Non Profitable Cancer Patients Web Portal For Fund Raising and Donation Congregation

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 65

A NON-PROFITABLE CANCER PATIENTS WEB PORTAL FOR FUND RAISING

AND DONATION CONGREGATION

A Capstone Project Presented to the Faculty of College of Computer Studies


Laguna State Polytechnic University
Los Baños Campus
Los Baños, Laguna

In Partial Fulfillment of the Requirements for the Degree


Bachelor of Science in Information Technology

Proponents:

MARIA VANESSA L. ANTARAN


DECYBEL P. CUADORO
JOSHUA IAN INDICO
JHOMAR A. PRESA

June 2020
CHAPTER I
Introduction

Having a potentially life-threatening disease like cancer often leads people

to examine their lives and look for meaning. In fact, this search for meaning

may be the aspect of cancer that most often has a positive influence on life.

The fear of death that affects most people when they are diagnosed with

cancer, often leads us to think about what we leave behind and what we

would like to do with the time we have left. Furthermore, besides of thinking

that they’re sick, they also think the expenses for their treatment [ CITATION

QuaND1 \l 1033 ].

A loved one battling cancer might find it hard to ask someone for help,

in fear of seeming needy or vulnerable. They can play a pivotal role for a

family member or friend living with cancer. They may trust their members and

feel close enough to share their greatest struggles and deepest emotions.

This is opportunity to provide the support your family or friend that need

during their excruciating journey with cancer. Cancer patients can develop

different kinds of coping strategies to help with emotional challenges

throughout their battle with cancer. Some people are open to sharing their

emotional challenges, while some are reserved and prefer to work through

their concerns in solitude. Create a my cause campaign to fund raise for their

treatment and recovery [ CITATION Fun16 \l 1033 ].

Donation management tools are essential for non-profits, particularly

those looking to integrate their offline fund raising efforts into their web

strategy. A good system for online fund raising should not only address donor
experience by creating an efficient, user-friendly platform for processing

donations and other types of fund raising revenue, but should also represent

the aesthetic and ethos of the organization as well, with giving pages that are

integrated components of the non-profit’s website. A strong donation

management platform can incorporate all these essential features and lead to

increased contributions, greater constituent engagement, and a much easier

time raising money[ CITATION Str14 \l 1033 ].

Project Context

Upon being diagnosed with cancer, a person's life changes dramatically.

Daily concerns have to take second place to completing all the tests, doctor

visits and paperwork that are needed in order to plan the cancer treatment.

Once the treatment is started and a general plan is put into place, the patient's

attention may turn to questions about finances [ CITATION DunND \l 1033 ]. The cost

of cancer treatment can be enough to stretch anyone’s finances thin, even

with health insurance, but there are other hidden costs that come with a

cancer diagnosis. Many cancer patients are unable to work as they fight for

their lives leaving them to scramble or rely on others for assistance with basic

necessities such as paying bills, buying groceries, co-pays and even money

for gas to make it to appointments with their doctors. Parents of children with

cancer may be unable to work, or be forced to drastically decrease their

hours, in order to care for their children[ CITATION HidND \l 1033 ]


Objectives

This research focus on the development of a web portal for cancer

patients sending donations and fund raising.

Specifically it aims to:

1. Develop a web platform for charitable institutions and cancer patients

as a tool for fund raising and donations.

2. Implement recyclable materials trading model to promote donation

recycled materials.

3. Apply module such as Android App Module, Request/Inquiry module,

Document Management Module, Fund Management Module, Statistical

Module.

Conceptual Framework

Figure 1. System Architecture


The figure 1 shows designed for the organization or cancer patients which

they can apply on the system so they can be one of the beneficiaries of funds

that will be collected. The chosen beneficiary can check incoming funds

through their accounts. The funds will send from the system to the beneficiary

on exact time when the donor choose them. The transaction will be using a

platform called coins.ph by which the beneficiaries will be required to have an

account to the said platform.

This project has the capability to transfer funds using an android

application with the help of the IoT. The IoT support the system and the

android application to interconnect and to easily access the app and the

system.

The documents of the charities who applied to the system will be handle

by the operator. This document must include the important details of the

establishments and the list of the cancer patients that they are helping with.

The list of the patients and their illness or what type of cancer they have

should be included. In that case, the operator of the system will know how

long the charity will should take the funds.

The available funds in the system will be managed by the admin wherein

he can add, hold and release funds. The funds that will be released was

based on the bottles that the donor will bring. The donor can divine his

earnings and distribute it to the beneficiaries that he want to help with. If the

funds become insufficient the admin can top up to add more funds. This

system can also print statistical report for the monitoring of all the funds.
Project Purpose

This project aims to provide an efficient fund raising for the cancer

patients through a trading portal. This study is deemed beneficial to the

following:

Junk shop Owner. Implementing a Recyclable Trading Portal will automate

the process, operation and management of recyclable materials. Also, the

system will provide productivity and efficiency, better communication and

better data.

Donor. Implementing a Recyclable Trading Portal will help not only the

environment, but also those people whose suffering cancer. It will take the

recyclable materials and turn them into funds for cancer patients.

Cancer Patient. Implementing a Recyclable Trading Portal who dealt with

medical bills, the system will provide financial assistance for the cancer

patients through recyclable materials. Also, fund raising for cancer patients

can help cover treatment costs.

Organization. Implementing a Recyclable Trading Portal will support and

offset mounting medical expenses of their cancer patient. Through trading

portal it will be the best medium to promote fund raising. Additionally, the

charity can manage their patients account automatically.

Future Researchers. The project will help the student researchers to be

aware and knowledgeable of the processes involved in the Recyclable

Trading Portal for Cancer Patients. It can be a help as a future reference for

more studies in the future.


Scope and Limitation

The system helps the cancer patients to their financial or the medical

expenses. It also promotes waste management. The system is a user-friendly

interface wherein the benefactors or the users will easily understand all the

information in the system. There are five modules which is Request/Inquiry

module, Database Management module and Funds Management module.

API Module

This module includes security in all the accounts in the system application.

There is an API key and API secret where the user can use to register

account to transfer and received donations. But aside from that, the API

cannot perform without an internet connection, which the internet is used for

transferring and receiving from android application.

Request/Inquiry Module

The module is designed for the charity or cancer patients which they can

apply on the system so they can be one of the beneficiaries of funds that will

be collected. The chosen beneficiary can check incoming funds through their

accounts. The funds will be sent from the system to the beneficiary on exact

time when the donor choose them. The transaction will be using a platform

called coins.ph by which the beneficiaries will be required to have an account

to the said platform.

Database Management Module


The documents of the charities who applied to the system will be handle

by the operator. This document must include the important details of the

establishments and the list of the cancer patients that they are helping with.

The list of the patients and their illness or what type of cancer they have

should be included. In that case, the operator of the system will know how

long the charity will should take the funds.

Funds Management Module

The available funds in the system will be managed by the admin wherein

he can add, hold and release funds. The funds that will be released was

based on the bottles that the donor will bring. The donor can divine his

earnings and distribute it to the beneficiaries that he want to help with. If the

funds become insufficient the admin can top up to add more funds.

Statistical Module

This module includes the viewing of monthly reports and printing for the

backup source of the users. But the theres a limitation like the users cannot

print without printer device but the users can save the file as pdf.
Definition of Terms

API

Server

Client
CHAPTER II

Review of Related Literature

Modern Cancer Treatment

Treatment of rectal cancer has changed dramatically over the last

decade. The worldwide introduction of total mesorectal excision in

combination with the increasing use of radio(chemo)– therapy has led to an

improved prognosis. One of the main prognostic factors in rectal cancer is the

circumferential resection margin (CRM). Since the initial description of its

clinical importance in 1986, the involvement of this margin (also called lateral

or radial resection margin) has been associated with a poor prognosis.

