Professional Documents
Culture Documents
Laundry Data Management System
Laundry Data Management System
Laundry Data Management System
BY:
KIPNG’ETICH DENNIS KIBET
INDEX NO:
265341051097
COURSE CODE:
1920/02
I would like to thank the almighty God, my friends and my parents for their moral support and my
friends with whom I shared our day-to-day experience and received lots of suggestions that
improved our quality of work.
REGARDS
Kibet Dennis
DECLARATION
I hereby declare that the project entitled “Laundry management system” submitted for the KNEC is
my original work done under the guidance of our programming lecturers.
SIGNATURES:
Supervised by:
Table of Contents
........................................................................................................................................................................... 1
ACKNOWLEDGEMENTS......................................................................................................................................2
DECLARATION....................................................................................................................................................3
CHAPTER ONE....................................................................................................................................................6
1.0 INTRODUCTION............................................................................................................................................6
1.1 Background information..............................................................................................................................6
1.3 Statement of the problem............................................................................................................................7
1.4 PROPOSED SYSTEM......................................................................................................................................7
1.5 Objectives of the study................................................................................................................................8
1.7 Significance of the study..............................................................................................................................8
1.7 Scope of Study.............................................................................................................................................9
1.8 Limitation and delimitation of study............................................................................................................9
1.8 Definition of terms.......................................................................................................................................9
CHAPTER TWO.................................................................................................................................................11
LITERATURE REVIEW........................................................................................................................................11
2.1 Introduction...............................................................................................................................................11
2.2 The Internet...............................................................................................................................................12
2.3 Portal vs Website........................................................................................................................................12
2.4 Major functions of portal...........................................................................................................................13
Chapter three...................................................................................................................................................15
Methodology...................................................................................................................................................15
3.1. Introduction to Methodology....................................................................................................................15
3.2. Feasibility studies......................................................................................................................................15
3.3. Population.................................................................................................................................................15
3.4. Sampling technique...................................................................................................................................16
3.5. Data collection techniques........................................................................................................................16
3.6. Research schedule.....................................................................................................................................16
3.7. Ethical Issues.............................................................................................................................................17
CHAPTER FOUR................................................................................................................................................18
SYSTEM ANALYSIS.............................................................................................................................................18
User-Interface Requirements...........................................................................................................................18
IV. Goals, Scenarios, Use Cases........................................................................................................................22
VI. Requirements.........................................................................................................................38
1.0 INTRODUCTION
Laundry firms currently use a manual system for the management and maintenance of critical
information. The current system requires numerous paper forms, with data stores spread throughout
the laundry management infrastructure. Often information (on forms) is incomplete or does not
follow management standards. Records are often lost in transit during computation requiring a
comprehensive auditing process to ensure that no vital information is lost. Multiple copies of the
same information exist in the laundry firm data and may lead to inconsistencies in data in
various data stores.
A significant part of the operation of any laundry firm involves the acquisition, management and
timely retrieval of great volumes of information. This information typically involves; customer
personal information and clothing records history, user information, price of delivery and
retrieval period, users scheduling as regards customers details and dealings in service
rendered, also our products package waiting list.
All of this information must be managed in an efficient and cost wise fashion so that the
organization resources may be effectively utilized.
The goal of laundry management system is to automate the management of the laundry firm
making it more efficient and error free. It aims at standardizing data, consolidating data ensuring
data integrity and reducing inconsistencies, through the use of highly computerized process that is
stress free, reliable and quick through the use of asp.net computer programming language and SQL
database application to both the users and the staff in charge of the registration and laundry
management processes. HTML would be at the front-end and provide the graphical user
interface that relates with the user, while the SQL database will be at the back-end to handle
the data storage process.
Laundry firm currently uses a manual system for the management and maintenance of critical
information. The current system requires numerous paper forms, with data stores spread throughout
the Laundry firm management infrastructure. Often information (on forms) is incomplete, or
does not follow management standards. Forms are often lost in transit between departments
requiring a comprehensive auditing process to ensure that no vital information is lost. This has
led to inconsistencies in various data due to large volume of contrasting customer details
leading
to mix-up of clothes in the laundry firm which thus leads to delay in collecting the clothes
back.
