parking and vehicle control …eprints.utar.edu.my/2665/1/fyp2_(report)_.pdffaculty of information...
Post on 04-May-2019
213 Views
Preview:
TRANSCRIPT
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR.
PARKING AND VEHICLE CONTROL APPLICATION ON CAMPUS
BY TAN YAU BOON
A REPORT
SUBMITTED TO
Universiti Tunku Abdul Rahman
in partial fulfillment of the requirements
for the degree of
BACHELOR OF INFORMATION SYSTEMS (HONS) INFORMATION SYSTEMS
ENGINEERING
Faculty of Information and Communication Technology (Perak Campus)
MAY 2017
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. i
UNIVERSITI TUNKU ABDUL RAHMAN
FACULTY OF INFORMATION & COMMUNICATION
TECHNOLOGY (PERAK CAMPUS)
CHECKLIST FOR FYP2 THESIS SUBMISSION
Student Id 1507834 Student Name TAN YAU BOON
Supervisor Name Mr.Ku Chin Soon
TICK (√) DOCUMENT
Front Cover Signed Report Status Declaration Form
Title Page
Signed form of the Declaration of Originality
Acknowledgement Abstract
Table of Contents
List of Figures (if applicable)
List of Tables (if applicable) List of Symbols (if applicable)
List of Abbreviations (if applicable)
Chapters / Content
Bibliography (or References)
All references in bibliography are cited in the thesis, especially in the chapter of literature review
Appendices (if applicable)
Poster
Signed Turnitin Report (Plagiarism Check Result - Form Number: FM-IAD-005)
______________________ ____________________ (Signature of Student) (Signature of Supervisor) Date: Date:
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. ii
UNIVERSITI TUNKU ABDUL RAHMAN
REPORT STATUS DECLARATION FORM
Title: PARKING AND VEHICLE CONTROL APPLICATION
__________________________________________________________
__________________________________________________________
Academic Session: 2017 May
I TAN YAU BOON
(CAPITAL LETTER)
declare that I allow this Final Year Project Report to be kept in
Universiti Tunku Abdul Rahman Library subject to the regulations as follows:
1. The dissertation is a property of the Library.
2. The Library is allowed to make copies of this dissertation for academic purposes.
Verified by,
(Author’s signature) (Supervisor’s signature)
Address:
__________________________
__________________________ _________________________
__________________________ Supervisor’s name
Date: _____________________ Date: ____________________
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. iii
Title
PARKING AND VEHICLE CONTROL APPLICATION ON CAMPUS
BY
TAN YAU BOON
A REPORT
SUBMITTED TO
Universiti Tunku Abdul Rahman
in partial fulfillment of the requirements
for the degree of
BACHELOR OF INFORMATION SYSTEMS (HONS) INFORMATION SYSTEMS
ENGINEERING
Faculty of Information and Communication Technology (Perak Campus)
MAY 2017
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. iv
DECLARATION OF ORIGINALITY
I declare that this report entitled “PARKING AND VEHICLE CONTROL
APPLICATION ON CAMPUS” is my own work except as cited in the references.
The report has not been accepted for any degree and is not being submitted concurrently in candidature for any degree or other award.
Signature : ________________________
Name : TAN YAU BOON
Date :
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. v
ACKNOWLEDGEMENTS
Firstly, I would like to thanks and appreciation to my supervisor, Mr Ku Chin Soon
who has guided me whenever I faced problems when doing this project. Besides that,
he spent a lot of time to guide and provide idea to complete my parking and vehicle
control application. It is my first time to develop an android mobile application and web
application.
To a very special person in my life, Yuen Jiang Kee, for his patience, unconditiona l
help and support, and standing by my side during difficult times. Lastly, I must say
thanks to my parents and family for their love, support and continuous ly during my
study period.
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. vi
ABSTRACT
Vehicle parking control is an important action for students who are driving a car to
enter campus. Usually, most of the campus parking lot is always limit for a specific
number of students to allow them to park their car insides the campus that is because
of the limited parking lot on campus. Also, for those students who are able to park their
car insides campus will be issued a car sticker to clarify they have right to park their
car on campus. However, it will create some problems which are related to illegal or
fake car sticker. In this proposal will present how efficient of the parking and vehicle
control application on campus to enable security guards to check a car sticker either
legal or illegal in a shortest ways and to solve the problem about cannot get the parking
place for student or staff to park their car, even though with a legal car sticker to enter
campus. Also, this proposal will introducing a new car zoning approaches which will
control the parking issues in campus. In UTAR campus, an observation had been
conducted to notice that there are many students had encountered parking issues in the
campus.
The each step of methodology that had been use to complete this project are define the
problem, gather the necessary information, design and develop an application, coding
out all the functionalities, evaluate and testing the system, deliver to user used and
followed by update the problem countered by the user.
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. vii
TABLE O F CONTENTS
Table of Contents
CHECKLIST FOR FYP2 THESIS SUBMISSION .............................................................. i REPORT STATUS DECLARATION FORM ..................................................................... ii Title................................................................................................................................ iii DECLARATION OF ORIGINALITY .............................................................................. iv ACKNOWLEDGEMENTS .............................................................................................. v ABSTRACT.................................................................................................................... vi TABLE OF CONTENTS ................................................................................................ vii LIST OF FIGURE........................................................................................................... ix LIST OF TABLES........................................................................................................... xi LIST OF ABBREVIATIONS .......................................................................................... xii Chapter 1: Project background ......................................................................................... 1
1.1 Introduction .......................................................................................................... 1 1.2 Problem statement ................................................................................................. 2 1.3 Project scope......................................................................................................... 3 1.4 Objective .............................................................................................................. 7 1.5 Impact, signif icance and contribution ....................................................................... 8 1.6 Chapter summary .................................................................................................. 9
Chapter 2: Literature Review ......................................................................................... 10 2.1 Parking and vehicle control approaches on campus .................................................. 10
2.1.1 Vehicles Sticker ......................................................................................... 10 2.1.2 Access card ............................................................................................... 10 2.1.3 Parking permit ........................................................................................... 11
2.2 Existing parking and vehicle control mobile application ........................................... 12 2.2.1 Parkmobile................................................................................................ 12 2.2.2 gtechana (officer parking right) .................................................................... 14 2.2.3 Spot Squad................................................................................................ 16
2.3 Existing system comparison .................................................................................. 17 2.4 Existing car zone approaches ................................................................................ 18
2.4.1 Agent-based models ................................................................................... 18 2.4.2 On-street parking strategy ........................................................................... 18 2.4.3 Off-street parking strategy........................................................................... 19
2.5 Comparison between existing car zone approaches .................................................. 19 2.6 Chapter Summary ................................................................................................ 20
Chapter 3: System Methodology and Proposed System .................................................... 21 3.1 Methods/ Technology involve ............................................................................... 21 3.2 Methodology....................................................................................................... 22 3.3 Gantt chart.......................................................................................................... 23 3.4 Tools, connectivity, hardware and software. ............................................................ 24
3.4.1 Tools to develop the application ................................................................... 24 3.4.2 Connectivity requirement for user ................................................................ 25 3.4.3 Hardware Requirement ............................................................................... 25 3.4.4 Software Requirement ................................................................................ 25
3.5 System functionalities .......................................................................................... 26 3.6 Flow chart of the application special features .......................................................... 29
3.6.1 Student enter campus.................................................................................. 29 3.6.2 Security guards conduct spot check .............................................................. 30 3.6.3 Student get a car sticker .............................................................................. 31 3.6.4 Student update serial number ....................................................................... 32
Chapter 4 System Design ................................................................................................ 33 4.1 System Architecture ............................................................................................. 33 4.2 Block Diagram .................................................................................................... 34 4.3 Campus map design (Location to put barrier gate) ................................................... 35 4.4 Sample vehicle sticker of UTAR campus ................................................................ 36
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. viii
4.5 User Interface Design (Mobile application) ............................................................. 37 4.6 User Interface Design (Web Application) ................................................................ 46 4.7 Database Design.................................................................................................. 59 4.8 NFC Design ........................................................................................................ 60
Chapter 5 System Testing ............................................................................................... 61 5.1 Verif ication Plan .................................................................................................. 61
Chapter 6 Discussion ...................................................................................................... 73 6.1 Project Achievement ............................................................................................ 73 6.2 System Strengths and Limitations. ......................................................................... 73 6.3 Implementation Issues. ......................................................................................... 73 6.4 Enhancement ...................................................................................................... 74 6.5 Summary ............................................................................................................ 74