[ CITATION Iri08 \l 1033 ]

Optimizing these delivery features for a disease as complicated and

heterogeneous as cancer often entails complex decision making, multiple

hand offs between primary and specialty care providers, and coordination

among cancer care team members. Although several IOM reports have

described these attributes of care delivery for modern health care

generally[CITATION Lea01 \l 1033 ]

A 2010 presidential commission report on the potential of health

information technology (HIT) underscored that IT-enabled health care can

reduce fragmentation of information, ensure high-quality, safer care, and

aggregate data to enable meaningful use at the point-of-care and population

level, leading to a “national health IT ecosystem in which every consumer,

doctor, researcher and institution has appropriate access to the information

they need[ CITATION JPH10 \l 1033 ]


Envisioned a cancer care environment in 2015 where technologic

innovations from web-enabled mobile devices, integrated patient phenotype

and genotype databases for individualized treatment, and real-time decision

support, could potentially enhance the clinical, organizational and relational

aspects of care.[CITATION Cen06 \l 1033 ]

Recent research focuses on how HIT can empower patients to become

more involved in their cancer care. Individuals commonly search the Internet

for health information and data from a nationally representative survey

revealed that nearly half of all Americans have sought cancer-related

information on the web.[ CITATION Rut06 \l 1033 ]

Beyond information seeking, IT provides resources for social and

emotional support of cancer patients and their caregivers. Given the distress

and uncertainty that inevitably accompanies a cancer diagnosis, virtual social

support groups are a way for patients to find coping strategies and share

experiences. The ACOR website has hosted cancer-related Internet mailing

lists for both patients and caregivers since 1995. Another example is the

Comprehensive Health Enhancement Support System (CHESS), developed

nearly 2 decades ago.[ CITATION Tay94 \l 1033 ]

CHESS was founded on the principles of “making high-quality

information and social support accessible and useful,” and enabling patients

to “become…actively involved in their treatment and recovery.” CHESS has

been instrumental in shaping understanding of how electronic information can

help patients with information and support needs. [ CITATION Gus05 \l 1033 ]

Improved cancer management through IT has received considerable

research attention in shared decision making, symptom management, and


treatment adherence literature. Decision aids guide patients toward an

informed choice in situations where different treatments entail tradeoffs based

on preferences and values. IT-enabled decision aids could be individually

tailored, highly interactive, and scalable, whereas many treatment decision

aids today are a generic comparison of treatment options. Patient-focused

interactive decision aids have been developed for breast cancer surgery and

are under development for prostate cancer treatment. Other emerging tools

such as Adjuvant! Online and the Cancer Profiler Tool provided by Live

STRONG and NexCURA offer personalized treatment options based on

patient characteristics.[ CITATION Whe04 \l 1033 ]

Treatment adherence may be disrupted if patients experience distress,

bothersome side effects, or adverse events. Comprehensive symptom

management lends itself to incorporating IT tools. A recent report of an

automated system to identify distress among cancer patients described the

ability to auto-notify appropriate professionals (e.g., severe pain triaged to

physician, nausea triaged to nurse, depression triaged to psychologist), when

patients reported treatment-related symptoms. Such a system keeps all

relevant providers aware of patients’ evolving medical and psychosocial

needs.[ CITATION Los10 \l 1033 ]

Although the use of smart phones and web-based personal health

record (PHR) tools such as HealthVault, Dossia, or the Google Health™

program to store health information and access it online in partnership with

multiple providers is increasing, cancer care seems to lag behind compared

with other health care applications.[ CITATION Mar10 \l 1033 ]


Project Health Design is studying pragmatic and conceptual aspects of

incorporating PHRs into patients’ daily lives and health care decisions using

mobile phones and other online tools, including an exploratory examination of

a customized care planning tool for breast cancer patients. [ CITATION Rob10 \l

1033 ]

Despite growing evidence that IT has great potential to improve care,

results are mixed. One randomized trial of a mobile phone–based symptom-

reporting system reported benefits to patients in the intervention

group[ CITATION McC09 \l 1033 ]

Persistent challenges related to information-seeking include the

credibility and trustworthiness of web-based information, and the uneven

access to web-based resources among different sub-populations.[ CITATION

Ber01 \l 1033 ]

Consumers’ and patients’ ability to critically evaluate web-based health

information is another understudied area that may be only exacerbated by the

rapid proliferation of “Web 2.0” technologies (e.g., social media sites, web

blogs) of questionable scientific accuracy.[ CITATION Eys02 \l 1033 ]

Security of personal health information is particularly important for

cancer patients, who may feel vulnerable or fear discrimination by insurers or

employers. Patients may benefit from a portable PHR on a device (e.g., a

flash drive) or website, but interoperability and privacy are key concerns,

especially as health information is shared across providers or systems.

Patients and providers also may not always share perspectives on the use of

portable health records. A recent review article noted that as patients turn to

the Internet to obtain health information, the patient–provider dynamic may


shift in various ways—some providers may feel threatened by highly activated

patients; others may welcome the opportunity to collaborate with informed

patients.[CITATION McM06 \l 1033 ]

Do embedded electronic guidelines influence treatment selection,

prevent errors, or ensure dosing safety for cancer patients? Such guidelines

are used routinely in areas other than cancer, and have been shown to

improve both quality and outcomes of cancer screening. This literature is less

well-developed in cancer treatment. A study examining whether computerized

reminders could ensure appropriate prescribing of erythropoietin for

chemotherapy-induced anemia found better prescribing adherence in the

intervention group, which received electronic “triggers” when warranted based

on patients’ hemoglobin levels.[ CITATION Kra03 \l 1033 ]

Given the numerous decision points throughout a cancer patient’s

diagnosis and treatment, opportunities to test and eventually implement other

point-of-care decision support strategies appear promising. However, few

empirical studies exist specifying optimal design factors to consider when

incorporating point-of-care alerts into practice.[ CITATION Sch09 \l 1033 ]

Given the challenging treatment considerations in cancer care, it is

important to identify the key features, timing, and other aspects of designing

and implementing computerized order entry and related decision support

systems, to ensure that tailored clinical solutions do not create new barriers to

provider–patient communication.[ CITATION Pea06 \l 1033 ]

High-performing modern cancer care organizations are knowledge-

based in that they use scientific evidence to guide decision making. In clinical

practice, this means pairing evidence-based medicine with evidence-based


management directed to improving clinical effectiveness. [ CITATION Sho07 \l 1033

The importance of IT in supporting and enhancing patient-centered

cancer care delivery is compelling in theory, and evidence of tangible

progress is growing. Highly integrated systems like Kaiser Permanente and

the Veterans Administration Health System have been recognized as

pioneers in developing IT-enabled solutions. Multiple studies have

documented increased satisfaction of providers and patients in these closed

systems, compared to open systems that accept patients from multiple health

plans.[ CITATION Mec03 \l 1033 ]

Health Concern and Cancer

Cancer can involve any tissue of the body and have many different

forms in each body area. Most cancers are named for the type of cell or organ

in which they start. If a cancer spreads (metastasizes), the new tumor bears

the same name as the original (primary) tumor. The frequency of a particular

cancer may depend on gender. While skin cancer is the most common type of

malignancy for both men and women, the second most common type in men

is prostate cancer and in women, breast cancer. Cancer frequency does not

equate to cancer mortality. Skin cancers are often curable. Lung cancer is the

leading cause of death from cancer for both men and women in the United

States today.[ CITATION DrD02 \l 1033 ]

Individuals obtain variations of these treatments for cancer. Patients

with cancers that cannot be cured (completely removed) by surgery usually

will get combination therapy, the composition determined by the cancer type

and stage. Palliative therapy (medical care or treatment used to reduce


disease symptoms but unable to cure the patient) utilizes the same treatments

described above. It is done with the intent to extend and improve the quality of

life of the terminally ill cancer patient. There are many other palliative

treatments to reduce symptoms such as pain medications and antinausea

medications.[ CITATION Alb96 \l 1033 ]

This article offers a general introduction to cancers, consequently the

details -- such as life expectancy for each cancer -- cannot be covered.

However, cancers in general have a decreasing life expectancy as the stage

of the cancer increases. Depending on the type of the cancer, as the

prognosis decreases, so does life expectancy. On the positive side, cancers

that are treated and do not recur (no remissions) within a five-year period in

general suggest that the patient will have a normal life expectancy. Some

patients will be cured, and a few others may get recurrent cancer.

