Professional Documents
Culture Documents
COURSE COMPACT LECTURE MODULES for BUD 904- Information and Communication Technology
COURSE COMPACT LECTURE MODULES for BUD 904- Information and Communication Technology
DEPARTMENT OF BUILDING
COURSE COMPACT
Course Objectives:
1. Understand the role of Information and Communication Technology in construction
management.
2. Explore advanced computerised management systems for efficient project
management.
3. Develop proficiency in financial modelling of construction projects using spreadsheet
software.
4. Gain expertise in network scheduling using the latest project management software.
5. Investigate the application of expert systems in construction management.
6. Explore the latest developments in CAD/CAM, including robotics, and their
implications for the construction industry.
Course Content:
1
Module 5: Expert Systems for Construction Applications
a) Introduction to Expert Systems and Artificial Intelligence in Construction
b) Applications of Expert Systems in Risk Management, Quality Control, and Decision
Support
Assessment:
• Assignments and Case Studies
• Presentations and Seminars
• Final Examination
References:
1. Kymmell, W. (2008). Building Information Modelling: Planning and Managing
Construction Projects with 4D CAD and Simulations. McGraw-Hill.
2. Hardin, B. and McCool, D. (2015). BIM and Construction Management: Proven
Tools, Methods, and Workflows. John Wiley & Sons
3. Lynch, P. (2011) Financial Modelling for Project Finance. Euromoney Institutional
Investor PLC
4. Cartelli, A. and Palma, M. (2009). Encyclopedia of Information Communication
Technology. IGI Global
5. Schwalbe, K. (2011).Information Technology Project Management. Course
Technology, Cengage Learning
6. Abdul Razak, R. (2017). Handbook of Construction Management: scope, schedule,
and cost control. Taylor Francis, CRC Press.
7. Nam, J. (2016). Construction Scheduling with Primavera P6. AuthorHouse.
8. CADD (2011). Project Planning 8t Management Primavera Project Management
Workbook. CADD Centre.
9. Radhakrishnan, P., Subramanyan, S., and Raju, V. (2008). CAD/CAM/CIM. New Age
International (P), Publishers
10. Laudon, K. C. and Laudon, J. P. (2013). Essentials of Management Information
System. Person Education, Inc – Prentice Hall.
2
LECTURE MODULES 1: INFORMATION TECHNOLOGY
This introductory note offers an overview of Information Technology (IT), its definitions,
purposes, benefits, and applications. Here's a condensed representation of the key points:
People
People play various roles in information systems, including:
• Systems Analyst
• Programmer
• Technician
• Engineer
• Network Manager
• MIS (Manager of Information Systems)
• Data Entry Operator
3
Equipment
Equipment encompasses both hardware and software. When considering equipment, think of
both components as integral parts of the system.
Procedures
Procedures are documented sequences of actions taken to achieve specific outcomes. They can
range from simple tasks to complex operations such as performing backups, shutting down
systems, and patching software.
Data
Data refers to raw, unorganized, discrete facts and figures that can be processed to generate
meaningful information.
Computer Software
Computer software is categorized into two main types: system software and application
software.
System Software: The primary system software is the operating system, which manages
hardware, files, and system resources, providing a consistent interface for controlling the
computer, often via a GUI.
Application Software: Application software is designed for specific tasks, available as ready-
to-use packages or customized solutions. Examples include general-purpose software like
spreadsheets and word processors, as well as industry-specific applications like package
tracking systems. Companies may also rent specialized software from application service
providers (ASPs) over the web.
Databases
Databases store collections of interrelated data organized for easy retrieval. Examples include
employee records and product catalogues. Customer databases are especially valuable for
designing and marketing products.
Telecommunications
Telecommunications connect computer systems and facilitate information transmission.
Network configurations vary based on organizational needs:
• LANs (Local Area Networks): Connect computers at a single site.
• WANs (Wide Area Networks): Connect computers at multiple sites.
• The Internet: A global network connecting millions of computers.
4
3. Management Information Systems (MIS): Generate reports for decision-making,
integrating with TPS.
4. Decision Support Systems (DSS): Aid in decision-making by providing information,
models, or analysis tools.
5. Expert Systems: Computer programs that emulate human expertise in specific fields.
Expert Systems
Expert systems emulate human expertise in narrow fields, using knowledge bases and inference
rules to make decisions. They are part of the broader field of artificial intelligence (AI).
Enterprise-Wide Systems
Enterprise-wide systems integrate various functions across an organization:
• ERP (Enterprise Resource Planning): Manages ongoing activities.
• CRM (Customer Relationship Management): Manages customer information.
• CMS (Content Management System): Organises and allows access to documents and
files.
Definitions of IM
1. Collecting, processing, and communicating information.
2. Providing relevant information to facilitate decision-making.
3. Planning, budgeting, and controlling information.
5
4. Defining, evaluating, protecting, and distributing data within an organization.
Information management ensures that the right information reaches the right person at the right
time, supporting effective decision-making and situational understanding.
6
Types of Information Management Systems
7
ii. Workflow Automation: Streamlining the creation and approval of marketing
materials.
iii. Distribution Management: Ensuring assets are used correctly across different
channels.
8
ii. Efficiency: Enhances the overall functioning of the organization by streamlining
processes.
iii. Decision-Making: Provides timely and accurate information for managerial decisions.
iv. Understanding: Improves understanding of the contexts in which decisions are made.
v. Reliability: Increases the reliability of data used in decision-making.
vi. Accuracy: Adherence to procedures improves the accuracy of data management and
storage.
9
LECTURE MODULE 2 - TELECOMMUNICATION AND
COMPUTER NETWORKS
Telecommunication refers to a wide range of technologies that transmit information over
distances. This includes mobile phones, landlines, satellite phones, and Voice over Internet
Protocol (VoIP). Other examples include radio, television, and networks. Although commonly
associated with modern technology, telecommunications also encompass ancient methods such
as smoke signals used by American Indians to send messages over long distances using visual
signals.