Chapter 7 Conclusion ..................................................................................................... 75 References ..................................................................................................................... 76 Appendix ....................................................................................................................... 77
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. ix
LIST OF FIGURE
FIGURE TITLE PAGE
2.2.1.1 Parkmobile (Registration) 12
2.2.1.2 Parkmobile(Scan QR code) 13
2.2.2.1 Gtechana (Car plate retrieving) 14
2.2.2.2 Gtechana (Registration form) 15
2.2.3.1 Spot squad 16
3.2.1 Methodology 22
3.3.1 Gantt chart 23
3.5.1 System functionalities 26
3.6.1.1 student enter campus 29
3.6.2.1 security guards conducting spot check 30
3.6.3.1 student get a car sticker 31
3.6.4.1 Student update serial number 32
4.1.1 System architecture 33
4.2.1 Block diagram 34
4.3.1 Campus map design 35
4.4.1 Sample vehicle sticker of UTAR campus 36
4.5.1 Splash Screen Design 37
4.5.2 Login interface 37
4.5.3 Student main menu 38
4.5.4 Car sticker registration interface 39
4.5.5.1 Request help interface 40
4.5.5.2 Notification 41
4.5.6 Check-In-Out 41
4.5.7 Security guards main menu 42
4.5.8.1 Spot Check interface (Enter manually) 43
4.5.8.2 Spot Check interface (Enter automatically) 43
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. x
4.5.9.1 Spot Check (Unsuccessful result) 44
4.5.9.2 Spot Check (Successful result) 44
4.5.10.1 Visitor registration form 45
4.5.10.2 Splash screen ( loading camera) 45
4.5.10.3 Scan IC 45
4.6.1 Create Vehicle registration period 46
4.6.2 Reserved parking zone value 46
4.6.3 Date input 47
4.6.4 Time input 47
4.6.5 View trimester 48
4.6.6 Delete trimester 48
4.6.7 Create security guard account 49
4.6.8 Validation checking for security guard account 49
4.6.9 Encrypted password 49
4.6.10 List of guard details 50
4.6.11 Edit Guard details 50
4.6.12 Delete Security guard account 50
4.6.13 View Current trimester student registration details 51
4.6.14 Filter current trimester student registration record 51
4.6.15 View parking size on each zone 52
4.6.16 Spot check result 52
4.6.17 Student registration record 53
4.6.18 View campus traffic 53
4.6.19 Visitor details 54
4.6.20 Select duration to view spot check chart report 54
4.6.21 Security guard spot check chart 55
4.6.22 Select duration to view traffic transaction chart report 55
4.6.23 Traffic transaction in campus 56
4.6.24 Select trimester to view result report in chart 56
4.6.25 Chart for ballot result 57
4.6.26 Update serial number 57
4.6.27 Manage user serial number 58
4.7.1 Database Design 59
4.8.1 NFC design 60
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. xi
LIST OF TABLES
Table Number TITLE PAGE
2.3.1 Existing system comparison 17
2.5.1 Comparison between existing car zone approaches 19
3.4.2.1 Connectivity requirement for user 25
3.4.3.1 Hardware requirement 25
3.4.4.1 Software requirement 25
5.1.1 Verification plan for security guard spot check 61
5.1.2 Verification plan for visitor registration 63
5.1.3 Verification plan for ballot result 66
5.1.4 verification plan for check-in-out 68
5.1.5 verification plan for login 70
5.1.6 verification plan for student car registration 71
5.1.7 Verification plan for request help 72
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. xii
LIST OF ABBREVIATIONS
RFID Radio-Frequency Identification
SQL Structured Query Language
PHP Hypertext Preprocessor
MP Megapixel
QR Quick Response Code
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 1
Chapter 1: Project background
1.1 Introduction
In every campus, the rules and regulation have been designed to control the traffic
movement and parking for students and staff utilizing the parking lots, roads and ways
at the campus. (Services, 2016) Therefore, the campus hired a numbers of staff or
security guard to in charge the parking and vehicle control on campus. However, the
security guards may not complete their work in a short time due to most of the work
are perform manually rather than automatically.
Furthermore, the purpose of parking and vehicle control purpose is to protect all
people safety on the campus. Most of the campus will introduce a way to determine
who have the right to enter campus which is using a car sticker method to determine
either a car driver is a student of the campus or outsiders. Also, those cars without car
sticker also possible to enter campus but required to fill in a form and get a temporary
pass to enter campus. Furthermore, the car sticker will be provided by the campus
through a different type of procedures based on their University rules and regulat ion.
Therefore, the security guard or staff have the responsible to checking through each
vehicle before allow them to enter campus.
In a campus, security guards will allow those car with a campus vehicles sticker
to enter campus. However, there are possible for outsiders to get a fake vehicles sticker
to enter the campus where the designed are same as campus car sticker. Since the
security guard allows the vehicle to enter campus is based on car sticker, therefore it
might mistakenly allow a car with illegal car sticker to enter campus. By considering
the safe purpose, the security guard needs to conduct a spot check of car sticker
operation on the campus. This will be time consuming and less efficient for a security
guard or staff to check through each cars insides a campus one by one and make a
comparison to a book which had been recorded those legal car sticker number with a
car plate number.
Since the advancement of technology, there is few campus starting to introduce a
parking and vehicle control application which is controlling parking problem on
campus to reduce the workload of a security guard or staff. By using parking and vehicle
control application on campus that allows staff or security guard to directly check a car
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 2
plate number and the application will determine the result either is legal or illegal for
security guard. Also, if a student or visitor simply park their car on campus, they can
directly use the application to retrieve the car owner details in order to inform them to
move their car away or penalty them.
Besides that, some of the parking and vehicle control application also work with
student or visitor by allowing them to report the car with the car plate number and the
location to security guards who are blocked their road traffic on the campus. Therefore,
the security guard will directly receive the notification and do some action on the people.
Also, the students are able to directly use the parking and vehicle control application to
inform the security guard or staff where they had faced a problem of parking on the
campus.
Lastly, the main problem of using the mobile phone is the small screen size so that
the purposed system will introduce a web application for the administrator to analyze
the data through the web application instead on the mobile phone.
1.2 Problem statement
The first problem for those students who had a valid car sticker to park their car on
campus is the student are required to spend some time to find out an available parking
space to park their car in a parking zone before attending any classes. Furthermore,
UTAR Kampar campus parking space is always no enough for students to park their
car that is due to lack of parking space. Besides that, UTAR Kampar campus parking
zone are quite far from each other, where a student may require spending extra few
minutes from one parking zone to another parking zone in order for a student to get
available parking space to park their car. Therefore, it might cause those students late
to attend their classes or examination due to car parking problem.
Moreover, the second problem is the parking place on the campus are not fully
utilized which means that some parking zone contains many available spaces but some
parking zone is always full. As a result, some students will always cannot get the
parking place where nearby their classrooms. Also, the reasons that a student to
purchase a car sticker to enter campus is because they want to reduce their time on
walking. But, sometimes they need to park their car far from their classrooms which
might not solve the problems in walking. Therefore, some of the student will feel that
is unfair for them to purchase a car sticker but still require to spend much time on
walking.
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 3
Besides that, UTAR campus will always face the problem which is related to people
using illegal car sticker to enter the campus. Therefore, the security guard will do their
tasks which are checking a car sticker either legal or illegal. In UTAR Kampar campus,
when a security guard or staff performing the car sticker spot check task they are
required to bring a book that had been recorded those details related to vehicle car
sticker number and assigned car plate number for checking purpose. Furthermore,
sometimes security guard also will use the walkie-talkie to request another staff to helps
them determine a car are using legal or fake car sticker on campus. However, there will
be very time consuming for the security guard or staff to check a car sticker manua lly
due to a lot of students park their car on campus.
Also, the another problem will occur is when a visitor wants to enter the campus
but the visitor is required to manually fill in many details such as date, time, car plate
number and phone number then the security guard will issue a pass to the visitor before
the visitor has the right to enter the campus, therefore visitor might feel the campus are
troubling them or something else. Besides that, while the visitor is filling the require
details, his or her car may block those other cars behind who are also want to enter the
campus as well due to one road lane are allow for use.
Lastly, the last problem faced by the student is almost every campus who
implemented the barriers gate in the parking zone, they will fully relies on the RFID
and access cards to control the traffic in the campus. Therefore, those campus who only
relies on one approaches there will be very inconvenient for those person who want to
enter the campus. For example, a student who realized him/hers has forgot bring their
access cards after reached the campus, then the student need to return back their hostel
or house to get the access card again which are very inconvenient.
1.3 Project scope
In this project is design a parking and vehicle control mobile application for the
security guard or staff and students to reduce their car parking problems that will be
faced in UTAR campus. Also, the mobile application will focus on the security guards,
students and admin due to consideration of privilege to access different module. The
few functionalities provide in the mobile application are enable students to register car
sticker and report the problem they had faced on campus. Also, the student are enable
to keep track their parking zone space either there have space or not. Besides that, the
mobile application also provides the function to allow the security guard to check a car
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 4
plate through QR code in order to determine whether the car sticker is legal or illega l
which will determine directly after scanned the QR code. Moreover, there have
provided a functionalities which provide security guard to register the visitor by either
through the scanning IC features and input manually. Also, some of the input in the
visitor registration will be automated such as date and time in order to shorten the time
during visitor registration. Furthermore, there will be introduced a web application for
the admin to control and view the traffic on the campus. In the web application, it allow
the admin to create and delete a registration period for the student to register their
sticker and the exact time and time where the ballot result will be generate. Not only
that, the admin are allow the create, update and view the security guards account where
some of the guards will be change their jobs after some of the period. Lastly, there will
be many different set of report for user either in graph form or text based. The admin
are allowed to analyze the information based on the report given. For example, an
admin want to view a yearly report of the traffic on the campus or find out the reason
why there are many student are unsuccessful to pass the security guards spot check
action which can be view in graph or text based.
The following are the programming language used in developing the mobile application:
- JAVA
- XML
- PHP
- SQL
- JQuery
- HTML
- CSS
The following are the module going to include in the Mobile Application:
Vehicle sticker checking module
This module will be only allowed for a security guard or staff to conducting their
car sticker spot check operation. The Security guard can direct scan the QR code in the
vehicle sticker or enter manually in the car plate number field and then the application
will determine a result of the car sticker either is illegal or legal. If the result are
unsuccessful, the security guards need to specific the categories of the reason which
can be selected through a mobile application mobile activity in order for the admin to
view the report in later.
