Professional Documents
Culture Documents
Non Profitable Cancer Patients Web Portal For Fund Raising and Donation Congregation
Non Profitable Cancer Patients Web Portal For Fund Raising and Donation Congregation
Non Profitable Cancer Patients Web Portal For Fund Raising and Donation Congregation
Proponents:
June 2020
CHAPTER I
Introduction
to examine their lives and look for meaning. In fact, this search for meaning
may be the aspect of cancer that most often has a positive influence on life.
The fear of death that affects most people when they are diagnosed with
cancer, often leads us to think about what we leave behind and what we
would like to do with the time we have left. Furthermore, besides of thinking
that they’re sick, they also think the expenses for their treatment [ CITATION
QuaND1 \l 1033 ].
A loved one battling cancer might find it hard to ask someone for help,
in fear of seeming needy or vulnerable. They can play a pivotal role for a
family member or friend living with cancer. They may trust their members and
feel close enough to share their greatest struggles and deepest emotions.
This is opportunity to provide the support your family or friend that need
during their excruciating journey with cancer. Cancer patients can develop
throughout their battle with cancer. Some people are open to sharing their
emotional challenges, while some are reserved and prefer to work through
their concerns in solitude. Create a my cause campaign to fund raise for their
those looking to integrate their offline fund raising efforts into their web
strategy. A good system for online fund raising should not only address donor
experience by creating an efficient, user-friendly platform for processing
donations and other types of fund raising revenue, but should also represent
the aesthetic and ethos of the organization as well, with giving pages that are
management platform can incorporate all these essential features and lead to
Project Context
Daily concerns have to take second place to completing all the tests, doctor
visits and paperwork that are needed in order to plan the cancer treatment.
Once the treatment is started and a general plan is put into place, the patient's
attention may turn to questions about finances [ CITATION DunND \l 1033 ]. The cost
with health insurance, but there are other hidden costs that come with a
cancer diagnosis. Many cancer patients are unable to work as they fight for
their lives leaving them to scramble or rely on others for assistance with basic
necessities such as paying bills, buying groceries, co-pays and even money
for gas to make it to appointments with their doctors. Parents of children with
recycled materials.
Module.
Conceptual Framework
they can apply on the system so they can be one of the beneficiaries of funds
that will be collected. The chosen beneficiary can check incoming funds
through their accounts. The funds will send from the system to the beneficiary
on exact time when the donor choose them. The transaction will be using a
application with the help of the IoT. The IoT support the system and the
android application to interconnect and to easily access the app and the
system.
The documents of the charities who applied to the system will be handle
by the operator. This document must include the important details of the
establishments and the list of the cancer patients that they are helping with.
The list of the patients and their illness or what type of cancer they have
should be included. In that case, the operator of the system will know how
The available funds in the system will be managed by the admin wherein
he can add, hold and release funds. The funds that will be released was
based on the bottles that the donor will bring. The donor can divine his
earnings and distribute it to the beneficiaries that he want to help with. If the
funds become insufficient the admin can top up to add more funds. This
system can also print statistical report for the monitoring of all the funds.
Project Purpose
This project aims to provide an efficient fund raising for the cancer
following:
better data.
Donor. Implementing a Recyclable Trading Portal will help not only the
environment, but also those people whose suffering cancer. It will take the
recyclable materials and turn them into funds for cancer patients.
medical bills, the system will provide financial assistance for the cancer
patients through recyclable materials. Also, fund raising for cancer patients
portal it will be the best medium to promote fund raising. Additionally, the
Trading Portal for Cancer Patients. It can be a help as a future reference for
The system helps the cancer patients to their financial or the medical
interface wherein the benefactors or the users will easily understand all the
API Module
This module includes security in all the accounts in the system application.
