Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 56

TRUSTPORT: YOUR FRIENDLY REPOSITORY FOR PORT RESTRICTED AND

EXCESS ITEMS

A Proposal

Presented to the Faculty of the

College of Computer Studies University of Cebu

In Partial Fulfillment of the Requirements

For the Degree Bachelor of Science in Information Technology

By
Maica Loberanes

Vince Ybas

Sylvester Joshua Barot

Mr. Teodoro Marvin Avergonzado Jr.


Adviser

October 2018
ACKNOWLEDGEMENT

We would like to thank God in giving us strength, good health,


encouragement and wisdom to overcome challenges. Through His guidance, we were
able to accomplish and come up with this proposal.

We would like to express our deep and sincere gratitude to our Adviser Mr.
Teodoro Marvin Avergonzado Jr. for his kindness and patience and for helping us
in our capstone project. It was a great privilege and honor to work and study under his
guidance. And to our CCS professors THANK YOU SO MUCH!

Finally, to our Family there are not enough words to describe how thankful
we are. Thank you for the love and sacrifices. Thank you for all the supports, thank
you for everything and to our classmates and friends thank you for helping us and
supporting us.

The Researchers
DEDICATION

We would like to dedicate this Capstone Project to our Family who never stop
giving their full support, for encouraging us and inspiring us. To our Teachers who guide us
in our projects and who helping us grow.

And to our Classmates and Friends our source of happiness thank you for helping us.

Most of all, to our God who guided us to overcome the challenges that we are facing this
entire semester and for the rest of our life.
TABLE OF CONTENTS

DEDICATION..............................................................................................................3
LIST OF TABLES.......................................................................................................6
CHAPTER I................................................................................................................10
INTRODUCTION......................................................................................................10
Definition of Terms.................................................................................................13
CHAPTER II..............................................................................................................14
REVIEW OF RELATED LITERATURE AND STUDIES...................................14
COMPARATIVE MATRIX...............................................................................17
CHAPTER III.............................................................................................................18
RESEARCH METHODOLOGY.............................................................................18
Software Engineering Methodology......................................................................18
Planning/Conception-Initiation Phase..................................................................19
Business Model Canvas.......................................................................................19
Program Workflow.............................................................................................19
Validation Board.................................................................................................21
Gantt Charts........................................................................................................21
Functional Decomposition Diagram..................................................................22
Use Case Diagram................................................................................................23
Storyboard............................................................................................................25
Database Design...................................................................................................38
Network Design....................................................................................................44
Development/Construction/Build Phase...............................................................45
Technology Stack Diagram.................................................................................45
Program Specification.........................................................................................47
References...................................................................................................................50
LIST OF TABLES
Table 1 Comparative Matrix...............................................................................17
Table 2 Passenger Table......................................................................................39
Table 3 Passenger Transaction Table..................................................................39
Table 4 Delivery Table.........................................................................................40
Table 5 Compartment..........................................................................................40
Table 6 Passenger Transaction............................................................................41
Table 7 Item Storage............................................................................................41
Table 8 Representative........................................................................................42
Table 9 Location..................................................................................................42
Table 10 Authorize...............................................................................................43
Table 11 Notification............................................................................................43
Table 12 List of Modules......................................................................................48
LIST OF FIGURES
Figure 1:Flow of the Study........................................................................................12
Figure 2: Unclaimed Baggage website screenshots.................................................14
Figure 3: Kahon.ph website screenshots..................................................................15
Figure 4: De-kahon website screenshots..................................................................15
Figure 5: Software Engineering Methodology........................................................17
Figure 6: Business Model Canvas.............................................................................18
Figure 7: Program Workflow–Passenger................................................................19
Figure 8: Program Workflow–Representative........................................................19
Figure 9: Validation Board.......................................................................................20
Figure 10: Capstone 41 Gantt Chart........................................................................21
Figure 11: Capstone 42 Gantt Chart........................................................................21
Figure 12: Functional Decomposition Diagram-WEB............................................22
Figure 13 : Functional Decomposition Diagram - MOBILE.................................22
Figure 14 : Use Case - Passenger..............................................................................23
Figure 15: Use Case-Representative.........................................................................23
Figure 16: Story Board – Landing Page..................................................................24
Figure 17: Story Board – Log in Form.....................................................................25
Figure 18: Story Board – User Account...................................................................25
Figure 19 : Story Board – User Account Information............................................26
Figure 20: Story Board – User Account Details......................................................26
Figure 21: Story Board – User..................................................................................27
Figure 22: Story Board – User..................................................................................27
Figure 23: Story Board – User Verify Account.......................................................28
Figure 24: Story Board – User Transaction............................................................28
Figure 25: Story Board – User Claiming Method...................................................29
Figure 26 : Story Board - Deliver Details.................................................................29
Figure 27 : Story Board – Mode of Payment...........................................................30
Figure 28: Story Board – Delivery Record..............................................................30
Figure 29 : Story Board – Confirm Deliver.............................................................31
Figure 30: Story Board – Authorize/Pick up...........................................................31
Figure 31: Story Board – Mode of Payment............................................................32
Figure 32 : Story Board - Successful........................................................................32
Figure 33 : Story Board – Admin Dashboard.........................................................33
Figure 34 : Story Board – Admin add Item.............................................................33
Figure 35 : Story Board – User Info.........................................................................34
Figure 36 : Story Board – Admin List of Records..................................................34
Figure 37 : Story Board – Notifications...................................................................35
Figure 38 : Story Board – Transaction History.......................................................35
Figure 39 : Story Board – Transaction Status.........................................................36
Figure 40 : Story Board – Transaction Details........................................................36
Figure 41 : TrustPort ERD........................................................................................37
Figure 42 : Network Model.......................................................................................43
Figure 43: Technology Stack Diagram.....................................................................44
Figure 44 : Software Specification............................................................................45
Figure 45 : Hardware Specification..........................................................................46
CHAPTER I
INTRODUCTION

