The document outlines the methodology for developing an inventory management system for CBST External Studies Center Supply Office. It discusses the functional and non-functional requirements including performance, information, economic, control, efficiency and service requirements. It also defines the business and technology constraints of the proposed system. The system will automate the inventory processes to track inventory levels in real-time and generate reports. It will allow authorized users to view inventory information through a secure login. The study aims to enhance the inventory management processes at the Supply Office.
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...JON ICK BOGUAT
All Copy Right Of JOnick Boguat DIT ,
This is my Full Document for my Thesis Project Last 2014
This is all purpuse is only for educational ....
-:) HAPPY CODE EVERYONE--
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...JON ICK BOGUAT
All Copy Right Of JOnick Boguat DIT ,
This is my Full Document for my Thesis Project Last 2014
This is all purpuse is only for educational ....
-:) HAPPY CODE EVERYONE--
My project Hospital Management System include registration of patients,storing their detail into the system and also computerized .My software has the facility to give a unique id for every patient and store the detail of every patient and doctor automatically. User can search availability of a doctor and the details of a patient using the id.
this is project report for library management system
this softwere made by himanshu chauhan .
in my project use language C# .net window form application.
this project subbmited to chinmaya degree college haridwar for any problem u can contact me 8650434350
Pharmaceutical store management systemTushar Dalvi
Developed online in-house Application for Pharmacy Management. Used Salesforce as CRM software to develop login Form, customer inquiry Form, and other various forms, also used HTML & CSS for Webpage Designing.
Library Management System Project in PHP with BlackBook & Source CodeRadikhaSharma
Library Management System in PHP & AngularJS source code & documentation can be downloaded from https://www.library-management.com/. This project can be used by MCA,BCA,CSE,BSC-IT & others IT students. I don't hold the rights of this source code or this document.
This is a part of the report I created during performance evaluation of Desktop Support operations, I undertook this project during my summer internship. this is an on-going project where currently I am working on the implementation of the recommendations I made. A brief description of this project is provided under "Summer Internship" Experience.
My project Hospital Management System include registration of patients,storing their detail into the system and also computerized .My software has the facility to give a unique id for every patient and store the detail of every patient and doctor automatically. User can search availability of a doctor and the details of a patient using the id.
this is project report for library management system
this softwere made by himanshu chauhan .
in my project use language C# .net window form application.
this project subbmited to chinmaya degree college haridwar for any problem u can contact me 8650434350
Pharmaceutical store management systemTushar Dalvi
Developed online in-house Application for Pharmacy Management. Used Salesforce as CRM software to develop login Form, customer inquiry Form, and other various forms, also used HTML & CSS for Webpage Designing.
Library Management System Project in PHP with BlackBook & Source CodeRadikhaSharma
Library Management System in PHP & AngularJS source code & documentation can be downloaded from https://www.library-management.com/. This project can be used by MCA,BCA,CSE,BSC-IT & others IT students. I don't hold the rights of this source code or this document.
This is a part of the report I created during performance evaluation of Desktop Support operations, I undertook this project during my summer internship. this is an on-going project where currently I am working on the implementation of the recommendations I made. A brief description of this project is provided under "Summer Internship" Experience.
Double entry document, Analysis and DesignMohsin Yaseen
The main focus of this document is to explain
1. How double entry system works,
2. Manual workflow,
3. Reports required,
including its analysis and engineering
4. Data Flow Diagram,
5. ER Diagram,
6. Tables and Data Structures,
7. Menus, Forms Designing (List and Edit View) and Workflows
8. Architecture Design.
Portfolio: http://be.net/myasinr
Wordpress: http://mohsinpage.wordpress.com
Linkedin: http://pk.linkedin.com/in/rmyasin
Twitter: http://twitter.com/moshsin
Facebook: https://www.facebook.com/pages/Mohsin-Page/180815835319473
Seu purchase requisition management systemSaifur Rahman
This project is based on purchase module. It has features of create requisitions , multi-level approval system, order cretion, recieving, different reports etc
Transforming a Paper-Based Library System to Digital in Example of Herat Univ...Abdul Rahman Sherzad
Resourceful libraries have long attracted knowledge-seekers and have played an important role in education and research. With the astonishing advances in science and technology, traditional libraries have not remained unaffected and the concept of digital library has emerged and caused a revolution in these old institutions. A digital library can provide access to many of the information networks around the world, which is a necessary component of almost any research experience today.
Considering the facilities associated with a digital library, gradual replacement of traditional libraries by digital ones appears to be inevitable. As an important step in enhancement of education in Afghanistan, the concept of digital libraries must be introduced and integrated into the country’s rapidly evolving educational system.
This thesis addresses the challenges existing in Afghanistan university libraries. A solution for each challenge is defined by introducing digital and automated systems and finally a scheme is provided for switching from a paper-based library system to a digital library system.