There is an API key and API secret where the user can use to register
account to transfer and received donations. But aside from that, the API
cannot perform without an internet connection, which the internet is used for
Request/Inquiry Module
The module is designed for the charity or cancer patients which they can
apply on the system so they can be one of the beneficiaries of funds that will
be collected. The chosen beneficiary can check incoming funds through their
accounts. The funds will be sent from the system to the beneficiary on exact
time when the donor choose them. The transaction will be using a platform
by the operator. This document must include the important details of the
establishments and the list of the cancer patients that they are helping with.
The list of the patients and their illness or what type of cancer they have
should be included. In that case, the operator of the system will know how
The available funds in the system will be managed by the admin wherein
he can add, hold and release funds. The funds that will be released was
based on the bottles that the donor will bring. The donor can divine his
earnings and distribute it to the beneficiaries that he want to help with. If the
funds become insufficient the admin can top up to add more funds.
Statistical Module
This module includes the viewing of monthly reports and printing for the
backup source of the users. But the theres a limitation like the users cannot
print without printer device but the users can save the file as pdf.
Definition of Terms
API
Server
Client
CHAPTER II
improved prognosis. One of the main prognostic factors in rectal cancer is the
clinical importance in 1986, the involvement of this margin (also called lateral
hand offs between primary and specialty care providers, and coordination
among cancer care team members. Although several IOM reports have
more involved in their cancer care. Individuals commonly search the Internet
emotional support of cancer patients and their caregivers. Given the distress
support groups are a way for patients to find coping strategies and share
lists for both patients and caregivers since 1995. Another example is the
information and social support accessible and useful,” and enabling patients
help patients with information and support needs. [ CITATION Gus05 \l 1033 ]
interactive decision aids have been developed for breast cancer surgery and
are under development for prostate cancer treatment. Other emerging tools
such as Adjuvant! Online and the Cancer Profiler Tool provided by Live
incorporating PHRs into patients’ daily lives and health care decisions using
a customized care planning tool for breast cancer patients. [ CITATION Rob10 \l
1033 ]
Ber01 \l 1033 ]
rapid proliferation of “Web 2.0” technologies (e.g., social media sites, web
flash drive) or website, but interoperability and privacy are key concerns,
Patients and providers also may not always share perspectives on the use of
portable health records. A recent review article noted that as patients turn to
prevent errors, or ensure dosing safety for cancer patients? Such guidelines
are used routinely in areas other than cancer, and have been shown to
improve both quality and outcomes of cancer screening. This literature is less
important to identify the key features, timing, and other aspects of designing
systems, to ensure that tailored clinical solutions do not create new barriers to
based in that they use scientific evidence to guide decision making. In clinical
systems, compared to open systems that accept patients from multiple health
Cancer can involve any tissue of the body and have many different
forms in each body area. Most cancers are named for the type of cell or organ
in which they start. If a cancer spreads (metastasizes), the new tumor bears
the same name as the original (primary) tumor. The frequency of a particular
cancer may depend on gender. While skin cancer is the most common type of
malignancy for both men and women, the second most common type in men
is prostate cancer and in women, breast cancer. Cancer frequency does not
equate to cancer mortality. Skin cancers are often curable. Lung cancer is the
leading cause of death from cancer for both men and women in the United
will get combination therapy, the composition determined by the cancer type
described above. It is done with the intent to extend and improve the quality of
life of the terminally ill cancer patient. There are many other palliative
that are treated and do not recur (no remissions) within a five-year period in
general suggest that the patient will have a normal life expectancy. Some
patients will be cured, and a few others may get recurrent cancer.