Rationale of the study

Technology is an integral and important part of our life. People use technology such
as computers and the Internet to complete schoolwork, projects and to conduct research.
Technology is an absolute need we cannot escape from, it has a very big role in most aspects
of our lives. Technology helps us to keep in touch with people who are away from us. We use
the telephones and computers to talk to them and even see them.

The use of technology has made our life comfortable. It is easy to check the weather
and keep updated on severe or threatening situations. No one can escape from the absolute
need of technology in our daily life. Through the help of the technology, booking ticket online
is much convenient. The airport system interfaces and integrates the majority of electronic
information, assuring maximum flow of information for operations, management and
security.

There are restricted items that are not allowed in the airport. There are a lot of
passengers always forgot the airport restricted items they end up throwing the items because
they can’t bring it, you are just wasting your item eventually your money spent. Passenger
excess items, one of the most common problem of the airline passengers. Packing too much
when you pack for a trip is that you don’t need as much as you think you need. Assuming
your carry-on bag is the right size. Airports have different set of rules when it comes to carry
on bag sizes packing large liquids in a carry on. Before you head to the airport, make sure to
check before you leave home.

Philippines Law restricts the important of certain goods for reasons of national
security, environment and public health protection, order and morality, in addition to
complying with international treaties and obligations. Philippine Airports restricted items
were divided into seven categories covering guns, firearms, devices discharging projectiles,
stunning devices, objects with sharp points and edges, liquids etc.

It is important to be aware that restrictions are enforced with regard to the liquids that
can be carried specially in the airports. Liquid, aerosols and gels (LAGs) in individual
containers with the capacity not greater that 100ml. Exempted from the restrictions on LAGs
are medication, baby milk and food and special dietary requirements. Also permitted to
ensure the health and welfare of certain passengers are: baby formula, medication etc. In the
case of medicine shall be carried in containers not more than 100ml and in the prescribed
transparent re-sealable plastic bag with the proof of prescription or statement.

Passengers are finding it difficult to remember all of these items that are not allowed,
there always will be some passengers who remain unaware. Some of those passengers likely
will blame the airport. Airports have their own list of items that are not allowed. They have no
choice they end up throw it because there’s no family left behind to get the items.