Unfortunately, there are no guarantees[ CITATION Tan02 \l 1033 ]

In the most basic terms, cancer refers to cells that grow out-of-control

and invade other tissues. Cells may become cancerous due to the

accumulation of defects, or mutations, in their DNA. Certain inherited genetic

defects (for example, BRCA1 and BRCA2 mutations) and infections can

increase the risk of cancer. Environmental factors (for example, air pollution)

and poor lifestyle choices—such as smoking and heavy alcohol use—can

also damage DNA and lead to cancer. Most of the time, cells are able to

detect and repair DNA damage. If a cell is severely damaged and cannot

repair itself, it usually undergoes so-called programmed cell death or

apoptosis. Cancer occurs when damaged cells grow, divide, and spread

abnormally instead of self-destructing as they should. [ CITATION Fra00 \l 1033 ]


During cancer treatment, patients have important and complex issues

to consider, including present and future fertility. Because many cancer

treatments can damage future fertility, patients who are or will be at a

childbearing age (or parents of children with cancer) should ask their cancer

care team about the possible impact treatment might have on their ability to

have children so they can discuss their options.[ CITATION Joh98 \l 1033 ]

Research has shown that cancer cells are not all the same. Within a

malignant tumor or among the circulating cancerous cells of a leukemia, there

can be a variety of types of cells. The stem cell theory of cancer proposes that

among all cancerous cells, a few act as stem cells that reproduce themselves

and sustain the cancer, much like normal stem cells normally renew and

sustain our organs and tissues. In this view, cancer cells that are not stem

cells can cause problems, but they cannot sustain an attack on our bodies

over the long term.[ CITATION Lud97 \l 1033 ]

One component of the cancer stem cell theory concerns how cancers

arise. In order for a cell to become cancerous, it must undergo a significant

number of essential changes in the DNA sequences that regulate the cell.

Conventional cancer theory is that any cell in the body can undergo these

changes and become a cancerous outlaw. But researchers at the Ludwig

Center observe that our normal stem cells are the only cells that reproduce

themselves and are therefore around long enough to accumulate all the

necessary changes to produce cancer. The theory, therefore, is that cancer

stem cells arise out of normal stem cells or the precursor cells that normal

stem cells produce.[ CITATION Mar01 \l 1033 ]


In the history of cancer, leukemias have often been a window into

larger truths about cancer in general. Chemotherapy, for instance, was shown

to be effective in leukemia well before physicians had the idea to try it on solid

tumors. The scientific and medical clarity offered by leukemia is due in large

part to the ability of researchers and physicians to easily take blood samples

and identify the various cellular components of the blood cancers. [ CITATION

Shi09 \l 1033 ]

After a cancer diagnosis, life changes. There are many challenges to

face. On top of choosing treatment, patients may have to deal with side

effects, absence from work, and family issues. Caregivers also have many

challenges including increased stress. Here, you can find information to assist

you navigate life with cancer.[ CITATION Art03 \l 1033 ]

Having a potentially life-threatening disease like cancer often leads

people to examine their lives and look for meaning. In fact, this search for

meaning may be the aspect of cancer that most often has a positive influence

on life. The fear of death that affects most people when they are diagnosed

with cancer, often leads us to think about what we leave behind and what we

would like to do with the time we have left. It can make you feel like it’s the

quality of life, not just the quantity, which matters most. [ CITATION Mil01 \l 1033 ]

Understanding CSCs can also help us modify current treatments for

maximum effect. Researchers at Stanford’s Ludwig Center for Cancer Stem

Cell Research and Medicine, for instance, discovered the reason that stem

cells, including cancer stem cells, are resistant to the ionizing radiation used

in many cancer treatments. Understanding this resistance may in the future


help researcher find compounds that undermine this process and make CSCs

vulnerable to radiation damage.[ CITATION Hom99 \l 1033 ]

If cancer stem cells are the primary driver of cancer growth and

metastasis, then effective cancer treatments must attack the CSCs. Shrinking

a cancerous tumor or reducing the glut of leukemic cells in the bloodstream

may offer temporary relief, but will not offer a long-term cure if CSCs are not

eliminated. What’s more, if only the CSCs are eliminated, the rest of the

cancer cells in the body will be attacked by the immune system or die out

naturally since cancer cells that are not stem cells by definition do not have

the ability to reproduce.[ CITATION And04 \l 1033 ]

Cancer is a group of diseases involving abnormal cell growth with the

potential to invade or spread to other parts of the body. These contrast with

benign tumors, which do not spread. Possible signs and symptoms include a

lump, abnormal bleeding, prolonged cough, unexplained weight loss and a

change in bowel movements. While these symptoms may indicate cancer,

they may have other causes. Over 100 types of cancers affect humans.

Tobacco use is the cause of about 22% of cancer deaths. Another 10% are

due to obesity, poor diet, lack of physical activity or excessive drinking of

alcohol. Other factors include certain infections, exposure to ionizing radiation

and environmental pollutants. In the developing world, 15% of cancers are

due to infections such as Helicobacter pylori, hepatitis B, hepatitis C, human

papillomavirus infection, Epstein–Barr virus and human immunodeficiency

virus (HIV). These factors act, at least partly, by changing the genes of a cell.

Typically, many genetic changes are required before cancer develops.

Approximately 5–10% of cancers are due to inherited genetic defects from a


person's parents. Cancer can be detected by certain signs and symptoms or

screening tests. It is then typically further investigated by medical imaging and

confirmed by biopsy.[CITATION Sco \l 1033 ]

Targeted therapy is a form of chemotherapy that targets specific

molecular differences between cancer and normal cells. The first targeted

therapies blocked the estrogen receptor molecule, inhibiting the growth of

breast cancer. Another common example is the class of Bcr-Abl inhibitors,

which are used to treat chronic myelogenous leukemia (CML). Currently,

targeted therapies exist for many of the most common cancer types, including

bladder cancer, breast cancer, colorectal cancer, kidney cancer, leukemia,

liver cancer, lung cancer, lymphoma, pancreatic cancer, prostate cancer, skin

cancer, and thyroid cancer as well as other cancer types. The efficacy of

chemotherapy depends on the type of cancer and the stage. In combination

with surgery, chemotherapy has proven useful in cancer types including

breast cancer, colorectal cancer, pancreatic cancer, osteogenic sarcoma,

testicular cancer, ovarian cancer and certain lung cancers. Chemotherapy is

curative for some cancers, such as some leukemias, ineffective in some brain

tumors, and needless in others, such as most non-melanoma skin cancers.

The effectiveness of chemotherapy is often limited by its toxicity to other

tissues in the body. Even when chemotherapy does not provide a permanent

cure, it may be useful to reduce symptoms such as pain or to reduce the size

of an inoperable tumor in the hope that surgery will become possible in the

future.[ CITATION Pet95 \l 1033 ]

Complementary and alternative cancer treatments are a diverse group

of therapies, practices and products that are not part of conventional


medicine. "Complementary medicine" refers to methods and substances used

along with conventional medicine, while "alternative medicine" refers to

compounds used instead of conventional medicine. Most complementary and

alternative medicines for cancer have not been studied or tested using

conventional techniques such as clinical trials. Some alternative treatments

have been investigated and shown to be ineffective but still continue to be

marketed and promoted. Cancer researcher Andrew J. Vickers stated, "The

label 'unproven' is inappropriate for such therapies; it is time to assert that

many alternative cancer therapies have been disproven. [ CITATION Wil92 \l

1033 ]

World Cancer Report provides a professional, multidisciplinary

assessment of all aspects of the geographical distribution, biology, etiology,

prevention, and control of cancer, predicated on research. The concise nature

of the text and the high graphic content (hundreds of colour maps, diagrams,

and photographs) make the publication accessible to a broad readership.