Definitions
10
Facilitating Communications
Sharing Resources
Intranet
An intranet is a private computer network using Internet Protocol technology to securely share
parts of an organization's information or network operating system within the organization. It
is designed to be accessible only by authorized members, employees, or others with permission.
Intranets can share information, support working in groups, and facilitate teleconferences.
Uses of Intranet
• Delivering tools and applications for collaboration, project management, and customer
relationship management.
• Serving as platforms for corporate culture changes and discussions.
• Providing secure, less expensive alternatives to private networks.
• Enabling company-wide access to updated information and documents.
Benefits
11
• Workforce Productivity: Easier access to information and applications.
• Time Savings: Information distribution on an as-needed basis.
• Improved Communication: Vertical and horizontal communication within the
organization.
• Web Publishing: Easy maintenance and access to corporate documents.
• Business Operations and Management: Supporting decision-making processes.
• Cost-effectiveness: Reduced need for physical documents.
• Enhanced Collaboration: Accessible information for teamwork.
• Cross-platform Capability: Compatibility with various operating systems.
• Built for One Audience: Tailored access based on roles within the company.
• Immediate Updates: Real-time information changes.
• Supports Distributed Computing Architecture: Integration with management
information systems.
EXTRANET
An extranet is a computer network that allows controlled access from the outside for specific
business or educational purposes. It extends a company's intranet to users outside the company,
such as partners, vendors, and suppliers.
Uses of Extranet
Advantages
Disadvantages
INTERNET
The Internet is a vast, international network linking millions of users globally. It is commonly
used for sending and receiving emails, accessing information, and communicating worldwide.
It is distinguished from the World Wide Web, which is a subset of the Internet used for
accessing web pages via browsers using the HTTP protocol.
12
COMPUTER NETWORKS
Purpose
Advantages
Disadvantages
NETWORK CLASSIFICATIONS
A LAN connects computers and devices in a limited geographical area like a home, school, or
office. Nodes on a LAN share resources and typically use wired connections, though wireless
LANs (WLANs) are also common. LANs are owned and managed by a single organization
and use technologies like Ethernet and Token Ring.
13
Figure 3 – A Library Network
14
LECTURE MODULE 3 - DATABASE MANAGEMENT SYSTEMS
A Database Management System (DBMS) is computer software designed to manage databases
based on a variety of data models. In other words, it is essentially nothing more than a
computerized record-keeping system like that of a filing cabinet. The users will have the
following facilities: add new files, insert new data, retrieve data, update data, delete data, and
delete files.
A computer database relies upon software to organize the storage of data. This software is
known as a database management system (DBMS). Database management systems are
categorised according to the database model that they support. The model tends to determine
the query languages that are available to access the database. A great deal of the internal
engineering of a DBMS, however, is independent of the data model and is concerned with
managing factors such as performance, concurrency, integrity, and recovery from hardware
failures. In these areas, there are large differences between products
Employee
Employee filefile
Prog 1
Stores file
Prog 2
15
Advantages of Traditional File Processing System
ü No need for external storage
ü No need for a highly technical person to handle the database.
ü The processing speed is high as compare to DBMS.
ü Files are often designed specifically for their particular application
ü Files are designed to meet the needs of a given program (e.g. Prog 1 uses the
employee file only).
ü The focus is on procedures (what needs to be done by the programs Prog 1 and Prog 2)
ü The records in a file may not relate to records in any other file. (e.g. the employee file
in no way related to the Warehouse file).
ü Companies have usually been using file processing for many years
Exercise: Find the employees making less than $23000 who a) work in a warehouse with
A floor area larger than 30000 square feet. b) have issued an order to supplier “S6”. This
would not be possible in the traditional approach if the files were separate.
16
Employee file
DBMS
Material supplier file
Prog 2
Definitions of Database
1. A database is an organized collection of data. The data is organized in a manner to allow
access, retrieval and use of that data.
2. A database is a single organized collection of structured data, stored with a minimum
of duplication of data items to provide a consistent and controlled pool of data. This
data is common to all users of the system but is independent of programs, which use
the data.
3. It is a structured collection of records or data that is stored in a computer system
ü Fields - This represents 1 unit of information in a database – e.g. Title of DVD,
Genre
17
A record is a group of related fields. It is a collection of data items. A record
contains information about a given person, place, event or thing. A record in an
employee table would contain specific information about a particular employee.
Character
A number, letter, punctuation mark, or other symbol that is represented by a single byte in
the ASCII and EBCDIC coding schemes.
Tables/File
A table is a group of related records. It captures all the records of a particular type of entity.
E.g. the employee table has all the employee records. The structure of the table is described
by the fields, that is, the type of data that will be held in the table.
A computer database relies upon software to organize the storage of data. This software is
known as a database management system (DBMS). Database management systems are
categorised according to the database model that they support. The model tends to determine
the query languages that are available to access the database. A great deal of the internal
engineering of a DBMS, however, is independent of the data model and is concerned with
managing factors such as performance, concurrency, integrity, and recovery from hardware
failures. In these areas, there are large differences between products.
Definitions
1. A DBMS is an item of complex software, which constructs and maintains a database in
a controlled way. It allows us to use the computer to create a database to which we can
change, add and delete data in the database. It also allows us to sort and retrieve data
and create forms, queries and reports using the data in the database.
2. A DBMS is application software that allows the creation, access, and management of a
database. It consists of a collection of interrelated data and a collection of programs to
access that data. A DBMS is usually purchased from a software vendor and is how an
application programmer or end-user views and manipulates data in a database.
18
3. DBMS is computer software designed to manage databases based on a variety of data
models
Advantages
ü Security can be improved
ü Integrity can be improved
ü Redundancies can be improved!
ü Better services to users
ü Cost of delivering and maintaining the system is lowered
ü Standards can be enforced
ü Faster response to query processing
Disadvantages
ü Confidentiality, privacy and security
ü Data quality concerns
ü Data integrity concerns
ü Enterprise vulnerability may be higher
ü The cost of using DBMS
Examples of DBMS’s
ü Microsoft Access
ü Oracle
ü DB2
ü Visual Foxpro
ü Informix
ü Ingres
ü Paradox
ü Sybase
ü SQL Server
ü Approach
ü GemStone
ü D3
ü Essbase
ü FastObjects
ü InterBase
ü JdataStore
ü Adabas
ü Versant
Database Types
ü Personal – used for recording self-information and for one’s access. A database
created to store phone contacts and addresses and friends would be a good example.
