Task: Using the Salesforce1 platform: (a) Configure data structures and access controls to accommodate the design identified during your analysis; (b) Configure the business rules ( field checks, workflows, etc) as per the requirements identified in the analysis phase; (c) Create a basic web integration solution to allow the capture of data from a web page into the system; (d) Populate the solution with sufficient test data to demonstrate all the features of the solution; (e) Build reports and management dashboards to meet the analytical requirements discussed in your analysis
Approach: Developed a Salesforce application for a Housing Society Management System in order for the smooth communication between tenants and the society management related to maintenance issues, facility bookings, etc.
Used Workflows, validation rules, lookup fields, visualforce pages built-in APEX to build the solution.
FIndings: It is a top-notch CRM platform that is simple-to-use, highly efficient, scalable, secure and by far the easiest to customize a solution that adds tremendous value to your business.
Tools: Salesforce
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Star, a wild bird, learned to count up to 8 on her own and discovered that numbers can be represented in different ways like 4+4 or 2+2+2+2, showing she was thinking about numbers consciously. She could also recognize number names and remember their sounds. Star showed unusual intelligence for a wild bird in her self-motivated pursuit of numerical science.
Distributed Database Management Systems (Distributed DBMS)Rushdi Shams
The document discusses distributed database systems, which involve fragmenting or replicating a database across multiple machines located in different geographical locations. There are two types of fragmentation: horizontal fragmentation, which divides a table into subsets of rows; and vertical fragmentation, which divides a table by projecting columns. For the fragmentation to be correct, it must satisfy completeness, reconstruction, and disjointness properties. Transparency hides the fragmentation and distribution of fragments from users.
Curve clipping involves using polygon clipping to test if a curved object's bounding rectangle overlaps a clipping window. If there is no overlap, the object is discarded. If there is overlap, the simultaneous curve and boundary equations are solved to find intersection points. Special cases like circles are considered, such as discarding a circle if its center is outside the clipping window plus/minus the radius. Bezier and spline curves can also be clipped by approximating them as polylines or using their convex hull properties.
The document discusses the Hill cipher, a polygraphic cipher technique based on linear algebra. The Hill cipher operates on blocks of letters, using a secret key matrix to encrypt plaintext letters into ciphertext. It encrypts by multiplying blocks of plaintext letters by the key matrix, taking the result modulo 26. The corresponding decryption matrix is calculated from the encryption matrix and is used to decrypt by reversing the process. An example demonstrates encrypting and then decrypting the message "HELLO WORLD" using a 2x2 matrix.
The document summarizes the architecture of a DBMS. It describes three levels of abstraction: the external view seen by users, the conceptual view that hides storage details, and the internal view of physical storage. It also discusses data independence, which allows changes to one view without affecting the others. Database languages like DDL, DML, DCL are used at different levels. The DBMS also provides different interfaces for users and administrators.
The document discusses different types of multidimensional data models (MDDM) used for data warehousing. It describes MDDM as providing both a mechanism for storing data and enabling business analysis. The main types discussed are star schema, snowflake schema, and fact constellation. Star schema has one central fact table connected to multiple dimension tables, resembling a star. Snowflake schema is similar but dimensional tables are normalized into hierarchies. Fact constellation has multiple fact tables sharing some dimensional tables.
This document discusses the OSI security architecture and its key concepts of security attacks, mechanisms, and services. It defines security attacks as any action compromising information security, security mechanisms as tools to detect, prevent or recover from attacks, and security services as services enhancing security. The document then discusses common types of security attacks like passive attacks involving unauthorized access and active attacks involving modifying information. It also outlines various cryptographic attacks against cryptosystems like ciphertext-only, known plaintext, chosen plaintext, and brute force attacks. Finally, it describes the main security services provided by cryptography as confidentiality, data integrity, authentication, and non-repudiation.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Star, a wild bird, learned to count up to 8 on her own and discovered that numbers can be represented in different ways like 4+4 or 2+2+2+2, showing she was thinking about numbers consciously. She could also recognize number names and remember their sounds. Star showed unusual intelligence for a wild bird in her self-motivated pursuit of numerical science.
Distributed Database Management Systems (Distributed DBMS)Rushdi Shams
The document discusses distributed database systems, which involve fragmenting or replicating a database across multiple machines located in different geographical locations. There are two types of fragmentation: horizontal fragmentation, which divides a table into subsets of rows; and vertical fragmentation, which divides a table by projecting columns. For the fragmentation to be correct, it must satisfy completeness, reconstruction, and disjointness properties. Transparency hides the fragmentation and distribution of fragments from users.
Curve clipping involves using polygon clipping to test if a curved object's bounding rectangle overlaps a clipping window. If there is no overlap, the object is discarded. If there is overlap, the simultaneous curve and boundary equations are solved to find intersection points. Special cases like circles are considered, such as discarding a circle if its center is outside the clipping window plus/minus the radius. Bezier and spline curves can also be clipped by approximating them as polylines or using their convex hull properties.
The document discusses the Hill cipher, a polygraphic cipher technique based on linear algebra. The Hill cipher operates on blocks of letters, using a secret key matrix to encrypt plaintext letters into ciphertext. It encrypts by multiplying blocks of plaintext letters by the key matrix, taking the result modulo 26. The corresponding decryption matrix is calculated from the encryption matrix and is used to decrypt by reversing the process. An example demonstrates encrypting and then decrypting the message "HELLO WORLD" using a 2x2 matrix.
The document summarizes the architecture of a DBMS. It describes three levels of abstraction: the external view seen by users, the conceptual view that hides storage details, and the internal view of physical storage. It also discusses data independence, which allows changes to one view without affecting the others. Database languages like DDL, DML, DCL are used at different levels. The DBMS also provides different interfaces for users and administrators.
The document discusses different types of multidimensional data models (MDDM) used for data warehousing. It describes MDDM as providing both a mechanism for storing data and enabling business analysis. The main types discussed are star schema, snowflake schema, and fact constellation. Star schema has one central fact table connected to multiple dimension tables, resembling a star. Snowflake schema is similar but dimensional tables are normalized into hierarchies. Fact constellation has multiple fact tables sharing some dimensional tables.
This document discusses the OSI security architecture and its key concepts of security attacks, mechanisms, and services. It defines security attacks as any action compromising information security, security mechanisms as tools to detect, prevent or recover from attacks, and security services as services enhancing security. The document then discusses common types of security attacks like passive attacks involving unauthorized access and active attacks involving modifying information. It also outlines various cryptographic attacks against cryptosystems like ciphertext-only, known plaintext, chosen plaintext, and brute force attacks. Finally, it describes the main security services provided by cryptography as confidentiality, data integrity, authentication, and non-repudiation.
Digital Signature Recognition using RSA AlgorithmVinayak Raja
The document provides an overview of the RSA public key encryption algorithm. It discusses how RSA uses a public key and private key pair, with the public key used to encrypt messages and the private key used to decrypt them. The security of RSA relies on the difficulty of factoring the product of two large prime numbers. The document outlines the RSA algorithm steps of key generation, encryption, and decryption. It also discusses RSA applications, standardization, speed, weaknesses, and history.