The Laundry Management System is designed for any Laundry firm to replace their existing
manual, paper based system. The new system is in form of an e-registration system to control the
following; customer information, products, services, users, carts and receipt. These services are
to be provided in an efficient, cost effective manner, with the goal of reducing the delay and
resources currently required for such tasks as clothes details are bounded to a particular
customer with a given id. Since the existing system makes use of tedious administrative tasks,
lots paper work and time, in which full information cannot be gotten from busy customers.
The goal of the laundry management system is to provide a computerized process that is stress free,
reliable and quick through the use of asp.net computer programming language and SQL
database application to the users and staffs in charge of the registration of customers and laundry
management processes. HTML would be at the front-end and provide the graphical user
interface that relates with the user, while the SQL database will be at the back-end to handle
the data storage process. Challenges faced, technologies used and unresolved problems. This
forms the basis for implementing later versions.
The proposed system seeks to simplify the users operation. The stages involved in the registration
process must be reduced to nearest minimum if it is to be faster and more convenient. The crude
way of registration using paper based processes of registration are time consuming and expensive.
The customers are rest assured security and availability of their clothing as at when due, as
information are protected using a specific Id.
An increase in the number of customer will obviously mean more paper work and less
efficiency of the existing system. Hence, many Laundry firms are finding the proposed system a
better and more effective way of catering for the inconvenience and inefficiency of the existing
system of registration. The proposed system for laundry firms plays a vital role in the transition and
if effectively implemented, it should be able to:
Reduce paper work and redundancy thereby improving productivity and lowering cost of printing
and purchasing registration materials annually. It aids the administrative in data management of
customers, by allowing the user to search for any customer with ease
customer records did not come very easily. Because most of the days I will be asked to come back
after one week to enable them to gather information for me. This is an academic environment where
time is allocated to other courses, making it almost impossible to handle the project work more
efficiently.
World Wide Web: World Wide Web simply called www is the most important tool of the Internet. It
was created in the late 1980s in Europe and was used limitedly in academic cycle.
File Transfer: Any kind of computer file can be sent via the Internet from one Internet user to
another. Table of accounts on spreadsheets, design by graphic artists, music sound files etc, can all be
exchanged in this way.
Web Brower: This is a special kind of software that processes hypertext make-up language (HTML)
document. In other words, a web browser is a computer program that interprets HTML command to
collect, arranged and display the parts of a web page.
LITERATURE REVIEW
2.1 Introduction
This chapter discuss on the literature review and background study of the project. Literature review
is important to achieve successful system because it helps to identify problem that occurred in
existing system. Beside that, it also help to identify the best approach to achieve the project goal
based on the study. This chapter focuses on the study of portal usability and comparison of existing
system.
This section takes critical review of existing system implemented, the success factors, EXISTING
SYSTEM OVER PROPOSED
SYSTEM
The proposed system seeks to simplify the users operation. The stages involved in the registration
process must be reduced to nearest minimum if it is to be faster and more convenient. The crude way
of registration using paper based processes of registration are time consuming and expensive. The
customers are rest assured security and availability of their clothing as at when due, as information
are protected using a specific Id.
An increase in the number of customer will obviously mean more paper work and less efficiency of
the existing system. Hence, many Laundry firms are finding the proposed system a better and more
effective way of catering for the inconvenience and inefficiency of the existing system of
registration. The proposed system for laundry firms plays a vital role in the transition and if
effectively implemented, it should be able to:
Reduce paper work and redundancy thereby improving productivity and lowering
cost of printing and purchasing registration materials annually. It aids the
administrative in data management of customers, by allowing the user to search for
any customer with ease.