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 5
Visitor registration module
This module will enable the security guard or staff to register the details of a visitor
in a shortened time. The module will automate some static data such as date and time
which no need to enter manually by the user. Also, there will provide an IC scanner
function for the security guards to register the visitor in faster ways.
Request for help module
To enables a student or visitor to directly notify security guards or staff when they
faced any problem on the campus where are required seek for help on the campus.
Besides that, if there have an accident in the campus they can directly notify the security
guards through the application. This module can help the student who want to save their
phone credit.
Register vehicle sticker module
This car sticker registration module is to provide a form for the student to register
their personal details and their vehicle details. Besides that, those registered details will
be stored on web-based in order for an admin to determine car sticker ballot result which
is either successful or unsuccessful. After the student register the car sticker, it is
required to generate the result by using the generate car sticker ballot result function.
The admin need to set a specific date and time that will generate the result of the car
sticker ballot and then the application will send a notification to inform the student
whether are in successful or unsuccessful ballot. Also, it allow the admin to view all the
students who get the successful ballot result in a particular trimester. Lastly, the
registration vehicle details will be stored on the database when the student is register.
On the next trimester, the student are not required to re-enter the vehicle details again
unless there has updated on their vehicle details.
Check in module
This module is a new features and alternative ways for a students to use NFC
scanner of the mobile device to enter the parking zones instead of restricted the student
to use RFID method only. The main purpose of this module is to support the new
proposed car zoning approaches in campus by restricting the student to park their car
in assigned zone only. By using check in module, it can allow the student to view the
current parking place leave before they visit the parking place Also, when using the
NFC scan function inside the check in module, it will determine either the user are the
person who is login or not based on the serial number enter by the student. If the student
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 6
who had lost their device, they must reset their phone serial number through the web
application due to the security concerns.
The following are the module going to include in the Web Application:
Vehicle registration period
This module are provided only for the admin to register a new trimester registrat ion
period for the student to register their vehicle details through the mobile application.
Firstly, the admin need to specific the number of parking place that want to reserve for
each parking zone including the motor and the car. After that, the admin need to specific
the exactly start date and end date which is allowed for the student to register and update
their vehicle details on a new trimester. After the end date is past, the student will not
able to register after that, all of the student will get the ballot result after the result
released date which is specified by the admin.
Manage security guards.
The admin can create a new account for a security guards for them to use the mobile
application to perform their job on the campus. Besides that, the admin also allow to
update the security guards account details and delete those unused security guards
account. For example, the admin can help the guard to update their contact number or
delete the security guard account when they are leaved the campus.
Report
The admin are allowed to view the report either in graph or text based. There are
many different type of report for the admin to view such as the campus traffic report,
ballot result report, guards spot check report, view the parking place of each zone and
registered visitor. Also, each type of the report will provide a filtering option and paging
to reduce the record view of the data. Besides that, the web application also enable the
admin to analyse which problem that have most percentages during the security guards
spot check. Not only that, there are a graph to show for the admin the ballot result on
each trimester such as the number of successful and unsuccessful student .
Authentication
The web application is not only providing a login pages for user, but the web
application will determine the type of user login and allowed for the student and
security guard to update their serial number when they had lost their device in the future.
The mobile application NFC module only will work with the serial number of the phone
which had been entered by the owner of the account.
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 7
1.4 Objective
There are three objective in this project.
1. To design a car zoning approaches
To reduce the problem of some parking zone are empty but some parking is full
through a balloting procedures. The mobile application will provide a good approaches
function for admin to determine which student should be chosen to get a legal car sticker
based on several criteria. The main criteria should be focus on are the parking place of
each zone, the different block of UTAR campus always for different faculty students.
For example, majority of business students (FBF) classes are in block B and majority
of FICT students are in block L and block N, FAS students in block D and FEGT student
in block E. Other than that, for those parking zone not related to the faculty will be
considered as a parking zone. The approaches for a student to get a successful ballot is
based on the student faculty and the number of parking space available on that faculty
zone. Also, the student are allow to use the function to check their parking zone have
parking space or not. Besides that, the admin are allow to enter the parking space that
are required to reserve for the staff and visitor. Lastly, the implementation of barriers
gate is to provide the ability for the application to keep track the parking place availab le
for use.
2. To develop a vehicle control for security guards system.
By using the application, many security guard work can be automated such as
directly get the details of the car sticker owner by providing the car plate within few
seconds rather than searching the car owner details manually. For example, design a
QR code for each vehicle sticker which will contain the information of the car plate.
Besides that, there will increase the work performance of the security guard or staff due
to the faster response of the application. Also, the application will provide flexible ways
for the security guard or staff to enter the car plate number such as voice detection, scan
car plate number and enter manually. Besides that, the visitor registration form can
convert to digital form where the security guard only required to enter few important
information such as phone number, car plate number, name and IC.
3. To design an alternative ways to let user access their parking zone
To introduce a barriers gate method on each parking zone where each of the faculty
parking zone will be implemented a barriers gate to authenticate the student who is
entered the campus. Besides that, the barriers gate device reader can retrieve the mobile
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 8
phone NFC hardware to scan instead of relying on one ways which is the RFID and the
access cards. By implementing this ways, the NFC will authenticate the user account
with the preset mobile phone serial number before allow the student enter the parking
zone. Not only that, the student also can track the available parking place easily due to
the traffic had been control and monitor.
1.5 Impact, significance and contribution
By using this mobile application it will reduce the workload of security guards. For
example, the application providing a QR code scanner for security guards to easily
retrieve the information about the vehicle. Besides that, it also allows the security guard
to register the visitor information in the shortest time due to digital form can be
automate some of the information like time and date.
Furthermore, many student are arguing the problem where required to spend a lot
of time in searching a parking zone where near their faculty even though will a valid
car sticker. Therefore the application will solve the problem of parking place through a
approaches that different faculty students will have a different probability to get a
campus car sticker in order to reduce the problem of a parking zone are not fully utilized
on the campus. By changing the procedures to get a successful ballot result of car sticker,
it will help a student to save a lot of time on finding a parking place in different zone
due to a campus parking zone is always far from another parking zone. Besides that,
the student can directly view the parking zone report about the parking zone to know
whether there are space or not.
Besides that, the mobile application are able to reduce the rate of making mistake
during the visitor registration or spot check operation for a security guards. Not only
that, the application also will provide a new module for all user which is related to
reporting the student parking problem on campus where the students are required to fill
in only few information such as the current zoning that faced the problem.
Lastly, the project can be implemented in very efficiently, due to many of the jobs
about the parking problem can be reduce by using the application. The application will
benefits the student, staff, security guards and admin. The student and staff can get the
parking place easily on the campus. Besides that, the security guards can reduce their
workload by automating most of the operation. Also, the admin are easier to manage
the balloting result by setting the date and time in the car sticker balloting function to
generate the result.
Chapter 1: Introduction
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 9
1.6 Chapter summary
This chapter is study about most of the vehicles parking issues that had been faced by
students, registration for visitor permit and heavy workload of security guards on
campus. Also, in the objective and the project scope part had been introduced the
module and ways to solve the problem as mention previously such as design a car
zoning approaches. In the impact, significance and contribution part, it had specifica l ly
describe who will benefit and how will he/she will be benefit by using the parking and
vehicle control application on campus.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 10
Chapter 2: Literature Review
2.1 Parking and vehicle control approaches on campus
2.1.1 Vehicles Sticker
Vehicles sticker are another way for a campus to manage their parking place on the
campus. Student are required to submit their legal document for the staff and then the
staff will issue the car sticker by considering several factors. After the student
successfully get the vehicles sticker, the vehicle sticker must be placed on the mirror in
order for security guard to conduct their checking easily (UTAR, 2014). However, there
are several term and condition that required a car sticker holder to follow which is for
the staff or management team to reduce those problems that may cause by a student on
campus. The strength of the vehicle sticker is easier for security guards to determine
the sticker is either legal or illegal. Besides that, low cost on designing the vehicles
sticker also another advantages of the vehicles sticker due to the sticker is lightwe ight
and required less material to design it. However, the weakness of the vehicles sticker is
the admin of the campus have difficulty to keep track the traffic in the campus. For
example, campus admin impossible to know the current amount of car that had been
inside a campus.
2.1.2 Access card
Students and staff are required to purchase an access card to enter campus and
parking on designated parking location. Students who want to enter the campus needs
to insert the access card into the card reader arrow first; stripe up and the left (The
university of Texas at Austin, 2016). After that, the barriers gate will be opened after
the access card is removed. Furthermore, the access card should put as near as possible
which is required within the range of 10 inches (The university of Texas at Austin,
2016). In addition, reader box will display a light where indicates whether the card have
read successfully or not. For example, if the access card had been spoiled then the reader
box will keep display the light in red color which is indicates there have a problem with
the access card. Besides that, the failure to open the barriers gate may make the access
card go out of sync (The university of Texas at Austin, 2016). Therefore, there will be
a charged for a participants to re-sync the access card. The advantages of the access
card is allow the admin to keep track the traffic in the campus where allow admin to
know whether there are still have the empty parking slot inside the campus or not. Not
only that, the access card will reduce the workload of the security guard where the
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 11
guards need to control the traffic in the campus only instead of keep looking a car
whether have permit enter or not. Besides that, the disadvantages of implementing the
access card is high cost as compared to other approaches. By implementing the access
card, there are required to purchase few hardware such as the barriers gate, access card
reader, access card and so on.