ü Departmental - a unit in an organisation which provides some functional
19
application of the data in the department’s domain
ü Workgroup – used by teams working on tasks that needs access to the same data
ü Enterprise - Centralized data that is shared by many users throughout the organization
20
• A file of data which is the principal source of information for a job which is updated or
amended as necessary(computer science) a computer file that is used as the authority in a
given job and that is relatively permanent
Transaction File -
• It is the collection of transaction records. It helps to update the master file and also serves
as audit trail and transaction history.
• (computer science) a computer file containing relatively transient data about a particular
data processing task
• A collection of transaction records. The data in transaction files is used to update the
master files, which contain the data about the subjects of the organization (customers,
employees, vendors, etc.). Transaction files also serve as audit trails and history for the
organization. Where before they were transferred to offline storage after some time, they
are increasingly being kept online for routine analysis
Additional Content
Some databases have their computer languages associated with them, which
allow the user to access and retrieve data. Other databases are only accessed via
languages such as COBOL. Data descriptions must be standardized, for this reason
21
Data Definition Language - The DDL is that portion of the DBMS, which allows
us to create and modify the structure of the database and the database tables. The
functions of a DDL may therefore include:
ü Creating Database structures
ü Creating table structures
ü Associating fields with table structures
ü Associating data types with field structures etc.
Data Manipulation Language - The DML is that portion of the DBMS, which
allows us to store, modify, and retrieve data from the database. There are two
types of DMLs: procedural DML and nonprocedural DML.
Procedural DMLs - require that the user specify the data that is needed from
the database and how to obtain it. Procedural DMLs are more difficult to use since
they require that the user be proficient in using the language commands to
manipulate the structure and the contents of the data file. On the other hand, they
are more flexible since they allow the user to determine the method that is used for
accessing and manipulating the structure and contents of a file.
Nonprocedural DMLs - require that the user specify the data that is needed from the
database, but it does not allow the user to tell how to obtain it. Nonprocedural DMLs
are easier to use since they do not require a detailed knowledge of the language
commands, which are needed to manipulate the structure and the contents of a data
file. On the other hand, they lack flexibility since the programmer has no way of
determining the method for accessing and manipulating the contents of the data file.
Please note that it is the nonprocedural DML of a 4th fourth-generational language
that allows it to exhibit structural and data independence.
Query Language
The implementation of a query language is very vital for a DBMS. The query
language allows the end user to generate ad-hoc queries, which are immediately
answered. In most languages, the DML and the query language are the same.
Today, many DBMSs also provide support for a standardized query language that
may be different from the DML of the language. This is known as the Structured
Query Language (SQL).
22
ü Should only be updated by skilled personnel
ü Is used to perform validation checks
ü Allows users to specify a default field value
Query Language
ü Allows users to specify data to be displayed, printed or stored
ü Consists of simple English-like statements
ü Each has its own grammar and vocabulary
ü Usually quickly learned by a non-programmer
Form
ü A window used to enter and change data
ü When well designed validates data as entered, thus reducing data entry errors
Report Generator/Writer
ü Allows users to design a report on the screen
ü Normally used only to retrieve data
Data Security
ü A DBMS provides means to ensure that only authorized users access users at
permitted times
ü Most DBMSs allow different levels of access privileges
23
LECTURE MODULE 4 - DATABASE ADMINISTRATION
Managing a company’s database requires a lot of coordination. These database activities are
performed by:
A database administrator (DBA) is a person who is responsible for the environmental aspects
of a database. Managing a company’s database requires a great deal of coordination. The role
of coordinating the use of the database belongs to the database administrator (DBA). The duty
of a database administrator varies depending on job description, corporate and IT policies and
the technical features and capabilities of the database management system’s (DBMS’s) being
administered. They nearly always include disaster recovery (backups and testing of backups),
performance analysis and tuning, and some database design or assistance thereof.
Database administrators work with database management systems software and determine
ways to organize and store data. They identify user requirements, set up computer databases,
and test and coordinate modifications to the computer database systems. An organization’s
database administrator ensures the performance of the system, understands the platform on
which the database runs, and adds new users to the system. Because they also may design and
implement system security, database administrators often plan and coordinate security
measures. With the volume of sensitive data generated every second growing rapidly, data
integrity, backup systems, and database security have become increasingly important aspects
of the job of database administrators.
The administrative and other controls carried out by the DBA therefore include
the following:
ü Select and implement the DBMS
ü Develop database models (e.g. Entity relationship diagrams)
ü Create and maintain the data dictionary1. This includes documentation of the data
dictionary.
ü Ensures that the database structure is documented
ü Supervise the addition of new data
Provides manuals describing the facilities the database offers and how to make
use of these facilities. Provides the facilities for retrieving data and for structuring
24
reports are appropriate to the needs of an organisation.
ü Ensures that the data in the database meets the information requirements of the
organization (designs the database)
ü Manages the security of the database. (Includes backup and recovery)
ü Recoverability - Checks backup and recovery/restore procedures
ü Perform archiving (backup and remove historical data from current files)
ü Availability – ensures that the database is running when necessary
ü Use query languages to obtain reports of the information in the database
ü Periodic appraisal of the data to ensure it is complete, accurate and not duplicated
(Monitor performance).
ü Verifies database integrity
ü Appraise the performance of the database and take corrective actions if performance
degrades.
Although not strictly part of a database administrator's duties, the logical and physical design
of databases is sometimes part of the job. These functions are traditionally thought of as
being the duties of a database analyst or database designer.