In the most basic terms, cancer refers to cells that grow out-of-control
and invade other tissues. Cells may become cancerous due to the
defects (for example, BRCA1 and BRCA2 mutations) and infections can
increase the risk of cancer. Environmental factors (for example, air pollution)
also damage DNA and lead to cancer. Most of the time, cells are able to
detect and repair DNA damage. If a cell is severely damaged and cannot
apoptosis. Cancer occurs when damaged cells grow, divide, and spread
childbearing age (or parents of children with cancer) should ask their cancer
care team about the possible impact treatment might have on their ability to
have children so they can discuss their options.[ CITATION Joh98 \l 1033 ]
Research has shown that cancer cells are not all the same. Within a
can be a variety of types of cells. The stem cell theory of cancer proposes that
among all cancerous cells, a few act as stem cells that reproduce themselves
and sustain the cancer, much like normal stem cells normally renew and
sustain our organs and tissues. In this view, cancer cells that are not stem
cells can cause problems, but they cannot sustain an attack on our bodies
One component of the cancer stem cell theory concerns how cancers
number of essential changes in the DNA sequences that regulate the cell.
Conventional cancer theory is that any cell in the body can undergo these
Center observe that our normal stem cells are the only cells that reproduce
themselves and are therefore around long enough to accumulate all the
stem cells arise out of normal stem cells or the precursor cells that normal
larger truths about cancer in general. Chemotherapy, for instance, was shown
to be effective in leukemia well before physicians had the idea to try it on solid
tumors. The scientific and medical clarity offered by leukemia is due in large
part to the ability of researchers and physicians to easily take blood samples
and identify the various cellular components of the blood cancers. [ CITATION
Shi09 \l 1033 ]
face. On top of choosing treatment, patients may have to deal with side
effects, absence from work, and family issues. Caregivers also have many
challenges including increased stress. Here, you can find information to assist
people to examine their lives and look for meaning. In fact, this search for
meaning may be the aspect of cancer that most often has a positive influence
on life. The fear of death that affects most people when they are diagnosed
with cancer, often leads us to think about what we leave behind and what we
would like to do with the time we have left. It can make you feel like it’s the
quality of life, not just the quantity, which matters most. [ CITATION Mil01 \l 1033 ]
Cell Research and Medicine, for instance, discovered the reason that stem
cells, including cancer stem cells, are resistant to the ionizing radiation used
If cancer stem cells are the primary driver of cancer growth and
metastasis, then effective cancer treatments must attack the CSCs. Shrinking
may offer temporary relief, but will not offer a long-term cure if CSCs are not
eliminated. What’s more, if only the CSCs are eliminated, the rest of the
cancer cells in the body will be attacked by the immune system or die out
naturally since cancer cells that are not stem cells by definition do not have
potential to invade or spread to other parts of the body. These contrast with
benign tumors, which do not spread. Possible signs and symptoms include a
they may have other causes. Over 100 types of cancers affect humans.
Tobacco use is the cause of about 22% of cancer deaths. Another 10% are
virus (HIV). These factors act, at least partly, by changing the genes of a cell.
molecular differences between cancer and normal cells. The first targeted
targeted therapies exist for many of the most common cancer types, including
liver cancer, lung cancer, lymphoma, pancreatic cancer, prostate cancer, skin
cancer, and thyroid cancer as well as other cancer types. The efficacy of
curative for some cancers, such as some leukemias, ineffective in some brain
tissues in the body. Even when chemotherapy does not provide a permanent
cure, it may be useful to reduce symptoms such as pain or to reduce the size
of an inoperable tumor in the hope that surgery will become possible in the
alternative medicines for cancer have not been studied or tested using
1033 ]
of the text and the high graphic content (hundreds of colour maps, diagrams,
Nearly all of the evidence linking obesity to cancer risk comes from
people may differ from lean people in ways other than their body fat, and it is
possible that these other differences—rather than their body fat—are what
or tissue samples under a microscope. In some cases, tests done on the cells’
proteins, DNA, and RNA can help tell doctors if there’s cancer. These test
results are very important when choosing the best treatment options. Tests of
