You are on page 1of 16

REPUBLIC OF THE PHILIPPINES

CAMARINES SUR POLYTECHNIC COLLEGES


COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

CHAPTER IV

METHODOLOGY
This chapter expounds the methodologies used in the study, explains the series of stages
applied to the model. This chapter also interprets the design, development process and testing of
the system that was developed in this study.
The Initiation Stage
This stage expounds the identified problems that the researchers will encounter, these
problems will be the basis of the researchers to find possible solution that this study will resolve.
The proposed solution will be the basis of the researchers in the development process of the
system.
Identified Problems. This study encountered problems in the algorithm and the
programming languages that was used. The machine learning algorithm that was used in this
study was difficult to implement using PHP. The researchers also encountered problems in
identifying which data should be mined.
Proposed Solution. Albeit the problems encountered by the researchers, they gathered
possible solutions for the problems encountered. One of which was finding a pre-implemented
machine learning library in PHP. Pre-implemented machine learning library will be used in
implementing the selected algorithm that will be used in this study. The researchers also
congregate and brainstorm the possible data to be mine in this study.

The Analysis Stage


Based on the identified problems, the researchers created a backlog which will be the
basis for the sprints in the development process. This backlog will be a guide to easily

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
29
development the proposed system to be done in the time allotted for the development process.
After the creation of the backlog, planning of sprints was conducted. In this stage, the sprint was
analyzed and prepared for the development process task.

Operational Feasibility

Figure 2: Fishbone Diagram


This diagram identifies the problems that may encountered along the procedure, this
diagram also serves as a problem map of the proposed system processes and to solve it one by
one. With this diagram the researcher can traced the problems that are needed to be solved.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
30
Technical Feasibility
The programming language that was used in this study is under web technologies, the
system that was developed will be implemented on web. A hosting site and a domain will be used
to run the system effectively. Web technologies can be accessed through a network like Local
Area Network, Metropolitan Area Network, Wide Area Network, and Internet.
Schedule Feasibility
Figure 9 shows the schedule of each process in this study. It also shows the schedule of
the each sprints in the development process of the system that will be developed in this study.

Figure 3: Gantt Chart


Requirements Modeling
This section shows the conceptual model of the system. This will expounds the systems
input, output and processing steps imperative to transform inputs into the outputs. Figure 4
displays the IPO model.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
31

Figure 4: Input-Process-Output Model


Input. Data is the most important pre-requisite in data mining. Before conducting data
mining, you should have a data in order to perform, hence in this process, gathering and adding of
data was conducted.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
32
Process. The gathered data will be analyzed and the possible data mining algorithm that
suits to be applied was determined. The data mining process in this stage was also conducted in
the process stage.
Output. The result of data mining process/performance analysis was displayed and it was
also presented using graph or chart for ease interpretation of the resulted data.
Data Process Modeling
Figure 5 shows the the boundary between the system, or part of a system, and its
environment, showing the entities that interact with it.

Figure 5: Context Diagram

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
33
Object Modeling

Figure 6: Level 0 Use Case Diagram


Level 0 Use Case Diagram. Figure 6 shows the complete functionality and boundaries of
user s and administrator. User can Add, Delete and Update Data while Administrator can Add
User, Add, Edit and Delete Period, Add, Edit and Delete Delivery Unit, and mine data. While they
can all view data and login.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
34

Figure 7: Level 1 Use Case Diagram (Administrator)


Level 1 Use Case Diagram (Administrator). Figure 7 shows the functionality that an
administrator can have. Administrator can login, view data, add user, add and manage period and
delivery units and mine the data and view the result of data mining on performance analysis.
Administrator cannot add, edit or delete submitted data by the users.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
35

Figure 8: Level 1 Use Case Diagram (User)


Level 1 Use Case Diagram (User). Figure 8 shows the functionality that a user can have.
User can login, view data, add, edit and delete data.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
36

The Design Stage


In this stage the researchers shift to focus planning and analysis to design. The Output
and User-Interface design was presented in this stage. The technical blueprint was presented also
using Data Flow Diagram to showcase the system flow and Entity Relationship Diagram for the
database design.
User-Interface Design

Figure 9: iData Login Screen


Figure 9 below shows the login screen of iData. The user or admin can login through this
form. The user or admin should have their unique username and password in order to login and
pass through the verification process and have a new session. Once they passed the verification
process they can no longer access this login page and they will be redirected to the site they are
registered.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
37

Figure 11: iData Input Data Form


Figure 10 shows the user-interface of the form where you can input data and submit the
data you have input.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
38

Figure 12: iData Edit/Delete Form


Figure 12 shows the data with an edit and delete function. In this form you can either
delete data by clicking the button with trash icon and edit data by clicking the button with pen
icon. When the edit icon was clicked you will be redirected to another form which contains the
data you want to edit. When you clicked the delete button an alert message will show and ask
your permission to delete the data.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
39

Figure 13: iData Summary View


Figure 13 shows the summary of data input by the user. The Summary of data can be
copied, exported to CSV, Excel, and PDF file and print it through your browser.

Entity Relationship Diagram

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
40
Figure 14 below shows the relationship between tables in the database. It was used to
easily identify the relationship between objects during the development process. It was also used
to determine the

Figure 14: Entity Relationship Diagram

The Development Stage

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
41
In this stage, the actual engineering and writing of the application was done. This stage is
where the system construction starts. In this stage the requirements that were set forth on the
previous stage.
Software Specification
In order to develop the system, the researchers used a computer/netbook that has any
operating system and applications
Hardware Specification
In developing the system, since it was a web application, the researchers used mid-range
computer/netbook with a graphics driver and a minimum resolution of 1920 x 1080.
Program Specification
iData is a system can store data and analyze the data using Classification and Regression
Tree (CART) Algorithm. The system can display the result of the performance analysis done by
the data mining algorithm.
Programming Environment
The development process of the system in this study is under web technologies. The
researchers used application programs to code and developed a web application. The following
are the application used in the development of iData, viz:
Front-end. In creating the system, the researchers used application that can read and edit
HTML, Javascript, MySQLi and PHP file (particularly Sublime Text 3). The researcher also used
XAMPP to run the PHP File using XAMPP Localhost Apache Server and Adobe Photoshop to
design and create graphics that was used in the system.

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
42
Backend. In terms of data storing, the researchers used XAMPP MySQL server to access
and store data.
Deployment Diagram
Deployment diagram is a structure diagram which shows architecture of the system as
deployment (distribution) of software artifacts to deployment targets. Artifacts represent concrete
elements in the physical world that are the result of a development process (Fakhroutdinov, n.d.).
Test Plan

REPUBLIC OF THE PHILIPPINES


CAMARINES SUR POLYTECHNIC COLLEGES
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
43
Notes

Fakhroutdinov, K. (n.d.). Deployment Diagrams Overview. Retrieved from UML Diagrams:


http://www.uml-diagrams.org/deployment-diagrams-overview.html

You might also like