Our proposed system TrustPort is a friendly repository for port restricted and excess
items. That will help to solve the problem of the passenger, instead of throwing the items it’s
better to store the items and claim it to their families.

Objectives of the Study

The main objective of the study is to design, analyze and develop a web based and mobile
application of port restricted and excess items.

Specially, the proposed system aims to provide a;


1. Create a platform that the passenger can store their restricted and excess items.
2. Offers a claiming method where a passenger can choose delivery, claim later or
authorize person.
3. Monitor rental records of the storage compartments of the items for safe keeping.
4. Provide system SMS notification for delivery upon pickups and authorize person
for pickup of items.
5. Manage and monitor payment transactions
6. Generates detailed reports such as transaction of compartment usage, histories of
the passenger, list of items, rental period and payment history.

Scope and Limitation of the Study

This study focuses on the development of Trusport, a software that stored and to
retrieve the restricted and excess items.
Scope of the study

 The system will track the items that have been stored.
 The system generates an I.D and password for those who don’t have an account.
 The system lets user edit their account credentials.
 The system provides push notifications.
 The system sends their credentials to the email/phone number they provide so that
they can use it to open their account.
 The system will allow the user to track their items and view their payments.

Limitations of the study

 The system can only store the items for up to 1 month.


 The system does not support IOS mobile devices.
 The system will be implemented within in the Philippines Airports.
 The system web application is only for administrator.

Significance of the Study


The proposed system will serve as a useful and a friendly repository for port restricted &
excess items to help people to store their excess stuff.

The study benefits the following:

Passenger - are people who ride on buses, airliners, ship and other methods of transportation.
Airlines - an organization providing a regular public service or air transportation on one more
routes.
Researchers - This will help give them tips and guides in developing the system. This will
enable individual people to utilize what they have learned in their laboratory sessions and
research studies about the given research titles.
Future Researchers - This project can serve as their references for those researchers who are
also taking the same study. This will also inspire researchers to improve and redesign or
innovate a new projects out from this references projects.
Flow of the Study

Rationale of the Study


Objectives of the Study
Related Literature

Customer Validation
Data Gathering
Iterative Methodology

TRUSTPORT: Your friendly


repository for port restricted and
excess items.

Figure 1:Flow of the Study

Definition of Terms

TrustPort - Repository for port restricted and excess items.


Passengers - are people who ride on buses, airliners, ship and other methods of
transportation.
Repository - a place where items may be stored.
Receiver - an authorized person to claim the items.
Mode of Payment- This refers on what type of payment does the passenger wants.
Cash on Delivery- The payment will be given when the item is already on their hand through
delivery.
Delivery - The process of transporting the items to the receiver’s house or address of
delivery.
Pick up- The process of claiming the items where the receiver go to airport to claim the items
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES

Related Literature

This chapter presents the writing of various personalities conducted by the proponents
throughout their analysis, that have relevant to this study. That is a guide for the researches to
realize their target objectives by obtaining ideas on connected studies.

According to (Singapore Airlines, January 2017) For the safety and security of the
passenger crew and aircraft. The items are either prohibited or restricted on all aircraft, in
accordance with the Dangerous Goods Regulations of International Air Transport Association
(IATA). The international Civil Aviation Association (ICAO) Technical Instructions and/or
SIA’s rules and regulations. You need to obey the rules and the law if the items is not allowed
to the airport you need to throw it away because you don’t have any choice.

According to (Transportation Security Administration, April 2018) TSA screens


approximately 1.3 million checked bags for explosives and other dangerous items daily. Upon
check in, your checked baggage will be provided to TSA for security screening. You must get
your restricted or prohibited stuff, or just throw it on the trashcans. Once the screening
process has completed, your airline will transport your checked baggage on your respective
flight as well as deliver it to the baggage claim area. The majority of checked baggage is
screened without the need for a physical bag search.