Databases are classified according to the approaches taken to database organization. The
classes are:
25
NETWORK
DATABASE
HIERARCHICAL
DATABASE
Purchase order file
RELATIONAL
DATABASE
OBJECT ORIENTED DATABASE
26
Hierarchical Model
A hierarchical system is organized in the shape of a pyramid, with each row of objects
linked to objects directly beneath it. Hierarchical systems pervade everyday life.
The hierarchical model is the oldest of the database models, and unlike the network,
relational and object-oriented models, does not have a well-documented history of its
conception and initial release. It is derived from the Information Management Systems
of the 1950s and 60's. It was adopted by many banks and insurance companies who
are still running it as a legacy system to this day. Hierarchical database systems can
also be found in inventory and accounting systems used by government departments
and hospitals.
The hierarchical model is a tree structured model and consists of many record types
with one being the root. The root record type exists at the top of the tree. All data must
be accessed through the root. One-to-many relationships exist between records in the
hierarchy with one being the parent and the other the child. Each child has a unique
parent, and a parent can have many children. This child/parent rule assures that data
is systematically accessible. To get to a low-level table, you start at the root and work
your way down through the tree until you reach your target.
27
Examples of hierarchical databases include:
Ø IMS - Information Management Systems by IBM
Ø System 2000 by MRI Systems Corp.
Ø Adabas
Ø Caché
Ø Multidimensional_hierarchical_toolkit
Ø Mumps_compiler
Ø GT.M
This independence between the programs and the data is called data independence.
Data independence is important because every time some change needs to be made to
the data structure, the programs that were being used before the change would
continue to work. To provide a high degree of data independence, a DBMS must
include a sophisticated metadata management system.
28
In DBMS, all files are integrated into one system thus reducing redundancies and
making data management more efficient. In addition, DBMS provides centralised
control of the operational data.
Some of the advantages of data independence, integration and centralized control are:
Centralizing the data in a database also often means that users can obtain new and
combined information that would have been impossible to obtain otherwise. Also,
the use of a DBMS should allow users who do not know programming to interact
with the data more easily.
29
require new programs to be written (or the information compiled manually) to
meet every new demand.
If several users are allowed to update the same data item at the same time, there is
a possibility that the result of the updates is not quite what was intended. For
example, in an airline DBMS, we could have a situation where the number of
bookings made is larger than the capacity of the aircraft that is to be used for the
flight. Controls therefore must be introduced to prevent such errors from occurring
30
because of concurrent updating activities. However, since all data is stored only
once, it is often easier to maintain integrity than in conventional systems.
Network Model
The network model is a database model conceived as a flexible way of representing
objects and their relationships. Its original inventor was Charles Bachman, and it
was developed into a standard specification published in 1969 by the Conference on
Data Systems Languages (CODASYL) Consortium. In many ways, the Network
Database model was designed to solve some of the problems with the Hierarchical
Database Model. Where the hierarchical model structures data as a tree of record
types, with each record type having one parent record and many children, the
network model allows each record type to have multiple parent and child records,
forming a lattice structure. This allows the model to support many-to-many
relationships. There is no root record type. Data can therefore be accessed through
more than one path. For example, in the diagram below, (Figure 6), an order can be
accessed through either the salesperson or the customer as the order has the
31
salesperson and customer as its parents. Another way of saying it is that the child of
the salesperson and customer is order. The path to Parts is either Salesperson, Order,
Parts or Customer, Order, Parts. You can therefore access parts by either knowing
who the salesperson is or through the order by knowing, for example, the order #.
Although the model was widely implemented and used, it failed to become
dominant for two main reasons. Firstly, IBM chose to stick to the hierarchical model
in their established products such as IMS and DL/I. Secondly, it was eventually
displaced by the relational model, which offered a higher-level, more declarative
interface.
Relational
ü Stores data in tables that consist of rows and columns.
ü Each row has a primary key
ü Each column has a unique name
ü Relational DB developer calls file a relation, record a tuple, and field an
attribute
32
ü Relational DB user calls file a table, record a row, and field a column
ü Most include Structured Query Language (SQL) a query language that allows
users to manage, update and retrieve data.
ü Examples: Access, Sybase, Visual FoxPro, Oracle, DB2
Object-Oriented
ü Stores data in objects (An object contains data plus the actions that process the
data)
ü Can usually store more types of data than Relational databases
ü Can usually access data faster than the Relational DB
ü Stores unstructured data more efficiently than the Relational DB
What is an Object?
An object generally is any item that can be individually selected and manipulated.
This can include shapes and pictures that appear on a screen as well as less tangible
software entities. In object-oriented programming, an object is a self-contained entity
that consists of both data and procedures to manipulate the data. In other words, an
object is an item that contains data, as well as the actions that read or process the
data.
33
Real-world objects share two characteristics: They all have states and behaviour. For
example, dogs have state (name, colour, breed, hungry) and behaviour (barking,
fetching, wagging tail). Bicycles have state (current gear, current pedal, two wheels,
number of gears) and behaviour (braking, accelerating, slowing down, changing
gears). Software objects are modelled after real-world objects in that they too have
states and behaviour. You might want to represent real-world dogs as software
objects in an animation program or a real-world bicycle as a software object in the
program that controls an electronic exercise bike. You can also use software objects
to model abstract concepts.
What is a Class?
A class is a category of objects. For example, there might be a class called shape that
contains objects which are circles, rectangles, and triangles. The class defines all the
common properties (characteristics) of the different objects that belong to it. A class
is a special programming construct that allows us to create objects. In other words, a
class provides the blueprint for the creation of an object. The class must specify a
description of the data that is stored and a description of the operations that the
object can provide.
As indicated above, each object must have a state and a set of methods, which are
encapsulated (contained) inside the object. The state refers to the data that is stored
inside the object, while the methods/behaviours refer to the set of
operations/functions, which the object can perform. For example, a user can click on
a button, put the mouse over the button, right-click or double-click on the button.
Click, double click, right-click, mouse over etc are therefore examples of methods.
When the user clicks on the button, the relevant code for the particular user action is
executed. Each object must have a set of well-defined public interfaces, which a
client may use to get the object to perform a specific operation.
Examples of objects.