World Cancer Report is designed to provide non-specialist health

professionals and policy-makers with a balanced understanding of cancer

control and to provide established cancer professionals with insights about

recent development.[ CITATION BWS14 \l 1033 ]

Nearly all of the evidence linking obesity to cancer risk comes from

large cohort studies, a type of observational study. However, data from

observational studies can be difficult to interpret and cannot definitively

establish that obesity causes cancer. That is because obese or overweight

people may differ from lean people in ways other than their body fat, and it is
possible that these other differences—rather than their body fat—are what

explains their different cancer risk.[ CITATION Che09 \l 1033 ]

Cancer is nearly always diagnosed by an expert who has looked at cell

or tissue samples under a microscope. In some cases, tests done on the cells’

proteins, DNA, and RNA can help tell doctors if there’s cancer. These test

results are very important when choosing the best treatment options. Tests of

cells and tissues can find many other kinds of diseases, too. For instance, if

doctors are not sure a lump is cancer, they may take out a small piece of it

and have it tested for cancer and for infections or other problems that can

cause growths that may look like cancer.[ CITATION Ric18 \l 1033 ]

The Hallmarks of Cancer is a seminal peer-reviewed article published

in the journal Cell in January 2000 by the cancer researchers Douglas

Hanahan and Robert Weinberg. The authors believe that the complexity of

cancer can be reduced to a small number of underlying principles. The paper

argues that all cancers share six common traits ("hallmarks") that govern the

transformation of normal cells to cancer (malignant or tumor) cells.The traits

("hallmarks") that the authors highlight in the paper are Cancer cells stimulate

their own growth (self-sufficiency in growth signals); They resist inhibitory

signals that might otherwise stop their growth (insensitivity to anti-growth

signals); They resist their programmed cell death (evading apoptosis); They

can multiply indefinitely (limitless replicative potential); They stimulate the

growth of blood vessels to supply nutrients to tumors (sustained

angiogenesis); They invade local tissue and spread to distant sites (tissue

invasion and metastasis).[ CITATION Dou01 \l 1033 ]


This review describes global patterns of tobacco use and the

mechanisms by which tobacco use is involved in carcinogenesis. A second

part will discuss the association between tobacco use and risk of specific

cancer types. To bacco use has traditionally been a practice of high‐income

countries, but it has recently been taken up in low‐income countries and it is

particularly common in men. A wide variety of tobacco products exist, of which

cigarettes are most frequently consumed. Tobacco products contain more

than 50 established or identified carcinogens and these may increase risk of

cancer by causing mutations that disrupt cell cycle regulation, or through their

effect on the immune or endocrine systems. Certain factors such as genes,

diet and environmental exposures may alter susceptibility to cancer in tobacco

users. Today at least 15% of all cancers are estimated to be attributable to

smoking, but this figure is expected to increase because of the uptake of

tobacco use in low‐income countries.[ CITATION HKu02 \l 1033 ]

The rates of occupational cancer exposure are highest among workers

whose workplaces do not meet the requirements for health and safety

protection and do not have the necessary engineering measures to prevent

the pollution of air with carcinogenic substances. For example, workers who

are heavily exposed to second hand tobacco smoke at their workplaces have

double the risk of developing lung cancer compared to those working in a

smoke-free environment. "The tragedy of occupational cancer resulting from

asbestos, benzene and other carcinogens is that it takes so long for science

to be translated into protective action," said Dr Maria Neira, WHO Director of

Public Health and Environment. "Known and preventable exposures are

clearly responsible for hundreds of thousands of excess cancer cases each


year. In the interests of protecting our health, we must adopt an approach

rooted in primary prevention, that is to make workplaces free from

carcinogenic risks."[ CITATION Nad07 \l 1033 ]

The increasing incidence of a variety of cancers after the Second

World War confronts scientists with the question of their origin. In Western

countries, expansion and ageing of the population as well as progress in

cancer detection using new diagnostic and screening tests cannot fully

account for the observed growing incidence of cancer. Our hypothesis is that

environmental factors play a more important role in cancer genesis than it is

usually agreed. (1) Over the last 2–3 decades, alcohol consumption and

tobacco smoking in men have significantly decreased in Western Europe and

North America. (2) Obesity is increasing in many countries, but the growing

incidence of cancer also concerns cancers not related to obesity nor to other

known lifestyle-related factors. (3) There is evidence that the environment has

changed over the time period preceding the recent rise in cancer incidence,

and that this change, still continuing, included the accumulation of many new

carcinogenic factors in the environment. (4) Genetic susceptibility to cancer

due to genetic polymorphism cannot have changed over one generation and

actually favours the role of exogenous factors through gene–environment

interactions. (5) Age is not the unique factor to be considered since the rising

incidence of cancers is seen across all age categories, including children, and

adolescents.[ CITATION Ber07 \l 1033 ]

Alcohol consumption is thought to account for a substantial number of

deaths worldwide, with Europe and America showing the highest alcohol

attributable fractions of 6.5% and 5.6%, respectively.1 Chronic diseases,


especially cancer, contribute markedly to this burden. In 2007 the

International Agency for Research on Cancer (IARC) added two of the most

common cancers—female breast and colorectal cancer—to the list of cancers

causally related to alcohol, which previously consisted of oral cavity, pharynx,

larynx, oesophagus, and liver cancer.2 Although alcohol consumption is a

major risk factor for cancer incidence,3 and Europe is among the regions with

the highest per capita alcohol consumption, detailed information on the

fractions of cancer that are attributable to alcohol consumption based on

direct empirical evidence for the different cancer sites is sparse,4 5 and

systematic and comparable estimations across European countries are

lacking.[ CITATION Nao11 \l 1033 ]

Skin cancers occur in uniquely accessible sites and are caused by

well-defined environmental agents; consequently, their formation illustrates

numerous salient features of carcinogenesis. Although most cases are not

reported, the annual incidence is estimated at about 1 million, accounting for

about 45% of all malignancies.[ CITATION Noe02 \l 1033 ]

The number of computed tomographic (CT) studies performed is

increasing rapidly. Because CT scans involve much higher doses of radiation

than plain films, we are seeing a marked increase in radiation exposure in the

general population. Epidemiologic studies indicate that the radiation dose

from even two or three CT scans results in a detectable increase in the risk of

cancer, especially in children. This article summarizes the facts about this

form of radiation exposure and the implications for public health. [ CITATION

DrB07 \l 1033 ]
Be sure to travel with all the medications and supplies you will need

during your time away, plus some extra should you lose or misplace them.

Ask your doctor about additional drugs you might take to combat treatment

side effects, motion sickness, or traveler's diarrhea. Carry a list of all your

medications, the dosages, and any allergies, and bring additional signed

prescriptions for back-up. Keep your drugs in their original containers and

pack them in carry-on bags, not in checked luggage, which can sometimes

get lost.[CITATION Jun \l 1033 ]

No one can know exactly, but your doctor should be able to tell you a

range of months or years. And you need to know if more treatment for cancer

will help you live longer. Ask your doctor to explain the risks and benefits of

any treatment. Fighting the cancer may no longer be the best thing for you.

[ CITATION DrF12 \l 1033 ]

You may just see it as taking care of someone you love, but what you

are doing is extremely important. Helping a loved one with cancer isn’t always

easy. Caregiving can be a full-time, non-stop job that wears on you physically

and emotionally, but there are many things you can do to make it easier.

[ CITATION Nel18 \l 1033 ]

Recyclable Trading Portal

Many recyclers run legitimate operations that absorb these costs and

profit from refurbished equipment sales and fees charged for accepting old,

unsalable material. But others are not so scrupulous. According to one

anonymous recycler, it’s not uncommon for companies to coordinate with

exporters to ship junk overseas. In some cases, exporters negotiate with

buyers in developing countries, who dictate the amount of junk they will
accept in exchange for a specified number of high-value items. [ CITATION

Cha06 \l 1033 ]

The problems relating to mounting solid waste are fast acquiring gigantic

proportions in the developing countries of Asia. Most of the countries,

nevertheless, continue to primarily focus on achieving high economic growth

and pay scant attention to waste management. [ CITATION Ami08 \l 1033 ]

It shows that arguments about dumping on the South need revision.