Internship project - Disability compensation using new technologiesWassimELBOURI1
The present work, done within Ericsson France as a graduation project, is in the purpose of obtaining my Resarch Master diploma in "Advanced Wireless Communications Systems" from CentraleSupelec and my Engineering diploma in Telecommunications from the High School of Communications of Tunis.
The aim of this work is to afford a global solution, based on new technologies, for autistic persons to help them have a normal life.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Online supply inventory system
1. TABLE OF CONTENTS
Title Page Pages
Abstract i
Acknowledgment ii
Declaration iii
Chapter I: Introduction
Statement of the Problem.............................................................................................. 1
Objectives..................................................................................................................... 1
Project Concept.............................................................................................................2
Project Vision................................................................................................................2
Relevance of the Study................................................................................................. 3
Scope and limitation.......................................................................................................3
1.6 Definition of terms........................................................................................................4
Chapter II: Review of Related
Literature.........................................................................
Chapter III: Methodology
Setting of the Study.......................................................................................................5
Requirements Definition................................................................................................5
Functional Requirement ................................................................................5
Non-Functional Requirement........................................................................5
Performance Requirement..............................................................5
3.2.2.1.1 Hardware and Software Requirement............................6-8
Information Requirement............................................................... 9
Economic Requirement..................................................................9
Control and Security Requirement..................................................9
Efficiency Requirement.................................................................10
Service Requirement ....................................................................10
Business Constraints....................................................................................................10
Technology Constraints ...............................................................................................10
Project Strategy............................................................................................................10
Chapter IV: Presentation, Analysis and Interpretation of Data
4.1 Justification of the Proposed System..........................................................................11
4.2 Proposed Organizational Chart ...
….........................................................none
Proposed Context Level Diagram...............................................................................11
Proposed Diagram 0...................................................................................................12
Child Diagram.......................................................................................................13-14
Entity Relation Diagram (ERD) ................................................................................ 15
Data Flow Diagram...............................................................................................16-17
2. Database Design...............................................................................................................................18
Data Dictionary............................................................................................................19
Process Specification Format....................................................................................20
Proposed Implementation Code................................................................................20
Chapter V: Project Feasibility
Technical Feasibility.......................................................................................................... 21
Economic Feasibility..........................................................................................................21
Operational Feasibility.......................................................................................................22
Legal Feasibility.................................................................................................................22
Schedule Feasibility...........................................................................................................22
Chapter VI: Financial Feasibility and Cost Benefits Analysis
Existing Operational Cost (Supplies and Materials Annually)..........................................23
Proposed Operational Cost (Supplies and Material) ......................................................... 23
Annual Benefits and Development Cost ...........................................................................24
Payback Period ..................................................................................................................24
Appendix A
1. Time Table.................................................................................................................... 38
2. Gantt Chart ...................................................................................................................38
3. PERT Diagram...............................................................................................................39
4. Flow Chart..............................................................................................................40-44
5. Screen shots.............................................................................................................45-48
6. Sample Coding ….……………………………………………………49-97
Appendix B
1. Summary........................................................................................................................99
2. Conclusion.....................................................................................................................99
3. Recommendation...........................................................................................................100
4. Definition of Terms. ......................................................................................................100
5. Bibliography..................................................................................................................101
3. Abstract
Inventory Management System is important to ensure quality control in
businesses that handle transactions revolving around consumer goods. Without proper
inventory control, a large retail store may run out of stock on an important item. A
good Inventory Management System will alert the retailer when it is time to reorder.
Inventory Management System is also an important means of automatically tracking
large shipments. For example, if a business orders ten pairs of socks for retail resale,
but only receives nine pairs, this will be obvious upon inspecting the contents of the
package, and error is not likely. On the other hand, say a wholesaler orders 100,000
pairs of socks and 10,000 are missing. Manually counting each pair of socks is likely
to result in error. An automated Inventory Management System helps to minimize the
risk of error. In retail stores, an Inventory Management System also helps track theft
of retail merchandise, providing valuable information about store profits and the need
for theft-prevention systems.
Automated Inventory Management System work by scanning a barcode either
on the item. A barcode scanner is used to read the barcode, and the information
encoded by the barcode is read by the machine. This information is then tracked by a
central computer system. For example, a purchase order may contain a list of items to
be pulled for packing and shipping. The Inventory Management System can serve a
variety of functions in this case. It can help a worker locate the items on the order list
in the warehouse, it can encode shipping information like tracking numbers and
delivery addresses, and it can remove these purchased items from the inventory tally
to keep an accurate count of in-stock items. All of this data works in tandem to
provide businesses with real-time inventory tracking information. Inventory
Management System make it simple to locate and analyze inventory information in
real-time with a simple database search.