2.1.3 Parking permit
The parking permit is a way to control a vehicle to enter campus. By using this
approaches, it will provide those parking spaces as fairly and as conveniently as
possible for all persons on a campus (Parking, 2014). There are several types of permit
such as surface parking permit, garage permit, one vehicle hangtag permit, resident
permit (Parking, 2014). Furthermore, the different type of permit is only allowed to
parking their car on a designated parking location. Also, different type of occupation is
required registering the different type of permit. For example, student and staff are
allowed to purchase the garage permit or surface parking permit and residential students
must purchase a resident permit. Furthermore, the visitor only allows to purchase one
vehicle hangtag permit. In addition, the strengths of the parking permit is everyone are
fair to get a permit to enter the campus rather than had restriction by using other parking
and vehicle control approaches. However, the limitation of the parking permit is the
campus must have a huge amount of parking slot for visitor, staff and student due to
everyone can get the permit easily to enter the campus.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 12
2.2 Existing parking and vehicle control mobile application
2.2.1 Parkmobile
Figure 2.2.1.1 the new user registration, login and vehicle control screenshot.
Parkmobile is an application to control the vehicle in the specific country. Besides
that, it also starting a parking and vehicle control for University due to the needs of a
customer. The parkmobile required a user to register before using the application due
to consideration of security. As refer to figure 2.2.1.1 the left-hand side picture shows
the registration form for a customer and the right-hand side is the parking and vehicle
control module on the parkmobile application where need the user to provide those
details to register the location they had park their car. In addition, due to the advance of
technology, the company starting to introduce the function of use touch ID to login
instead of entering manually in order to protect customer privacy.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 13
Figure 2.2.1.2 show the ways to retrieve parking zone number
The figure 2.2.1.2 show the ways of Parkmobile to retrieve the parking zone
number. The user can look for Parkmobile sign or sticker. After registered, the user can
use the Parkmobile application to type in the zone number listed on the sign in order to
start a parking session (Parkmobile, 2016). This module is useful for a user where the
car parking place doesn’t provide or have an unclear parking zone number.
Strengths
By using Parkmobile, there are provides a good design of registration form for a user
in order to protect the user confidential data. Also, the parkmobile provide a convenient
ways for user to login by using the touch ID to login directly rather than enter username
and password manually. Besides that, they are trying to use the QR technology to
automate some parking process which will convenient for a user. Also, the registrat ion
of vehicle parking is simple enough where the user always didn’t like to enter many
data.
Weakness
The main problem on this mobile application are the QR code scanner might take a long
time to scan the parking zone due to unclear printing of the QR code. Besides that, the
QR code sticker also might be destroyed or affected by the weather then the QR code
may be harder or cannot scan and proceed it into words.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 14
2.2.2 gtechana (officer parking right)
Figure 2.2.2.1
The figure 2.2.2.1 show the mobile parking application from Gtechana Company. From
the diagram, the mobile application showed that the convenient ways to enables a user
to enter a car plate using voice detection and car plate camera scanner. Besides that, the
user can directly click the speak logo button and then speak out the car plate number,
therefore the mobile application can analyse the voice and then convert it to the data.
After capturing the car plate number, the mobile application will check the car plate
number had paid the parking fees or not. Also, the other ways for a user to enter the car
plate are using a phone camera to capture images and then the application will analyse
the image in order to capture the car plate number from the images. Besides that, the
user needs to select which parking zone they are entered. Those parking zoning all are
listing in a drop-down list, the user can direct choose from the drop-down list rather
than entering the details manually.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 15
Figure 2.2.2.2
Figure 2.2.2.2 show the vehicle registration forms of the officer parking application.
The mobile application provides a very simple user interface for user to enter the car
details manually. This registration is for user to register their parking vehicle for
payment purpose.
Strengths
The parking control application provides flexible ways for a user to enter the car plate
number into the mobile application such as using voice detection and images, besides
that, the register form are easy for a user to read the font clearly due to smaller screen
size are always the majority problem on the smartphone. By using this application, it
will eliminate errors due to manual entry of wrong information, incomplete notice and
etc (Gtechna, 2016).
Weakness
The main weakness of this mobile application is the processing time. The mobile
application required to take a long time to scan and detect the user input which is the
car plate number. Also, the user interface is too simple due to the color problem. A user
might not trust an application that with a very simple user interface. Lastly, the
application developer should be considered to design a new button which provides a
clear all function for convenience user when they want to re-enter all the data.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 16
2.2.3 Spot Squad
Figure 2.2.3.1
The figure 2.2.3.1 show the Spot squad mobile application. This application provides a
module which a report a car who are breaking the rules and regulation to authorit ies.
Besides that, the user is required to report what are the problem at the parking area and
then input with car plate number either enter manually or using the phone camera to
capture the car plate image for mobile application to perform analyse tasks.
Furthermore, it also requests a user to capture an image as an evidence in step 2.
Strength
The Spot Squad mobile application provides a special module for a user which are
reporting a problem related to parking such as double parked or handicap parking. Also,
the each step are clearly stated on the mobile application where a user will not get lost
while using the application. Furthermore, it also allows a user to enter car plate
manually or using the car plate camera scanner which is more flexible for a user.
Weakness
The Spot Squad mobile application might not easily to recover when a user makes
mistake. For example, when the user in step 3 but the user had made mistake on step 1,
therefore required to exit and then enter the module again. Also, the option that provides
user to select the vehicle problems that may be restricted where some of the situation
cannot be described by just few wording such as a small accident that happened on that
campus.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 17
2.3 Existing system comparison
Criteria ParkMobile gtechana Spot Squad Proposed system
Processing result
time
Moderate Slow Slow Moderate
Number of ways to
enter car plate
2 3 2 2
Able to input car
plate easily
Yes Yes Yes Yes
Convenient login
for user
Yes
(touchID)
No
(manually)
No
(manually)
No
(manually)
Able to report car
parking problem
No No Yes Yes
Easily recover when
made mistake
Moderate Moderate Low Moderate
Table 2.3.1
The table 2.3.1 show the existing system comparison of parkMobile, gtechana,
Spot Squad and proposed system. Refer to the table, the ParkMobile, gtechana and
proposed application able to recover easily when user had make mistake but the Spot
Squad application are not able to recovery easily. Also, different mobile application
able to provides a different ways for user to enter the car plate, the proposed application
are able to provide 2 type of ways to enter car plate which are QR code scanner and
enter manually. Furthermore, all the application are provided a login function but only
the ParkMobile application are allow for user to login with touchID. Lastly, the
processing time of parkMobile and proposed system are moderated fast due to using
the QR code technology to process the result. But, the gtechana and Spot Squad will be
slower due to the process is involves the image processing capability which is required
to grab the car plate number from an images.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 18
2.4 Existing car zone approaches
2.4.1 Agent-based models
The agent-based models are an approaches to resolve the problem of planning on
a campus by utilized few variable such as parking fees, parking supply, transit fees, and
distribution and trip generation (Boamah, 2013). After defining the variable, the agent
is refer to all the variable interact with each other and generate a desired outcome. In
order to successful implementing the agent-based models, the campus is required to
collect a parking data using a quantitative model. The data should be included the
parking space available on the campus, the permit purchases of various permit
categories, annual profit, and the cost of parking for operation and maintenance
(Boamah, 2013). After that, use a vensim PLE software to stimulate the parking
behaviour followed by further considered the relationship between the cost and benefit
in meeting the demand between students, staff and admin on the campus. After that,
simulations will run to answer the question “how to price the parking permit to
minimize the parking shortage on campus and still meet the cost of parking (Boamah,
2013)? For analyser to judge which ways are better to choose to implement the parking
zones on campus.
2.4.2 On-street parking strategy
On-street parking strategy allow to manage the on-street parking and control the
car park building (Auckland council organisation, 2015). The on-street parking is an
approaches to allow driver to park their car on the street. Besides that, the on-street
parking can be only allow for park in few street only rather than all the street on the
campus due to consideration of the safety and give more space for walking. By using
on-street parking which can increase the parking lot on the campus. In order for the on-
street parking successful, the campus is required to consider there are no limitation to
conduct the on-street parking. For example, will not disturb other car pass by and safety
of the pedestrian. Also, it also should restricted the time to parking on the street by
implementing the policy or regulation to support it. Reserved Parking also should be
considered for bus, Taxi and POS office car to have place for them to leave their car.
The price of the on-street parking should be set on different rate which mean that the
longest time that a person leave their car longer, then the charged should be more
expensive.
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 19
2.4.3 Off-street parking strategy
Another parking approaches is using the off-street parking. The Off-street parking
is referring to the user to park their car on the garage or parking lot (Francisco, 2012).
In order to control the traffic of off-street parking well, therefore authorities need to
provide a number of building and the car facilities to control the parking traffic in the
parking surface. The building of the off-street parking should be included a barriers
gate to control the entry and exits. Usually, the car park building is required for user to
pay, parking with time-restriction and unrestricted parking. The off-street parking can
be reduce the traffic congestion on the road. Besides that, this approaches is more
suitable for shopping centre where have a huge compound for them to build the parking
building. Besides that, off-street parking can be further divided based on the user is
either long-stay or short stay (Auckland council organisation, 2015).