Wastes are secondary resources for lower income countries, harvesting them

is a significant economic activity, and consequent resource recovery is a key

part of the global economy.[ CITATION Gre15 \l 1033 ]

Green computing aims in attaining sustainable future by

implementation of practices that uses computing resources economically and

eco-friendly manner. With due course of time, companies where information

technology is implemented have realized that going green is beneficiary both

in terms of maintaining public relations and reduced overheads. [ CITATION

Bhu17 \l 1033 ]

Disposal of plastic waste is an emerging global environmental issue, as

these wastes have become the most rapidly growing segment of the

municipal waste stream in the world. It is reported that approximately 500

million metric tons between 1997 and 2007 in the United States (National

Safety Council 1999). Up to 80% of plastics from the United States had

seeped into Asia and Africa. It is noteworthy that the United States is the only

developed country today that has not ratified the United Nations Basel

Convention, which bans the export of hazardous wastes to developing

countries.[ CITATION Xia07 \l 1033 ]


The demand for materials including recycled material, have strong

effects on the import volume of recyclable waste. Moreover, this implies that

the imports of a developing country from developed countries increase with

expanding industrial activity and economic growth. We find no evidence for a

pollution haven for wastes and recycling. [ CITATION Kei13 \l 1033 ]

A significant pollution haven effect is observed as rising per capita

income reduces the amount of hazardous waste countries’ import. However,

this effect is outweighed by high‐income countries’ relative capital abundance,

and by rising GDP creating larger increases in disposal capacity than waste

production.[ CITATION Jen09 \l 1033 ]

The international trade of waste products is large and has grown

substantially in the past decade. Using bilateral waste trade data and an index

of environmental stringency for 92 countries, compelling evidence is found

that waste imports increase for a country [ CITATION Jou12 \l 1033 ]

The American Cancer Society is fixated on damage control–diagnosis

and treatment–and basic molecular biology, with indifference or even hostility

to cancer prevention. This myopic mindset is compounded by interlocking

conflicts of interest with the cancer drug, mammography, and other industries.

The “nonprofit” status of the Society is in sharp conflict with its high overhead

and expenses, excessive reserves of assets and donations came from other

fund raising.[ CITATION Sam99 \l 1033 ]

Plastic waste is one of the global rising problems in developing

countries like India and developed countries. Plastic comprises material that is

valuable as well as toxic and has shoddier health and environment impact.

Existing and future initiatives of plastic waste management have been


addressed by explaining the developed countries initiatives towards plastic

waste management. The key to success in terms of plastic waste

management such as Extended Producer Responsibility (EPR) and Producer

Responsibility Organization (PRO) initiatives have been presented in a lucid

manner.[ CITATION Vij15 \l 1033 ]

Lack of knowledge has resulted in mismanagement of toxic plastic

waste. Misunderstanding of the composition of plastic waste creates

occupational and environmental problems. A layered arrangement of

networks that inform the actions of actors involved in plastic waste disposal. It

is necessary to identify the structured network in order to minimize the

potential risks.[ CITATION Mas10 \l 1033 ]

During the past two decades, the generation and Trans boundary

movements of hazardous wastes and their disposal has become a major

issue of environmental justice. It is estimated that in 1990, 400 million metric

tons of hazardous waste was generated worldwide. There has also been an

increase of incidents of hazardous waste exports to both developed and

developing countries for recovery or recycling. Hazardous waste often has an

economic value as secondary raw materials. Consequently, many hazardous

wastes are exported for activities such as resource recovery, recycling or re-

use. [ CITATION DrZ10 \l 1033 ]

Security System

World Wars I and II brought an increased awareness of security

systems as a means of protection against military espionage, sabotage, and

subversion; such programs in effect became part of a country’s national-

security system. After World War II much of this apparatus was retained as a
result of international tensions and defense-production programs and became

part of an increasingly professionalized complex of security functions.

[ CITATION Ada70 \l 13321 ]

The development and diffusion of security systems and hardware in

various parts of the world has been an uneven process. In relatively

underdeveloped countries, or the underdeveloped parts of recently

industrializing countries, security technology generally exists in rudimentary

form, such as barred windows, locks, and elementary personnel security

measures. In many such regions, however, facilities of large international

corporations and sensitive government installations employ sophisticated

equipment and techniques.[ CITATION Pat80 \l 13321 ]

Security systems are becoming increasingly automated, particularly in

sensing and communicating hazards and vulnerabilities. This situation is true

in both crime-related applications, such as intrusion-detection devices, and

fire-protection alarm and response (extinguishing) systems. Advances in

miniaturization and electronics are reflected in security equipment that is

smaller, more reliable, and more easily installed and maintained. [ CITATION

Bri00 \l 13321 ]

Security systems can be classified by type of production enterprise,

such as industrial, retail (commercial), governmental, government contractor,

or hospital; by type of organization, such as contract security or proprietary;

by type of security process, such as personnel or physical security; or by type

of security function or emphasis, such as plant protection (variously defined),

theft control, fire protection, accident prevention, protection of sensitive


(national security or business proprietary) information. Some of these

categories obviously overlap.[ CITATION Ali98 \l 13321 ]

Security for small businesses constitutes a special situation. Because

small firms cannot afford specialized proprietary security staffs, measures

must be incorporated into regular routines and staff training or be purchased

from outside organizations. Theft, both internal and external, is a prime

concern.[ CITATION Eri07 \l 13321 ]

Residential security constitutes another special category. Sizable

housing or apartment complexes, especially if under one management, can

employ sophisticated security measures, including, for example, closed-circuit

television monitoring of elevators and hallways and trained security guards.

Relatively simple equipment for houses or small apartment buildings, as, for

example, exterior lighting and alarms, is increasingly used. Some

neighbourhoods of large cities cooperatively employ patrol services or

organize resident volunteer patrols.[ CITATION Amy01 \l 13321 ]

Advances in security equipment technology have been numerous.

Some of the more noteworthy examples include sensor devices that report

unauthorized removal of items; personal-identification and access-control

systems that directly “read” unique personal characteristics such as voice

quality and hand geometry; surveillance devices that can scan premises at

night; and devices that permit surveillance at considerable distances, making

entry to the premises unnecessary.[ CITATION Mel12 \l 13321 ]

The whole concept of security systems has developed considerably

throughout the last century and the gadgets on the market these days are
extremely reliable when it comes to offering security and protection. [ CITATION

Ste16 \l 13321 ]

The most basic definition of any security system is found in its name. It

is literally a means or method by which something is secured through a

system of interworking components and devices.

Mobile Application

Mobile applications frequently serve to provide users with similar

services to those accessed on PCs. Apps are generally small, individual

software units with limited function. This use of app software was originally

popularized by Apple Inc. and its App Store, which offers thousands of

applications for the iPhone, iPad and iPod Touch. [ CITATION Dal15 \l 13321 ]

The simplest mobile apps take PC-based applications and port them

to a mobile device. As mobile apps become more robust, this technique is

somewhat lacking. A more sophisticated approach involves developing

specifically for the mobile environment, taking advantage of both its limitations

and advantages.[ CITATION Cor12 \l 13321 ]

One major category of business mobile applications involves social

media, the Web and outreach. With these types of mobile apps, the business

advertises itself through the Internet or in social media platforms like

Facebook. Some of these apps integrate customer feedback, but the vast

majority of them are centered toward getting a message out or improving

brand visibility online and through a user’s access device, for example, a

tablet or smartphone.[ CITATION Jam11 \l 13321 ]

These apps can capture and analyze data in order to help the

business understand its strengths and weaknesses. For example, businesses


will sift through data for from business intelligence mobile apps to look at

where their products are selling, to identify particular challenges, or to

otherwise build smarter campaigns.[ CITATION Dav06 \l 13321 ]

Mobile Application includes customer relationship management tools

like Salesforce, or other designs intended to help businesses get information

about their customers. Some of these apps make it easier to source materials

and services from vendors and suppliers. Other mobile apps help with payroll

and inventory. All of these types of logistics apps have specific roles in how a

business handles its internal processes. [ CITATION Fre03 \l 13321 ]

Mobile apps are sometimes categorized according to whether they

are web-based or native apps, which are created specifically for a given

platform. A third category, hybrid apps, combines elements of both native and

Web apps. As the technologies mature, it's expected that mobile application

development efforts will focus on the creation of browser-based, device-

agnostic Web applications.[ CITATION Mar11 \l 13321 ]

Mobile apps, it is a term used to describe Internet applications that run

on smartphones and other mobile devices it is also help users by connecting

them to Internet services more commonly accessed on desktop or notebook

computers, or help them by making it easier to use the Internet on their

portable devices. A mobile app may be a mobile Web site bookmarking utility,

a mobile-based instant messaging client, Gmail for mobile, and many other

applications.[ CITATION Van12 \l 13321 ]

Apps were originally intended for productivity assistance such as

email, calendar, and contact databases, but the public demand for apps

caused rapid expansion into other areas such as mobile games, factory
automation, GPS and location-based services, order-tracking, and ticket

purchases, so that there are now millions of apps available. [ CITATION Bro16 \l

13321 ]

Mobile applications can interact with one or more cameras onboard

the device. The basic interaction with the camera requires modeling the

ViewContainer for visualizing the camera image and commands, the

invocation of an Action for taking the picture, the asynchronous event that

notifies that the photo has been taken, and the visualization of the image in

the system-level media gallery.[ CITATION Kon19 \l 13321 ]

Mobile application security is a cause of growing concern not only

among mobile users, but also among the cellular providers. Security services

for mobile cloud applications.[ CITATION May12 \l 13321 ]

A mobile application can either load data from a remote location, store

data in a local database, or both. When loading data from remote locations,

SQL-injection protection must be built into the service that provides the data.