An object-oriented database can contain many classes of objects, these include:
ü Command buttons
ü List boxes
ü Data windows
ü Windows
ü Menus
ü Text boxes
ü Pictures
ü Audio clips
ü Video clips (animation)
ü Students
ü ·Courses
34
ü Employees
An object contains data, as well as actions that read or process the data. A Member object, for
example, might contain data about a member such as Member ID, First Name, Last Name,
Address, and so on. It also could contain instructions on how to print the member record or
the formula required to calculate a member's balance due. A record in a relational database,
by contrast, would contain only data about a member.
Object-oriented databases have several advantages compared with relational databases. They
can store more types of data, access this data faster, and allow programmers to reuse objects.
An object-oriented database stores unstructured data more efficiently than a relational
database. Unstructured data includes photographs, video clips, audio clips, and documents.
When users query an object-oriented database, the results often display more quickly than the
same query of a relational database.
If an object already exists, programmers can reuse it instead of recreating a new object -
saving on program development time. For example, if a Close button exists on a screen, the
programmer only needs to write the code once, and then place the same button on each
screen. This is called inheritance as discussed below.
Polymorphism (many forms) – the ability to have multiple classes of objects using the
same interfaces although the implementation details may vary from object to object. For
example, you can have a function/subroutine that calculates the area of an object.
The way it calculates area depends on the type of object that is called the function. This is
because the formula for area is different for circles, rectangles, triangles etc. In other words,
35
there is one function called CALCULATE_AREA and multiple objects will call this
function, but the function behaves differently from object to object.
Encapsulation – the ability of an object to hide its internal representation from the
program that uses it. This is accomplished by defining public interfaces and by
specifying that these public interfaces must be used when accessing the internal
data.
Information hiding - an object has a public interface that other objects can use to
communicate with it. The object can maintain private information and methods that
can be changed at any time without affecting other objects that depend on it. You
don't need to understand a bike's gear mechanism to use it.
A multimedia database stores images, audio clips, and/or video clips. For example, a
geographic information system (GIS) database stores maps. A voice mail system
database stores audio messages. A television news station database stores audio and
video clips.
A groupware database stores documents such as schedules, calendars, manuals, memos, and
reports. Users perform queries to search the document contents. For example, you can search
people's schedules for available meeting times.
A computer-aided design (CAD) database stores data about engineering, architectural, and
scientific designs. Data in the database includes a list of components of the item being
designed, the relationship among the components, and previous versions of the design drafts.
A Web database links to an e-form on a Web page. The Web browser sends and
36
receives data between the form and the database. OODBs add database functionality to object
programming languages. A major benefit is the unification of the application and database
development into a seamless data model and language environment. As a result, applications
require less code, use more natural data modelling, and code bases are easier to maintain.
Object developers can write complete database applications with a modest amount of
additional effort. According to Rao (1994), "The object-oriented database (OODB) paradigm
is the combination of object-oriented programming language (OOPL) systems and persistent
systems. The power of the OODB comes from the seamless treatment of both persistent data,
as found in databases, and transient data, as found in executing programs." Data is a database
is said to be persistent (constant) because you can read a record at one point in time and read
the record at another point in time and the record is still there. In other words, the record is
not transient (temporary).
In contrast to a relational DBMS where a complex data structure must be flattened out to fit
into tables or joined together from those tables to form the in-memory structure,
OODBs have no performance overhead to store or retrieve a web or hierarchy of
interrelated objects. This one-to-one mapping of object programming language objects to
database objects has two benefits over other storage approaches: it provides higher
performance management of objects, and it enables better management of the complex
interrelationships between objects. This makes object DBMSs better suited to support
applications such as financial portfolio risk analysis systems, telecommunications service
applications, World Wide Web document structures, design and manufacturing systems, and
hospital patient record systems, which have complex relationships between data.
37
and applets. An applet is an application that has limited features, requires limited memory
resources, and is usually portable between operating systems.
By encapsulating methods with data structures, an ORDBMS server can execute complex
analytical and data manipulation operations to search and transform multimedia and other
complex objects. As an evolutionary technology, the object-relational (OR) approach has
inherited the robust transaction- and performance-management features of its relational
ancestor and the flexibility of its object-oriented cousin. Database designers can work with
familiar tabular structures while assimilating new object-management possibilities.
For example, an object could be defined as being a command button. Code could be written
to manipulate the button in various ways such as: raise the button, move its location, bring it
into focus, enlarge it etc.
38
Ø Information supplied to managers is more valuable because it is based on a
comprehensive collection of data instead of files, which contain only the data
needed for one application. (Total availability).
Ø The integration of different business systems is greatly facilitated.
Ø Security settings are usually used to define who have access to what level.
ü Easier record-keeping
ü Easier and Faster Access to data
Ø Non-technical users can access and maintain data if afforded the necessary
privileges
Ø As well as routine reports, it is possible to obtain ad-hoc reports to meet
requirements.
ü Reduced development/programming time (e.g. a programmer will take less time to
create a payroll system).
39
LECTURE MODULE 5 - INFORMATION TECHNOLOGY
FOR BUSINESS ORGANISATIONS
In its basic form, information within business organisations exists as letters, memos,
graphs, records, messages, and so on. When that information is electronically
transferred, raw data is exchanged between two or more office employees, either at
the same or different locations.
In order to process information, office automation systems must allow input of new
information and the retrieval of stored information. Input of new information refers
to the physical transfer of text, video, graphics, and sound into a computer. Input
can be typed into the computer or scanned (digitally reproduced) from another
document or source. New advances in input devices frequently allow direct
handwritten input or voice dictation. Input of pre-existing information means
retrieving the electronic materials from an existing storage area. These storage areas
can be finite and local, such as the hard drive on the office PC, or as seemingly
infinite and global as the Internet, the worldwide collection of computer networks
that is growing every year.