cells and tissues can find many other kinds of diseases, too. For instance, if
doctors are not sure a lump is cancer, they may take out a small piece of it
and have it tested for cancer and for infections or other problems that can
cause growths that may look like cancer.[ CITATION Ric18 \l 1033 ]
Hanahan and Robert Weinberg. The authors believe that the complexity of
argues that all cancers share six common traits ("hallmarks") that govern the
("hallmarks") that the authors highlight in the paper are Cancer cells stimulate
signals); They resist their programmed cell death (evading apoptosis); They
angiogenesis); They invade local tissue and spread to distant sites (tissue
part will discuss the association between tobacco use and risk of specific
cancer by causing mutations that disrupt cell cycle regulation, or through their
whose workplaces do not meet the requirements for health and safety
the pollution of air with carcinogenic substances. For example, workers who
are heavily exposed to second hand tobacco smoke at their workplaces have
asbestos, benzene and other carcinogens is that it takes so long for science
World War confronts scientists with the question of their origin. In Western
cancer detection using new diagnostic and screening tests cannot fully
account for the observed growing incidence of cancer. Our hypothesis is that
usually agreed. (1) Over the last 2–3 decades, alcohol consumption and
North America. (2) Obesity is increasing in many countries, but the growing
incidence of cancer also concerns cancers not related to obesity nor to other
known lifestyle-related factors. (3) There is evidence that the environment has
changed over the time period preceding the recent rise in cancer incidence,
and that this change, still continuing, included the accumulation of many new
due to genetic polymorphism cannot have changed over one generation and
interactions. (5) Age is not the unique factor to be considered since the rising
incidence of cancers is seen across all age categories, including children, and
deaths worldwide, with Europe and America showing the highest alcohol
International Agency for Research on Cancer (IARC) added two of the most
major risk factor for cancer incidence,3 and Europe is among the regions with
direct empirical evidence for the different cancer sites is sparse,4 5 and
than plain films, we are seeing a marked increase in radiation exposure in the
from even two or three CT scans results in a detectable increase in the risk of
cancer, especially in children. This article summarizes the facts about this
form of radiation exposure and the implications for public health. [ CITATION
DrB07 \l 1033 ]
Be sure to travel with all the medications and supplies you will need
during your time away, plus some extra should you lose or misplace them.
Ask your doctor about additional drugs you might take to combat treatment
side effects, motion sickness, or traveler's diarrhea. Carry a list of all your
medications, the dosages, and any allergies, and bring additional signed
prescriptions for back-up. Keep your drugs in their original containers and
pack them in carry-on bags, not in checked luggage, which can sometimes
No one can know exactly, but your doctor should be able to tell you a
range of months or years. And you need to know if more treatment for cancer
will help you live longer. Ask your doctor to explain the risks and benefits of
any treatment. Fighting the cancer may no longer be the best thing for you.
You may just see it as taking care of someone you love, but what you
are doing is extremely important. Helping a loved one with cancer isn’t always
easy. Caregiving can be a full-time, non-stop job that wears on you physically
and emotionally, but there are many things you can do to make it easier.
Many recyclers run legitimate operations that absorb these costs and
profit from refurbished equipment sales and fees charged for accepting old,
buyers in developing countries, who dictate the amount of junk they will
accept in exchange for a specified number of high-value items. [ CITATION
Cha06 \l 1033 ]
The problems relating to mounting solid waste are fast acquiring gigantic
Wastes are secondary resources for lower income countries, harvesting them
Bhu17 \l 1033 ]
these wastes have become the most rapidly growing segment of the
million metric tons between 1997 and 2007 in the United States (National
Safety Council 1999). Up to 80% of plastics from the United States had
seeped into Asia and Africa. It is noteworthy that the United States is the only
developed country today that has not ratified the United Nations Basel
effects on the import volume of recyclable waste. Moreover, this implies that
and by rising GDP creating larger increases in disposal capacity than waste
substantially in the past decade. Using bilateral waste trade data and an index
conflicts of interest with the cancer drug, mammography, and other industries.