2.2 The Internet
Since the existence of Multimedia Super Corridor (MSC), Malaysia’s government strongly
highlighted the importance of ICT among people and organization in Malaysia. Internet starts to
bloom and become a popular and competitive advantage to many organizations. In this world of
technology, Internet is a popular medium to access and share information. It is the easiest and fastest
way to broadcast and retrieve information. Internet also provides unlimited access to anyone, any
place and at anytime.
Websites
Web sites depend on the fact that the user has a browser such as Mozilla, Netscape, Konqueror,
Opera, or Internet Explorer but carry out most functionality on a server. The browser speaks HTTP
and will render HTML’s code sent to it. Several additions to the basic protocol allow for instance
cookies to be used for persistent communication, digital certificates to be used for authentication and
java script to give some necessary client-side functionality. Web sites typically provide access to a
variety of permanently on-line data linked using HTML references. CGI, the Common Gateway
Interface, provides a mechanism to invoke a script or executable program running on a Web server.
User input can be provided from a form, radio button or active map. Use of server-side CGI, JSP or
PHP languages can also enable dynamic pages of information. Plug-in technology helps to render
pages in special ways such as to show PDF documents, display VRML or other images, show video
or play audio tracks. Portals Portals build on the same technology used for Web sites, but enhance
the functionality and flexibility to cater for the demands of specific classes of user. According to
Gerd Waloszek (2005), “Portals are a special breed of external or internal Websites offering a blend
of information, applications and services.
This implies that portals always have more than just information to offer, as many Websites do”.
According to Rob Allan (2004), “Put simply a portal is a presentation layer which aggregates,
integrates, personalizes and presents information, transactions and applications to the user according
to their role and preferences”. From both perceptions portal can be conclude as a gateway to web
access which users can locate all the web content they commonly need which required
personalization, search, channels, links, and customization base on role and workflow.
According to Ramona Winkler (2005), “Traditionally, a portal denotes a gate, a door, or entrance. In
the context of the World Wide Web, it is the next logical step in the evolution to a digital culture”.
Formerly, portals are defined as search engines where it offers a full text index of document content.
Today’s Internet portals offer a more structured, navigable interface compare to Internet search
engines. Internet portal is more focused on better delivery of specific information among a group
with the same interest.
The portal should automatically present its users with the information appropriate to the user’s role
and allow the user to search for information that was not previously known to be relevant to the
user’s role, but which may be available through the portal Personalization Personalization should be
based on user roles, as well as user preferences.
Methodology
3.3. Population
The target population will comprised of the employees who work at Laundry. The target population
will be selected based on their knowledge of employee laundry system. The population will be from
all workers in general organization. This target population will have the characteristic the researcher
is interested in. The population for the study will consist of 30 employees.
3.5.1 Questionnaires
Questionnaires will be used to collect the primary data. The questionnaire will be prepared by the
researcher and distributed to the employees personally after pre-tested. They were used because they
were easily administered. The researcher ensured that the questions were simple to answer, avoided
personal and direct questions were free from biasness. This enabled respondents to exhaust all the
factors about the study. This will be considered important because; It gave the respondent freedom of
expression, it will be economical, the response rate will be high and the presence of the researcher
will be not necessary.
CSS can also allow the same markup page to be presented in different styles for different
rendering methods such as on-screen, in print and on Braille-based, tactile devices. CSS
specifies a priority scheme to determine which style rules apply if more than one rule matches
against a particular element. Priorities are calculated and assigned to rules, so that the results are
predictable.
SYSTEM ANALYSIS
The overview of Automated Laundry Processing System (ALPS) consists of the same process
of picking up, dropping off and cleaning clothes without the use of paper receipts. The normal
process of picking up and dropping off clothes remains the same but once the customer leaves
ALPS takes over to automate the logging process. As the customer drops off his or her clothes,
instead of a paper ticket given out the clothes are scanned and input into the system matching
the customer’s personal information. The customer is assigned a unique ID given by ALPS for
pick up of clothes. ALPS use Smart Tags and a sophisticated ID system to track clothes from
laundering to pick up. It uses these Smart Tags to allow hands free control of the clothes
conveyor allowing quick and easy clothes pick up by the customer.
