Professional Documents
Culture Documents
Trustport: Your Friendly Repository For Port Restricted and Excess Items
Trustport: Your Friendly Repository For Port Restricted and Excess Items
EXCESS ITEMS
A Proposal
By
Maica Loberanes
Vince Ybas
October 2018
ACKNOWLEDGEMENT
We would like to express our deep and sincere gratitude to our Adviser Mr.
Teodoro Marvin Avergonzado Jr. for his kindness and patience and for helping us
in our capstone project. It was a great privilege and honor to work and study under his
guidance. And to our CCS professors THANK YOU SO MUCH!
Finally, to our Family there are not enough words to describe how thankful
we are. Thank you for the love and sacrifices. Thank you for all the supports, thank
you for everything and to our classmates and friends thank you for helping us and
supporting us.
The Researchers
DEDICATION
We would like to dedicate this Capstone Project to our Family who never stop
giving their full support, for encouraging us and inspiring us. To our Teachers who guide us
in our projects and who helping us grow.
And to our Classmates and Friends our source of happiness thank you for helping us.
Most of all, to our God who guided us to overcome the challenges that we are facing this
entire semester and for the rest of our life.
TABLE OF CONTENTS
DEDICATION..............................................................................................................3
LIST OF TABLES.......................................................................................................6
CHAPTER I................................................................................................................10
INTRODUCTION......................................................................................................10
Definition of Terms.................................................................................................13
CHAPTER II..............................................................................................................14
REVIEW OF RELATED LITERATURE AND STUDIES...................................14
COMPARATIVE MATRIX...............................................................................17
CHAPTER III.............................................................................................................18
RESEARCH METHODOLOGY.............................................................................18
Software Engineering Methodology......................................................................18
Planning/Conception-Initiation Phase..................................................................19
Business Model Canvas.......................................................................................19
Program Workflow.............................................................................................19
Validation Board.................................................................................................21
Gantt Charts........................................................................................................21
Functional Decomposition Diagram..................................................................22
Use Case Diagram................................................................................................23
Storyboard............................................................................................................25
Database Design...................................................................................................38
Network Design....................................................................................................44
Development/Construction/Build Phase...............................................................45
Technology Stack Diagram.................................................................................45
Program Specification.........................................................................................47
References...................................................................................................................50
LIST OF TABLES
Table 1 Comparative Matrix...............................................................................17
Table 2 Passenger Table......................................................................................39
Table 3 Passenger Transaction Table..................................................................39
Table 4 Delivery Table.........................................................................................40
Table 5 Compartment..........................................................................................40
Table 6 Passenger Transaction............................................................................41
Table 7 Item Storage............................................................................................41
Table 8 Representative........................................................................................42
Table 9 Location..................................................................................................42
Table 10 Authorize...............................................................................................43
Table 11 Notification............................................................................................43
Table 12 List of Modules......................................................................................48
LIST OF FIGURES
Figure 1:Flow of the Study........................................................................................12
Figure 2: Unclaimed Baggage website screenshots.................................................14
Figure 3: Kahon.ph website screenshots..................................................................15
Figure 4: De-kahon website screenshots..................................................................15
Figure 5: Software Engineering Methodology........................................................17
Figure 6: Business Model Canvas.............................................................................18
Figure 7: Program Workflow–Passenger................................................................19
Figure 8: Program Workflow–Representative........................................................19
Figure 9: Validation Board.......................................................................................20
Figure 10: Capstone 41 Gantt Chart........................................................................21
Figure 11: Capstone 42 Gantt Chart........................................................................21
Figure 12: Functional Decomposition Diagram-WEB............................................22
Figure 13 : Functional Decomposition Diagram - MOBILE.................................22