4. Acknowledgement
Any accomplishment requires the effect of many people and this work is not
different. At first I remain ALLAH. All praises to ALLAH for allowing us in
presenting our project. I want to thank all the teachers of CBST & our honorable
Principal, CBST. Special Thanks to my project Supervisor Engr. Arifa Sultana, Sr.
lecturer and Head, Department of Computer Science &Engineering (CSE), CBST.
Without her guidance and technical help it was completely impossible to carry out the
project work. I cannot forget the contribution of Md. Imran Ali Lecturer, department
of CSE. She has provided her encouragement and technical support to me. I have to
think those who helped us for solving problems and asking for more and more
features. Thanks to all libraries and staff those gives permission to access and read
many books about this system. Grateful acknowledgment is made to computer Lab
Assistant for giving to install required software and use the computers. Finally, I wish
to thanks to my parents and friends without whom I would not have been able to make
out this place.
Name: Arman Ahmed
Registration: 00001112394
Session: 2011-2012
5. Declaration
I, hereby, declare that the work presented in this project is the outcome of the
Investigation performed by me under the supervision of Engr. Arifa Sultana, Sr.
Lecturer and Head, Department of Computer Science & Engineering, College of
Business Science &Technology (CBST). I also declare that no part of this project and
there has been or is being submitted elsewhere for award of any degree.
Countersigned
(Engr. Arifa Sultana)
Supervisor
Signature
Exam Roll No: 1112394
Student
7. Introduction
Inventory system deals primarily with determining the size and placement of
the materials within a facility or within multiple locations of a supply chain
network. It is also concerned with the importance of forecasting the required
inventory, availability of physical space, and cost in carrying those inventories to
maintain the planned course of production against the random fluctuations, or
shortage of materials. One way of managing inventory is to have a web-based
system in place that can instantly track and update the information about the tools
or equipment.
The importance of implementing a web based inventory system is becoming
vital as most of the time the information are accessible instantly, thereby making
the details of the usage of the equipment available, and improving the movement
and anticipation of their demand as well as the productivity of the system as a
whole. The implementation of this web-based inventory system can help
institutions develop the skills to cope with their operational environments. Because
lack of system tool to be used to monitor the availability and quantity of materials
in this university.
8. Statement of the Problem
General Problem:
CBST External Studies Center Supply Office Inventory System is using
manual system on the inventory of all the properties of university.
Specific Problem:
They are using MS Excel in their inventory to record the properties of the
university.
They could not easily track down the properties of the university.
Redundancy in entering items.
It takes much time in making their inventory
Objectives
General Objectives
To develop an efficient and fast computer-based inventory system in
CBST External Studies Center Supply Office.
Specific Objectives
Shorten data-processing time
In processing the inventory, it will not consume enough time to process.
Reduce errors
Through this system, fewer errors will be avoided because the system will
be easy to use.
Improve the accuracy ofinput
It will help the user to avoid mistakes regarding the data that they will give
to the clients. There will be accurate information.
9. Give information easily and efficiently
It will make easier for the user to give information to the faculty.
Data integrity
It gives users the assurance that the information they see is trustworthy.
Data security
It ensures that data is kept safe from corruption and that access to it is
suitably controlled. Thus data security helps to ensure privacy. It also helps
in protecting personal data.
ProjectConcept
The proponents have come with the idea of the project because many of the
faculties in CBST External Studies Center have observed that the Inventory system
rely on manual process of giving information on the properties of the university.
Many of the faculties also observed and complained that the processing of their
information is time consuming.
Then the proponents have decided to propose a computerized information
system in the Supply Office of CBST External Studies Center, Mymensingh
Oriental in order to improve and develop their system and to track the properties of
the university more responsive to the needs and desires of the faculties.
ProjectVision
The CBST Supply Officer wants to make the inventory system more
responsive to the needs and desires of the faculties by making manual system a
computerized one. They want to have a system that will help reduce files, paper
works and delays in computer processing.
The system could provide limited access to ensure data security and the data
is protected. They also recommended to effectively and efficiently tracking the
properties of the college.
10. Relevance of the Study
Nowadays, institutions particularly at CBST External Studies Center,
Mymensingh Oriental are looking for improvement of the Supply Office for
their system to reach and achieve their goals and objectives as successful
institutions. The relevance why the proponents have to conduct the study is:
To understand how institutions work to design an appropriate computerized
system
To enhance the service offered by the institutions
This study will be advantageous not only to the management but also for the
faculties and staffs and individuals involved in their information. This includes the
following:
Faculties/Staffs - this will help minimize their tasks and speed up the
processing of information.
Management – through this system study, the management will be able to
evaluate or assess the performance of the currently used system and be able
to find out the common problems that arise.
Scope and Limitation
This study limits only in the process of inventory system of the CBST
External Studies Center supply office which is located at Mymensingh Oriental.
The possible people that can use the system would be the following:
11. Principal- the center administrator of a school. He has the authority to
operate the system; he can open it if he has transactions to do.
Supply Officer – the person assigned to manage the properties of the
university; he/she have also the authority to operate the system; he/she is the
one that will make the inventory of the property of the university.