However, office automation affects the job itself, the flow of information through an
organization, the process of management and even the corporate structure. It entails:
Ø Paperless office – email, electronic filing, file security, internet, intranet
Ø Electronic conferencing
40
Ø Software – word processing, spreadsheet, powerpoint, databases, business
systems, desktop publishing
Equipment
Ø Fax machines
Ø Computers, workstations
Ø Printers
Ø Scanners, Cameras
Voice mail
It is communications technology that functions much like an answering machine,
allowing callers to leave a voice message for an individual. More elaborately, it
refers to a centralized system of stored telephone messages that can be retrieved
later. The term is also used more broadly to denote any system of conveying a stored
telecommunications voice message, including using an answering machine.
Most cell phones have voicemail as a basic feature, and manyland line phones and
41
corporate PBXs have their own voicemail options. Note, PBX is an acronynm for
Private branch exchange, a telephone exchange that serves a particular business or
office.
Voice messaging
Voice mail is a service that functions much like an answering machine, allowing a
person to leave a voice message for one or more persons. Voice messaging is
using voice mail as an alternative to electronic mail, in which voice messages are
intentionally recorded, not because the recipient was not available.
Telemarketing
Selling over the telephone. It is a method of direct marketing in which
a salesperson solicits prospective customers to buy products or services, either over
the phone or through a subsequent face to face or Web conferencing appointment
scheduled during the call.
Telemarketing can also include recorded sales pitches programmed to be played over
the phone via automatic dialing. Telemarketing has come under fire in recent years,
being viewed as an annoyance by many.
Teleconferencing
Conferencing is where people meet and see and speak to each other.
Teleconferencing is conferencing via telecommunication channels. The user is able to
see and hear a person at the other end of the line in another location.
Teleconferencing requires a camera, microphone, speakers and the appropriate
communication software. Once this technology catches on it will be very popular
and be a huge money maker. Teleconferencing minimizes the time and cost spent
traveling (no hotel fees, jet lag etc.) The world becomes smaller place (global
marketplace). You can have business meetings with all the desired people when and
where need to.
Telecommuting
Commuting is traveling from one location to the other, such as from work to home.
Telecommuting is where a person does not have to travel to work but works from
home and connects to his office via telecommunication channels. (i.e.
commuting/going to work via telecommunication channels)
Advantages
ü Less traffic on the roads, less pollution etc.
ü Reduction in expenses such as work clothes, gas etc.
ü Reduction in the need for parking spaces and offices for staff
Disadvantages
ü Persons who are not disciplined enough will not be productive as they will talk
on the phone, watch tv, eat etc instead of work.
42
ü Anti-social behaviour will result as there is limited social interaction.
ü This will not be possible with all jobs
E-commerce
E-commerce (electronic-commerce) refers to business over the Internet. It entails the
buying and selling of goods and services on the Internet, especially the World Wide
Web. The terms "e-business" and "e-tailing" are often used synonymously with e-
commerce. They refer to the same idea; they are just used to confuse people trying to
learn computer terms. In practice, the term e-commerce and a newer term, e-
business, are often used interchangably.
Note, for online retail selling, the term e-tailing is sometimes used. In other words, it is the
conducting of business online, including shopping, banking, investing.
Web sites such as Amazon.com, Outpost.com, and eBay are all e-commerce sites.
The two major forms of e-commerce are Business-to-Consumer (B2C) and Business-
to-Business (B2B). While companies like Amazon.com cater mostly to consumers,
other
companies provide goods and services exclusively to other businesses.
Electronic mail
E-mail, short for electronic mail, is the transmission of messages over
communications networks. The messages can be notes entered from the keyboard
43
or electronic files stored on disk. Most mainframes, minicomputers, and computer
networks have an e-mail system. Some electronic-mail systems are confined to a
single computer system or network, but others have gateways to other computer
systems, enabling users to send electronic mail anywhere in the world. Companies
that are fully computerized make extensive use of e-mail because it is fast,
flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages,
but many allow you to edit your messages using any editor you want. You then
send the message to the recipient by specifying the recipient's address. You can
also send the same message to several users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them.
To see if you have any mail, you may have to check your electronic mailbox
periodically, although many systems alert you when mail is received. After
reading your mail, you can store it in a text file, forward it to other users, or delete
it. Copies of memos can be printed out on a printer if you want a paper copy.
All online services and Internet Service Providers (ISPs) offer e-mail, and most
also support gateways so that you can exchange mail with users of other systems.
Usually, it takes only a few seconds or minutes for mail to arrive at its destination.
This is a particularly effective way to communicate with a group because you can
broadcast a message or document to everyone in the group at once.
Internet
The Internet is a large, international computer network linking millions of users
around the world that use the TCP/IP protocols. It is used daily by many
individuals for the main purposes of sending and receiving electronic mail (email),
obtaining information on almost any subject, or to communicate with
others around the world. Access to the Internet is obtained by subscription, and an
Internet address is needed to receive or to send a message. Such addresses have a
specific format that specifies the name of the user, the machine they are working
on, and where that machine is located.
Advantages
ü Better communication – email, chat rooms etc.
ü Easier, faster access to information
ü Less travelling – e.g. to a library, store
ü More convenient – e.g. shopping, paying bills
Disadvantages
ü Exposure of children to pornography, pedofiles, harmful information
ü ·Can be addictive for some persons
44
ü Persons unable to socialize
45
LECTURE MODULE 6: INTRODUCTION TO
COMPUTERISED MANAGEMENT SYSTEMS
Computerized Management Systems (CMS) revolutionise project management in the
construction industry by integrating technology, processes, and human resources. The
implementation and integration of Management Information Systems (MIS) play a crucial role
in enhancing project management capabilities and improving overall project outcomes.
Construction firms need to embrace CMS and MIS solutions to achieve greater efficiency,
transparency, and accountability in project execution, ultimately leading to improved project
success rates and stakeholder satisfaction. Thus, in this lecture module, we'll delve into the
overview of CMS in construction and explore the implementation and integration of
Management Information Systems (MIS) in construction projects. Furthermore, we will
explore how CMS facilitate different aspects of project management, including project
planning and scheduling, document management, financial management, communication and
collaboration, risk management, quality control, and reporting and analytics.