This document discusses frequency domain filtering for image sharpening. It begins by explaining the difference between spatial and frequency domain image enhancement techniques. It then describes the basic steps for filtering in the frequency domain, which involves taking the Fourier transform of an image, multiplying it by a filter function, and taking the inverse Fourier transform. The document discusses sharpening filters specifically, noting that high-pass filters can be used to sharpen by preserving high frequency components that represent edges. It provides examples of ideal low-pass and high-pass filters, and Butterworth and Gaussian filters. Laplacian filters are also introduced as a common sharpening filter that uses an approximation of second derivatives to detect and enhance edges.
This document provides an introduction to commitment schemes and zero-knowledge protocols in cryptographic theory. It defines commitment schemes as cryptographic primitives that allow a player to commit to a value without revealing it, while preventing them from changing their mind later. It also introduces zero-knowledge protocols, which enable secure protocols to accomplish complex tasks. The document surveys existing results on commitment schemes and zero-knowledge protocols, and points out some open research problems.
This presentation introduces Feistel encryption and decryption. It discusses the Feistel cipher structure which partitions the input block into two halves and processes them through multiple rounds of substitution and permutation. It shows diagrams of the Feistel encryption and decryption processes. It also covers the design features of Feistel networks such as block size, key size, number of rounds, and sub-key generation. Finally, it provides an example of the round function that performs a bitwise XOR of the left half and output of a function applied to the right half and sub-key.
Clipping identifies portions of a scene outside a specified clip window region. There are different types of clipping for 2D graphics including all-or-none, point, line, and polygon clipping. The Cohen-Sutherland algorithm assigns a region code to line endpoints based on their position relative to the clip window boundaries, and uses logical AND operations on the codes to determine if a line is fully inside, outside, or needs clipping.
Image segmentation in Digital Image ProcessingDHIVYADEVAKI
Motion is a powerful cue for image segmentation. Spatial motion segmentation involves comparing a reference image to subsequent images to create accumulative difference images (ADIs) that show pixels that differ over time. The positive ADI shows pixels that become brighter over time and can be used to identify and locate moving objects in the reference frame, while the direction and speed of objects can be seen in the absolute and negative ADIs. When backgrounds are non-stationary, the positive ADI can also be used to update the reference image by replacing background pixels that have moved.
What is Data Mining? Data Mining is defined as extracting information from huge sets of data. In other words, we can say that data mining is the procedure of mining knowledge from data.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
This document discusses different types of data models, including object based models like entity relationship and object oriented models, physical models that describe how data is stored, and record based logical models. It specifically mentions hierarchical, network, and relational models as examples of record based logical data models. The purpose of data models is to represent and make data understandable by specifying rules for database construction, allowed data operations, and integrity.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
KNIME Analytics Platform is an open source data analytics platform that allows users to discover insights from data through customizable workflows. It provides over 1000 analytic techniques through nodes for tasks like statistics, data mining, text mining, and more. Workflows can integrate various data sources, transform the data, apply models, and output results in standard formats. The platform is open source and free to use, customize, and extend through its community and commercial extensions.
This document compares the performance of two machine learning algorithms, two-class boosted decision tree and two-class decision forest, in predicting fake job postings. The boosted decision tree algorithm achieved higher accuracy (93.8% vs 95.4%) and recall (75% vs 2%) than the decision forest algorithm, suggesting it is better able to detect fake job postings. While the decision forest algorithm had perfect precision of 100%, the boosted decision tree provides a more reliable overall performance in identifying fake job postings.
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...butest
This document provides an overview of unsupervised learning techniques, specifically clustering algorithms. It discusses three main approaches to clustering: exclusive clustering using k-means, agglomerative clustering using hierarchical algorithms, and overlapping clustering using fuzzy c-means. It provides examples and explanations of how k-means and hierarchical clustering work, including the steps involved in each algorithm. It also discusses strengths and weaknesses of different clustering methods.
This document discusses techniques for integrating extracted data and schemas. It begins by introducing the problems of column and instance value matching during data integration. It then describes common database integration techniques like schema matching. It also discusses linguistic, constraint-based, domain-level, and instance-level matching approaches. Finally, it covers issues specific to integrating web query interfaces, such as building a global query interface and matching interfaces through correlation mining and clustering algorithms.
Collaborating on Technology Service Delivery Summary report finalSabina Visser
This report summarizes a project that evaluated opportunities for Alberta municipalities to collaborate on technology service delivery. 37 representatives from 29 municipalities participated.
The project identified a range of current collaboration among municipalities, from simply sharing tools to fully sharing applications. While template and document sharing was widely agreed upon, municipalities were less inclined toward full application sharing currently.
Six key opportunity areas for collaboration were identified: replacement of recreation management systems, electronic council systems, financial systems, asset management systems, permitting systems, and disaster recovery space issues.
The report provides recommendations to further collaboration, including engaging additional business areas, exploring various collaboration models, using provided governance tools, continuing procurement document sharing, and MISA playing a leadership role in knowledge sharing
Grassroots Affairs Governance Under the Rural Revitalization Strategy Empower...ijtsrd
With the strong support of governments at all levels, WeChat mini programs have been widely used in the field of urban governance. However, due to the lack of support of professional information tools, the actual operation process is too complex, resulting in too many management levels and cumbersome operators, reducing the efficiency and accuracy of information transmission, it is difficult to achieve information and grid management, and seriously limiting the popularization and application of grass roots transaction processing mini programs at the grass roots level. This paper aims to explore how WeChat mini programs can effectively solve the challenges in practical applications and propose a new development plan for social governance applications based on WeChat mini programs, which has been tested in many places and achieved remarkable results. In the future, WeChat mini programs will be continuously optimized and promoted in practice to help the countrys rural revitalization. Haofang Zhao | Yingjian Ma | Shiyan Guo | Hongmei Ju "Grassroots Affairs Governance Under the Rural Revitalization Strategy Empowered by WeChat Mini Program Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-4, August 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59808.pdf Paper Url:https://www.ijtsrd.com/management/general-management/59808/grassroots-affairs-governance-under-the-rural-revitalization-strategy-empowered-by-wechat-mini-program-technology/haofang-zhao
Digital Signature Recognition using RSA AlgorithmVinayak Raja
The document provides an overview of the RSA public key encryption algorithm. It discusses how RSA uses a public key and private key pair, with the public key used to encrypt messages and the private key used to decrypt them. The security of RSA relies on the difficulty of factoring the product of two large prime numbers. The document outlines the RSA algorithm steps of key generation, encryption, and decryption. It also discusses RSA applications, standardization, speed, weaknesses, and history.
This document discusses frequency domain filtering for image sharpening. It begins by explaining the difference between spatial and frequency domain image enhancement techniques. It then describes the basic steps for filtering in the frequency domain, which involves taking the Fourier transform of an image, multiplying it by a filter function, and taking the inverse Fourier transform. The document discusses sharpening filters specifically, noting that high-pass filters can be used to sharpen by preserving high frequency components that represent edges. It provides examples of ideal low-pass and high-pass filters, and Butterworth and Gaussian filters. Laplacian filters are also introduced as a common sharpening filter that uses an approximation of second derivatives to detect and enhance edges.