The “nonprofit” status of the Society is in sharp conflict with its high overhead
and expenses, excessive reserves of assets and donations came from other
countries like India and developed countries. Plastic comprises material that is
valuable as well as toxic and has shoddier health and environment impact.
networks that inform the actions of actors involved in plastic waste disposal. It
During the past two decades, the generation and Trans boundary
tons of hazardous waste was generated worldwide. There has also been an
wastes are exported for activities such as resource recovery, recycling or re-
Security System
security system. After World War II much of this apparatus was retained as a
result of international tensions and defense-production programs and became
smaller, more reliable, and more easily installed and maintained. [ CITATION
Bri00 \l 13321 ]
Relatively simple equipment for houses or small apartment buildings, as, for
Some of the more noteworthy examples include sensor devices that report
quality and hand geometry; surveillance devices that can scan premises at
throughout the last century and the gadgets on the market these days are
extremely reliable when it comes to offering security and protection. [ CITATION
Ste16 \l 13321 ]
The most basic definition of any security system is found in its name. It
Mobile Application
software units with limited function. This use of app software was originally
popularized by Apple Inc. and its App Store, which offers thousands of
applications for the iPhone, iPad and iPod Touch. [ CITATION Dal15 \l 13321 ]
The simplest mobile apps take PC-based applications and port them
specifically for the mobile environment, taking advantage of both its limitations
media, the Web and outreach. With these types of mobile apps, the business
Facebook. Some of these apps integrate customer feedback, but the vast
brand visibility online and through a user’s access device, for example, a
These apps can capture and analyze data in order to help the
about their customers. Some of these apps make it easier to source materials
and services from vendors and suppliers. Other mobile apps help with payroll
and inventory. All of these types of logistics apps have specific roles in how a
are web-based or native apps, which are created specifically for a given
platform. A third category, hybrid apps, combines elements of both native and
Web apps. As the technologies mature, it's expected that mobile application
portable devices. A mobile app may be a mobile Web site bookmarking utility,
a mobile-based instant messaging client, Gmail for mobile, and many other
email, calendar, and contact databases, but the public demand for apps
caused rapid expansion into other areas such as mobile games, factory
automation, GPS and location-based services, order-tracking, and ticket
purchases, so that there are now millions of apps available. [ CITATION Bro16 \l
13321 ]
the device. The basic interaction with the camera requires modeling the
invocation of an Action for taking the picture, the asynchronous event that
notifies that the photo has been taken, and the visualization of the image in
among mobile users, but also among the cellular providers. Security services
A mobile application can either load data from a remote location, store
data in a local database, or both. When loading data from remote locations,
SQL-injection protection must be built into the service that provides the data.
on existing sites. When the user wishes to access a mobile application, they
navigate their mobile browser to the proxy server's main page, select their
application from a list of available applications, and then proceed to use the
device that not only communicates, but helps to learn, earn, and have fun.
This is made possible by the development of mobile applications. [ CITATION
Joh16 \l 13321 ]
Charity/ Organization
Giving to charity isn’t a new fad; it’s a practice that has been popular
methods, the act of charitable giving has had its place in the history books for
time stand beside Ancient Greeks and clergy members alike as those who
have done their part in donating both time and precious resources to those in
or alms. The name stems from the most obvious expression of the virtue of
charity; giving the recipients of it the means they need to survive. The
injured, are generally regarded as the proper recipients of charity. The people
such as food, water, clothing, healthcare and shelter, but other actions may
Institutions evolved to carry out the labor of assisting the poor, and
these institutions, called charities, provide the bulk of charitable giving today,
institutes dedicated to care of the poor, hospitals, organizations that visit the
homebound and imprisoned, and many others. Such institutions allow those
whose time or inclination does not lend themselves to directly care for the
poor to enable others to do so, both by providing money for the work and
supporting them while they do the work. Institutions can also attempt to more
effectively sort out the actually needy from those who fraudulently claim
goes, the uniformity and inefficiency of much public sector provision, while
acting from nobler motives than private sector providers chasing profit.