Other people that would be given the authorization.
Definition of Terms
Inventory- is the process of making an itemized list of supplies on hand.
Inventory system- is the system of recording the properties of the school in
supply office
Faculty’s information- faculty’s background
Data loss-refers to the unforeseen loss of data orinformation.
Data Security- extrusion prevention is the practice of stopping data leakage
by filtering outbound network traffic. The practice protects sensitive digital
assets from unauthorized transfer by stopping the movement of packets
across the network. Extrusion detection, by contrast, simply alerts an
administrator to a potential issue.
Data Integrity- refers to the validity of data, meaning data is consistent and
correct.
13. Keeping records and inventory numbers by paper are a thing of the past.
With doing that you can't have up to date accurate numbers and by not having up to
date accurate numbers it can make your day a little more challenging then it
normally should be. In today’s society everything is about the now, and with the
now comes new technology. We all know that paper records are not anything new it
is an old habit that needs to be broken.
CBST Supply Office is an office which is a part of the school that supplies
books and other supplies that the school needed.
Since CBST Supply Office has a computer which they use to make
inventories using MS Excel, we offered them our proposal of improving their
inventory method. We call our project proposal “Advance Inventory System”
because the office already have already a computerized system, as mentioned earlier.
Using MS Excel in doing inventories is much like doing it on paper but it is much
easier because you won’t be writing on a bunch of papers.
An inventory system is a complete system that performs functions such as
transactions (borrowing of books/supplies). For the reason the system guides them
through the creation of faculty list, supplier list, book and supplies list. The system
can track down supply items, remaining stocks and incoming stocks.
15. Setting of the Study
The study was proposed for the inventory transaction of the Supply Office
of CBST External Studies Center located at Mymensingh Oriental.
Requirements Definition
Functional Requirement
There are several functions that are included in the system to satisfy the needs
of the university. Some of these are as follows:
The proposed system is intended for inventory purposes. Thus, it can
perform different processes included in the inventory. It will be able to
monitor the supply of a certain items; the newly ordered items will be added
to the current stocks and for the outgoing stocks that can be subtracted from
the current stock. Therefore, the university will able to track the item/supply
that are running out of stock and thus prepare order. It can also monitor
faculty’s orders, and purchases from supplier.
Non – Functional Requirement
Performance Requirement
The system would require the hardware and software
specification stated below to maximize its performance. If the
specified requirements are not provided by the university, the system
will not satisfy the institution expectation on the system.
Aside from the hardware and software specification, the
system also requires a user that is capable of navigating the system
well. And it’s not necessary that the user types very fast, even if it is
just the average speed as long as it can manage the system
well.
16. Hardware and Software Requirement
The proposed system will work on Firefox V5.3 or
higher, Google Chromev1.3.21.111 or higher and Internet
Explorer 7 or higher running under Windows Operating System.
Software Requirement
The system requires a minimum of Windows XP or higher than
Windows 10.
Hardware Requirement
Minimum of 20 GB hard disk or higher
256 MB memory or Higher
Intel Pentium 4
Monitor
Mouse
Keyboard
Power Supply
Alternating Voltage Regulator(AVR)
Printer
Modem
17. Information Requirement
The specific inputs are required by the system in order to
perform it functions well. Some information is necessary to provide
and to gain desired output.
Information like faculties name, address, contact number, etc.
are required by the system to recognize the authorized persons that can
use the system in institution. Item ID, item name and other information
about the item is also necessary. Faculty id, name, position, designated
room, etc., item code name are also needed. There are should be unique
identifier of each item, supplier, faculty, user, etc. because the identifier
will be the one that will set a difference among all other data.
Most of the data are stored in the system itself, but some of it is
kept manually for the purposed of the institution.
Economic Requirement
If the proposed system will be implemented, university will need a set
of computer to be used. But since the institution already have an
existing one, it would be their decision it they would buy a new one.
They will need to provide a budget for bond papers and ink/ribbon for
printing purposes.
Control and Security Requirement
Security and control over the data is necessary in creating a
system. This is to minimize issues of unauthorized data manipulation
and data loss.
The researcher would set constraints for security purposes. A
unique username and password will be providing to authorize
personnel in the institution. This will appear at the start-up of the
system.
Through these constraints, the institution will have control over
the confidential information/data.
18. Efficiency Requirement
The proposed Inventory System has the ability to produced
output with minimal waste. Accurate/appropriate inputs coming
from the user of the system are required so that the system can work
efficiently. These inputs would be the basis of the output of the
system.
Service Requirement
Since the system will provide limited access only for security
purposes, only the person with the username and password can
access the system. These people would be the one who will enjoy the
service that the system will be giving such as performing inventory
functions.
Business Constraints
The proposed system is intended to create a system that can perform inventory
functions only. It cannot perform other system like point of sale, preparing
accounting and other processes not related to tracking and inventory functions. The
system can only process transaction involving inventory.