This document provides an introduction to commitment schemes and zero-knowledge protocols in cryptographic theory. It defines commitment schemes as cryptographic primitives that allow a player to commit to a value without revealing it, while preventing them from changing their mind later. It also introduces zero-knowledge protocols, which enable secure protocols to accomplish complex tasks. The document surveys existing results on commitment schemes and zero-knowledge protocols, and points out some open research problems.
This presentation introduces Feistel encryption and decryption. It discusses the Feistel cipher structure which partitions the input block into two halves and processes them through multiple rounds of substitution and permutation. It shows diagrams of the Feistel encryption and decryption processes. It also covers the design features of Feistel networks such as block size, key size, number of rounds, and sub-key generation. Finally, it provides an example of the round function that performs a bitwise XOR of the left half and output of a function applied to the right half and sub-key.
Clipping identifies portions of a scene outside a specified clip window region. There are different types of clipping for 2D graphics including all-or-none, point, line, and polygon clipping. The Cohen-Sutherland algorithm assigns a region code to line endpoints based on their position relative to the clip window boundaries, and uses logical AND operations on the codes to determine if a line is fully inside, outside, or needs clipping.
Image segmentation in Digital Image ProcessingDHIVYADEVAKI
Motion is a powerful cue for image segmentation. Spatial motion segmentation involves comparing a reference image to subsequent images to create accumulative difference images (ADIs) that show pixels that differ over time. The positive ADI shows pixels that become brighter over time and can be used to identify and locate moving objects in the reference frame, while the direction and speed of objects can be seen in the absolute and negative ADIs. When backgrounds are non-stationary, the positive ADI can also be used to update the reference image by replacing background pixels that have moved.
What is Data Mining? Data Mining is defined as extracting information from huge sets of data. In other words, we can say that data mining is the procedure of mining knowledge from data.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
This document discusses different types of data models, including object based models like entity relationship and object oriented models, physical models that describe how data is stored, and record based logical models. It specifically mentions hierarchical, network, and relational models as examples of record based logical data models. The purpose of data models is to represent and make data understandable by specifying rules for database construction, allowed data operations, and integrity.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
KNIME Analytics Platform is an open source data analytics platform that allows users to discover insights from data through customizable workflows. It provides over 1000 analytic techniques through nodes for tasks like statistics, data mining, text mining, and more. Workflows can integrate various data sources, transform the data, apply models, and output results in standard formats. The platform is open source and free to use, customize, and extend through its community and commercial extensions.
This document compares the performance of two machine learning algorithms, two-class boosted decision tree and two-class decision forest, in predicting fake job postings. The boosted decision tree algorithm achieved higher accuracy (93.8% vs 95.4%) and recall (75% vs 2%) than the decision forest algorithm, suggesting it is better able to detect fake job postings. While the decision forest algorithm had perfect precision of 100%, the boosted decision tree provides a more reliable overall performance in identifying fake job postings.
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...butest
This document provides an overview of unsupervised learning techniques, specifically clustering algorithms. It discusses three main approaches to clustering: exclusive clustering using k-means, agglomerative clustering using hierarchical algorithms, and overlapping clustering using fuzzy c-means. It provides examples and explanations of how k-means and hierarchical clustering work, including the steps involved in each algorithm. It also discusses strengths and weaknesses of different clustering methods.
This document discusses techniques for integrating extracted data and schemas. It begins by introducing the problems of column and instance value matching during data integration. It then describes common database integration techniques like schema matching. It also discusses linguistic, constraint-based, domain-level, and instance-level matching approaches. Finally, it covers issues specific to integrating web query interfaces, such as building a global query interface and matching interfaces through correlation mining and clustering algorithms.
Collaborating on Technology Service Delivery Summary report finalSabina Visser
This report summarizes a project that evaluated opportunities for Alberta municipalities to collaborate on technology service delivery. 37 representatives from 29 municipalities participated.
The project identified a range of current collaboration among municipalities, from simply sharing tools to fully sharing applications. While template and document sharing was widely agreed upon, municipalities were less inclined toward full application sharing currently.
Six key opportunity areas for collaboration were identified: replacement of recreation management systems, electronic council systems, financial systems, asset management systems, permitting systems, and disaster recovery space issues.
The report provides recommendations to further collaboration, including engaging additional business areas, exploring various collaboration models, using provided governance tools, continuing procurement document sharing, and MISA playing a leadership role in knowledge sharing
Grassroots Affairs Governance Under the Rural Revitalization Strategy Empower...ijtsrd
With the strong support of governments at all levels, WeChat mini programs have been widely used in the field of urban governance. However, due to the lack of support of professional information tools, the actual operation process is too complex, resulting in too many management levels and cumbersome operators, reducing the efficiency and accuracy of information transmission, it is difficult to achieve information and grid management, and seriously limiting the popularization and application of grass roots transaction processing mini programs at the grass roots level. This paper aims to explore how WeChat mini programs can effectively solve the challenges in practical applications and propose a new development plan for social governance applications based on WeChat mini programs, which has been tested in many places and achieved remarkable results. In the future, WeChat mini programs will be continuously optimized and promoted in practice to help the countrys rural revitalization. Haofang Zhao | Yingjian Ma | Shiyan Guo | Hongmei Ju "Grassroots Affairs Governance Under the Rural Revitalization Strategy Empowered by WeChat Mini Program Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-4, August 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59808.pdf Paper Url:https://www.ijtsrd.com/management/general-management/59808/grassroots-affairs-governance-under-the-rural-revitalization-strategy-empowered-by-wechat-mini-program-technology/haofang-zhao
This document provides an overview of e-governance and its application in developing countries. It defines e-governance as using information and communication technologies to improve government effectiveness, efficiency, and transparency. The document presents a four-phase e-governance model moving from information provision to full transactional capabilities. It also discusses technology impacts and provides two case studies of e-governance projects in Ghana and Tanzania aimed at better coordination and use of information for decision-making. Key challenges for developing countries include lack of infrastructure, skills, funding, and digital divides.
The State of Community Management 2018 marks the ninth year of this vitally important resource for community professionals and organizations and builds on the insights and expertise of our past reports.
Download the full report: the.cr/socm2018
IRJET- Decentralized Freelancing System - Trust and TransparencyIRJET Journal
1) The document proposes a blockchain-based decentralized freelancing system to provide trust and transparency between employers and freelancers.
2) Current centralized freelancing systems involve intermediaries, resulting in higher transaction fees, lack of transparency, and possibility of fraud.
3) The proposed system uses blockchain and smart contracts to directly connect employers and freelancers, removing intermediaries and providing a trusted, transparent system with lower fees.
Is Community Management Difficult The Role of Technology in Easing the BurdenSarah Boyer
Community management, a crucial aspect of maintaining vibrant and engaged online and offline groups, poses unique challenges. The role of technology in easing the burden of community management is significant, revolutionizing how we approach this complex task. This article explores the difficulties of community management and how technology serves as a pivotal tool in simplifying and enhancing this process.