According to (Office for Transportation Security, October 2017) Releases a new list of
restricted items in congruence to international standards set by the International standards set
by the International Civil Aviation Organization (ICAO). The said step is to develop the pre-
existing list of items prohibited on Philippine airports to counter emerging threats to civil
aviation brought about by introduction of new items capable of being used to destabilize
aircrafts and innovative ways of artfully concealing weapons devised by unlawful elements. It
also intends to establish a standardized security screening operation at all airports in the
country. The OTS has added essential items and increases the standard level to commensurate
with threats posed by the introduction of these new items.
Related Studies

The study is based on different websites, organizations, and applications. Some


features have similarities to the proposed project. These similarities will guide the researchers
in creating the project. The following figures below are the studies with its own description
which has significance in our study. The following websites are the ones who are closely
related to the presented study.

Unclaimed Baggage Center

The Unclaimed Baggage Center is a retail store located in Scottsboro in Jackson


Country, Alabama. The Store’s concept of reselling of lost or unclaimed airline luggage has
received national attention over the years, including mentions on The Oprah Winfrey Show,
Late Night with David Letterman, Fox News and the Today show. Over a million customers
visit the 50,000-square foot store each year to browse through some of the 7,000 items added
each day. According to Thrillist, most items are sold for a discount of 20-80%.

Figure 2: Unclaimed Baggage website screenshots


Kahon.ph

Kahon.ph is the first web-based storage solution in the Philippines. Unlike conventional
storage services, we eliminate the logistical burden of customers bringing their items to a
storage facility while also giving them convenience of doing everything from the comfort of
their homes.

Figure 3: Kahon.ph website screenshots

De-kahon

De-Kahon was simple: will provide a completely on-demand storage service for
residents of Metro Manila (at least initially), specially those who live in small spaces like
dorms, apartments, condominiums, or small homes; space is getting harder and harder to
come by. Living in Metro Manila can be stressful already, and having chaos and clutter at
home does not help. So that will allow them to expand the space for their stuff quickly and
easily.

Figure 4: De-kahon website screenshots


COMPARATIVE MATRIX

Table 1

COMPARATIVE MATRIX

Features Unclaimed Kahon.ph De-Kahon TRUSTPORT


Baggage

Profile ✔ ✔ ✔ ✔
Management
Manage ✔ ✔ ✔ ✔
Account
Make Delivery ✔ ✔ ✔
Track Item ✔ ✔
Mode of ✔ ✔ ✔
Payments
Manage Rental ✔
period
Check Item ✔
Status
View Rental ✔
History
View ✔
Transactions
history
Send/Receive ✔
Notifications
Manage ✔ ✔ ✔
Preferences and
mode of
Transactions
Manage Items ✔
and payment
transaction
Cash on ✔
Delivery
TOTAL 20% 40% 38% 100%
CHAPTER III
RESEARCH METHODOLOGY

Software Engineering Methodology

In developing our project, the proponents have decided to use the Agile
Methodology. In agile methodology, software developed in incremental, rapid cycles.
Interactions among customer, developers and client are emphasized rather than processes and
tools. Agile methodology focuses on responding to change rather than extensive planning.

Figure 5: Software Engineering Methodology


Planning/Conception-Initiation Phase

Business Model Canvas

Figure 6: Business Model Canvas

The Figure above shows the Business Model Canvas of the TrustPort system. The
proponents were able to identify the key factors that will affect greatly on the proposed study.

Program Workflow

A Program Workflow is a visual representation of the sequence of steps needed to


perform the process from beginning to end. The researchers use workflow to show how the
Trustport system works as shown below. Below shows how user and Admin interact with our
system.
Figure 7: Program Workflow–Passenger

The figure above shows that the user can manage account, transaction. User will
receive SMS notification about his transactions. User can view his transaction history.

Figure 8: Program Workflow–Representative

The figure above shows that the admin is can manage account user and transaction.
Admin will send SMS notification to the user about his transactions. Admin checked
payment, manage tracking and rental period.
Validation Board

The researcher conducted this Validation Board survey as a tool to test if the
proposed system is acceptable by the Providers and the Purchasers. Most of the respondents
approved to the benefits that the Trustport system offers to them.