2.5 Comparison between existing car zone approaches
Criteria Agent-based On-street
parking
Off-street
parking
Proposed
system
Ability to resolve
parking issue
high high high high
Cost to implement
the technique
moderate low high moderate
Flexible to set the
parking fees
Yes Yes Yes N/A
Required people to
support
Yes
Yes Yes Yes
Barriers gate flexible No Yes Yes
Able to track the
available parking
slot
depend No Yes Yes
Table 2.5.1
All the models of the parking are able to reduce the parking issues. The agent-based
are analyze the situation then only find the best ways to solve the issues, therefore it
will have the high capability to resolve the parking issues. Besides that, the on-street is
a ways to allow user to park their car in the street and off-street are park their inside a
parking building and parking zones. The proposed system are allow user to park their
on a specific zone which is assigned by the admin of the campus. Besides that, the cost
to implement the agent-based is required middle amount of money to observe the
Chapter 2: Literature Review
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 20
current situation and then need use a software to stimulate the result. On-street parking
cost is low due to the parking place can be added directly and no need to purchase any
extra equipment. The off-street parking implementation cost will be higher due to there
need to build a parking building with multiple story or single story and implement the
gate barriers to control the traffic in the building. The proposed system will require a
moderate cost to purchase extra equipment which is the barriers gate for few parking
zone in a campus. Furthermore, all the model are flexible for admin to set the parking
fees except proposed system which is based on onetime payment. However, all of the
model are using technology to conduct it, but there are still need one or two people to
control the traffic on the parking areas due to some of the decision cannot produce by
the system. Lastly, the agent-based model based on the situation to decide either want
to implement the barriers gate or no need. The off-street parking and proposed system
are required the barriers gate to track the available parking place for user. Lastly, there
have difficulty to keep track the traffic on the on-street parking where the user might
just enter the parking slot without notice.
2.6 Chapter Summary
This chapter had been further discuss about those existing parking and vehicle control
application and existing car zone approaches. Besides that, the table also have been
simplify the strengths and weakness of all the approaches. However, the proposed
application is improved the limitation of the existing application, therefore the proposed
application can be done better.
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 21
Chapter 3: System Methodology and Proposed System
3.1 Methods/ Technology involve
The platform of parking and vehicle control on campus application will develop
using java language. The java language is a good language for a user to develop the
mobile application. Besides that, the java also provides many libraries which can
provide a useful function for an android application where will reduce the workload of
developing the application.
In the mobile application should include the images numbering and alphabet
scanner and voice detection in order for a security guard to have a choice which will
more easily for them to proceed their work. Besides that, the application will have a
login page where only allow student, staff and admin to become the user of the
application in order to determine their privilege. Also, the different module provided
by the application is limited for a particular user based on the login user privilege which
means the different user only allow to access certain module only. However, the admin
is allowed to access all the module in the application due to they may need an extra
information to perform their tasks.
Lastly, the parking and vehicle control on campus application will work on all the
android phone with the latest android version.
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 22
3.2 Methodology
Figure 3.2.1
Figure 3.2.1 show the methodology of developing the proposed mobile application.
In the planning phase, the objective and goals of development the system will be
identified. The project scope will determine the module that is required to include in
the proposed system.
In the analysis phase, the observation and questionnaires will be conducted in order
to retrieve the current requirement of the user. The requirement of the user should be
included in the proposed system.
During the prototyping stages, a mobile application will be developed and then will
coding out some functionalities which no yet included in the prototype during
implementation stages. After implementation stages, the application will perform
several types of testing such as the black box, acceptance testing, functional testing and
non-functional testing to make sure the product is actually solving the needs addressed
and gathered during the requirement stages. (skumar, 2016) However, if the testing
discovers the problem or bugs then it should be returned to prototype stages and modify
the prototype until there have no error in the testing stages.
Define the
problem Gather necessary information
Design and develop an application
Evaluate and testing the system
Update the problem countered by user
Coding out all the functionalities
Deliver to user used
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 23
After successfully testing the system, the system will proceed to deployment stages
which are deployed the application for customer use. In the maintenance stages, when
the customer start using the developed system then the problems come up and needs to
be solved from time to time (skumar, 2016).
3.3 Gantt chart
Figure 3.3.1 Gantt chart for mobile application development (01 November 2016- 31
August 2017)
The figure 3.3.1 show the Gantt chart about the mobile application development. The
project starting with the planning the concept of the proposal continues by creating a
project plan then conduct a presentation to the client. During the analysis phase, design
and distribute questionnaire for the user to gather the information related to parking and
vehicle control problems on campus. Besides that, some of the problems are very
obvious for me to conduct an observation through the user. During the prototyping
stages, a few diagram such as use-case, activity and class diagram will be drawing.
After that, a prototyping will be designed for a user to try out and get some feedback
from the user.
Furthermore, during the testing stages, the mobile application must perform some type
of testing to check the functionalities whether can provides accurate output for the user.
After testing, the presentation and a report should be carried out for a user to understand
the application.
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 24
3.4 Tools, connectivity, hardware and software.
3.4.1 Tools to develop the application
Firebase API
- Providing a specific key for a particular devices where allow us to determine
the device currently login with what user. Besides that, this have been used in
the Request help function where all the admin account will receive the
notification but the student will not receive the notification.
Android studio
- Android studio are the main software that allow to develop android application
through the JAVA language and XML language. Besides that, the android studio
allow to integrated with those API and library which are more convenient in
develop a mobile application.
Hostinger Sever
- By using hostinger server, it allow the mobile application and the web
application to share the data. The hostinger is an online server which allow to
create and manage a database. Besides that, it also allow to upload the php script
for developing the web application and retrieving data to mobile application.
Visual paradigm
- A software tools to draw many type of UML diagram which is easier to code
out during the coding section. Visual paradigm is useful to draft out and perform
the flow chart to indicate the logic.
RFID and NFC technology
- Two smart device that with NFC hardware will be used to conduct this project,
one of the device is receiver and the other one is sender.
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 25
3.4.2 Connectivity requirement for user
Description Compulsory
Internet connection YES
GPS NO
NFC YES
Compass NO
Table 3.4.2.1 connectivity requirement for user
3.4.3 Hardware Requirement
Description Minimum requirement
Processor 1.2GHz or higher
Camera 5 MP
RAM 256MB or higher
Internal storages 1GB
Table 3.4.3.1 Hardware requirement for user
3.4.4 Software Requirement
Description Minimum requirement
Android Version Android 4.0 or higher
Table 3.4.4.1 Software requirement for user
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 26
3.5 System functionalities
Figure 3.5.1
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 27
As referring to Figure 3.5.1 there are several function provided by the proposed
application:
Mobile Application
Login
- Login function is a basic function that are needed for every application where it
allow the application to determine the privilege who are logon either is students
or admin of the campus. Besides that, the login function also created for
authentication where this application only allow for the student and security
guards used only.
Request help
- Request is a function that allow the students to select which zone they have
faced a parking problem such as the NFC scanner spoiled, accident and
something that are related to the traffic in the campus. After user click submit
the helps button, then a notification will notify the security guards in order for
them to take the action.
Check in-out
- The check in is a special feature where allow the student to use NFC function
inside their smart phone to enter the campus due to some of the faculty parking
zone had been blocked by the barrier gate. Besides that, the student who does
not have NFC devices, it also can using their student ID to scan using RFID.
Lastly, the student are required to register their phone serial number through the
web application in order for them to successfully to enter the campus.
Register vehicle sticker
- This module allow the student to register the car sticker through the mobile
application in order for them have the right to enter campus. Besides, the student
only required to register their vehicle details once only. During the next trimester,
the mobile application will directly retrieve the details that the student had been
registered before. However, the student also able to update the details before
confirm the registration.
Register visitor
- This function allow the security guards directly register on the spot with a name,
car plate, IC number and parking zone that visitor tends to visit. Besides that,
the security guards are able to use the SCAN IC function which had been
Chapter 3: System Methodology and Proposed System
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 28
provided in the register module. The SCAN IC function are directly scan the
information on a particular Identity card.
Spot Check
- The spot check module are provided for the security guards to determine
whether the vehicle have the right to enter campus or not. Also, if the student
are using illegal car sticker which will be directly records to the authority. All
of the cases such as purchasing third party sticker, fake sticker and illega l
parking will be determine by the security guards.
Profile
- The student and security guards are able to view their personal profile by
accessing this module. Besides that, the profile are allow the change their profile
by accessed the function provided.
Web Application (Admin)
Vehicle registration period
- The admin are required to register the duration for the student to register a
vehicle sticker for each trimester. Besides that, the admin need to specific the
number of parking slot that want to reserve for the staff and the visitor. During
the new registration period, the admin also need to select the exactly date and
time for generating the ballot result either is successful or unsuccessful.
Furthermore, the admin also allow to delete the registration period which might
be created with mistake.
Manage security guards.
- The admin can create a new account for a security guards for them to use the
mobile application to perform their job on the campus. Besides that, the admin
also allow to update the security guards account details and delete those unused
security guards account.
Report
- The admin are allowed to use view the report either in graph or list of details
such as the traffic report that involved in each parking zone in UTAR campus.
Besides that, the web application also enable the admin to analyze which
problem that have most percentages during the security guards spot check. Not
only that, there are a graph to show for the admin the ballot result on each
trimester such as the number of successful and unsuccessful student .
Chapter 3: Proposed Method/Approach
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 29
3.6 Flow chart of the application special features
3.6.1 Student enter campus
Figure 3.6.1.1
The figure 3.6.1.1 show that the process of the student when entering to the campus. A
student will be directly rejected by the security guards, if the vehicles doesn’t have a
car sticker. After enter to the campus, the student is required to follow the parking zone
which assigned by the admin. However, if the student going to another parking zones
and trying to enter the zone, the gate barriers will not be open to enter. During enter the
Chapter 3: Proposed Method/Approach
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 30
campus, the student have alternative ways to enter the campus which is using the NFC
instead of focusing on one ways which is RFID. The parking zones also have the
capability to determine the number of parking space left in the parking zones, if there
is no parking for a student, a messages will be displayed to notify the student in the
mobile application.