ALPS begin with the tagging of the clothes and ends when the clothes are requested for pick up by
the customer. By focusing in on this target region we are attempting to eliminate some of the manual
labor that can introduce delay in customer pick up, misplacing of clothing items and improper
inventorying. ALPS assume that all clothing received have an embedded RF chip in the material.
ALPS do not install or supply RF chips or IDs for clothes identification. Current technology has
already incorporated the use of RF IDs for merchandise tracking which includes clothes.
User-Interface Requirements
User interfaces are the registration pages developed for the customers and users to register and
manage the items brought. They consist of the following:
DATAFLOW DIAGRAM
19
Figure 2: Laundry Application Flowchart.
20
Operator/User Characteristics
Typical operators or users of the system are expected to have at least a rudimentary
education consisting of at least middle school education. The operators are required to
read and understand written English language as well as be proficient in the usage of
modern personal computers and its operations.
Definitions of terms related to our project and dry cleaning are as follows:
Laundry Transaction: atomic action that starts with customer dropping off articles
•
of clothes to be cleaned and ends with customer picking up the cleaned clothes.
• Transaction id/Parent id: an identifier associated with Laundry Transaction
• Child id: an identifier attached to each article of clothes in a laundry transaction
• Tagging: an act of attaching a unique child id to an article of clothing
• Tag: marker that can be identified with scanner
• Abnormal child id: all ids that does not belong to the laundry transaction id The
overall ALPS system consists of:
Scanner Com: communication module interfaces System Controller. All Scanners are attached
to Scanner Com.
Counter Scanners: scanners that operators at the laundry counter uses to scan incoming and
outgoing laundry
Conveyor Scanners: scanners that scan the laundry that is in the laundry conveyor
Tagging Scanners: scanners that operators at eh tagging counter/station tags received
laundry
Smart Tags: tags that can be scanned remotely by Counter, Conveyor and Tagging Scanners
System Controller: the heart of the system that allows operators to interact with the
system via the User Interface. Manages Data store which stores catalog of all the
laundry/Smart Tags in the system.
Data Store: storage medium that stores all the system data.
User Interface: subsystem that allows human interaction with the system
Conveyor Controller: received signal from System Controller to rotate the conveyor and
stops when requested Smart Tag is found
21
Conveyor: modified conveyor with smart tag embedded in the laundry slots to identify the
location of the laundry slot.
Manual Controller: Allows manual control of the conveyor belt as in standard operation.
Functions as a back up to ALPS.
Top level use case of ALPS is shown in the figure below. The Actor in this Use Case is
the Dry Cleaner Staff. The Dry Cleaner Staff uses: receiving clothes, tagging clothes,
cataloging clothes, searching clothes, re-inventorying clothes and reporting clothes. As
stated earlier, ALPS takes over once the clothes are received by Dry Cleaners Staff.
22
23
The Use Cases of ALPS is broken down into Use Case Scenarios to describe conditions and
the flow of that particular part of ALPS.
24
Name: Tagged Scan
Description: After the clothes are received, employee tags the bagged clothes. The
tags are scanned into the system along with the parent tag, which is
the receipt. The parent tag and the child tags on the clothes are
linked.
Actors: Employee
Trigger: Bagged clothe arrives to tagging station
Precondition: Parent receipt is created and scanned into the system
Post-condition: Parent tag and child tags are in the system with established
relationship between the parent and child tags.
25
Normal Flow: 1. Bagged clothes are tagged.
2. Parent tag is scanned
3. Parent tag is retrieved from the system and displayed
4. Tags attached to the clothes are scanned and these tags are
defined as child tags
5. Child tags are associated with the parent tag
Alternate Flow: 3.1 Parent tag is not found in the system
3.2 Scan the parent tag in the bag and save it
4. Flow of normal flow is followed from here on at step 4 of
normal flow
Notes:
26
Trigger: Cleaned cloth arrives and needs to be cataloged. Cleaned clothes are
grouped as a bundle with their parent tag/receipt attached to the
bundle
Precondition: System has parent and child tag and its relationship stored in the
datastore.