Technology Constraints
The system cannot perform with multi-user because is only good for one user at
a certain period of time since it is located in the office where limited person can
enter. The system is not web-based thus; on-line accessing of data/information
cannot be applied.
Project Strategy
The researcher used a phased approach to analysis and design which holds that
system is best developed through the use of specific cycle of analysis and the user
activities. This approach is called System’s Development Life Cycle. This approach
has 7 phases that the researchers used as a part of their project strategy.
20. Justificationof Proposed System
The supply online inventory system is designed with the hands-on approach.
Based on the actual interviewed, initial visits to the supply office that we’re made
and meetings with the supply officer. Data regarding fixed assets, hand tools, and
consumables were collected from the respective supply office. We analyzed the
collected data to determine some important aspects of the research. As a beginner,
we gathered hardcopy of the available record items that we can use to develop the
system, and any unnecessary data will be recorded and necessary action could be
taken.
ProposedOrganizational Chart NONE
ProposedContextLevel Diagram
The context diagram shows the flows of data and supplies where it goes in
and out. The supply office will receive the delivered items and supply information
from the supplier. The supply officers will all the purchased items to the supplier.
After they received the supplies they record all the information to the system and
distribute it to the faculty. If there is a request form the faculty, the request will go
to supply office and the supply officer will be the responsible what will be the items
to purchase. And also the system will generate report.
Item Information
Payment
2
InventoryReports
Purchasing Online Supply
Inv entory Sy stem
Send Request
Returned Item
Release Supply
1
Accessto Internet
Internet
Supplier
Report
Faculty
21. ProposedDiagram0
Diagram 0 shows the expanded context diagram. It shows the whole
process that is occurring in the system and the entities connected to each
process, from the requesting of supplies, producing management reports,
checking requested supplies returned, purchasing and receiving new
supplies from suppliers.
Child Diagram
22. d1 Request Master file
Receiving Item from supplier
Return Euipt. Info 1
Get Equipt. info
Lists of Equipt. 2
Update Supply
Record
Management Report
Reciept of Lost Items
Equipt.
Return
3
Get Reciept
of lost
items
Generate Management Report
d1
Update Supplies
Master file
1 2
Return Euipt. Info Lists of Equipt.
Get Equipt. info
Record Return
Equipments
Lists of Returned Equipt.
23. Returned Equipment
Request Item
d1 Request Master file
3
record item
request
Item information
Send request
1 2
Request item Lists if item
Get request Access to
item Internet
28. Data Dictionary
A data dictionary is a collection of descriptions of the data
objects or items in a data model for the benefit of programmers and
others who need to refer to them or the dictionary of data is at a time
the pillar of work and the result of research and analysis of data. It is
just like a depicted picture of the entire work. This dictionary of data
defines all categories of data or data types, brief the all essential
information about the software is included.
TABLE FIELD DESCRIPTION TYPE CONTRAINTS
USER User_id User identification Integer Primary Key
Username Name use by user Varchar Not null
Password Password of the
user
Varchar Not null
USERTYP
E
Utype_id Usertypeidentificati
on
Integer Foreign key
Admin Administrator Varchar Not null
User Authorized user Varchar Not null
CATEGOR
Y
Cat_id Category
identification
Integer Primary Key
Item_name Item Identification number Foreign key
ITEM Item_id Item identification Integer Primary key
Supplier_id Supplier
Identification
number Foreign key
Item_name Name of the item Varchar Not null
Brand Brand of the item Varchar Not null
Price Price of the item Varchar Not null
Quantity Quantity of the item Varchar Not null
Unit_id Unit identification Integer Foreign key
Itype_id Item type
identification
number Foreign key
Cat_id Category
identification
number Foreign key
PO Purchase_id Purchase order
identification
Integer Primary key
Supplier_id Supplier
identification
number Foreign key
Item_id Item identification number Foreign key
Brand Brand of the item Varchar Not null
Quantity Ordered quantity Varchar Not null
unit Item unit Varchar Not null
Price Item price Varchar Not null
UNIT Unit_id Unit identification Varchar Primary key
29. Unit_name Name of the unit Varchar Foreign key
ITEM
TYPE
Itype_id Item type
identification
Varchar Primary key
Type_name Item type name Varchar Foreign key
RECEIV
ED ITEM
Recieveditem_id Received item
identification
Varchar Primary key
Po_id Purchase
order
Identificatio
n
Varchar Foreign key
Quantity Quantity of the
received item
Varchar Foreign key
REPORT Report_id Report identification Varchar Primary key
Item_id Foreign key
Date_reported Varchar Foreign key
BARROW
ED ITEM
Bar_id Barrowed
identification
Integer Primary key
Item_id Item identification integer Foreign key
Person_barrowed Person barrowed the item Varchar Foreign key
Deparment Department Varchar Foreign key
Position Position of the person Varchar Foreign key
Item_type Type of item Varchar Foreign key
Cat_id Category
identification
integer Foreign key
Itype_id Item type
identification
integer Foreign key
Date_barrowed Date the item
barrowed
Varchar Foreign key
Date-returned Date the item returned Varchar Foreign key
SUPPLIER Supplier_id Supplier identification integer Primary key
Supplier_name Name of the supplier varchar Foreign key
Address Supplier address varchar Foreign key
Contact_person Person to be contact varchar Foreign key
Contact_number Contact number varchar Foreign key
email Supplier email varchar Foreign key
REQUE
ST
ITEM
Requestitem_id Request
item
identificat
ion
integer Primary key
Item_name Name of the item request varchar Foreign key
quantity Quantity of the
request item
varchar Foreign key
User-id User identification integer Foreign key
RELEASE
ITEM
Release_id Release identification integer Primary key
Item_id Item identification integer Foreign key
Employee_name Name of the
employee
varchar Foreign key
department Department of
the employee
varchar Foreign key
30. position Employee position varchar Foreign key
Date_released Date the item released varchar Foreign key
ProcessSpecificationFormat
Process specification format shows how the specific process
begins and where it ends. If the user attempt to login and it is granted
the system will let her/him view the main form and the content of it but
if he/she fails, the system will go back to the login form.