Figure 14 : Use Case - Passenger..............................................................................23
Figure 15: Use Case-Representative.........................................................................23
Figure 16: Story Board – Landing Page..................................................................24
Figure 17: Story Board – Log in Form.....................................................................25
Figure 18: Story Board – User Account...................................................................25
Figure 19 : Story Board – User Account Information............................................26
Figure 20: Story Board – User Account Details......................................................26
Figure 21: Story Board – User..................................................................................27
Figure 22: Story Board – User..................................................................................27
Figure 23: Story Board – User Verify Account.......................................................28
Figure 24: Story Board – User Transaction............................................................28
Figure 25: Story Board – User Claiming Method...................................................29
Figure 26 : Story Board - Deliver Details.................................................................29
Figure 27 : Story Board – Mode of Payment...........................................................30
Figure 28: Story Board – Delivery Record..............................................................30
Figure 29 : Story Board – Confirm Deliver.............................................................31
Figure 30: Story Board – Authorize/Pick up...........................................................31
Figure 31: Story Board – Mode of Payment............................................................32
Figure 32 : Story Board - Successful........................................................................32
Figure 33 : Story Board – Admin Dashboard.........................................................33
Figure 34 : Story Board – Admin add Item.............................................................33
Figure 35 : Story Board – User Info.........................................................................34
Figure 36 : Story Board – Admin List of Records..................................................34
Figure 37 : Story Board – Notifications...................................................................35
Figure 38 : Story Board – Transaction History.......................................................35
Figure 39 : Story Board – Transaction Status.........................................................36
Figure 40 : Story Board – Transaction Details........................................................36
Figure 41 : TrustPort ERD........................................................................................37
Figure 42 : Network Model.......................................................................................43
Figure 43: Technology Stack Diagram.....................................................................44
Figure 44 : Software Specification............................................................................45
Figure 45 : Hardware Specification..........................................................................46
CHAPTER I
INTRODUCTION
Technology is an integral and important part of our life. People use technology such
as computers and the Internet to complete schoolwork, projects and to conduct research.
Technology is an absolute need we cannot escape from, it has a very big role in most aspects
of our lives. Technology helps us to keep in touch with people who are away from us. We use
the telephones and computers to talk to them and even see them.
The use of technology has made our life comfortable. It is easy to check the weather
and keep updated on severe or threatening situations. No one can escape from the absolute
need of technology in our daily life. Through the help of the technology, booking ticket online
is much convenient. The airport system interfaces and integrates the majority of electronic
information, assuring maximum flow of information for operations, management and
security.
There are restricted items that are not allowed in the airport. There are a lot of
passengers always forgot the airport restricted items they end up throwing the items because
they can’t bring it, you are just wasting your item eventually your money spent. Passenger
excess items, one of the most common problem of the airline passengers. Packing too much
when you pack for a trip is that you don’t need as much as you think you need. Assuming
your carry-on bag is the right size. Airports have different set of rules when it comes to carry
on bag sizes packing large liquids in a carry on. Before you head to the airport, make sure to
check before you leave home.
Philippines Law restricts the important of certain goods for reasons of national
security, environment and public health protection, order and morality, in addition to
complying with international treaties and obligations. Philippine Airports restricted items
were divided into seven categories covering guns, firearms, devices discharging projectiles,
stunning devices, objects with sharp points and edges, liquids etc.
It is important to be aware that restrictions are enforced with regard to the liquids that
can be carried specially in the airports. Liquid, aerosols and gels (LAGs) in individual
containers with the capacity not greater that 100ml. Exempted from the restrictions on LAGs
are medication, baby milk and food and special dietary requirements. Also permitted to
ensure the health and welfare of certain passengers are: baby formula, medication etc. In the
case of medicine shall be carried in containers not more than 100ml and in the prescribed
transparent re-sealable plastic bag with the proof of prescription or statement.
Passengers are finding it difficult to remember all of these items that are not allowed,
there always will be some passengers who remain unaware. Some of those passengers likely
will blame the airport. Airports have their own list of items that are not allowed. They have no
choice they end up throw it because there’s no family left behind to get the items.
Our proposed system TrustPort is a friendly repository for port restricted and excess
items. That will help to solve the problem of the passenger, instead of throwing the items it’s
better to store the items and claim it to their families.
The main objective of the study is to design, analyze and develop a web based and mobile
application of port restricted and excess items.
This study focuses on the development of Trusport, a software that stored and to
retrieve the restricted and excess items.