3.6.2 Security guards conduct spot check
Figure 3.6.2.1
The figure 3.6.2.1 show the basic operation and an alternative ways for the security
guards to conducting their spot check operation on campus. The main operation on this
is for the security guards to determine either a student enter the campus is with a legal
or illegal car sticker. However, even though there are barriers gate for each parking
zones, but the spot check operation still considered as an important operation that is
because of want to solve the problem of a student using friends login ID to enter the
parking zones.
Chapter 3: Proposed Method/Approach
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 31
3.6.3 Student get a car sticker
Figure 3.6.3.1
The Figure 3.6.3.1 show the procedures how the application to choose the successful
registered ballot of the car sticker biding result. By overall process, the application will
check the time and date of the result released data. If reached the result of release date
and time, the application will generate result based on the registered student. Besides
that, if a particular parking zone still contain available space, the mobile application
will choose from the unsuccessful registered student who are most near the parking
zone with parking space.
Chapter 3: Proposed Method/Approach
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 32
3.6.4 Student update serial number
Figure 3.6.4.1
The flow chart show the process that update the serial number in the application. The
reason that purposed this is to reduce the misuse of the user account by scanning the
NFC tag multiple time. Firstly, if the student want to update the serial number, they
need to visit the faculty office and fill in particular form. After that, admin need to
change the status of updating the serial number to active. Therefore, the student are
allowed to update serial number through the web sites. After updating, the status of
updating will automatically update to 0.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 33
Chapter 4 System Design
4.1 System Architecture
Figure 4.1.1
In parking and vehicle control application, it will used the client-server architecture.
Each type of the user will access the application with the internet connection, then the
application will communicate with the server. The server will control the flow of data
between request and response. As refer to the figure 4.1.1 when a student or security
guards perform login function in the mobile application using their smart phone, then
the application will access the server, then the server will retrieve the required data from
the database to compare the password and username to determine either that is a valid
or invalid input by the user with the data stored on the database.
Besides that, the web application which had been developed will used the client -
server architecture where the admin use a computer to request the required data and
then the web application will generate the report for the admin. For example, when a
admin select the date between 01-Jan 2017 and 31-Jul 2017, then the application will
connect to the server, the server will control what data that the web application are
requesting, then return the related data to the web application before generate the report
for the admin to view.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 34
4.2 Block Diagram
Figure 4.2.1
The block diagram of Figure 4.2.1 show that the student are required login to the
application before using it. After that, the student are only allow to pass through the
barriers gate either with a NFC or student card to open the barriers gate. The
application will determine automatically either the parking zone is same with the
parking zone assigned by the admin or not. After that, the student are allow to park
their car inside the campus zone.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 35
4.3 Campus map design (Location to put barrier gate)
Figure 4.3.1
The figure 4.3.1 is a map of the UTAR kampar campus which enables to see the gate barrier had been added to the parking zones.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 36
4.4 Sample vehicle sticker of UTAR campus
Figure 4.4.1
The figure 4.4.1 is the sample of the car sticker that going to use in the UTAR campus.
The new designed sticker that with a QR code which will directly store the car plate
number which is more convenient for security guard or admin to conduct the spot check
operation in the UTAR campus.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 37
4.5 User Interface Design (Mobile application)
Figure 4.5.1 Splash Screen Design
The figure 4.5.1 show the splash screen design, the splash screen design will appear
only when the user haven’t login. If the user has been login, the splash screen design
will not display on the screen.
Figure 4.5.2 Login Interface Design
After the splash screen appear few seconds, the application will redirect user to the
login page. The student and security guards must enter the correct username and
password in order to login successfully.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 38
Figure 4.5.3 Student Main menu
The figure 4.5.3 is the main menu for the student. Each of the student are will redirect
to this page, if they are login successfully. The vehicle registration is for the student to
apply their vehicle sticker on each trimester. However, each student only allow to apply
once for each trimester. If student trying to apply more than one, there will display error
to indicate the problem. Besides that, the Help module is to allow student to request a
help from security guard where they might face the problem inside the campus. Also,
the check In/Out module is a new approaches for the student to enter the campus using
the NFC on the device, the application will match the current serial number with the
pre-set serial number to increase the security on using this application. Furthermore,
the check-in module allow the student to view the parking slot available on their parking
zone so that they can enter the parking zone with confident that there have a parking
place. Lastly, the profile is for the student to view their personal details.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 39
Figure 4.5.4 car sticker registration
The figure 4.5.4 show the simple interface for a student to register their car sticker
through online rather than relying on the web browser. Besides that, the student are
required to input the vehicle type, vehicle plate number, vehicle manufacturer, vehicle
model, vehicle color and select the vehicle type for proceeding the registration.
The student only allowed for register once only in each trimester. If the student try
to register twice on each trimester, the application will display an error to notify the
student. After click the apply button, the application will check are the form contain
any empty field before proceeding to the confirm alert.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 40
Figure 4.5.5.1 Request help Figure 4.5.5.2 Notification (Admin)
Figure 4.5.5.1 show the module which is providing for students. Every student are
allow to use this module to request the help from the security guards. Besides that, the
student are able to specific the problem such as the barriers gate cannot be open or NFC
reader spoiled, give block by other car and etc. After specific the problem, the student
needs to select the problem is occurs in which parking zone in the campus.
Figure 4.5.5.2 show the notification has been received by the security guards. After the
security guards received the notification, the security can take action based on the
information given. This module can be very useful for those student who has
insufficient credit in their mobile phone.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 41
Figure 4.5.6 (Check-In-Out)
Figure 4.5.6 is the module to allow the student to scan through the reader in
front of the barrier gate implemented in each faculty zone. Before the student can enter
to the parking zone, they need to scan the NFC-enable phone with the reader in order
to make the barrier gate open. This module only can access when the ballot result is
successful. The student who got the unsuccessful ballot, they are unable to access this
module.
After accessing this module, the student are able to view their parking assigned
zone and the available parking slot are left in their parking zone only. The current status
are the information to determine the student current is in the inside or outside of the
parking zone.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 42
Figure 4.5.7 Security Guard Main Menu
Figure 4.5.7 is the main menu of the security guards. The security guards are
able to perform the spot check operation, visitor registration, check-in-out and profile
module. The security guards can use the mobile application to conduct their spot check
operation easily through the QR code scanner and a new design vehicle sticker for
UTAR campus. Besides that, the security guards able to register a visitor details in faster
ways where the security guards can grab the information directly through the SCAN IC
function inside the visitor registration module. The check-in-out module is same as the
student but the security are able to access every parking zone instead of only one
parking zone.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 43
Figure 4.5.8.1 spot check module(Enter Manually)
The figure above show the interface of the spot check operation which is designed
only for security guard to check either a car sticker is valid or invalid. Besides that, the
security guard are able to enter the car plate manually (Figure 4.5.4.1) or click the QR
code button for accessing the QR code scanner (Figure 4.5.4.2) through the camera.
After the checking, the application will retrieve the car plate number and then
compare with the database car plate numer to determine either the sticker is legal or
illegal. Besides that, there have a clear button provided for the security guards to clear
the car plate input text field. The application also will check
Figure 4.5.8.2 spot check module(Enter Automatically)
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 44
Figure 4.5.9.1 Figure 4.5.9.2
Spot check (Unsuccessful Result) Spot check (Successful Result)
The both figures show the spot check result. If the spot check result is unsuccessful
then the figure 4.5.9.1 activity will be appear to request the security guards to select the
categories of the problem which had been checked.
Besides, the figure 4.5.9.2 show the spot check result which is successful. Since
the security guards only enter the car plate number, then the security guard need to
manually matching the vehicle details with the car by using the vehicle manufacture,
color, model and vehicle registration No.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 45
Figure 4.5.10.1 Figure 4.5.10.2 Figure 4.5.10.3 Visitor registration form Splash Screen Scan IC
The figure 4.5.10.1 is the activity of the visitor registration form. The security
guard can use this module to register the visitor details. Security guards able to choose
either input the visitor details manually or through the scan IC function. The security
guards need to enter the visitor name, car plate number, IC number and address. The
date and time arrived is auto generated by the application. The security guards need to
ask the visitor how long they will be visit the campus and which block they are tends
to visits. After successful register, the security guards will issue an access card to the
visitor for them to visit the parking zone.
Moreover, the figure 4.5.10.2 is the splash screen to indicate there are loading the
camera after the security guard click the SCAN IC button. After loading the splash
screen, the figure 4.5.10.3 will be display. The security guards need to fit the IC inside
the box in order to scan the details faster. Furthermore, if the place are too dark then the
security guard can open the flash light directly through the activity.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 46
4.6 User Interface Design (Web Application)
Figure 4.6.1 Create vehicle registration period
Figure 4.6.2 Reserved parking zone value.
The admin are required to create a new registration period for the student to register
their vehicle. The admin need to select the “Red text” which is show in the figure 4.6.1
in order to update the reservation value. If the admin do not update the value, then the
web application will directly choose the pre-set value which had been set on last
trimester (Figure 4.6.2).
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 47
Figure 4.6.3 Date input
Figure 4.6.4 Time input
Besides that, when an admin want to create a new registration period they need to
select the date and time for the start, end and result released date. The date (Figure 4.6.3)
and the time (Figure 4.6.4) input field has been design on using the JQuery method to
change the input type to date and time picker which will reduce the burden for the admin.