The document provides an overview of requirements analysis for the Homeless Help Mission charity. It includes:
1) A rich picture diagram showing the people, processes, and information flows within the organization.
2) An analysis of the key issues including inconsistent data systems, conflicts over developing a new management information system, and ensuring projects meet key performance indicators.
3) Use case diagrams and descriptions of primary and secondary scenarios for activities like assigning gardening tasks, volunteer registration, and reporting within the "Dig-it" project.
4) The document is divided into sections covering rich picture analysis, use case modeling, and a planned critique of the models.
From eGov 2.0 to eGov 3.0: The Research Agendasamossummit
The research agenda of the eGov area will be discussed in this session, focusing on innovative ideas and directions for its advancement from the eGov 2.0 to a new eGov 3.0 paradigm.
Yannis Charalabidis, University of the Aegean, Greece
The document outlines the agenda for an event on smart cities. It includes presentations and panels on topics like smart city concepts, digital administration in large cities, and a social network for local governments. A keynote speech introduces the concept of smart cities and how technology can help address challenges facing governments through operational and management excellence.
The document outlines the agenda for an event on smart cities. It includes presentations and panels on topics like smart city concepts, digital administration in large cities, and a social network for local governments. A keynote speech introduces the concept of smart cities and how technology can help address challenges facing governments through operational and management excellence.
This digital communications strategy aims to create three, one-minute videos to provide job readiness information for accessibility users. The videos will be hosted on Annecto's YouTube channel and promoted on their social media platforms. They will address web support and information, communication and accessibility, and networking. The goal is to develop opportunities for employment and social networking of accessibility users using targeted, visual content.
Smart city position paper - GS1 standards perspectiveDaeyoung Kim
This document discusses strategies for developing interoperable data-driven smart cities. It begins by defining key smart city stakeholders and trends, including open data hubs and living labs. It then discusses challenges like fragmented data sources and solutions like using GS1 global standards for resource identification. Use cases from Korea demonstrate how GS1 standards were applied successfully to integrate legacy systems and develop new services. Overall, the document advocates applying GS1 identification, data modeling and interface standards to address smart city interoperability issues and help realize the full potential of data-driven smart governance and services.
BIM Term Paper Proposal on Applications of ICT on Office Management santo BD
BIM Term Paper Proposal
Topics is "Applications of ICT on Office Management and organization Development"
Broader objective of the study :
? ? Main objective of this study- ICT applications how to help office management and
to develop organization.
Specific objectives: The specific objective of the study will be:
• Identify the ICT applications using for office management.
• To identify impact on employment productivity of using ICT applications.
• Cost benefit analysis of using ICT applications in the organization.
Bangladesh Institute of Management (BIM), Dhaka
The document summarizes a minor project report on developing an online estate management system. It includes an acknowledgment section thanking those who helped with the project. It then provides details on the objectives and scope of the project such as creating an online system for a construction company to advertise and manage property listings, provide payment options for customers, and generate reports. It also includes sections on the theoretical background, system analysis, design, feasibility study, and information gathering process.
Proposal note for strengthening of monitoring and evaluation on projectsNoor Khan
This document proposes using new data analytics tools to improve monitoring and evaluation of social sector programs. It argues that predictive analytics, rapid cycle evaluations, and monitoring dashboards can help governments and organizations better understand program impacts, identify who will benefit most from interventions, and make smarter decisions. These tools could help address challenges around evaluating complex, multi-level social protection programs and ensuring resources are used effectively to meet development goals. The document outlines some of the data and business challenges around social sector programs and argues analytics can help overcome issues around data quality, behavioral dynamics, and linking different programs and levels of government.
This document discusses engaging low-income residents in civic tech and data collaboratives. It emphasizes that without intentionally including low-income people, projects risk only addressing issues raised by those who already have a voice. The document outlines challenges to engagement and provides examples of how three CTDC cities meaningfully involved residents. In St. Louis, residents helped shape a court information website through surveys. In Boston, youth were hired to contribute to all stages of a youth employment project. In Seattle, using plain language like "civic needs" worked better than "civic tech and data".
Colombia's Colnodo has a strong network of partnerships that allow the organization to diversificate, increase its impact and leverage different technologies. Colnodo's leadership provides a detail explanation of the model, along with recommendations for implementation.
Unit-12 Saukaryam- ICT Project in Visakhapatnam Municipal Corporation, Andhra...vjkolaventy
The document discusses Project Saukaryam, an ICT project initiated by the Visakhapatnam Municipal Corporation in Andhra Pradesh, India. The project aims to provide online civic services to improve governance and citizen satisfaction. It established a website and city civic centers connected by a broadband network. Citizens can access services like certificates, utility connections, complaints, and payments online or at civic centers. The project was developed using a public-private partnership model to overcome funding constraints. While innovative, the project also faced some limitations.
Infoxchange Australia recommends that specific ICT funding be allocated to the not-for-profit sector so that it can become smarter and achieve digital proficiency. This is a vital means of removing barriers to performance and enhancing service delivery.
Similar to Sales force- Housing society management system | Strategic ICT and eBusiness Implementation (20)
Thesis - Mechanizing optimization of warehouses by implementation of machine ...Shrikant Samarth
Task: As Research Project is part of a postgraduate course it is also required that students employ and
develop their research knowledge and skills in an applied fashion. The Research Project must
involve the identification, generation, or collation of relevant primary or secondary data and the
ability to analyze them in a meaningful and critical manner.
Approach: Data was taken from a working organization to resolve the issue regarding the space optimization of the warehouse which results into losses to the company.
Findings: Ada boosting algorithm works best for identification of the blowout products beforehand which would help warehouse manager to apply strategies on the products which would take time to sell. So that, the losses associated to such products can be avoided.
Tools: Python programming, Excel visualizations, Overleaf latex
Infographic - Ireland: "A Beneficiary of Brexit"Shrikant Samarth
Task: The objective of this assignment is to tell a story using data via the medium of an infographic
Apporoach: A general topic was selected first after which the data was downloaded from multiple sources and then cleaned in R. The topic chosen was positive effects of Brexit on Ireland.
Tools: Adobe Illustrator
Data Visualization - A reality check Prisons in IndiaShrikant Samarth
Task: The task is to prepare a business magazine-style report (think HBR, Time Magazine or The Economist). It should be a minimum of 1,500 words, Maximum 2,000 words and should be based on a recent dataset.
Approach: A general topic was selected first after which the data was downloaded from multiple sources and then cleaned in R. 10- 12 different visualizations of the data were created using Tableau, Microsoft Power BI and online visualization tools. The topic chosen was Prisons in India.
Findings: Informative Business Style Magazine created, which reveals very interesting numbers of Indian Prisons.
Tools: Tableau, Microsoft Power BI, Advanced Microsoft Word
Analytical CRM - Ecommerce analysis of customer behavior to enhance sales Shrikant Samarth
Task: You are required to choose a dataset (or related datasets) in an area of interest suitable for analyzing customer relationships.