reciprocal love between God and man that is made manifest in unselfish love
relationship with itself and to increasingly value the welfare of both the
as radar, computing and the development of the jet engine so it was for
for the post war leaders of the business world were from the military in WWII,
with the majority of Post War managers drawing on their military training as a
clothing, and shelter. But work involves more than the use of tools and
the reach of the hand, expand muscle power, enlarge the senses, and
multiply the capacities of the mind. The story of work is still unfolding, with
great changes taking place throughout the world and in a more accelerated
fashion than ever before. The form and nature of the work process help
determine the character of a civilization; in turn, a society’s economic,
political, and cultural characteristics shape the form and nature of the work
process as well as the role and status of the worker within the society.
work can perhaps lead to a better understanding of the present problems now
simple tasks involving the most basic of human needs: food, child care, and
organize the work of foraging and hunting and, later, agriculture. [ CITATION
Ada11 \l 13321 ]
group for people with learning difficulties and a social firm, which still operates
13321 ]
a one-way act where a person gives but asks for nothing in return. [ CITATION
Tho18 \l 13321 ]
problems, troubles, and griefs of some sort in life but charity starts with those
kindness, and love to help others.Hence some people set aside their own
relief and to provide assistance to people at times of need in any part of the
world, especially who are the victims of war, natural disaster, catastrophe,
education of young people for the public benefit by making grants and awards
world, people feel deep sorrow but seem to put no effort whatsoever to reduce
or eradicate the problem. Poverty in today’s world has turned out to be sinister
and we lay passive towards the problem, therefore such attitude has made us
as every drop in the ocean counts to form a vast water mass, even small
donations have the potential to drastically improve an individual’s quality of
making lives better; when we touch lives by the dint of donations or charity,
spreading light to the most needy and enlighten our souls in the process.
They provide children and families with clothing, food, education, shelter and
the teachings. Through love, motivation, and opportunities they help people
thrive and become self-sufficient and on the other hand there are
organizations have taken up a sacred mission of helping the helpless, it’s now
our duty as well to help them to raise funds and support their noble cause.
which are private initiatives for private good, focusing on material gain, and
with government endeavors, which are public initiatives for public good.
Instead of charity, Wilde suggests preventing poverty and the need for
charity in the first place. A parallel argument can be made for the concern
about the wage gap in the states; instead of an off-place slave analogy.
Instead of promoting higher minimum wage, people should try and see the
root cause of the wage gap. For both poverty and the wage gap, these are
that the DES is not generally secure because of the advances in computer
processing power. The year 2000 the NIST formally adopted the AES and
With AES encryption and decryption were implemented using the same
key that was called a symmetric encryption algorithm. While the encryption
algorithm uses two different keys which is public and private that was called
encryption process as a binary string. For those who are using the same
encryption key to encrypt and decrypt the data, it is very important to keep a
secret encryption key. The AES protects the digital information in various
and hardware. It is also difficult to know the detail of this process because of it
is too patented encryption and it’s difficult to decrypt the data which is the
or more devices, the data transmission in the SMS or the security system
would be more secure. SMS technology is an emerging wireless
communication simple and secure among the devices and the internet the
data transmission between these devices has become faster and efficiently,
and widen the wireless communications (Miao, 2010). AES algorithm is one of
proven to be the best way to convert the data into private messages. It is
the message in the client side and send it together with public keys through
the network. The data is retrieved on the server side and through the access
to the database, private keys are recovered and decryption process (Jenny
over the last decade. The worldwide introduction of total mesorectal excision
improved prognosis. Quirke prove that the rectal cancer or called chemo-
therapy will be the solving problem for the cure of cancer but the prediction of
it is failed many of people die in cancer. Otherwise many expert have been
invented and make and article on to resolve or to prevent the increasing death
rate in cancer and how to cure that illness and one of this is related in
technology. In the article of Holdren A 2010 presidential commission report on
quality, safer care, and aggregate data. Holdren identify that the information of
technology expert can help the cancer patients but not to cure but to assist for
the medications and gather data who got cancer every year.