After the admin created the registration period, the admin will not be able to create
another registration period again until the current ballot is released. Furthermore, the
web application will perform the necessary validation such as the end date cannot be
greater than start date. Not only that, the web application also will validate the input
text field to ensure there doesn’t contain any empty text fields.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 48
Figure 4.6.5 View trimester
Figure 4.6.6 Delete record
The figure 4.6.5 are the list of the trimester which the admin has been created previous ly.
The admin can view the previous start date, end date and result released date of the
registration period. If the admin want to delete the registration period, they can click
the delete icon in the action columns to delete the registration period. Besides that, there
will be a confirmation dialog box show for the admin to confirm that the selected
registration period are the one he/she wish to delete ( Figure 4.6.6) . The list of the
registration period will be display in paging, if the record is more than 10 which cannot
be fit in a screen.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 49
Figure 4.6.7 Create security guard account.
Figure 4.6.8 Validation checking for security guards.
Figure 4.6.9 Encrypted Password.
The figure 4.6.7 is the interface for the admin to create the security account. The
admin need to enter the security guards login ID, password, confirmation password,
name and the contact no.
Besides that, the web application will ensure that the login ID enter which is
unique (figure 4.6.8). The password must be match with the re-enter password. Lastly,
all the password stored in the database will be encrypted (Figure 4.6.9).
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 50
Figure 4.6.10 List Of Guards details
Figure 4.6.11 Edit Guard Details
Figure 4.6.12 Delete Security Guards Account.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 51
The figure 4.6.10 is the list of the total security guards account in the campus.
Each of the security guards will have one account for them to conduct their tasks in the
campus. The admin are allow to edit the security guards details by clicking the action
columns with an edit icon. After clicked the edit icon, the Figure 4.6.11 will be pop out
for the admin to edit the security guards details. After updated the details, the pop out
box will be closed automatically and then will display the security account which has
been updated. Besides that, when the admin want to delete a security guards account,
there will be a confirmation messages for the admin to select (Figure 4.6.12).
Figure 4.6.13 View current trimester student registration details
Figure 4.6.14 Filter current trimester student registration record
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 52
The figure 4.6.13 is the interface that for admin to view the current trimester
registration status. The student only will be assigned to a particular zone when the ballot
result is successful. If the result haven’t released, then the status all will be display in
pending. Besides that, the filter selection box (Figure 4.6.14) is to allow the admin to
filter the data such as only view the student who get the successful ballot on this
trimester only.
Figure 4.6.15 View parking size on each zone
The figure 4.6.15 is the table to view the parking zone size of the 5 faculty
zone on the UTAR campus. The table are managed to view the car parking size and
motorcycle parking size on each zone.
Figure 4.6.16 Spot Check Result
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 53
The figure 4.6.16 show the security guards spot check result. Each time that a
security guards check a car plate through the mobile application will be stored on the
database. After that, the admin are able to monitor the major problem that occurs
inside UTAR campus. Besides that, the admin are able to filter the details by selecting
which trimester they want to analyze. Furthermore, the admin can further filter by
selecting the check result is either invalid or invalid. The reason that provides these
features are to reduce the record that view by the admin.
Figure 4.6.17 Student registration record.
The figure 4.6.17 is the interface that allow the admin to search all student registrat ion
details for every trimester. Each pages are allow to display 10 records, the admin can
use the filter selection menu to reduce the number of records.
Figure 4.6.18 Campus Traffic.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 54
The figure 4.6.18 show the current trimester traffic in the campus. The table show that
there are only 2 parking place has been used in the zone P and there still have 178
parking slots in that zone.
Figure 4.6.19 Visitor details
The figure 4.6.19 show the visitor registration details which had been registered by
the security guards through the mobile application.
Figure 4.6.20 select duration to view spot check chart report
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 55
Figure 4.6.21 Security guards spot check chart
The figure 4.6.20 is to allow the admin to select the duration that he/she wish to view
in the charts. The figure 4.6.21 are the result of the duration from 01-06-2017 to 31-
08-2017. After that, the admin are able to know the major problem of using vehicle
sticker are using the fake sticker (third party).
Figure 4.6.22 select duration to view traffic transaction chart report
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 56
Figure 4.6.23 Traffic transaction in campus
The figure 4.6.22 show the interface for the admin to select the duration for view the
traffic transaction in the campus. The figure 4.6.23 show the result of the traffic
transaction between 01-02-2017 and 30-09-2017.
Figure 4.6.24 Ballot Result report in Chart
The figure 4.6.24 is allowed the admin to select the trimester that he/she want to view
in the chart form.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 57
Figure 4.6.25 Chart for Ballot Result
The figure 4.6.24 is the page to allow the admin select which trimester that he/she
want to view. The figure 4.6.25 show the chart of the trimester Jul 2017 to indicate
that there are 11 number of student get successful registration and none student get
unsuccessful.
Figure 4.6.26 Update Serial number
In order to increase the security on using the NFC tag to open the barrier gate, the
student need to update their serial number based on their device. If the student who has
lost their phone, they need to update the new device serial number through this interface.
Besides, the serial number is bind with the student or security guards account, then the
NFC reader only will accept those tag based on the serial number which is has been
preset by the user. Not only that, the student is allowed to active and inactive the NFC
tag through the radio button.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 58
Figure 4.6.27 manage user serial number
Before the student are allowed to update the serial number, the student need to fill in
the form through the faculty office. The admin are allowed the student to update the
serial number by checking the radio button to active. Besides that, the admin can use
the filter function to filter out the records.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 59
4.7 Database Design
Figure 4.7.1 Database Design
The figure 4.7.1 show there are nine main class in the proposed project which are users, Reservation, trimester, visitor, parkingzone, checkedcarplate, registervehicle,
traffic and vehicle details.
Each of the user with the position of security guards are able to check multiple car plate, register multiple visitor. Besides that, each of the student only can have one
registration details. A student can register their vehicle multiple time but with different trimester. Furthermore, each registered vehicle will have one or many traffic
transaction in the campus. Also, each of the reservation can be assigned to multiple trimester. Each admin can arrange multiple parking zone in the UTAR campus.
Chapter 4: System Design
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 60
4.8 NFC Design
Figure 4.8.1
The figure 4.8.1 show the NFC connection between the smart phone and the
receiver. Each time when a student or security guards they open the parking and vehicle
control application and then access the Check-in-out module, the receiver of the NFC
will interact with the database.
Each time when a student use the NFC, the receiver will update the record in the
database such as the traffic transaction inside the campus. Besides that, the receiver will
match the serial code of the scanning device with the serial number which is binds with
the user account database to determine whether the current scanning device has the right
to enter the parking zone or not.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 61
Chapter 5 System Testing
5.1 Verification Plan
Test objective: To develop a vehicle control for security guards system.
Test plan 1: Security guards spot check module.
Input Expected output Actual output
Admin manually type in the
unsuccessful ballot car
platen number.
The admin able to
know result of the
spot check whether is
valid or invalid.
The admin are need to select
the reason, if the spot check
result is invalid.
Security guards use QR
function to retrieve the
vehicle number.
Security guards able
to know result of the
spot check whether is
valid or invalid.
Security guards able to
determine whether the car
plate is valid or invalid.
Result: valid car plate No.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 62
Blank input in the car plate
for spot check.
The application will
display that is invalid
sticker.
The application display
empty text field.
Security guards use the QR
scan.
The application can
retrieve the QR code
information within 20
seconds.
The QR code scanner only
take about 5 seconds to get
the car plate number.
Security guards enter the car
plate number
The application will
retrieve the car details
within 30 seconds.
The result is displayed
within 10 seconds.
Security guards enter the car
plate number which had
been successful registered
on last trimester.
The application will
only analyse the
current trimester data
only.
The application will get the
latest trimester result.
Table 5.1.1 verification plan for security guard spot check
Conclusion of test plan 1:
The security guards are able to use 2 option to enter the car plate to determine the result
of the spot check either is valid or invalid. Besides that, the security guards are able to
retrieve the QR code details within 5 seconds and get the result of the spot check within
10 seconds. Lastly, the application will check the car plate based on only current
trimester.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 63
Test objective: To develop a vehicle control for security guards system.
Test plan 2: Visitor registration
Input Expected output Actual output
Admin enter the visitor
details such as car plate,
name and identity card.
The application are able
to generate the date and
time automatically
during registration
The application will
generate today date and
time accurately.
The admin input the
invalid IC number such as
character
The application will
display error for the user.
The application will notify
the required data on
particular field.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 64
The security guard scan
the driver identity card.
The security guard are
able to scan the admin
identity card less than 1
minutes.
The speed of the Scan IC
function are based on the
brightness of the object
which is the IC.
The security guard try to
scan the UTAR student ID
The application will grab
some of the data in the
student ID.
There will have an error
message to indicate no
related data.
The security guards click
confirm without enter any
data.
The application will
display error message to
indicate there are empty
input inside the activity.
Each of the text field will
display different error
message to request the
security guard to enter a
correct input.
Table 5.1.2 verification plan for visitor registration
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 65
Conclusion of test plan 2:
The security guards are allow to choose either enter the register details manually or
through the scanning IC function. The Scan IC function sometimes the result will not
be very accurate. However, the performance of the SCAN IC function is not the best
but there is better than a guards to enter such details manually. Each of the data field
will only accept the valid input based on the criteria.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 66
Test objective: To design a car zoning approaches
Test plan 3: Ballot Result generated
Input Expected output Actual output
More than 210 FICT student register. The ballot result will randomly
select the student to get the
successful ballot result.
The result show that the ballot procedures is
randomly selected a record to generate the result
based on the student faculty.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 67
Multiple faculty student register The ballot will assigned the zone
based on their faculty.