[ CITATION Erl12 \l 13321 ]

To make mobile applications available outside of the Designer, we have

implemented a proxy server component that serves mobile applications based

on existing sites. When the user wishes to access a mobile application, they

navigate their mobile browser to the proxy server's main page, select their

application from a list of available applications, and then proceed to use the

application.[ CITATION Jef10 \l 13321 ]

Mobile communication is so integrated into our lives that many people

feel uncomfortable without a cell phone. A smart phone is a multifunctional

device that not only communicates, but helps to learn, earn, and have fun.
This is made possible by the development of mobile applications. [ CITATION

Joh16 \l 13321 ]

Charity/ Organization

Giving to charity isn’t a new fad; it’s a practice that has been popular

for thousands of years. Research shows us that even through unconventional

methods, the act of charitable giving has had its place in the history books for

ages and is still growing in popularity. Wealthy, modern philanthropists of our

time stand beside Ancient Greeks and clergy members alike as those who

have done their part in donating both time and precious resources to those in

need.[ CITATION Kyl12 \l 13321 ]

Charitable giving is the act of giving money, goods or time to the

unfortunate, either directly or by means of a charitable trust or other worthy

cause. Charitable giving as a religious act or duty is referred to as almsgiving

or alms. The name stems from the most obvious expression of the virtue of

charity; giving the recipients of it the means they need to survive. The

impoverished, particularly those widowed or orphaned, and the ailing or

injured, are generally regarded as the proper recipients of charity. The people

who cannot support themselves and lack outside means of support

sometimes become "beggars", directly soliciting aid from strangers

encountered in public.[ CITATION Kri08 \l 13321 ]

Most forms of charity are concerned with providing basic necessities

such as food, water, clothing, healthcare and shelter, but other actions may

be performed as charity: visiting the imprisoned or the homebound, ransoming

captives, educating orphans, even social movements. Donations to causes


that benefit the unfortunate indirectly, such as donations to fund cancer

research, are also charity.[ CITATION Ash15 \l 13321 ]

Institutions evolved to carry out the labor of assisting the poor, and

these institutions, called charities, provide the bulk of charitable giving today,

in terms of monetary value. These include orphanages, food banks, religious

institutes dedicated to care of the poor, hospitals, organizations that visit the

homebound and imprisoned, and many others. Such institutions allow those

whose time or inclination does not lend themselves to directly care for the

poor to enable others to do so, both by providing money for the work and

supporting them while they do the work. Institutions can also attempt to more

effectively sort out the actually needy from those who fraudulently claim

charity.[ CITATION Van05 \l 13321 ]

Charities are praised as the ‘third sector’, avoiding, so the argument

goes, the uniformity and inefficiency of much public sector provision, while

acting from nobler motives than private sector providers chasing profit.

[ CITATION Ale09 \l 13321 ]

Voluntary organisations have long played a part in delivering services,

particularly in areas where public provision was regarded as inadequate or

inappropriate, such as in personal and social care. [ CITATION Chr10 \l 13321 ]

Charity, in Christian thought, the highest form of love, signifying the

reciprocal love between God and man that is made manifest in unselfish love

of one’s fellow men. St. Paul’s classical description of charity is found.

[ CITATION CHR00 \l 13321 ]

Since earliest times humanity has endeavoured to develop the most

appropriate systems of organization to meet the challenges of a particular era.


Inevitably the systems of organization that developed were reflections of the

wider values, tradition and general organization of society at that time,

moulded by the necessity of withstanding threat and seeking to innovate

whilst maximising benefits from existing resources. Human development has

continually necessitated a corollary of human and organizational development

designed to maximize effectiveness. This progression is indicative of a

civilizing process that has continually asked humanity to reassess its

relationship with itself and to increasingly value the welfare of both the

individual and wider society as a whole. [ CITATION Gra11 \l 13321 ]

World War II represents something of a tipping point in terms of its

impact on the development of industrial organization and leadership. Just as

the conflict precipitated incredible technological advancements in areas such

as radar, computing and the development of the jet engine so it was for

leadership models, particularly in the areas of communications and efficiency.

The primary models and experience of leadership and organizational structure

for the post war leaders of the business world were from the military in WWII,

with the majority of Post War managers drawing on their military training as a

model for organizational development.[ CITATION Ada02 \l 13321 ]

Work is essential in providing the basic physical needs of food,

clothing, and shelter. But work involves more than the use of tools and

techniques. Advances in technology, which will always occur, help to extend

the reach of the hand, expand muscle power, enlarge the senses, and

multiply the capacities of the mind. The story of work is still unfolding, with

great changes taking place throughout the world and in a more accelerated

fashion than ever before. The form and nature of the work process help
determine the character of a civilization; in turn, a society’s economic,

political, and cultural characteristics shape the form and nature of the work

process as well as the role and status of the worker within the society.

[ CITATION Mic19 \l 13321 ]

The world of work comprising all interactions between workers and

employers, organizations, and the work environment is marked by the

constant adaptation to changes in the technological, cultural, political, and

economic environments. The study of historical changes in the organization of

work can perhaps lead to a better understanding of the present problems now

on a worldwide scale that accompany ongoing technical, political, and

economic changes.[ CITATION Mel15 \l 13321 ]

In the earliest stages of human civilization, work was confined to

simple tasks involving the most basic of human needs: food, child care, and

shelter. A division of labour likely resulted when some individuals showed

proficiency in particular tasks, such as hunting animals or gathering plants for

food. As a means of increasing the food supply, prehistoric peoples could

organize the work of foraging and hunting and, later, agriculture. [ CITATION

Ada11 \l 13321 ]

It provided a work training project operating under the name of

Worklink. There was also an advice and information service, an advocacy

group for people with learning difficulties and a social firm, which still operates

today as the independent business, Cafe Nova Interchange. [ CITATION Lam99 \l

13321 ]

Charity is the act of extending love and kindness to others

unconditionally, which is a conscious act but the decision is made by the


heart, , without expecting a reward. When Charity is carried out selflessly, it is

a one-way act where a person gives but asks for nothing in return. [ CITATION

Tho18 \l 13321 ]

Charity begins with the inward recognition of a need to show

compassion to others whether consciously or unconsciously. Everyone has

problems, troubles, and griefs of some sort in life but charity starts with those

who learn to downplay their own problems, in order to extend compassion,

kindness, and love to help others.Hence some people set aside their own

pains to relieve the pain of others.[ CITATION Abd12 \l 13321 ]

Charity is essential and therefore meant to be done for public benefit,

relief and to provide assistance to people at times of need in any part of the

world, especially who are the victims of war, natural disaster, catastrophe,

hunger, disease, poverty, orphans by supplying them with food, shelter,

medical aid and other fundamental needs.[ CITATION Zak00 \l 13321 ]

Such charitable purposes can gain momentum from advancing the

education of young people for the public benefit by making grants and awards

to students in full-time education. When considering poverty in the developing

world, people feel deep sorrow but seem to put no effort whatsoever to reduce

or eradicate the problem. Poverty in today’s world has turned out to be sinister

and we lay passive towards the problem, therefore such attitude has made us

powerless to stop it.[ CITATION Ibr12 \l 13321 ]

When everyone is giving to an effective charity, the size of our

donation would directly correspond to the number of people we are able to

help. We don’t have to be a millionaire to make a significant difference. Just

as every drop in the ocean counts to form a vast water mass, even small
donations have the potential to drastically improve an individual’s quality of

life.[ CITATION Coo05 \l 13321 ]

The greatest gift to our community would be when we contribute to

making lives better; when we touch lives by the dint of donations or charity,

spreading light to the most needy and enlighten our souls in the process.