And many IT expert follow it according in CHR or Center for Health Center
Many people have scare to have an cancer, So what the cancer really
about and why people very afraid to have them. According Dr. Tan Cancer
can involve any tissue of the body and have many different forms in each
body area. Most cancers are named for the type of cell or organ in which they
start. If a cancer spreads (metastasizes), the new tumor bears the same
And what is the cure of cancer, in the article of Albert Individuals obtain
variations of these treatments for cancer. Patients with cancers that cannot be
the composition determined by the cancer type and stage. Many expert tried
to create a cure in that illness. But nothing will succeed the only hope will be
medication and many of the cancer patients try to find a solutions like go to
the charities. And how would work to help the cancer patients with the
medications base on the article of Schmidt Many recyclers run legitimate
operations that absorb these costs and profit from refurbished equipment
sales and fees charged for accepting old, unsalable material. With the help of
Many people suffer illnesses one of this is the very popular and high
risk it is call cancer. The most common or the most prone in cancer was the
poor and no money to spend people. So, that in the time of A.D. they create a
charity that will help the people who don’t have money to pay the bills in their
medications in cancer. There are several foundations or charity that will help
the people who needs medication for their illnesses. And according to
In terms of that many people know there were many charity that will
help people who doesn’t have a money and many people apply that’s why the
security system organize to prevent the people who taking advantage in the
fund of the charity will stop. And according to Gregersen Security System for
Base on the local and foreign articles the researchers have an idea to
combine the fund raising and trading portal in one system. The system
concept will be raise fund for the cancer patients and also to recycle the
plastics waste. To help and save the cancer patients the people will donate
plastic bottles and it will also help the environment to prevent the pollutions
that the plastic will cause. And also with the help of the Internet many patients
will get easily apply in the charities that will help poor people.
CHAPTER III
Methodology
This chapter discusses the use of agile method and the procedure of
phase involves product backlogs, sprint planning, sprint backlogs and the
Research Design
Source:https://miro.medium.com/max/1000/1*6YLYqLJPP4ni2gIt6FgQ3g.jpeg
About Scrum, 2016). The researcher adapt scrum as the main framework on
developing the A Non-Profitable Patients Web Portal for Fund Raising and
develop. The title should be related to the system that the group is
developing. The team shall contact the client to set an appointment and
discuss about the scopes and limitations of the system/ project. The team
should take down the schedule of work to be done. Scrum Master and his
group should make a meeting about the system that they're going to develop.
Planning for the activity to be done by sprint. During the sprint, the members
of the group should make a list of tasks and write down the hours of work it
takes. And lastly, after the group successfully develop the system/project.
They will set an appointment to the client to test the system that the team
developed.
to identify the problem that the user have. Planning is important because if the
team wants to develop a system, the team must have a plan first. Developer
must know the problem statement, and find the best answer to solve a
problem. After planning, the developer designed the system with some criteria
that needs of the user. After the designing the coding is developed with
functions that have in the system. Using PHP (Hypertext Pre-processors) the
design. After that, testing the system will be next. If the system has a problem,
the developer will repair it until it functions properly. The good benefits using
this method is developer can return back to any phase that need to repair
without go back to the first stage. The last phase in the system is the
Product Backlog. Naturally, this phase will be done with the help of the
client. The team conducted an interview about the needs of the system. Days
Below are the product backlogs and its estimated hours together with the
priority which is the sequence of what part of the system should be develop
Estimated
Priority Items
hour/s per day
Admin
1 As an Admin, I want to Log in and access the 2
system.
2 As an Admin, I want to manage the system. 3
3 As an Admin, I want to add, edit or delete an 5
account.
4 As an Admin, I want to accept incoming 4
registrations.