Scope of the study
The system will track the items that have been stored.
The system generates an I.D and password for those who don’t have an account.
The system lets user edit their account credentials.
The system provides push notifications.
The system sends their credentials to the email/phone number they provide so that
they can use it to open their account.
The system will allow the user to track their items and view their payments.
Passenger - are people who ride on buses, airliners, ship and other methods of transportation.
Airlines - an organization providing a regular public service or air transportation on one more
routes.
Researchers - This will help give them tips and guides in developing the system. This will
enable individual people to utilize what they have learned in their laboratory sessions and
research studies about the given research titles.
Future Researchers - This project can serve as their references for those researchers who are
also taking the same study. This will also inspire researchers to improve and redesign or
innovate a new projects out from this references projects.
Flow of the Study
Customer Validation
Data Gathering
Iterative Methodology
Definition of Terms
Related Literature
This chapter presents the writing of various personalities conducted by the proponents
throughout their analysis, that have relevant to this study. That is a guide for the researches to
realize their target objectives by obtaining ideas on connected studies.
According to (Singapore Airlines, January 2017) For the safety and security of the
passenger crew and aircraft. The items are either prohibited or restricted on all aircraft, in
accordance with the Dangerous Goods Regulations of International Air Transport Association
(IATA). The international Civil Aviation Association (ICAO) Technical Instructions and/or
SIA’s rules and regulations. You need to obey the rules and the law if the items is not allowed
to the airport you need to throw it away because you don’t have any choice.
According to (Office for Transportation Security, October 2017) Releases a new list of
restricted items in congruence to international standards set by the International standards set
by the International Civil Aviation Organization (ICAO). The said step is to develop the pre-
existing list of items prohibited on Philippine airports to counter emerging threats to civil
aviation brought about by introduction of new items capable of being used to destabilize
aircrafts and innovative ways of artfully concealing weapons devised by unlawful elements. It
also intends to establish a standardized security screening operation at all airports in the
country. The OTS has added essential items and increases the standard level to commensurate
with threats posed by the introduction of these new items.
Related Studies
Kahon.ph is the first web-based storage solution in the Philippines. Unlike conventional
storage services, we eliminate the logistical burden of customers bringing their items to a
storage facility while also giving them convenience of doing everything from the comfort of
their homes.
De-kahon
De-Kahon was simple: will provide a completely on-demand storage service for
residents of Metro Manila (at least initially), specially those who live in small spaces like
dorms, apartments, condominiums, or small homes; space is getting harder and harder to
come by. Living in Metro Manila can be stressful already, and having chaos and clutter at
home does not help. So that will allow them to expand the space for their stuff quickly and
easily.
Table 1
COMPARATIVE MATRIX
Profile ✔ ✔ ✔ ✔
Management
Manage ✔ ✔ ✔ ✔
Account
Make Delivery ✔ ✔ ✔
Track Item ✔ ✔
Mode of ✔ ✔ ✔
Payments
Manage Rental ✔
period
Check Item ✔
Status
View Rental ✔
History
View ✔
Transactions
history
Send/Receive ✔
Notifications
Manage ✔ ✔ ✔
Preferences and
mode of
Transactions
Manage Items ✔
and payment
transaction
Cash on ✔
Delivery
TOTAL 20% 40% 38% 100%
CHAPTER III
RESEARCH METHODOLOGY
In developing our project, the proponents have decided to use the Agile
Methodology. In agile methodology, software developed in incremental, rapid cycles.
Interactions among customer, developers and client are emphasized rather than processes and
tools. Agile methodology focuses on responding to change rather than extensive planning.
The Figure above shows the Business Model Canvas of the TrustPort system. The
proponents were able to identify the key factors that will affect greatly on the proposed study.
Program Workflow
The figure above shows that the user can manage account, transaction. User will
receive SMS notification about his transactions. User can view his transaction history.
The figure above shows that the admin is can manage account user and transaction.
Admin will send SMS notification to the user about his transactions. Admin checked
payment, manage tracking and rental period.