[ CITATION Nic19 \l 13321 ]

Non-profits, charitable organizations and NGO’s often staffed by

volunteers dedicated to improving the lives of abandoned, poor children,

adults, orphans and homeless must be funded to reduce human sufferings.

They provide children and families with clothing, food, education, shelter and

the teachings. Through love, motivation, and opportunities they help people

thrive and become self-sufficient and on the other hand there are

organizations to support the elderly with dignity and assistance. As these

organizations have taken up a sacred mission of helping the helpless, it’s now

our duty as well to help them to raise funds and support their noble cause.

[ CITATION Nic18 \l 13321 ]

Philanthropy consists of "private initiatives, for the public good,

focusing on quality of life". Philanthropy contrasts with business initiatives,

which are private initiatives for private good, focusing on material gain, and

with government endeavors, which are public initiatives for public good.

[ CITATION Dic16 \l 13321 ]

Instead of charity, Wilde suggests preventing poverty and the need for

charity in the first place. A parallel argument can be made for the concern

about the wage gap in the states; instead of an off-place slave analogy.

Instead of promoting higher minimum wage, people should try and see the
root cause of the wage gap. For both poverty and the wage gap, these are

products of a capitalism a socialist economy strives to eliminate poverty and

disease.[ CITATION Sla10 \l 13321 ]

Advance Encryption Standard Algorithm

AES is known as an Advance Encryption Standard is a formal encryption

method that was adopted by the National Institute of Standards and

Technology by the US Government. They started to identify a process for the

replacement of the Data Encryption Standard. In this method, they recognized

that the DES is not generally secure because of the advances in computer

processing power. The year 2000 the NIST formally adopted the AES and

published it as a federal standard which designated under FIPS-197.

With AES encryption and decryption were implemented using the same

key that was called a symmetric encryption algorithm. While the encryption

algorithm uses two different keys which is public and private that was called

43 asymmetric encryption algorithm. A data encryption key is used in the

encryption process as a binary string. For those who are using the same

encryption key to encrypt and decrypt the data, it is very important to keep a

secret encryption key. The AES protects the digital information in various

forms of data, voice video from the attackers or eavesdropping in software

and hardware. It is also difficult to know the detail of this process because of it

is too patented encryption and it’s difficult to decrypt the data which is the

cipher text if they lost the private keys (Huong, 2014).

The most currently used AES algorithm implemented by the SMS

messages to protect the confidentiality of data during transport between two

or more devices, the data transmission in the SMS or the security system
would be more secure. SMS technology is an emerging wireless

communication tool, which provides a wide range of wireless communication.

SMS technology is mainly used for communication between android phones

and devices, such as computers and laptops. And it makes the

communication simple and secure among the devices and the internet the

data transmission between these devices has become faster and efficiently,

and widen the wireless communications (Miao, 2010). AES algorithm is one of

powerful technology used to reduce security threats in the transmission of

messages on the network. Encryption and decryption of information have

proven to be the best way to convert the data into private messages. It is

widely used algorithm, which provides security through encryption of data

passing to the web to ensure information authenticity. It allows us to encrypt

the message in the client side and send it together with public keys through

the network. The data is retrieved on the server side and through the access

to the database, private keys are recovered and decryption process (Jenny

Torres A. M., 2016).

Synthesis and Relevance of the Study

According to Quirke, Treatment of rectal cancer has changed dramatically

over the last decade. The worldwide introduction of total mesorectal excision

in combination with the increasing use of radio(chemo)– therapy has led to an

improved prognosis. Quirke prove that the rectal cancer or called chemo-

therapy will be the solving problem for the cure of cancer but the prediction of

it is failed many of people die in cancer. Otherwise many expert have been

invented and make and article on to resolve or to prevent the increasing death

rate in cancer and how to cure that illness and one of this is related in
technology. In the article of Holdren A 2010 presidential commission report on

the potential of health information technology (HIT) underscored that IT-

enabled health care can reduce fragmentation of information, ensure high-

quality, safer care, and aggregate data. Holdren identify that the information of

technology expert can help the cancer patients but not to cure but to assist for

the medications and gather data who got cancer every year.

And many IT expert follow it according in CHR or Center for Health Center

Envisioned a cancer care environment in 2015 where technologic innovations

from web-enabled mobile devices, integrated patient phenotype and genotype

databases for individualized treatment, and real-time decision support, could

potentially enhance the clinical, organizational and relational aspects of care.

Many people have scare to have an cancer, So what the cancer really

about and why people very afraid to have them. According Dr. Tan Cancer

can involve any tissue of the body and have many different forms in each

body area. Most cancers are named for the type of cell or organ in which they

start. If a cancer spreads (metastasizes), the new tumor bears the same

name as the original (primary) tumor.

And what is the cure of cancer, in the article of Albert Individuals obtain

variations of these treatments for cancer. Patients with cancers that cannot be

cured (completely removed) by surgery usually will get combination therapy,

the composition determined by the cancer type and stage. Many expert tried

to create a cure in that illness. But nothing will succeed the only hope will be

the chemo-theraphy. Many of the community know what it cost to make a

medication and many of the cancer patients try to find a solutions like go to

the charities. And how would work to help the cancer patients with the
medications base on the article of Schmidt Many recyclers run legitimate

operations that absorb these costs and profit from refurbished equipment

sales and fees charged for accepting old, unsalable material. With the help of

the foundations many fund raising will conduct.

Many people suffer illnesses one of this is the very popular and high

risk it is call cancer. The most common or the most prone in cancer was the

poor and no money to spend people. So, that in the time of A.D. they create a

charity that will help the people who don’t have money to pay the bills in their

medications in cancer. There are several foundations or charity that will help

the people who needs medication for their illnesses. And according to

Nicholas that Non-profits, charitable organizations and NGO’s often staffed

by volunteers dedicated to improving the lives of abandoned, poor children,

adults, orphans and homeless must be funded to reduce human sufferings.

In terms of that many people know there were many charity that will

help people who doesn’t have a money and many people apply that’s why the

security system organize to prevent the people who taking advantage in the

fund of the charity will stop. And according to Gregersen Security System for

small businesses constitutes a special situation. Because small firms cannot

afford specialized proprietary security staffs, measures must be incorporated

into regular routines.

Base on the local and foreign articles the researchers have an idea to

combine the fund raising and trading portal in one system. The system

concept will be raise fund for the cancer patients and also to recycle the

plastics waste. To help and save the cancer patients the people will donate

plastic bottles and it will also help the environment to prevent the pollutions
that the plastic will cause. And also with the help of the Internet many patients

will get easily apply in the charities that will help poor people.
CHAPTER III

Methodology

This chapter discusses the use of agile method and the procedure of

phase involves product backlogs, sprint planning, sprint backlogs and the

product artifacts. The development of the system will be explained together

with figures and diagram use.

Research Design

Source:https://miro.medium.com/max/1000/1*6YLYqLJPP4ni2gIt6FgQ3g.jpeg

Figure 4. Agile Scrum Methodology

Agile Scrum Methodology is an agile framework designed for

consistently complying in any complex and innovative scope of work (Learn

About Scrum, 2016). The researcher adapt scrum as the main framework on

developing the A Non-Profitable Patients Web Portal for Fund Raising and

Donation Congregation It is expected that with the techniques of this

framework the project will be done highly satisfactory.


The researchers’ plan the title base on the system they’re going to

develop. The title should be related to the system that the group is

developing. The team shall contact the client to set an appointment and

discuss about the scopes and limitations of the system/ project. The team

should take down the schedule of work to be done. Scrum Master and his

group should make a meeting about the system that they're going to develop.

Planning for the activity to be done by sprint. During the sprint, the members

of the group should make a list of tasks and write down the hours of work it

takes. And lastly, after the group successfully develop the system/project.

They will set an appointment to the client to test the system that the team

developed.

In planning system, the researchers search about the existing systems

to identify the problem that the user have. Planning is important because if the

team wants to develop a system, the team must have a plan first. Developer

must know the problem statement, and find the best answer to solve a

problem. After planning, the developer designed the system with some criteria

that needs of the user. After the designing the coding is developed with

functions that have in the system. Using PHP (Hypertext Pre-processors) the

source code to be implementing with the design to build a complete system

design. After that, testing the system will be next. If the system has a problem,

the developer will repair it until it functions properly. The good benefits using

this method is developer can return back to any phase that need to repair

without go back to the first stage. The last phase in the system is the

Implementation. In this phase if the system has no problem, the team

continued the system project.