ProposedImplementation Code
Database
A new database is created and SQL code written, defining
tables, attributes and relationships.
HTML
HTML rather straightforward and it is pretty simple to create a
tag or two and throw some text in. It is great to create a online Web
page. There’s much more to building a web page than just creating a
couple of tags and adding some text.
CSS (Cascading Style Sheet)
Once the main structure is ready, CSS code needs to be written
to add styles to the application.
Server-side language
Implementation of application class, application functions, DB
interactions and queries requires a server-side interaction.
JavaScript
Implementation of Ajax features (drag and drop, animation
effects, etc.) is done using the framework chosen in the Design phase
(Query, Scriptaculous, MooTools).
PHP has been employed as a development language and My
SQL as a backend database with CSS implemented for the interface
having a scope of modification to suit user requirement.
Start Grante
d
Yes End
No
Login Main f orm Reports
User Entry Av ailable Items Supplier Receiv eItems Items Purchase
Order
Barrowed Items Report
32. Technical Feasibilities
Technical feasibility centers around the existing computer system (Hardware
and Software etc) and to what extend it support the proposed addition. For example,
if the current computer is operating at 80 percent capacity - an arbitrary ceiling -
then running another application could overload the system or require additional
Hardware. This involves financial considerations to accommodate technical
enhancements. If the budget is a serious constraint, then the project is judged not
feasible. In this project, all the necessary cautions have been taken care to make it
technically feasible. Using a key the display of text/object is very fast. Also, the
tools, operating system and programming language used in this localization process
is compatible with the existing one.
Economic Feasibilities
Economic analysis is the most frequently used method for evaluating the
effectiveness of the candidate system. More commonly known as cost/benefit
analysis, the procedure is to be determining the benefits and savings that are
expected from a candidate and compare them with costs. If benefits outweigh costs,
then the decision is made to design and implement the system.
A systems financial benefit must exceed the cost of developing that system. i.e.
a new system being developed should be a good investment for the organization.
Economic feasibility considers the following
The cost to conduct a full system investigation.
The cost of hardware and software for the class ofapplication.
The benefits in the form of reduced cost or fewer costly errors.
The cost if nothing changes (The proposed system is not developed).
The proposed “ONLINE SUPPLY INVENTORY SYSTEM” is economically
feasible because
The system requires very less time factors.
The system will provide fast and efficient automated environment instead of
slow and error prone manual system, thus reducing both time and man
power spent in running the system.
The system will have GUI interface and very less user-training is required to
learn it.
33. Operational Feasibilities
It is the measures of how well a proposed system solves the problems and it
takes advantages of the opportunities identified during the scope definition and
problem analysis phases. CBST Supply Office has computer literate staff so they
don’t find it hard to operate the proposed system. However, they need to improve
their existing system to more accurate, reliable, secured and well-organized system.
LegalFeasibilities
Government constrains – since the proposed system is going to be
implemented in government institute, it may be subject to Rules and
regulation imposed and even funding constrains.
Copyright issues – Since the proposed system will be using open source
software there will be minimal licensing and related issues.
Schedule Feasibilities
The study of the proposed Online Inventory System of CBST Supply Office
is convenient and sensible to its time frame. Conducting personal interviews with
the Supply Officer, creating the documents, designing and developing the software
were made to finish the proposal.