Validation Board
The researcher conducted this Validation Board survey as a tool to test if the
proposed system is acceptable by the Providers and the Purchasers. Most of the respondents
approved to the benefits that the Trustport system offers to them.
Gantt Charts
This is the Trusport Gantt Chart this is the tool we used in allotting the different
activities in order to complete the study. This constructed with a horizontal axis representing
the total time span of our project, broken down into increments and a vertical axis
representing the tasks that make up our project. Horizontal bars of varying lengths represent
the sequences, timing, and time span for each task.
Figure 10: Capstone 41 Gantt Chart
This is the Use Case Diagram of TrustPort it describes how users perform tasks on a
system. Also, it outlines how the system responds to the request of a certain actor. Also shows
the steps performed by an actor and how these processes relate to each other.
Entity-Relationship Diagram
Data Dictionary
Table 2
PASSENGER TABLE
Table 3
DELIVERY
Table 5
COMPARTMENT
Table 6
PASSENGER TRANSACTION
Table 7
ITEM STORAGE
Table 8
REPRESENTATIVE
Table 9
LOCATION
Table 10
AUTHORIZE
Table 11
NOTIFICATION
Network Design
Network design is a category of systems design that deals with data transport
mechanisms. As with other systems' design disciplines, network design follows an analysis
stage, where requirement are generated, and precedes implementation, where the system (or
relevant system component) is constructed.
Network Model
TrustPort Network Model, this is our database model conceived a flexible way of
representing objects and their relationships. Its distinguishing feature is that the schema,
viewed as a graph in which object types are nodes and relationship types are arcs, is not
restricted to being a hierarchy or lattice.
The figure below shows the network design of the proposed system. It shows how the
nodes, network equipment and links of how they are connected to each other. As long as there
is an internet, all the users can access to their accounts. The admin can access to the system
directly or using the internet.
Network Topology
The Trustport network topology is a Star topology because it is very popular and the
start-up costs are low. It is also easy to add new nodes to the network. The network is robust
in the sense that if one connection between a computer and the hub fails, the other
connections remain intact. If the central hub fails, however, the entire network goes down
Development/Construction/Build Phase
The Developing Phase involves more than code development and software
developers. The infrastructure is also developed during this phase and all roles are active in
building and testing deliverables. The team continues to identify all risks throughout the
phase and address new risks as they emerge.
A set of software that provides the infrastructure for a computer that is used for
making the Trustport system. This comprises the layers in software offering that need to
create a complete platform. The stacks differ whether installed in a client or a server.
Software Specification
Hardware Specification
The hardware specification deals with the physical parts of a computer and for the
application to perform its expected functions. The tangible components of a system that
would define the requirements of its hardware peripherals so that the system will be capable
of its expected functions.
Program Specification
List of Modules
List of modules will serve as the guidelines for the developers in implementing the
TrustPort system.
Table 12
LIST OF MODULES
Port
Programmer Modules Administrator
Passengers
Account Management
1. Create Account *
2. Login/ Logout * *
3. Update Account * *
4. Deactivate Account *
No. of Points (1 point per module per user) 1 1
Items Management
1. Create Items *
2. Retrieve Items *
3. Update Items *
4. Delete Items *
No. of Points (1 point per module per user) 0 1
Transactions Management
1. Create Transactions *
2. Retrieve Transactions *
3. Update Transactions
*
References
https://www.singaporeair.com/en_UK/us/travel-info/baggage/baggage-restrictions/
https://www.tsa.gov/travel/security-screening
http://www.ots.gov.ph/
De-kahon , Retrieved from
http://www.de-kahon.com/home
https://www.kahon.ph/
https://www.unclaimedbaggage.com/
Curriculum Vitae
HUSTLER
Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com
______________________________________________________________________________
PERSONAL INFORMATION
HACKER
Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com
______________________________________________________________________________
PERSONAL INFORMATION
. HIPSTER
Maica G. Loberanes
Address: Puntod Alaska Mambaling Cebu City
Email Address: maicaloberanes@gmail.com
______________________________________________________________________________
PERSONAL INFORMATION