Approach: Topic is chosen – Customer behavior Analysis in Ecommerce Industry for Enhancing Sales. Brazilian E-commerce public dataset was downloaded, cleaned and performed multiple regression in SPSS to check the relationship between the dependent variable and multiple independent variables.
Findings: Customer can be retained if the product delivered in time and if there is a delay in the product delivery, it is a duty of a seller to inform the customer for the same. The payment method has proven to be an important parameter to enhance sales over a period of time. analysis suggests on-time delivery, flexibility in payment method and good customer service would help the seller to gain customer trust which would help them to convert more sales.
Tools: IBM SPSS , Excel (pivot tables and charts), Tableau
Advance Data Mining - Analysis and forecasting of power factor for optimum el...Shrikant Samarth
Task: Execute a research project using data mining techniques
Approach: The topic chosen was ‘Analysis and Forecasting of Power Factor for Optimum Electric Consumption in a Household.’ Research question – What can be the best short term range of forecast for power factor patterns so that optimum energy consumption can be achieved for a household?
To answer the question, CRISM- DM method was used. The ARIMA machine learning model was developed using R.
Findings: The best short term range of forecasts for the power factor was achieved for 6 months and 12 months duration using the ARIMA model. The MAPE value for the ARIMA model was around 1.83.
Tools: Rstudio
Statistics For Data Analytics - Multiple & logistic regression Shrikant Samarth
Task: To build multiple regression and logistic regression models on appropriate data.
Approach: A general topic was selected first after which the data was downloaded from the source keeping the restrictions in mind and then cleaned in R. Then the multiple regression and logistic regression models were built using IBM SPSS and the outputs were interpreted. The dependent variable was life expectancy and the independent variables were Age-standardized Mortality-Communicable”, “Age-standardized Mortality-Cardiovascular Disease and Diabetes".
Findings: Multipleregression - analysis was conducted to make sure normality, linearity, multi-collinearity, independence of errors and homoscedasticity were not violated. Statistically, the score of Life expectancy at age 60, 퐹(2,102) = 39.474 푅2 = .436, 푝 < 0.0005
Logistic Regression: Result shows 58.9% (Cox & Snell R-Square) and 80.1% (Nagelkerke R-Square) of the variance and gives 92.4% of correctly classified countries. The two indicating factors made a remarkable commitment to the model. Also, the model predicts the increase in “Mortality-Cardiovascular/Diabetes” and “Mortality rate cause by Communicable” variables is the cause of a decrease in Life Expectancy in a country.
Tools: IBM SPSS
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of IrelandShrikant Samarth
Task: To develop a data warehouse from multiple structured and unstructured sources of data and implement a minimum of three non-trivial business intelligence queries on the data warehouse with the help of visualizations.
Approach: Created Data warehousing project for Data Warehousing and Business Intelligence module based on entities affecting the rate of crime in the Republic of Ireland. Created Data warehouse and build automated cube to fetch proper data periodically. Used R programming language to clean data, to store data used SQL Server as Database, SSAS for creating Data Cube so the user gets a proper insight of various accident conditions, also used Tableau for various Reports.
Tools: RStudio, SQLServer, SSIS, SSAS, Tableau
VIDEO Description: https://www.youtube.com/watch?v=uRdyZQja66M&t=134s
Devise and implement a test strategy in order to perform a comparative analysis of the capabilities of two database management systems (Cassandra and HBase) in terms of performance.
Approach: Installation and implementation of instances of the two data storage and management systems. The Yahoo Cloud Serving Benchmark is used to compare the performances of HBase and Cassandra. Average latency and throughput were considered for analyzing the comparison of the two databases. The results obtained from YCSB are then analyzed and visualized with the help of Tableau.
Findings: HBase performs insertion, reading, and updating of records faster than Cassandra but only when the operations count is less. At heavier loads, Cassandra performs better than Hbase.
Tools: Hbase, Cassandra, Hadoop, Tableau, YCSB
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Sales force- Housing society management system | Strategic ICT and eBusiness Implementation
1. Housing Society Management System
Part 2: Project Implementation Report
MSc in Data Analytics {2019/2020}
Team Members:
Name Student ID
Niraj Shah X18139108
Preeti Sakav X18133592
Shrikant Samarth X18129137
Kaustubh Albur X18136567
2. Housing Society Management System | ICT Project Page | 2
Contents
Introduction:.................................................................................................................................................4
Strategic Planning and Analysis: ...................................................................................................................4
Target Group:................................................................................................................................................5
Background of Housing System: ...................................................................................................................5
Basis of Implementation Architecture:.........................................................................................................5
System Architecture:.................................................................................................................................6
Advantages:...............................................................................................................................................6
Disadvantages...........................................................................................................................................6
System Design:..............................................................................................................................................6
User and Administrator Functionalities:.......................................................................................................7
Tenant.......................................................................................................................................................7
Administrator............................................................................................................................................7
Benefits of the Proposed System:.................................................................................................................8
Scope of Improvement: ................................................................................................................................8
Data Dictionary .............................................................................................................................................9
Event Data Dictionary ...............................................................................................................................9
Tenant Data Dictionary.............................................................................................................................9
Flat Data Dictionary ................................................................................................................................10
Maintenance Issue Data dictionary ........................................................................................................10
Society Issue Data Dictionary..................................................................................................................11
Process Diagrams:.......................................................................................................................................12
Booking Facility:......................................................................................................................................12
Lease Renewal: .......................................................................................................................................13
Maintenance System: .............................................................................................................................14
Event Management System:...................................................................................................................15
Entity-Relationship Diagram:..................................................................................................................16
Database Schema:...................................................................................................................................17
Implementation of Architecture:................................................................................................................18
Users: ......................................................................................................................................................18
Admin Home Page & Structure:..............................................................................................................18
Tenant Home Page & Structure:.............................................................................................................21
Standard Objects.....................................................................................................................................22
3. Housing Society Management System | ICT Project Page | 3
Flats.............................................................................................................................................................22
Tenants........................................................................................................................................................25
Facilities: .....................................................................................................................................................27
Society related issues:.................................................................................................................................29
Maintenance Issues ....................................................................................................................................32
Event Registration:......................................................................................................................................35
Lease Renewal.............................................................................................................................................37
Analysis and Dashboards: ...........................................................................................................................38
Teamwork ...................................................................................................................................................42
References ..................................................................................................................................................42
4. Housing Society Management System | ICT Project Page | 4
Introduction:
Accommodation issues in Dublin have been rising with every passing day as
immigrants have started looking at Ireland as a great opportunity to settle down.
Thus our Housing Society was established in 2017, with an optimize Housing
Management System. This Management System takes care of almost every issue
that a tenant might face during his stay. The entire residence is owned by the
Housing Society, and have adopted the Housing Management System to manage
the society. Services of the system are specially designed for the ease and smooth
communication between tenants and the society administration regarding any
issues, booking of any facilities provided by the society, issues related to lease
etc. As any request/complaint is raised by the tenant an auto generated email
will be sent to the administration and to the tenant as a confirmation of the issue
raised.