35. EXISTING OPERATIONALCOST (Supplies and Equipment
Annually)
Table 1
Descripti
on
Cost
Bond Paper Php 450.00
Ballpens Php 150.00
Stapler w/ staple Php 150.00
Puncher Php 150.00
Ledger Php100.00
Paper clip Php 50.00
Pentel Pens Php225.00
Cartolina Php 80.00
Envelope Php 50.00
Folder Php 260.00
Refill ink Php 800.00
Computer Php 25,000.00
Total = Php 27,465.00
PROPOSED OPERATIONALCOST (Supplies and Materials)
Table 2
Description Price (Php) Quantity Cost
Envelope Php 20.00 2 Php 40.00
Bond Paper Php 150.00 3 Php 450.00
Paper clip Php 3.00 15 Php 50.00
Refill ink Php 100.00 8 Php 800.00
Computer Php 25,000.00 1 set Php 25,000.00
Total = Php 26,340.00
EOP = Existing
Operational Cost POC =
Proposed Operational
Cost
D = Difference between the EOP and POC
36. Formula:
D = EOP – POC
Computation:
D = Php 27,465.00 – Php
26,340.00 D = Php
1,125.00
ANNUAL BENEFITSAND DEVELOPMENTCOST
For CBST External Studies Center, we have calculated the expenses and
benefits and the previous expenses is Php27, 465.00. And our proposed expenses
are for only Php 26,340.00. Assuming an estimated six year operational life of
equipment and software, the total benefit would approximate Php 6,750.00.
PAYBACK PERIOD
The payback period is the time period required for the amount invested in an
asset to be repaid by the net cash outflow from the original investment, and is
expressed in years.
The formula for the payback method is simplistic: Divide the cash outlay
(which is assumed to occur entirely at the beginning of the project) and divide by
the amount of net cash flow generated by the project per year (which is assumed to
be the same in every year).
The second invests Php 26,340.00in a new system of inventory, and the
new system for inventory then produces cash flow of Php1, 125.00 per year, then
the payback period per year is (Php 26,340.00initial investment Php1,125.00
annual payback).
38. 1. TIME TABLE
Activit
y
Detailed activity Days required
Data gathering Conduct interviews 3
Survey/questioners 4
Read supply office reports and information 3
Introduce web based system 5
Observed reaction to the propose system 4
Data flows and decision analysis Analyze data flow 24
Designing database 18
Data dictionary 6
Entity relationship 10
Analyze system requirements 12
Proposal preparation Perform cost and benefits analysis 11
Prepare recommendation 4
Prepare proposal 4
2. GANTT CHART
40. 4. FLOWCHART
The main page flow chart shows all the choices that the user can choose from. To
start the system flow the user must logged in first before he/she can enter or access the
system. When the user finishes typing her username and password, then he/she can click
the login button to access the main page. But if he/she fails to login or his/her username or
password is incorrect, he/she will stay in the login page and he/she cannot access to the
main page.
41. Login flowchart
The login flowchart shows the process when the user enters her username together
with her password. After the user inputted his/her username and password, the system will
check if those username and password inputted correct/incorrect or if it is exists, if not then
the system will ask again for the correct username and password. If username and password
exists, then the user can access the main page and perform different transactions.
42. User Entry
flowchart
If the user is already in the user page, he/she can view the list of all available items
in the table and no the actions will display, and in the suppliers navigation he/she can
choose whatever action he/she wants to perform. And after viewing all the items the users
may now exit or logout after he/she finished what he’ll/she’ll done.
43. Supplier Entry
flowchart
Also in the supplier entry flowchart, he/she can choose or click the supplier entry
navigation and the table and all the actions will display, and he/she can choose whatever
action he/she wants to perform. And the back button let the user go back to the main page
after he/she finished what he’ll/she’ll done.
44. Stocks Entry flowchart
Also in the items entry flowchart, he/she can choose or click the items entry navigation
and the table and all the actions will display, and he/she can choose whatever action he/she
wants to perform.
50. //
// Page class
//
$default = NULL; // Initialize page object first
class cdefault {
// Page ID
var $PageID = 'default';
51. // Project ID
var $ProjectID = "{B36B93AF-B58F-461B-B767-
5F08C12493E9}";
// Page object name
var $PageObjName = 'default';
// Page name
function PageName() {
return ew_CurrentPage();
}
65. ""; // Clear message in Session
}
echo "<div class="ewMessageDialog"" .
(($hidden) ? " style="display: none;"" : "") . ">" . $html .