46
management, financial management, communication and collaboration, risk management,
quality control, reporting and analytics. Embracing CMS enables construction firms to
overcome challenges, mitigate risks, and deliver high-quality projects on time and within
budget
a) Features:
i. Gantt charts and critical path analysis tools for visualising project schedules and
identifying key milestones.
ii. Resource management modules for allocating resources efficiently and
avoiding conflicts.
iii. Integration with Building Information Modeling (BIM) software for enhanced
coordination and clash detection.
b) Benefits:
i. Improved project timeline accuracy and predictability.
ii. Enhanced resource utilization and productivity.
iii. Proactive identification of scheduling conflicts and bottlenecks.
2. Document Management:
Centralised document repositories facilitate efficient storage, retrieval, and sharing of project-
related documents, drawings, and specifications.
a) Features:
i. Cloud-based storage solutions for secure and accessible document storage.
ii. Version control mechanisms to track document revisions and ensure document
integrity.
iii. Role-based access control to manage permissions and ensure data security.
b) Benefits:
i. Reduced document retrieval time and improved document accessibility.
ii. They enhanced collaboration and information sharing among project
stakeholders.
iii. Improved document traceability and compliance with regulatory requirements.
3. Financial Management:
CMS tracks project costs, budgets, and expenditures, providing stakeholders with real-time
financial insights and cost control measures.
a) Features:
i. Budgeting and forecasting modules for setting project budgets and predicting
financial outcomes.
ii. Expense tracking and invoice management functionalities to monitor project
expenditures.
iii. Integration with accounting software for seamless financial data exchange.
b) Benefits:
47
i. Real-time visibility into project finances and cost trends.
ii. Improved cost control and budget adherence.
iii. It has enhanced financial reporting and compliance with financial regulations.
a) Features:
i. Project portals and discussion forums for facilitating communication among
team members.
ii. Instant messaging and video conferencing tools for real-time collaboration.
iii. Document sharing and commenting functionalities for asynchronous
collaboration.
b) Benefits:
i. Enhanced transparency and accountability in project communication.
ii. Reduced miscommunication and project delays.
iii. Improved stakeholder engagement and satisfaction.
5. Risk Management:
CMS helps identify, assess, and mitigate project risks through proactive risk management
strategies and contingency planning.
a) Features:
i. Risk register modules for capturing and prioritising project risks.
ii. Risk assessment tools for evaluating the likelihood and impact of identified
risks.
iii. Mitigation planning functionalities for developing risk response strategies.
b) Benefits:
i. Early identification and mitigation of project risks.
ii. Improved project resilience and readiness to address unforeseen challenges.
iii. Reduced project disruptions and delays.
6. Quality Control:
Quality management modules ensure adherence to quality standards and regulations by
monitoring and controlling quality throughout the project lifecycle.
a) Features:
i. Quality inspection checklists and templates for standardising quality assurance
processes.
ii. Non-conformance management functionalities for documenting and resolving
quality issues.
iii. Audit trail capabilities to track quality-related activities and ensure
accountability.
b) Benefits:
i. Consistent delivery of high-quality project outcomes.
ii. Enhanced customer satisfaction and reputation.
48
iii. Improved compliance with quality standards and regulations.
a) Features:
i. Pre-defined report templates for standard project performance metrics.
ii. Data visualisation tools for creating interactive dashboards and visualising
trends.
iii. Ad-hoc reporting capabilities for generating customised reports based on
specific stakeholder requirements.
b) Benefits:
i. Informed decision-making based on real-time project data and analytics.
ii. Improved project performance tracking and monitoring.
iii. Identification of opportunities for process improvement and performance
optimisation.
49
c) Change Management: Resistance to change among project stakeholders and workforce
may hinder the successful implementation of MIS, emphasizing the importance of
change management strategies and stakeholder engagement.
d) Cost and Resource Constraints: Limited budgets and resources may constrain the
adoption of advanced MIS solutions, necessitating careful cost-benefit analysis and
prioritization of key functionalities.
50
LECTURE MODULE 7: FINANCIAL MODELING OF
PROJECTS
Introduction
In the ever-changing and competitive landscape of the construction industry, companies must
use every tool at their disposal to stay ahead. One such strategic tool is financial modelling, a
critical element in fiscal management, risk mitigation, and planning. Financial modelling for
construction projects is a critical process that helps in planning, executing, and monitoring
projects effectively. By understanding the principles and key components of financial
modelling, project managers and financial analysts can ensure the financial viability and
success of construction projects. Regular updates and continuous improvement of the financial
model are essential to adapt to changing circumstances and maintain accuracy.
2. Cost Forecasting: Every construction project has a unique cost structure, including
variable and fixed costs, direct and indirect expenses, and identification of the
breakeven point. Factors include material costs, labour costs, equipment costs,
subcontractor costs, and overhead expenses like salaries, utilities, insurance, and office
rent.
51
4. Investment Analysis: Large-scale construction involves significant investment. A
financial model should provide insights into the payback period, return on investment
(ROI), and internal rate of return (IRR) for each project or investment.
7. Financial Statements and Ratios: A financial model synthesizes data into financial
statements such as profit & loss, balance sheet, and cash flow statements. It also
scrutinizes financial ratios like gross margin, EBITDA margin, liquidity ratios, and
leverage ratios.
1. Data Collection: Gather historical data and market research. Understand cost drivers,
pricing strategies, and revenue patterns.
2. Develop Assumptions: Build realistic and defendable assumptions based on collected
data for financial forecasting.
3. Construct the Model: Use software like Microsoft Excel to create the model structure,
incorporating assumptions and financial elements.
4. Testing and Validation: Run various scenarios to test the model's sensitivity to changes
in assumptions.
5. Final Review and Use: Share the model with stakeholders, incorporate feedback, and
begin using it for decision-making processes.
52
4. Sustainability and Corporate Responsibility: They incorporate sustainability elements,
aligning with corporate responsibility and the industry's emphasis on sustainable
practices.
Key Highlights
i. Combines accounting, finance, and business metrics to forecast future results.
ii. Projects a company’s future financial performance.
iii. Useful for valuing companies and determining growth strategies.