Figure 9: Validation Board

Gantt Charts

This is the Trusport Gantt Chart this is the tool we used in allotting the different
activities in order to complete the study. This constructed with a horizontal axis representing
the total time span of our project, broken down into increments and a vertical axis
representing the tasks that make up our project. Horizontal bars of varying lengths represent
the sequences, timing, and time span for each task.
Figure 10: Capstone 41 Gantt Chart

Figure 11: Capstone 42 Gantt Chart


Functional Decomposition Diagram

TrustPort Functional Decomposition Diagram or simply (FDD) the method we used


to model the business-related functions also simplifies our business process and shows
individual elements. This will decompose and organizes a function in a hierarchical process
where it was translated into program modules during the implementation of the application. It
also illustrates the users of the system on a functional level which further advances the
understanding of the proponents, readers and possible future researchers.

Figure 12: Functional Decomposition Diagram-WEB

Figure 13 : Functional Decomposition Diagram - MOBILE


Use Case Diagram

This is the Use Case Diagram of TrustPort it describes how users perform tasks on a
system. Also, it outlines how the system responds to the request of a certain actor. Also shows
the steps performed by an actor and how these processes relate to each other.

Figure 14 : Use Case - Passenger

Figure 15: Use Case-Representative


Storyboard

A storyboard is a graphic organizer in the form of illustrations or images displayed in


sequence for the purpose of pre-visualizing a motion picture, animation, motion graphic or
interactive media sequence.

Figure 16: Story Board – Landing Page


Figure 17: Story Board – Log in Form
Figure 18: Story Board – User Account

Figure 19 : Story Board – User Account Information

Figure 20: Story Board – User Account Details


Figure 21: Story Board – User

Figure 22: Story Board – User


Figure 23: Story Board – User Verify Account

Figure 24: Story Board – User Transaction


Figure 25: Story Board – User Claiming Method

Figure 26 : Story Board - Deliver Details


Figure 27 : Story Board – Mode of Payment

Figure 28: Story Board – Delivery Record


Figure 29 : Story Board – Confirm Deliver

Figure 30: Story Board – Authorize/Pick up


Figure 31: Story Board – Mode of Payment

Figure 32 : Story Board - Successful


Figure 33 : Story Board – Admin Dashboard

Figure 34 : Story Board – Admin add Item


Figure 35 : Story Board – User Info

Figure 36 : Story Board – Admin List of Records


Figure 37 : Story Board – Notifications

Figure 38 : Story Board – Transaction History


Figure 39 : Story Board – Transaction Status

Figure 40 : Story Board – Transaction Details


Database Design

Database design is the process of producing a detailed data model of a database. This


data model contains all the needed logical and physical design choices and physical storage
parameters needed to generate a design in a data definition language, which can then be used
to create a database. A fully attributed data model contains detailed attributes for each entity.

Entity-Relationship Diagram

An entity-relationship diagram (ERD) is a data modeling technique that graphically


illustrates an information system’s entities and the relationships between those entities. An
ERD is a conceptual and representational model of data used to represent the entity
framework infrastructure.

Figure 41 : TrustPort ERD

Data Dictionary

A data dictionary is a collection of descriptions of the data objects or items in a data


model for the benefit of programmers and others who need to refer to them. A first step in
analyzing a system of objects with which users interact is to identify each object and its
relationship to other objects. This process is called data modeling and results in a picture of
object relationships. After each data object or item is given a descriptive name, its
relationship is described (or it becomes part of some structure that implicitly describes
relationship), the type of data (such as text or image or binary value) is described, possible
predefined values are listed, and a brief textual description is provided. This collection can be
organized for reference into a book called a data dictionary.

Table 2

PASSENGER TABLE

Field Name Description Data Type Length Null

PassID Primary Key INT NO


PassFname Passenger VARCHAR 100 NO
Firstname
PassLname Passenger VARCHAR 100 NO
Lastname
PassEmail Passenger Email VARCHAR 100 NO
PassContactNo Passenger Contact INT 100 NO
number
PassPassword Passenger VARCHAR 100 NO
Password
TokenID INT NO

Table 3

PASSENGER TRANSACTION DETAILS

Field Name Description Data Type Length Null

Items_trans_id Foreign Key INT 100 NO


Pass_trans_id Primary Key INT 100 NO
Item_stor_id Item storage id INT 100 NO
Item_cat_id Item Category INT 100 NO
id
Item_name Item name VARCHAR 100 NO
Table 4