Strategic Planning and Analysis:
Strategic planning is an important for all associations including for-profits, non-
profits, government offices, human resources, social administrations etc. It
unlocks new ways to deal with the management system that helps in filling the
gap in the system. Moreover, strategic planning is used to set priorities, focus
energy and resources, strengthen operations and adjust the organization's
direction in response to a changing environment. Effective strategic planning
expresses not just where an association is going and the actions expected to
make progress, but also in addition how it will know whether it is effective
(company, 2019).So, we have utilized some management strategies to tackle the
gap between tenants and Society management. (Hayden, 2019)
5. Housing Society Management System | ICT Project Page | 5
Target Group:
The system acts as an mediator between the tenants and the administration,
thus the target users will be the Housing Societies and Rental Organizations.
The tenants usually had to keep running behind the owner to solve any of their
maintenance/repair issues, or had to wait for long to book any facilities. The
management system eases their task by giving them one platform through which
they can raise their complaints, book facilities have a reminder for their lease
renewal system and will not have to have to wait for long to get a response.
Background of Housing System:
There was no particular housing system to manage the entire housing society
but with the rising demand in the housing sector, led to the communication gap
between the tenants and the Housing Society that gap is bridged by this Housing
Management System. 30% of the housing in Dublin is private and rental
accommodation, thus a large percentage of people are living in a rental house
which requires a good management for any issues faced. (Ireland, 2018) Earlier
people had to call the owner and concern them for any problem faced. With the
rise in technology and software it has become easy for the owners and tenants
to communicate with each other hassle free.
Basis of Implementation Architecture:
This management system acts as a bridge between the communication gap
observed between the society/apartment owner/administrator and tenants.
Through this process the tenants will be able to communicate with the
administrator without any hassle for any issue that he faces related to his
apartment or the society. The administrator follows a certain work flow where he
is able to see the issue raised or a request sent for booking any facility by a
specific tenant of a specific apartment from a wing. All the requests and
complaints received from various tenants of the housing society are available at
the administrator view where he resolves their issue and a confirmation email
regarding the same is sent. Tenant details , his complaint history and number
of times the tenant has booked any facility all other details are available at the
administrator view.
6. Housing Society Management System | ICT Project Page | 6
System Architecture:
Salesforce is an vital part of Housing System, that provides a customized,
practical and easy solutions to all tenants who wish to communicate with the
administration for any purpose. It also gives the administration a different work
flow and authorities to resolve issues effectively. This platform creates various
objects, dashboards, apps, verification, data storing points etc which makes the
working of the system effective and user friendly.
Advantages:
• Time efficient.
• Avoids miscommunication between tenants and administration office.
• People living in the society are updated of upcoming events.
• Issues of people living in the society are resolved.
Disadvantages:
• Actual implementation of this process requires financial investment to it.
• To use this system access to internet is mandatory.
System Design:
The Housing System is a Salesforce Application that provides an informative and
communicative platform for people living in the housing society. People living in
the society has the access that is given by the administrator, to raise concerns
regarding issues faced in the apartment or society related issues. The
architecture has been developed taking into account all the possible things a
tenant of the apartment can face during his stay in the housing society. The
admin has authorities to take decisions, circulate notice, inform owners and
tenants about the upcoming events through email. Non members of the housing
society can take part in the events of the society through an invitation link. All
the information is available with the administrator of the Housing System.
7. Housing Society Management System | ICT Project Page | 7
User and Administrator Functionalities:
Tenant
• A person living in an apartment can complaint about the problems in the
apartment like problems in the boiler, plumbing issues, kitchen issues etc.
• Tenant can pull up a request to book any facility provided by the housing
society like booking a slot for swimming pool, club house facilities and games,
community hall for parties and events.
• Tenants facing any society related issue such as parking space, hygiene of
the society, frequent breakdown of wifi, lifts, cutdown on water supply etc
can be raised in the Society Related Issues tab in the salesforce app.
• A tenant can keep a check on all his facility booking history in the Facility
Tab.
Administrator
• The administrator can view all the maintenance issues raised by the tenant.
Maintenance issues are Repair or Replace type. Reading the description
provided by the tenant the admin can decide what to do and approve or reject
its request. An auto generated e-mail will be sent accordingly.
• Admin has the authority to process the requests of booking any facility
requested by the tenant. If at a particular time slot more than one person
have raise a request to book the same facility, admin decides and accepts and
reject the request accordingly.
• All the Society related issues will be scrutinized by the admin, resolve them
and send an email to every member of the housing society informing the issue
has been resolved.
• Provides a link to invite non-members of the housing society to their events
and society parties. Admin will collect all the information of these people and
inform them if any apartment is vacant, and further event link’s will be
broadcasted.
8. Housing Society Management System | ICT Project Page | 8
Benefits of the Proposed System:
The proposed system will ease and bridge the communication gap between
tenants and the housing society admin. Endless calls to the admin and following
up with him to resolve a small issue will be over. Tenants just have to raise a
complaint through the salesforce application and their task is done. The
expected resolution, description of the issue faced are the additional information
the tenant can provide to resolve his issues as early as possible. The efforts of
finding a right place and reserving it for any event or function is eliminated, as
the type of event, date of event can be selected by the tenant and the request to
book that facility needs to be sent on the salesforce app. Salesforce will keep a
check on all the facility and the complaint history booked or raised by the tenant,
whether the admin has resolved or rejected the request.
Through this Society Management System the administrator can manage the
entire housing society irrespective of its size through the salesforce application.
The admin has sufficient information of all the maintenance issues of the
apartments and the society. Through this information an annual cost required
to maintain the society can be estimated. Detailed analysis on this information
will help the administrator to reduce the maintenance cost and make the working
of the housing society more efficient.
Scope of Improvement:
The system developed in Salesforce can be developed as an mobile application,
where the user will have a login id and password, the authorized login id and
password will get access to all the facilities and advantages of this application.
The admin will have another view, where he can check all the incoming request
and act accordingly through the mobile application.
This particular system with few changes can be developed for any other rental
organization, any other housing societies having different set of facilities and
requirements.
9. Housing Society Management System | ICT Project Page | 9
Data Dictionary:
Event Data Dictionary
Attribute Label Data type Allowed values Description
ActivityDate Date Date Date of Event
Activitytime Time Time Time of Event
Attendees String Text Members name
Description String Text Event Description
Duration Time Hours:Mins:Sec Duratio of event
Email String Email id Emailid of Attendee
IsPrivate Checkbox Yes/No Public/Priavte Event
CreatedBy String Text User who created The
event
Tenant Data Dictionary
Attribute Label Data type Allowed values Description
Age Numeric Numbers Tenants
age{Formula}
BirthDate Date Tenants Date Of
Birth
Tenants Birth date
Name String Name of tenant Tenants name
Gender PickList Male/Female Select Male/Female
Phone_Number Number Numbers Tenants Contact
Details
Tenant_since_Months Date Date Days since Lease
Date_Of_Occupancy Date Date Date of Joining
10. Housing Society Management System | ICT Project Page | 10
Flat Data Dictionary
Attribute Label Data type Allowed values Description
Created_By Date Date Record created by.