The ballot is assigned the zone for the successful
ballot based on their faculty zone.
Table 5.1.3 verification plan for ballot result.
Conclusion of test plan 3:
The system are able to generate the ballot result which is based on the faculty which will be minus the reservation parking slot first before select
the student to get the successful ballot. Besides that, if the available parking zone is full then the student will get the unsuccessful ballot instead
of successful.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 68
Test objective: To design an alternative ways to let user access their parking zone
Test Plan 4: check-in-out function. (NFC)
Input Expected output Actual output
Student use NFC function to
scan the reader to enter
assigned zone.
The mobile phone will
notify with a sound to
indicate the NFC had been
successfully scanned.
The application is
notify with a sound
and a welcome
messages.
Student click the check-in
module.
Student are able to retrieve
all the parking place
available on all parking
zone
Student only able to
view their assigned
zone available
parking slot.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 69
Student scan the NFC with the RFID
reader where the mobile phone serial
number is not bind with his or her
account.
The application
will display error
to notify student.
The application
display error
messages and ask
for logout, if he/she
not the owner.
Security guards click the check in module
and try to check in every parking zone
Admin are able
to enter any car
zone.
Security guard can
access any parking
zone on the campus.
Table 5.1.4 verification plan for check in
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 70
Test Plan 5: Login (Mobile Application)
Input Expected output Actual output
User has login to the application
and then close the application.
The user directly
access the main
menu instead of
entering the
username and
password again.
The application will
directly access to the
main menu.
User enter empty username but
leave blank on the password
column.
The application
will display
password input is
required.
The application display a
red symbol to indicate
there are empty on
password.
Table 5.1.5 verification plan for login
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 71
Test Plan 6: Vehicle registration (Mobile Application)
Input Expected output Actual output
Student access the vehicle
registration on a new
trimester
Student doesn’t need to enter
the vehicle details.
The data directly
display on the screen
instead of re-enter.
Student register twice on
one trimester.
Student are able to register
successfully and display
error if there is duplicated
car plate existed.
There will be a
message to notify the
student had been
register on this
trimester before.
Table 5.1.6 verification plan for student car registration.
Chapter 5: System Testing
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 72
Test Plan 7: Request help (Mobile Application)
Input Expected output Actual output
Student access helps
module
The student are able to select
the problem that had been
faced
The student need to
enter their problem
manually.
Student enter the problem
they faced on the campus
with a long sentence
The security guard are allow
to view all the sentence on
the mobile phone
notification board.
The security guard are
unable to view the full
sentence.
Student click submit
button after enter all the
details
The admin are able to
receive the notification
within 20 seconds
The admin receive the
notification within 5
seconds.
Table 5.1.7 verification plan for request help
Chapter 6: Discussion
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 73
Chapter 6 Discussion
6.1 Project Achievement
In the chapter 6, the result was prove that the project has been fits the three
objective where the ballot result are able to generate based on the student faculty.
Besides that, the security guards are able to do their tasks all in mobile application
platform instead of manually writing down everything on a paper such as the security
can use the mobile application to conduct the spot check operation in the campus. Also,
there will be introduced a new ways which is NFC function for the student and staff to
enter the campus instead of relying on one methods.
6.2 System Strengths and Limitations.
The strengths of this project is to enable a security guards and students to do their
tasks easily. For security guards, they are able to use the mobile application to conduct
spot check and registration for a visitor through multiple ways which had been provided
in the mobile application. Besides that, the student are able to use the mobile application
to check the available parking place before enter to the campus, vehicle registrat ion,
and using NFC mobile device to enter their parking zone instead of relying on the
technique RFID using access cards. Also, the NFC module are highly protected by
using the serial number. If the student want to update the serial number, they need to
fill in the form to the faculty office before they are able to update the serial number.
The limitation that will be faced on using this mobile application is the security
guards using the SCAN IC function, since the scanning function can be affected by
many reason such as the brightness, camera resolution and etc. Therefore, sometime s
the security guards will not get exactly details same as the identity card. Another
limitation of this project is the admin had been created the registration period, the
student cannot directly register but the need to close the mobile application and then re-
open it again.
6.3 Implementation Issues.
The main issues that implementing this project is the communication between the
Chapter 6: Discussion
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 74
mobile application and the web application. Each type of the user will change the value
that had been stored in the database. Besides that, both of the application are sharing
the same database. For example, the admin can generate the report while the security
guards are conducting the spot check operation at the same time. Therefore, any site of
the application change the value also will affect the database value.
Besides that, NFC scanner equipment are still unpopular in nowadays therefore in
this project will use both NFC device to act as a receiver and the sender to get the project
is done.
6.4 Enhancement
As referring to the project limitation, the function in the application will be
continuously improve. For example, the security guards using the SCAN IC function
are able to get the accurate details and complete their tasks in the fastest ways.
Besides that, make the database become a real-time database where the student can
get the latest registration period time without re-open the application. For example,
when an admin update the value in the database, the student can directly get the latest
information directly through their mobile application.
6.5 Summary
This chapter is study and determine whether the completed project can achieve the pre-
defined objective or not. Based on the each testing plan, there had been proved that
the project has achieved three of the object. Although there are few limitation in the
project, but the system helps a campus to solve many problem and very convenient for
every type of user. Previously, the admin are only can view the report based on the
Microsoft Excel. After implemented this project, the admin are allow to view the
student information and campus traffic in an organized ways and can be access in any
time through a device that with an internet connection. Furthermore, the security guards
also no need to rely on the verbal and document to determine the car plate is using valid
or invalid vehicle sticker.
Chapter 7: Conclusion
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 75
Chapter 7 Conclusion
Previously, many of the people are more relying on the paper to write down those
important information that are needed for them. But, nowadays due the advancement
of technology, the technology are able to reduce many problems or workload that had
been involved in our daily life. For example, the proposed parking and vehicle control
mobile application is more focus on control the traffic in the campus and reduce the
workload that had been faced in campus parking. In addition, the advancement of the
technology are able to increase the productivity of a person to produce their work in
better ways.
The proposed mobile application are able to providing a new car zoning approaches
for admin to ensure the parking place in the UTAR campus are fully utilized. Obviously,
the previous method are not fully utilized due to many parking zones are left empty but
other parking zone are full at all the time. However, the mobile application are able to
resolve the problems which is providing the UTAR car sticker based on their faculty.
Besides that, the mobile application will directly to help the admin to decide which
parking zone should be assigned to a particular student who are registered the vehicle
car sticker. Not only that, by implementing the barrier gate that are allow the mobile
application to provide an extra feature which is allow the user to keep track the parking
place left for student. Besides that, in order to provide a more efficient ways for security
guard to conduct their spot check operation, there are required to support by the QR
code which is enables the security guards to eliminate the entering step which is slower
than QR code reader.
Lastly, after completed the purposed web application and the mobile application, I
hope that those application can actually help and benefit a lot of user such as student,
staff, student, admin and visitor to solve their daily problems that might be occurs in
the campus
References
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 76
References Auckland council organisation, 2015. Auckland Transport Parking Strategy. [Online] Available at: https://at.govt.nz/media/1119147/Auckland-Transport-Parking-Strategy-May-2015.pdf [Accessed 09 March 2017]. Boamah, E. F., 2013. campus parking. [Online]
Available at: http://sbs.mnsu.edu/ursi/news/campus_parking.pdf [Accessed 09 March 2017]. campus, 2016. Campus parking service. [Online] Available at: https://parking.uic.edu/UserFiles/Servers/Server_87374/File/documents/UICRulesAndRegs.pdf [Accessed 24 November 2016]. Francisco, S. C., 2012. on street parking/off street parking. [Online] Available at: https://www.tripadvisor.com.my/ShowTopic-g60713-i30-k5936541-On_street_parking_offstreet_parking_driveway_park-San_Francisco_California.html [Accessed 09 March 2017]. Gtechna, 2016. Citation Equipment. [Online]
Available at: https://www.gtechna.com/product/officer-esweep/ [Accessed 24 November 2016]. Parking, T. a., 2014. Rules and regs. [Online] Available at: http://publicsafety.cua.edu/res/docs/rules-and-regs.pdf [Accessed 24 November 2016]. Parkmobile, 2016. Parkmobile. [Online] Available at: http://us.parkmobile.com/#how-it-works [Accessed 22 November 2016]. regulation, 2015. Parking Regulations. [Online] Available at: https://parking.rice.edu/uploadedFiles/Parking/Registration/Rates_and_Information/Parking%20
regulations%20w-%20pic.pdf [Accessed 24 November 2016]. Services, C., 2016. Campus. [Online] Available at: https://www.amherst.edu/services/parking#overview [Accessed 24 November 2016]. skumar, 2016. What are the Software Development Life Cycle (SDLC) phases?. [Online] Available at: http://istqbexamcertification.com/what-are-the-software-development-life-cycle-sdlc-phases/ [Accessed 22 November 2016]. The university of Texas at Austin, 2016. Access Card Usage and Instructions. [Online] Available at: https://parking.utexas.edu/parking/cardinstructions.html [Accessed 07 March 2017].
UTAR, 2014. [Online] Available at: http://www.utar.edu.my/dsa/file/FM-DSA-GSU-001%20Application%20for%20car%20sticker.pdf [Accessed 17 12 2017].
Appendix
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 77
Appendix
Appendix
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 78
Appendix
BIS (Hons) Information Systems Engineering
Faculty of Information and Communication Technology (Perak Campus), UTAR. 79
top related