DELIVERY

Field Name Description Data Type Length Null

Item_del_id Primary Key INT 100 NO


Reciever_name Name VARCHAR 100 NO
Contact num Contact num of INT 100 NO
the receiver
Complete_adr Complete VARCHART 100 NO
Address
Delivery_date Delivery date1 datetime NO

Table 5

COMPARTMENT

Field Name Description Data Type Length Null

Compart_id Foreign Key INT 100 NO


Loc_id Primary Key INT 100 NO
Compart_desc Compartment VARCHAR 100 NO
description
Compart_price Compartment INT 100 NO
price

Table 6

PASSENGER TRANSACTION

Field Name Description Data Type Length Null


Pass_trans_id Primary Key INT 100 NO
Pass_id Foreign Key INT 100 NO
Rep_id Foreign Key INT 100 NO
Auth_id Foreign Key INT 100 NO
Payment_method Payment VARCHAR 100 NO
method
Claim method Claiming VARCHAR 100 NO
method
Total_price Total price INT 100 NO
Trans_date Transaction datetime NO
Date
Trans_status Transaction VARCHAR 100 NO
Status

Table 7

ITEM STORAGE

Field Name Description Data Type Length Null

Item_stor_id Primary Key INT 100 NO


Stor_Desc Storage VARCHAR 100 NO
description
Stor_price Storage Price VARCHAR 100 NO
Store_status Storage Status VARCHAR 100 NO

Table 8

REPRESENTATIVE

Field Name Description Data Type Length Null

Rep_id Primary Key INT 100 NO


Rep_fname Representative VARCHAR 100 NO
first name
Rep_lname Representative VARCHAR 100 NO
last name
Rep_email Representative VARCHAR 100 NO
email
Rep_con_num Representative VARCHAR 100 NO
contact number
Rep_pass Representative VARCHAR 100 NO
password
Rep_token token VARCHAR 100 NO

Table 9

LOCATION

Field Name Description Data Type Length Null

Loc_id Primary key INT 100 NO


Item_del_id Foreign Key INT 100 NO
Loc_name Location Name VARCHAR 100 NO
Del_price price INT 100 NO

Table 10

AUTHORIZE

Field Name Description Data Type Length Null

Auth_id Primary Key INT 100 NO


Pass_id Foreign Key INT 100 NO
Auth_fname Authorize first VARCHAR 100 NO
name
Auth_lname Authorize last VARCHAR 100 NO
name
Auth_mname Authorize VARCHAR 100 NO
middle name
Auth_con_num Authorize INT 100 NO
contact number
Auth_email Authorize email VARCHAR 100 NO
Auth_addr Authorize VARCHAR 100 NO
Address

Table 11

NOTIFICATION

Field Name Description Data Type Length Null

Item_cat_id Primary Key INT 100 NO


Item_desc Item description VARCHAR 100 NO

Network Design

Network design is a category of systems design that deals with data transport
mechanisms. As with other systems' design disciplines, network design follows an analysis
stage, where requirement are generated, and precedes implementation, where the system (or
relevant system component) is constructed. 

Network Model

TrustPort Network Model, this is our database model conceived a flexible way of
representing objects and their relationships. Its distinguishing feature is that the schema,
viewed as a graph in which object types are nodes and relationship types are arcs, is not
restricted to being a hierarchy or lattice.

The figure below shows the network design of the proposed system. It shows how the
nodes, network equipment and links of how they are connected to each other. As long as there
is an internet, all the users can access to their accounts. The admin can access to the system
directly or using the internet.

Figure 42 : Network Model

Network Topology

The Trustport network topology is a Star topology because it is very popular and the
start-up costs are low. It is also easy to add new nodes to the network. The network is robust
in the sense that if one connection between a computer and the hub fails, the other
connections remain intact. If the central hub fails, however, the entire network goes down

Development/Construction/Build Phase

The Developing Phase involves more than code development and software
developers. The infrastructure is also developed during this phase and all roles are active in
building and testing deliverables. The team continues to identify all risks throughout the
phase and address new risks as they emerge.