Flat_No Character Number and
Character
Flat number
Floor Character Character Floor on which Flat is
located
Name String Names Name of tenant
Price Numeric Number Price of apartment
Wing Character Wing name The Building in which
the flat is
Type Number Type of Flat Number of rooms and
size of flat
Maintenance Issue Data dictionary
Attribute Name
(Field Name)
Measurement
Unit
(Data Type)
Allowed Values Description
CreatedBy Date Date of creation Member raising
the issues
Detail String Description Details of the
maintenance issue
Flat_No Integer Flat number Flat no of the
person
LastModifiedBy Date Date Any modifications
Name String Name of creator Tenants name
Owner String Owners Name Owners name
Type String Maintenance issue or
Society related issue
Type of issue
11. Housing Society Management System | ICT Project Page | 11
Society Issue Data Dictionary
Attribute Name Data Type Allowed Values Description
CreatedBy String Text Person who raised the
issue
Description String Text Description Description of the
society related issue
Flat_Number Integer Numeric Flat number of the
person
Issue_Solved CheckBox Approved or
Rejected
Is the issue resolved or
not
LastModifiedBy Date Modification
Date
If any modifications
Name String Name Name of the member
Owner String Name Owner/tenant
12. Housing Society Management System | ICT Project Page | 12
Process Diagrams:
Booking Facility:
DATA CAPTURE POINT
Society members need to book the facility they wish to use in advance. The
above diagram describes the process flow for booking different facilities.
Members need to login to their account and select the appropriate date and
facility they wish to book. The request is sent to the admin via email for approval.
The updated status of the request can be viewed online.
13. Housing Society Management System | ICT Project Page | 13
Lease Renewal:
A part of the system is to generate reminders and renew the lease before expiry.
The system generates a reminder automatically which is sent to the tenant. If
the tenant wishes to renew the lease ,the request will be acknowledged and sent
to admin for further processing.
14. Housing Society Management System | ICT Project Page | 14
Maintenance System:
DATA CAPTURE POINT
The maintanence system is automated wherein members can send requests
for repairing or replacement. The administrator views the request and appoints
a person to handle the request.
15. Housing Society Management System | ICT Project Page | 15
Event Management System:
DATA CAPTURE POINT
The above diagram displays the process flow for event management system.
Every event organised is published on the website and an email notification is
sent to all members in the society.Members are required to register for the events
they would attend.
16. Housing Society Management System | ICT Project Page | 16
Entity-Relationship Diagram:
The diagram above presents the Entity-Relationship model, used for designing
the system. The ER diagram contains Entities,Attributes and Relationships. The
diagram above contains seven entites. Relationships between the entities can be
One -to-One ,One-to Many or Many-to-Many. The relation between members and
flats, lease and members is one to one, and the relation between facilities and
members is many to many. Each Entity has multiple attributes which describe
the entity. The ER diagram designed is used for building the system.
17. Housing Society Management System | ICT Project Page | 17
Database Schema:
Database schema:The database schema is designed based on the relationships
determined in the ER diagram.Figure above displays relations between tables in
the database.The model makes it easier to setup the model.Schema builder is
used for modelling data ,it provides drag and drop funtionality with the help of
which objects can be created easily.
18. Housing Society Management System | ICT Project Page | 18
Implementation of Architecture:
There are two different views of the application. The first is the administrative
view given to the society management which has all the rights related to all the
objects in the application. The other is the User view given to the tenants living
in the society and has limited privileges and access for the application.
Custom fields, different data structures, workflows, validations, etc. are
described for each custom object built for the application.
Users:
1) Society Owner (Admin), 2) Tenants
Admin Home Page & Structure:
Some of the screenshots given below are from the Admin login.
The following are the custom objects created for the society management
application. We have used the contact (for event registration) default objects and
adapted them for the society management use.
This is the view of Admin’s frontend custom objects, which shows all the
objects created for the application.
19. Housing Society Management System | ICT Project Page | 19
The below home page of the admin login shows recent activity, dashboard and
calendar for event schedule.
The admin’s home page also shows all the request raised by the users for
approval, where admin can take a decision to approve or reject based on the
schedule of all requests.
To see the users, request in details, admin needs to click on the individual
request. Below is the request view from the admin’s home page, where admin
can accept or decline the request.
20. Housing Society Management System | ICT Project Page | 20
The above diagram shows the status of the maintenance issue as pending and
after the issue is approved by the admin the status will show approved as
shown below.
21. Housing Society Management System | ICT Project Page | 21
For a quick view, various graphs can also be seen on the home page which is
from the dashboard tab on the admins portal.
Tenant Home Page & Structure:
The screenshot given below shows the permissions given to the tenants.
The tenants have restrictions for the objects they can or cannot see. The
screenshot given below shows that a tenant cannot view information regarding
other tenants and does not have access to reports and dashboards. Even
though a tenant can see a flat, he cannot create a new one. It can only be
created by the admin.
22. Housing Society Management System | ICT Project Page | 22
The screenshot given below shows a maintenance issue from a tenant’s view.
Only the admin can approve/reject these issues.
Standard Objects
Articles are database tables that enable us to store information explicit to the
association in salesforce. The followings are the objects used for the project
implementation.
Flats
This is the first custom object from the admin’s view and the screenshots show
the flow object from viewing of the flat to creation and adding tenants to the
flat. The below image show the fields used for this object.
23. Housing Society Management System | ICT Project Page | 23
The below screenshot is the admin’s view for the Flat object.
The screenshot given below describes the view that comes up after clicking on a
“New Flat”. The various fields are type, status, floor and wing which are all
picklists. There are 3 types: 1 BHK, 2 BHK and 3 BHK. The status can either
be booked or available. There are 6 floor in each wing and there are 5 wings
from Wing A to Wing E.
After saving the details, the price field comes up and it is an automatic formula
field dependent on type of the flat. New tenants can also be added as shown in
the figure below.
24. Housing Society Management System | ICT Project Page | 24
The figure below shows another flat which already has a tenant. Here admin
can see all the records of tenant’s history, facilities used, raised tickets for
maintenance and society related issues.
25. Housing Society Management System | ICT Project Page | 25
The tenant name of the flat details page redirect to the details of the tenant.
This is due to the lookup field used in the tenant object for flats.
Tenants
This is the next custom object used for this application. The image below
shows the fields and validation rules used for this object.
The image below is the admin view of the tenant’s object. It is a list of the
already existing tenants in the society and the respective flat numbers. The
object can create new tenants and assign flats to the tenant.
26. Housing Society Management System | ICT Project Page | 26
Almost all the fields are mandatory, which need to be filled while adding a new
tenant. A lookup field for the flat is used in this object as shown below.
The figure below shows the validation for the phone number being triggered as
it is not a 10-digit number.
27. Housing Society Management System | ICT Project Page | 27
Note that in the below figure, age and tenant since(months), are formula fields
and are calculated according to the data entered while creating a record.
Facilities:
Approval process in the setup has been used for this object.
All requests for facilities can be viewed by admin. Admin can see all the details
like tenants Name, his flat no., type of facilities he is requesting for, phone
number and the requested data with time. To make sure for the easy
management this view is very helpful.