5 As an Admin, I want to view the available funds. 3
6 As an Admin, I want to view the transaction 4
records.
User
7 As a User, I want to sign up to the system. 3
8 As a User , I can access the system. 2
9 As a User , I can view my funds. 4
10 As a User , I want to check my account 4
11 As a User, I want to claim my funds. 4
Total 41 hours
Table 1 represents the list of product item of the system. The project
will use by the Authorized Person and the selected User to manage the
transaction and provide proper documentation for list of the products. And
also, they will be the one who responsible for using the system.The list of item
is separated into two parts Admin and the User, so the researchers would not
lost on what particularly the analyst had done as such far. It is likewise
hours per days demonstrated. The researchers spend a day for doing what in
the list, to guarantee that each part of system will be done in view of its need.
Requirements Specifications
Software Requirements
Visual Studio It is used to develop the actual application for android and
Windows 10 operating system.
Hardware Requirements
The table below shows the requirements for the desktop and Mobile
android Phone specification this includes the processor, hard disk drive, RAM
and Operating system.
Desktop Specification
Processor RYZEN 3 1300
Hard Disk Drive 500GB
RAM 4GB
Operating System Windows 10
This Figure shows the Request/Inquiry module where the beneficiary will
sign up to the system and fill up all the required details including all the requirements
that will prove that they need the financial support. The admin can check and verify
the requirements given by the beneficiary if it is true and legal. When the beneficiary
was accepted by the admin it can now view his/her account including its fund
available. All the accounts of the beneficiaries who sign up to the system will be
The figure above shows how the admin manage the accounts of all the
funds. The admin and the beneficiary will access the module by logging in
their accounts.
the one who can add funds to the system. The admin will check if the system still
have enough funds that will bear the outgoing funds. The funds will be transfer from
the system to the beneficiary through money transfer / bank accounts. The
Sprint Backlog
tier
Test middle tier
for the admin gathered by the researchers during the first phase of this
project. The researchers must do the tasks for every item which is to design
and test the whole system. The hours per day represent for what the
User
7 As a User, I want to Code the 30
tier
Test middle tier
9 As a User , I can Code the 40
tier
Test middle tier
10 As a User , I want to Code the 40
tier
Test middle tier
11 As a User, I want to Code the 40
choosing the charity by the user. The hours per day conducted too. Sprint
Evaluation
quality for the evaluation. The system tested based on the characteristics of
ISO 25010.
Functional Suitability. One of the most important quality of the system since
it demands that the software meets the needs and requirement of the users.
The researchers can prove that the system meet the requirements of the
users and it turn, user have assurance that the system are functionally.
users which are the cancer patients as the beneficiaries, the donors and
satisfaction to the users to test if the software application to know if there will
be some errors.
Reliability. The IT expert will check the reliability of the software application
Security. The IT expert will be checking the standard function of the security
Test Plan
Figure 8. Test Plan
Test plan and evaluation includes the process by which the system
Integration Testing
1. Compatibility Testing
will test the compatibility of the system according to the usage or need of the
client. The system will use a windows operating system and MySQL
2. Performance Testing
Figure 10. Performance Testing
can perform well under the expected workload. This is aiming not to find bugs
Thus, the proponents will test the system to determine if the application can
respond quickly, if it is stable under varying loads and to find the maximum
software product. This involves testing the software code. The proponents will
be testing the fully integrated system to check how the components will
interact with one another. To check for desired outputs, the proponents will
verify through testing of every input. Also, to test the user’s experience with
the system.
Acceptance Testing
will evaluate the system’s compliance with the requirements and asses if it
satisfies the acceptance criteria. The proponents must complete all of the
other system testing in order to arrive in acceptance testing. Once the system
testing is complete, this is the right time to perform the acceptance testing as
Security and Access Control Testing is where the system is tested for
and logging out into the system. And then will click the back button of the
browser to check if the system asked to log in again or if the system provided