Post-condition: System stores the location where the cleaned clothes/parent tag is
hanged.
Normal Flow: 1. Employee rotates the conveyor belt until open slot is found
2. Employee hangs the clothes on the open slot
3. System scans the hanged clothes’ parent tag
4. System marks the location where of open slot and associates
with the scanned parent tag
Alternate Flow: None
Notes: None
27
the clothes and rotates the conveyor belt and stop the conveyor belt
where the cloths hangs
Actors: Employee
Trigger: Customer comes in the pick their cloth.
Precondition: System has the location of the clothes stored in the system’s datastore
Post-condition: System marks the parent tag as being picked up and no longer in the
system.
Normal Flow: 1. Employee scans the customer’s receipt
2. System retrieves the scanned receipt’s tag and location where
the clothes are.
3. System rotates the conveyor belt and stop on the location
where the clothes are hanging
4. Employee unhooks the clothes from the conveyor belt and
hands the clothes to customer
5. System marks the parent tag as being picked up
Alternate Flow: 1. Employee enters customer’s account number
2. System retrieves all the parent tags under the account number
3. System finds first parent tag and rotates the conveyor belt
4. System stops conveyor belt at the location where the clothes
are hanging
5. Employee unhooks the clothes
6. System marks the unhooked clothes’ parent tag as being
picked up.
7. Employee presses “Next” button
8. Go to step 3 until all the clothes are marked as picked up
Notes:
28
Name: Re-inventorying
Description: At set time or when employee request re-inventory, system associates
all the parent tags in the system with location of the slot where the
clothes are hanging
Actors: Employee or pre-determined time
Trigger: Pre-determined time arrives or employee requests re-inventory
Precondition: System is in working order
Post-condition: All the clothes/parent tags in the conveyor belt are scanned and its
location is logged.
Normal Flow: 1. System rotates the conveyor belt
2. Scans all the parent tags and associated slot number
3. Saves the tag and slot number in the system
29
4. System stops the conveyor belt until all the slots are accounted
for
Alternate Flow: None
Notes:
Name: Reporting
Description: System scans the data-store and report any missing clothes or overdue
clothes
Actors: Employee
Trigger: Makes request for Report
Precondition: System is in working order
Post-condition: Report is displayed
Normal Flow: 1. Employee request a missing/overdue report
2. System scans the data-store for missing clothes
3. System scans the data-store for overdue clothes
30
4. System display missing clothes and overdue clothes with
associated customer info
Alternate Flow: None
Notes:
Subsystem Interactions
As identified in the Use Cases, ALPS need to perform 6 operational functions to support Dry
Cleaning business process. They are:
The following sequence diagrams illustrates interactions of ALPS subsystem to accomplish these
6 functions.
31
Whenever customers drop off their dirty clothes to get dry cleaned, ALPS will generate a
receipt id/tag id, which is call Parent Tag Id. ALPS will store the Parent Tag ID for all
laundry transactions.
32
Tagging Scan of Received Dirty Clothes
After the clothes are received, the employee attaches Child Tag Ids to the clothes and
associate the Child Tag Ids to the Parent Tag Id that was assigned during the “Receiving
Dirty Clothes” process.
33
Searching and removing cleaned clothes
When customer comes in to pick up their cleaned clothes, the employee scans the receipt
customer has and APLS finds the clothes on the conveyor. The conveyor rotates and stops
so that employee can unhook the clothes from the conveyor.
34
Re-inventorying the clothes in the system
Periodically employee or at specified time intervals ALPS will re-scan all the clothes hanging in
the conveyor belt to update the data store’s inventory.
35
36
Reporting
Upon employee’s request, ALPS finds all the missing clothes and overdue cloths and displays as
a list for employee’s review.