28. Housing Society Management System | ICT Project Page | 28
Requesting a new facility: Admin also has the authority of booking a facility
for any guests or on special request of a tenant (in case his user access is not
working).
Form filled has to be submitted for approval. The below figure shows the admin
view of the request before approving or rejecting.
29. Housing Society Management System | ICT Project Page | 29
Below figure shows the user’s view after approval for his requested facility.
Society related issues:
A workflow has been created in this object. When a tenant creates a new issue,
a mail is sent to the tenant and the admin regarding this.
The image below shows the workflow created for it.
30. Housing Society Management System | ICT Project Page | 30
The below society related issue screenshot shows the tenants view, just to
spread awareness tenants can also view all the society related issues.
If a tenant wants to raise an issue regarding the society, issue name is the
mandatory field additionally he can add description and flat number is optional.
As this tab is for the society flat number is not mandatory. Anyhow admin can
see who have raised the issue from his portal. Below screenshot shows the
tenants view when a tenant creates a new issue.
Below screenshot shows filled form from the admin’s view. This issue raised by
the tenants can be then acknowledged by the admin. After successfully resolving
the issue admin can close the case. Moreover, society can also any raise issue to
spread awareness amongst the tenants.
31. Housing Society Management System | ICT Project Page | 31
After successful resolving the issue, when admin clicks on the resolve button,
as shown in the screenshot; an auto generated email triggers and sent to the
respective tenant.
Screenshot of the email notification sent to the tenant after successfully
resolving the issue.
32. Housing Society Management System | ICT Project Page | 32
After the issue is solved in reality, the admin can edit it and mark it as solved
as shown below. This is the admin view for all the society related issues; which
are raised by tenants with brief, issue resolved section, issue raised by tenant,
flat number and the record id Some of the issues out of which only one is
solved.
Maintenance Issues
This is the next object in this application. An approval process from the setup
has been used for this object.
Below screenshot is the admin’s view for the maintenance issues, where admin
can see all the issues raised by the tenants with flat number, type of issue i.e.
replacement or repair, detailed issue, and the ticket created by tenant (with
data and time).
The new issue tab opens a window where tenant can register the complaint
regarding the issue they are facing and can suggest a preliminary suggestion to
resolve the issue. As shown below all the fields are mandatory which needs to
be filled in order to raise a complaint.
33. Housing Society Management System | ICT Project Page | 33
As soon as tenants submits a complaint which is shown below, tenants can
recheck the ticket before sending issue for approval from admin, and needs to
wait for admins feedback.
As mentioned in the above screenshot, after submission an email is triggered to
the admin regarding the ticket created. The below tenant’s complaint ticket
shows the status as pending, where tenant’s needs to wait for an
acknowledgement from the admin.
Below screenshot shows the email notification which has been sent to the
admin.
34. Housing Society Management System | ICT Project Page | 34
Admin needs to click on the quick access email link to check ticket raised from
the tenant. The quick access issue link redirects admin to the salesforce ticket
where only the admin has the right to approve or reject it.
If admin thinks the issue is repeated or not the realistic one, based on the
decision making, if admin rejects the ticket. The below status can be seen on
the user’s maintenance ticket.
35. Housing Society Management System | ICT Project Page | 35
Event Registration:
The contact object has been used for event registration. People from outside the
society can register via a web page whereas the tenants can register from the
event object itself. A visual force page has been used to meet the requirement of
the project of integration and capture of data from the web. The link for the
page below is:
https://hsocietymanagement-developer-edition.eu19.force.com/contactcreate
The following web page is showed after successful Registration:
As soon as any one registers from the link, for example “Conor McGregor” has
registered for the society event as shown in the above screenshot; the
registered person’s name gets reflected in the admins database which is shown
in the below screenshot. With the help of this the admin can keep a track of the
people registering for events.
36. Housing Society Management System | ICT Project Page | 36
The tenants do not require any registration link; they can easily register for the
same event directly from the sales force portal. The screenshot for event
registration is shown below.
The admin can view all the registrations for the events on his portal which is
shown in the below screenshot.
37. Housing Society Management System | ICT Project Page | 37
Lease Renewal
The process of sending a reminder to the tenant that the lease is about to end
has been implemented using a workflow. The condition set is that if the tenant
has completed 11 months of the tenure then the email reminder will be sent.
The image below shows the workflow and criteria.
The image below shows the mail sent to the admin and the tenant.
38. Housing Society Management System | ICT Project Page | 38
Analysis and Dashboards:
The screenshot provided below shows the home screen of the dashboards tab.
It is a visual representation of the entire work flow.
This dashboard displays the number of issues raised by a particular apartment
through the salesforce application. For example, flat A103 has two issues
related to gas supply and vacuum cleaner. Thus this dashboard uses two
objects i.e flats and maintenance issues.
39. Housing Society Management System | ICT Project Page | 39
The following dashboard displays the status of all the apartments in the
housing society, are the apartments booked or vacant/available for booking.
With the following dashboard the admin can keep a track of the number of
users accessing the application time to time.
40. Housing Society Management System | ICT Project Page | 40
The following dashboard displays the percentage of people complaining about
the society related maintenance issues.
The following dashboard shows the graphical representation of the facilities
used by the society members.
41. Housing Society Management System | ICT Project Page | 41
This dashboard gives information about the type of solution the tenant expects
for the maintenance issue raised.
42. Housing Society Management System | ICT Project Page | 42
Teamwork
The project work was equally divided between the group members to achieve
various objectives starting from the project planning, implementation in
Salesforce to the Report writing.
Sr no. ICT Team Student ID Contribution
1 Niraj Shah X18139108 25%
2 Preeti Sakav X18133592 25%
3 Shrikant Samarth X18129137 25%
4 Kaustubh Albur X18136567 25%
References
company, A. S. (2019, April 20). balancedscorecard. Retrieved from www.balancedscorecard.org:
https://www.balancedscorecard.org/BSC-Basics/Strategic-Planning-Basics
Hayden, C. (2019, October). https://moodle.ncirl.ie/course/view.php?id=1862. Retrieved from
www.moodle.ncirl.ie: https://moodle.ncirl.ie/course/view.php?id=1862
Ireland, 2. O. (2018, july 9). Dublin Housing Observatory. Retrieved from Ordnance Survey Ireland:
https://www.osi.ie/blog/dublin-housing-observatory/
https://www.youtube.com/watch?v=YsW8EOtjHGQ&feature=youtu.be
https://www.youtube.com/watch?v=d4m8MNL2DqU
https://www.youtube.com/watch?v=GKa3ffDpsyI&feature=youtu.be
https://www.youtube.com/watch?v=t2gkUcpug-Y
https://www.youtube.com/watch?v=1Z74Oopvekw&feature=youtu.be
https://www.youtube.com/watch?v=Dcx_ufCpDmQ&feature=youtu.be
https://www.youtube.com/watch?v=Bxbu18wfPdA&feature=youtu.be
https://www.youtube.com/watch?v=iCLewiabH7Q&feature=youtu.be