate and reliable to their business.
In conducting the study, Lincoln Internet Cafe located at Bato-Bato St.,
Riverside, Commonwealth Avenue serves the sample. The internet cafe uses
manual system in recording the usage of their computers. They use a log-book
that contains the following list: computer number, time in and out, time to be
consumed and the amount to be paid. Aside from this task, the assistant is also
obliged to ask or remind the customer if they are going to extend their time or
they are about to end their transaction. After that, they encircle the computer
number, calculate it by computing the time the customer have consumed.
42. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
42
Crisanta (2010) conclude that LIC (Lincoln Internet Cafe) system is time
consuming and difficult. Sometimes, customers exceeded their usage because
they are not guarded properly and having this kind of negligence causes an
income lost to the business.
In the study of Añes, Bamba, Geronimo (2011) entitled “Highlighting the
Operational Concerns and Accounting System of Selected Computer Rental
Shops in Sta. Mesa, Manila”, the company’s accounting concepts and policies
are in accordance with the existing accounting standards and properly directed
by the management. With regards to the general accounting procedures, the
results show that all business transactions are done accordingly. Business forms
and financial reports are with agreement with the business transactions done.
Financial reports and business forms are catered with the company’s
requirements. Thus, encompassing good accounting practices is beneficial and is
helpful in efficiently conducting the day to day operations of the company.
The company has strong control with regards to all cash procedures and
transactions. The receipts and deposits of cash are properly supported by a
source documents.
Daily summary report is prepared to account for daily revenue, assuring
that revenue transactions are recorded as they take place. Employees’ payrolls
are accounted for accordingly, amount and balances are checked and reconciled
with number or hours worked. Consequently, payroll amounts are corrected if
any errors or changes occur. In the light of the findings presented in the study of
43. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
43
Equillo, Macarubbo and Rongavilla (2009) entitled “Leading Principles and
Practices of Internal Control among selected State Universities and Colleges”,
the study show that an essential measurement that ensures that internal control
systems remained unchanged is the proper and regular monitoring. Proper
monitoring is aimed to ensure that controls are operating as intended. Ongoing
monitoring is regularly performed to cover up all internal control components.
This is undertaken in a real-time basis and responds dynamically. This is very
important to the internal control people as it ranks first among all related
monitoring procedures.
In line with having a good accounting system, it is also important to
consider the operational concerns of a business. This is the main concern of the
undergraduate thesis of Apellado, Santos and Valdez (2010) entitled
“Highlighting the Operational Management and Accounting System of Laundry
Shops in San Juan”. Findings of the study includes establishing a petty cash fund
for controlling the expenses, regular monitoring of everyday transactions
affecting different areas of business and communicating problems encountered
in operating the business.
Chapter 3
Research Methodology
44. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
44
Research Approach
The researchers have used the System Development Life Cycle (SDLC)
in planning, conceptualizing, brainstorming, creating and designing the internet
café log in and log out request system with barcode technology which is a
systematic approach to program development and system analysis and design
with respect to computer technology and software engineering.
Systems Development Methodology
The Structured System Analysis and Design Methodology was a system
approach used to the system analysis and design of internet café log in and log
out request system-barcode based. It involves the sequence applications and
executions of events as wells to the analyses of data and appropriate
documentations involved in analyzing, decoding and interpreting the present
system and the proposed system and there were series of steps to be followed in
gathering information in terms of the development and design of the internet
café log in and log out request system-barcode based.
Data Gathering Procedure and Output
In designing and developing the log in and log out request system, the
researchers asked permission in writing to the office of the Campus Director and
informed the research adviser as well as internet attendant about the study. After
the approval was secured, the gathering of information to the present
operation/transaction involved relevant to the study was actually begun. The
researchers actually have identified the Internet Café of the University as partner
45. SURIGAO DEL SUR STATE UNIVERSITY
CAGWAIT CAMPUS
Cagwait, Surigao del Sur
45
in conducting the study that deals with the internet log in and log out with server
intervention. Gathering of data from the present transactions and operations to
Internet café was smoothly started.
Research Locale
This study was conducted at the Internet Café of Surigao del Sur State
University-Cagwait Campus, Poblacion, Cagwait, Surigao del Sur.
Research Planning and Procedure
A letter asking permission to conduct the study entitled” Internet Café
Log in and Log out Request System-Barcode Technology” was sent to the
Office of the Campus Director of this University which allowed the student
researchers to use the internet café for their research activities. After the
approval was secured, the design and development of the program was initiated
and commenced.
Research Time Target
The time target accomplishment of this research will be on November to
March of the Academic Year 2015-2016. Furthermore, visual basic 6.0 software
is used to the development and design of this system program and there will be a
trial and error approach in order to apply all necessary requirements of this study.