37
V. System Structure and Design
VI. Requirements
The high level requirements, which are very general statements describing the customers
use/need for the system, are then defined more specifically. The results are low level
requirements which are traceable to the system objects and functional performance.
38
39
40
VII. Verification and Validation
Referring to Figure 10, the V-Model of systems development, the process of requirements
flow-down involves decomposition of the high-level stakeholder requirements into detailed
subsystem and component specifications, which are used by component and subsystem
designers to produce integral parts of a system from the bottom up. The task of system
verification is to prove the system functionality concurrently as the design is trans-formed
into functional component, module, subsystem, and system level objects and assemblies.
At the highest level of verification, the system is tested against the stakeholder
requirements, which is called validation. Once validation is complete, the system can be
fully commissioned and turned over to its users.
41
Verification
Verification Requirement Level
ID
Using a fully assembled Smart Tag,
Sensor/Scanner, and desktop computer running
conveyer belt controlling and logistics tracking
software, perform the following functions:
42
Perform the following tests: Scan the parent tag,
V_1.1 compare the information pop-up on the screen and Sub-system
the records stored in the database.
Perform the test through the Front-desk Scanner.
Connect a data recorder to Tag Transceivers to verify
communications between Tag, Tag Transceiver, and
Central Database:
43
Perform the test through the Conveyer Belt Scanner.
Hang a cloth with tag on each slot of the conveyer
belt respectively. Then rotate the conveyer belt 90
degree to the left and right respectively. Connect a
data recorder to Tag Transceivers to verify
communications between Tag, Tag Transceiver and
Central Database:
44
Perform a software control simulation of the
V_1.2 queuing mechanism, results must show sufficient Sub-system
evidence that the sensor/scanner processes the
45
Using a Manual Tag Programmer, perform the
following operations on Tag: clear data, download
data, upload data. Verify that uploaded data matches
V_1.5 Sub-system
downloaded data. Downloaded data shall include a
sample I.D. number, type, and time/date
information.
46
Perform test with sensor/scanner’s waterproof
property. Reposition sensor/scanner enclosure every
V_1.6.4 four hours to expose all six sides to spray. At end of Component
test, open enclosure and verify that it is moisture
free.
A requirement breakdown structure is used for the top-down and bottom-up verification.
First, the bottom-up verification will be performed. Start verification on the lowest level of
requirement elements, verifying if the requirement specification is satisfied. Then gradually
trace up to the upper level requirement elements, verifying them until reach the highest the
level.
Second, the top-down verification will be performed. Start verification on the highest level
of requirement elements, verifying if the component or sub-system’s functionality satisfies
the specification of the high level requirements. Then trace down to the lowest level.
47
VIII. Tradeoff Analysis
In design and specification of the system, it is necessary to consider both sides of the situation.
For the scanner problem of the system development, a multi-objective optimization is necessary.
Due to the multiple subsystem constituents, and varying specification ranges, as described under
the system structure heading, tradeoff is necessary to optimize performance variables and cost.
The following section describes our tradeoff analysis, aided by the use of Excel, conducted in
order to find optimal design parameters.
CHAPTER FIVE
CONCLUSION
The package was designed in such a way that future modifications can be done easily. The
following conclusion can be deduced from the development of the project.
• It provides a friendly graphical user interface which proves to be better when compared to
the existing system.
• It provides a friendly graphical user interface which proves to be better when compared to
the existing system.
• System security, data security and reliability are the striking features.
48
Laundry System project is developed using PHP, CSS, Bootstrap, and JavaScript. Talking about
the project, it has all the essential features. This project has an administration side from Where
he/she can view all the laundry, manage laundry type, generate report and change password. In
this project, all the functions are performed from the Admin side which means there is no user
side.
To run this project you must have installed virtual server i.e XAMPP on your pc (for Windows).
Laundry System in PHP is free to download with source code.
References
1. "Operations Research Applications and Algorithms," W.L. Winston
5. "We'll take the shirt off your back - and not give it back", Smart Money, February 2003, Daisy
Chan
49