Technology Stack Diagram

A set of software that provides the infrastructure for a computer that is used for
making the Trustport system. This comprises the layers in software offering that need to
create a complete platform. The stacks differ whether installed in a client or a server.

Figure 43: Technology Stack Diagram

Software Specification

Software Specification is a detailed description of a software system to be developed


with its functional and non-functional requirements. The software specification supplies the
definition of essential software needed by the proposed system. It provides the technologies
that will be used by the proponents in developing the proposed system.
Figure 44 : Software Specification

Hardware Specification

The hardware specification deals with the physical parts of a computer and for the
application to perform its expected functions. The tangible components of a system that
would define the requirements of its hardware peripherals so that the system will be capable
of its expected functions.

Figure 45 : Hardware Specification

Program Specification

A program specification is the definition of what a computer program is expected to


do. It includes the list of modules that the researchers will be implementing to the system.

List of Modules

List of modules will serve as the guidelines for the developers in implementing the
TrustPort system.
Table 12

LIST OF MODULES

Port
Programmer Modules Administrator
Passengers
Account Management
1. Create Account *
2. Login/ Logout * *
3. Update Account * *
4. Deactivate Account *
No. of Points (1 point per module per user) 1 1
Items Management
1. Create Items *
2. Retrieve Items *
3. Update Items *
4. Delete Items *
No. of Points (1 point per module per user) 0 1
Transactions Management
1. Create Transactions *
2. Retrieve Transactions *
3. Update Transactions
*

No. of Points (1 point per module per user) 1 1


Payment Transaction Management
1 .Create *
2. Retrieve *
No. of Points (1 point per module per user) 1 1
Monitor and Notification Management
1. Create Notification *
2. View Notification *
No. of Points (1 point per module per user) 1 1
Inquiry and Reports Management
1. View Transactions *
2. View History of Transaction * *
3. View and Summarize Sales Report *

4. View and Summarize Subscription *


No. of Points (1 point per module per user) 1 1
Number of Modules per User (equals no. of points per user) 5 6
Total Number of Modules 11

References

Singapore Airlines (January 2017) Retrieved from

https://www.singaporeair.com/en_UK/us/travel-info/baggage/baggage-restrictions/

Transportation Security Administration (April 2018) Retrieved from

https://www.tsa.gov/travel/security-screening

Office for Transportation Security (October 2017) Retrieved from

http://www.ots.gov.ph/
De-kahon , Retrieved from

http://www.de-kahon.com/home

Kahon , Retrieved from

https://www.kahon.ph/

Unclaimed Baggage, Retrieved from

https://www.unclaimedbaggage.com/

Curriculum Vitae

HUSTLER

Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com

______________________________________________________________________________

PERSONAL INFORMATION

Date of Birth : July 11, 1999


Place of Birth : Alaska Mambaling
Civil Status : Single
Religion : Roman Catholic
EDUCATIONAL BACKGROUND

Elementary :Alaska Elementary School


High School : Don Carlos A. Gothong National High School
College :University of Cebu - Main
Course :Bachelor of Science in Information Technology

HACKER

Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com

______________________________________________________________________________

PERSONAL INFORMATION

Date of Birth : July 11, 1999


Place of Birth : Alaska Mambaling
Civil Status : Single
Religion : Roman Catholic
EDUCATIONAL BACKGROUND

Elementary :Alaska Elementary School


High School : Don Carlos A. Gothong National High School
College :University of Cebu - Main
Course :Bachelor of Science in Information Technology

. HIPSTER

Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com

______________________________________________________________________________

PERSONAL INFORMATION

Date of Birth : July 11, 1999


Place of Birth : Alaska Mambaling
Civil Status : Single
Religion : Roman Catholic
EDUCATIONAL BACKGROUND

Elementary :Alaska Elementary School


High School : Don Carlos A. Gothong National High School
College :University of Cebu - Main
Course :Bachelor of Science in Information Technology
Appendix A: Oath of Confirmation
Appendix B: Capstone Project Team Composition Form
Appendix G: Capstone41 Consultation Log Form
Appendix H: Censor’s Certificate

You might also like