Project Procedures

Product Backlog. Naturally, this phase will be done with the help of the

client. The team conducted an interview about the needs of the system. Days

of observation and asking questions, the following backlogs were constructed.

Below are the product backlogs and its estimated hours together with the

priority which is the sequence of what part of the system should be develop

first and what should come last.

Table 4. Product Backlog

Estimated
Priority Items
hour/s per day
Admin
1 As an Admin, I want to Log in and access the 2
system.
2 As an Admin, I want to manage the system. 3
3 As an Admin, I want to add, edit or delete an 5
account.
4 As an Admin, I want to accept incoming 4
registrations.
5 As an Admin, I want to view the available funds. 3
6 As an Admin, I want to view the transaction 4
records.
User
7 As a User, I want to sign up to the system. 3
8 As a User , I can access the system. 2
9 As a User , I can view my funds. 4
10 As a User , I want to check my account 4
11 As a User, I want to claim my funds. 4
Total 41 hours

Table 1 represents the list of product item of the system. The project

will use by the Authorized Person and the selected User to manage the

transaction and provide proper documentation for list of the products. And

also, they will be the one who responsible for using the system.The list of item

is separated into two parts Admin and the User, so the researchers would not
lost on what particularly the analyst had done as such far. It is likewise

demonstrates the asked for capacity by various users of framework. Estimate

hours per days demonstrated. The researchers spend a day for doing what in

the list, to guarantee that each part of system will be done in view of its need.

Requirements Specifications

Software Requirements

MariaDB The researchers used for as database management of all


inputs. It can handle large amount of data and generate by the formula that is
build.

PHP Is the server side scripting language that used to support on


handling of the database transaction.

Visual Studio It is used to develop the actual application for android and
Windows 10 operating system.

Hardware Requirements

The table below shows the requirements for the desktop and Mobile
android Phone specification this includes the processor, hard disk drive, RAM
and Operating system.

Table 1. Desktop Specification

Desktop Specification
Processor RYZEN 3 1300
Hard Disk Drive 500GB
RAM 4GB
Operating System Windows 10

Table 2. Mobile Android Phone Specification

Mobile Android Phone Specification


Processor Qualcomm SDM450 Octa Core
ROM 16GB
RAM 2GB
Operating System ColorOS
Requirments Modeling
Use Case

Figure 5. Request/Inquiry Module

This Figure shows the Request/Inquiry module where the beneficiary will

sign up to the system and fill up all the required details including all the requirements

that will prove that they need the financial support. The admin can check and verify

the requirements given by the beneficiary if it is true and legal. When the beneficiary

was accepted by the admin it can now view his/her account including its fund

available. All the accounts of the beneficiaries who sign up to the system will be

manage by the admin.


Figure 6. Document Management Module

The figure above shows how the admin manage the accounts of all the

patients, it includes the viewing of accounts, database management, updating

funds. The admin and the beneficiary will access the module by logging in

their accounts.

Figure 7. Fund Management Module


The figure above shows the transferring and managing the funds. The admin is

the one who can add funds to the system. The admin will check if the system still

have enough funds that will bear the outgoing funds. The funds will be transfer from

the system to the beneficiary through money transfer / bank accounts. The

beneficiary can now claim the funds.

Sprint Backlog

*Table 5. Admin Sprint Backlog

Estimated hour/s per


Priority Items
week
Admin
1 As an Admin, I want Code the 30
to Log in and interface
access the system. Design middle
tier
Test middle tier
2 As an Admin, I want Code the 30
to manage the interface
system. Design middle
tier
Test middle tier
3 As an Admin, I want Code the 40
to add, edit or interface
delete an account. Design middle
tier
Test middle tier
4 As an Admin, I want Code the 40
to accept incoming interface
registrations. Design middle
tier
Test middle tier
5 As an Admin, I want Code the 30
to view the available interface
funds. Design middle
tier
Test middle tier
6 As an Admin, I want Code the 40
to view the interface
transaction records. Design middle

tier
Test middle tier

Table 2 shows the corresponding sprint of each item or product backlog

for the admin gathered by the researchers during the first phase of this

project. The researchers must do the tasks for every item which is to design

and test the whole system. The hours per day represent for what the

researchers will do every day of the week to complete the task.

Table 6. User Sprint Backlog

User
7 As a User, I want to Code the 30

sign up to the interface


Design middle
system.
tier
Test middle tier
8 As a User , I can Code the 30

access the system. interface


Design middle

tier
Test middle tier
9 As a User , I can Code the 40

view my funds. interface


Design middle

tier
Test middle tier
10 As a User , I want to Code the 40

check my account interface


Design middle

tier
Test middle tier
11 As a User, I want to Code the 40

claim my funds. interface


Design middle
tier
Test middle tier

Table 3 consists of viewing transactions and instructions and lastly

choosing the charity by the user. The hours per day conducted too. Sprint

backlogs will intensively follow by the researchers to fasten the development

of the inventory system without compromising other entity needed and

significant on the project.

Evaluation

Figure 8. ISO 25010


In assessing the system, the researchers used the ISO 25010 product

quality for the evaluation. The system tested based on the characteristics of

ISO 25010.

Functional Suitability. One of the most important quality of the system since

it demands that the software meets the needs and requirement of the users.

The researchers can prove that the system meet the requirements of the

users and it turn, user have assurance that the system are functionally.

Performance Efficiency. Users of software application usually regard

performance as an important standard to decide whether the software is good

and user friendly.

Compatibility. Is important to the system to ensure the user’s satisfaction to

determine whether the website is proficient enough to run properly in different

browsers, versions, OS and network

Usability. The researchers developed the system to implement the specified

users which are the cancer patients as the beneficiaries, the donors and

junkshop owner to know if the software application had an effectiveness and

satisfaction to the users to test if the software application to know if there will

be some errors.

Reliability. The IT expert will check the reliability of the software application

by analyzing the quality through the measurement and specification if are

accurate in the functionality of the application.

Security. The IT expert will be checking the standard function of the security

through data if they are secured and protected in hacker.


Maintainability. The IT expert will be checking the standard function of the

system including if are needed a maintenance and stability of the software.

Portability. The IT expert will be determined whether if the system has

capability to transfer in other android or entire system.

Test Plan
Figure 8. Test Plan

Test plan and evaluation includes the process by which the system

application or the components are compared against requirements and

specifications through testing.

Integration Testing
1. Compatibility Testing

Figure 9. Compatibility Testing

Compatibility Testing is a non-functional testing in which we ensure that

the system is capable of running on different environment. The proponents

will test the compatibility of the system according to the usage or need of the

client. The system will use a windows operating system and MySQL

Database. The system will need a network connection therefore the

proponents will test the compatibility of the application in different networks

with all parameters such as Bandwidth, capacity and operating speed.

2. Performance Testing
Figure 10. Performance Testing

Performance testing is needed in software testing to ensure that software

can perform well under the expected workload. This is aiming not to find bugs

but to eliminate the bottleneck in the performance. Performance testing

focuses on the checking of the software’s speed, scalability and stability.

Thus, the proponents will test the system to determine if the application can

respond quickly, if it is stable under varying loads and to find the maximum

user load the system can handle.


3. System Testing

Figure 11. System Testing

System Testing is the testing of a complete and fully integrated

software product. This involves testing the software code. The proponents will

be testing the fully integrated system to check how the components will

interact with one another. To check for desired outputs, the proponents will

verify through testing of every input. Also, to test the user’s experience with

the system.
Acceptance Testing

Figure 12. Acceptance Testing

Acceptance Testing is where the system is tested for acceptability. This

will evaluate the system’s compliance with the requirements and asses if it

satisfies the acceptance criteria. The proponents must complete all of the

other system testing in order to arrive in acceptance testing. Once the system

testing is complete, this is the right time to perform the acceptance testing as

to confirm that the software is ready to be made available to the end-users.


Security and Access Control Testing

Figure 13. Security and Access Control Testing

Security and Access Control Testing is where the system is tested for

security mechanisms of an information system that protect data and maintain

functionality as intended. The proponents will test the system by logging in

and logging out into the system. And then will click the back button of the

browser to check if the system asked to log in again or if the system provided

the logged-in application.

You might also like