"</div>";
}
var $Token = "";
var $TokenTimeout = 0;
var $CheckToken = EW_CHECK_TOKEN;
var $CheckTokenFn = "ew_CheckToken";
var $CreateTokenFn = "ew_CreateToken";
66. // Valid Post
function ValidPost() {
if (!$this->CheckToken || !ew_IsHttpPost())
return TRUE;
if (!isset($_POST[EW_TOKEN_NAME]))
return FALSE;
$fn = $this->CheckTokenFn;
if (is_callable($fn))
return
$fn($_POST[EW_TOKEN_NAME], $this->TokenTimeout);
return FALSE;
}
67. // Create Token
function CreateToken() {
global $gsToken;
if ($this->CheckToken) {
$fn = $this->CreateTokenFn;
if ($this->Token == "" &&
is_callable($fn)) // Create token
$this->Token = $fn();
$gsToken = $this->Token; // Save to
global variable
}
68. }
//
// Page class constructor
//
function __construct() {
global $conn, $Language;
global $UserTable, $UserTableConn;
$GLOBALS["Page"] = &$this;
$this->TokenTimeout =
ew_SessionTimeoutTime();
69. // Language object
if (!isset($Language)) $Language = new
cLanguage();
// Page ID
if (!defined("EW_PAGE_ID"))
define("EW_PAGE_ID", 'default',
TRUE);
// Start timer
if (!isset($GLOBALS["gTimer"]))
$GLOBALS["gTimer"] = new cTimer();
70. // Open connection
if (!isset($conn)) $conn = ew_Connect();
// User table object (users)
if (!isset($UserTable)) {
$UserTable = new cusers();
$UserTableConn = Conn($UserTable-
>DBID);
}
}
71. //
// Page_Init
//
function Page_Init() {
global $gsExport, $gsCustomExport,
$gsExportFile, $UserProfile, $Language, $Security,
$objForm;
// User profile
$UserProfile = new cUserProfile();
// Security
72. $Security = new cAdvancedSecurity();
// Global Page Loading event (in userfn*.php)
Page_Loading();
// Page Load event
$this->Page_Load();
// Check token
if (!$this->ValidPost()) {
echo $Language-
>Phrase("InvalidPostRequest");
74. global $gsExportFile, $gTmpImages;
// Page Unload event
$this->Page_Unload();
// Global Page Unloaded event (in userfn*.php)
Page_Unloaded();
// Export
$this->Page_Redirecting($url);
// Close connection
75. ew_CloseConn();
// Go to URL if specified
if ($url <> "") {
if (!EW_DEBUG_ENABLED &&
ob_get_length())
ob_end_clean();
header("Location: " . $url);
}
exit();
}
76. //
// Page main
//
function Page_Main() {
global $Security, $Language;
if (!$Security->IsLoggedIn()) $Security-
>AutoLogin();
$Security->LoadUserLevel(); // Load User Level
if ($Security->AllowList(CurrentProjectID() .
'dashboard.php'))
$this->Page_Terminate("dashboard.php"); //
Exit and go to default page
94. 1. Summary
Some institutions are still doing their inventory the old way, the manual
process of recording their supplies by paper. It is a time consuming process and
could also cause other problems. The upgrading of the existing computerized
system into an advance system reduces the time in processing the inventory of the
supplies of the school. It can give accurate information in generating reports.
The data that has been collected by the proponents through the interviews
and observations that were conducted are summarized below:
The proponents have discovered that there is no data security and data
integrity in their existing system.
The Supply Officer is having a hard time in updating the inventory records
of the school.
It is time consuming in generating reports.
2. Conclusion
The objective of this project was to build a program for maintaining the
details of all Supply Order .The system developed is able to meet all the basic
requirements. It will provide the facility to the user so that they can keep tracks of
all the equipment being supplied. The management of the Inventory will be also
benefited by the proposed system, as it will automate the whole supply procedure,
which will reduce the workload. The security of the system is also one of the prime
concerns.
There is always a room for improvement in any software, however efficient the
system may be. The important thing is that the system should be flexible enough for
future modifications. The system has been factored into different modules to make
system adapt to the further changes. Every effort has been made to cover all user
requirements and make it user friendly.
95. Goal achieved: The System is able provide the interface to the user so that he can
replicate his desired data.
User friendliness: Though the most part of the system is supposed to act in the
background, efforts have been made to make the foreground interaction with user as
smooth as possible. Also the integration of the system with Inventory Management
project has been kept in mind throughout the development phase.
3. Recommendation
Future studies should look at the opportunity of implementing a standard
procedure for the procurement method as applied in the industry with view
minimizing waste in inventory. Other issues that can be further discussed are the
ability to integrate the system into faculty website, providing more accessibility to
the teachers, students and visitors to acknowledge the inventory status. Also, better
strategies are to devised for the faculty and staffs so that a more feasible procedure
is followed in the procurement practices.
4. Definition ofTerms
Inventory- is the process of making an itemized list of supplies on hand.
Inventory system- is the system of recording the properties of the school in
supply office
Faculty’s information- faculty’s background
Data loss-refers to the unforeseen loss of data orinformation.
Data Security- extrusion prevention is the practice of stopping data leakage
by filtering outbound network traffic. The practice protects sensitive digital
assets from unauthorized transfer by stopping the movement of packets
across the network. Extrusion detection, by contrast, simply alerts an
administrator to a potential issue.
Data Integrity- refers to the validity of data, meaning data is consistent and
correct.