53
3. Model Structuring: Organize the model logically with separate sheets for inputs,
calculations, and outputs.
4. Input Data: Enter the collected data and assumptions into the model.
5. Calculation: Implement formulas to calculate costs, revenues, cash flows, and financial
metrics.
6. Scenario Analysis: Test different scenarios to assess the impact of varying assumptions
on the project’s financial outcomes.
7. Validation and Testing: Check the model for errors and validate it against known
benchmarks or historical projects.
a) Financial Functions: NPV (Net Present Value), IRR (Internal Rate of Return), XNPV,
and XIRR.
b) Statistical Functions: AVERAGE, MEDIAN, STDEV.P, and TREND.
c) Logical Functions: IF, AND, OR, and nested IF statements.
d) Lookup Functions: VLOOKUP, HLOOKUP, INDEX, and MATCH.
a) Data Tables: One-variable and two-variable data tables for analyzing the impact of
input changes.
b) Scenario Manager: Create and compare multiple financial scenarios.
c) Goal Seek: Determine the necessary input value to achieve a desired financial outcome.
d) Monte Carlo Simulation: Use random sampling to model and analyze the impact of risk
and uncertainty in financial forecasts.
a) Charts and Graphs: Use line charts, bar charts, and pie charts to visualize financial
data.
b) Conditional Formatting: Highlight key financial metrics and variances.
54
c) Dashboards: Create interactive dashboards for a comprehensive view of project
performance.
d) Pivot Tables: Summarize large datasets and extract meaningful insights.
a) Risk Assessment: Identify, analyze, and mitigate financial risks using the model.
b) Performance Monitoring: Track project performance against financial benchmarks and
milestones.
c) Decision Support: Use model outputs to support strategic decisions and optimize
project outcomes.
d) Continuous Improvement: Regularly update the model with actual data and refine
assumptions to improve accuracy.
55
LECTURE MODULE 8: NETWORK SCHEDULING WITH
PROJECT MANAGEMENT SOFTWARE
Introduction
To ensure successful project delivery, optimised resource usage, and timely completion, project
managers must have a good understanding of the available tools and techniques, including
advanced methods in CPM and resource allocation.
1. Project Management Software: Essential for efficient network scheduling and project
execution.
2. Critical Path Method (CPM): Key technique for identifying the longest sequence of
dependent tasks and optimizing project timelines.
3. Advanced CPM Techniques: Include float analysis, crash analysis, and fast-tracking.
4. Resource Allocation: Critical for optimizing the use of resources and ensuring project
efficiency.
5. Software Integration: Enhances project management capabilities through automation
and comprehensive data analysis.
Mastering these concepts and utilising appropriate software tools, can enable Project managers
to significantly improve their scheduling and resource management processes, leading to more
successful project outcomes.
i. Project Management Software: Tools designed to assist project managers and teams
in planning, executing, and closing projects efficiently.
ii. Network Scheduling: A technique used to plan and control the sequence of project
activities to ensure timely project completion.
56
iv. Resource Management: Allocating and optimizing resources (human, equipment,
materials).
v. Collaboration Tools: Facilitating communication and collaboration among project
team members.
vi. Progress Tracking and Reporting: Monitoring project progress and generating
performance reports.
b) Steps in CPM:
1. Activity Definition: List all project activities.
2. Activity Sequencing: Determine dependencies between activities.
3. Network Diagram: Create a visual representation of activities and their
dependencies (e.g., activity-on-node (AON) diagrams).
4. Duration Estimation: Estimate the time required for each activity.
5. Critical Path Identification: Calculate the longest path through the network
diagram.
57
6. Schedule Adjustment: Identify and address critical activities to avoid project
delays.
Resource Allocation
58
Expert Systems for Construction Applications
The following lecture notes provide an overview of expert systems and AI in construction,
highlighting their applications in risk management, quality control, and decision support.
Introduction
Overview of Expert Systems
• Definition: Expert systems are advanced computer programs designed to simulate the
decision-making abilities of a human expert. They provide solutions to complex
problems by reasoning through bodies of knowledge, represented primarily in the form
of "if-then" rules.
• Components:
• Knowledge Base: Contains specialized knowledge and rules from human
experts in the field.
• Inference Engine: Applies logical rules to the knowledge base to infer new
information or make decisions.
• User Interface: Facilitates interaction between the user and the system, allowing
users to input data and receive output.
Overview of Artificial Intelligence (AI)
• Definition: AI involves the creation of intelligent machines capable of performing tasks
that typically require human intelligence. This includes learning from experience,
understanding natural language, recognizing patterns, and making decisions.
59
• Risk Management: These technologies help in identifying, assessing, and mitigating
risks, thereby reducing potential delays and cost overruns.
• Quality Control: AI and expert systems ensure that construction processes and
outcomes meet the required quality standards by facilitating accurate and consistent
inspections.
Historical Context and Evolution
• Early Development: Expert systems emerged in the 1960s as rule-based systems aimed
at replicating the decision-making process of human experts.
• Advancements: Integration with AI technologies like machine learning and natural
language processing has significantly expanded their capabilities, making them more
robust and versatile.
• Modern Applications: Today, expert systems and AI are widely used in various sectors,
including construction, for tasks such as project management, risk assessment, and
quality control.
Applications in Construction
Project Management
• Scheduling: AI-driven project management tools can create and adjust project
schedules dynamically, considering real-time data and potential delays.
• Resource Allocation: Optimize the use of materials, labor, and equipment to ensure that
resources are used efficiently and effectively.
Risk Management
• Prediction and Prevention: Use historical data and AI algorithms to predict potential
risks and suggest preventative measures.
• Real-Time Monitoring: Implement sensors and IoT devices to continuously monitor
construction sites and identify potential issues before they escalate.
Quality Control
• Automated Inspections: Use computer vision and AI to perform detailed inspections of
construction work, ensuring adherence to quality standards.
• Defect Detection: Early identification of defects in materials or workmanship, reducing
the need for costly rework.
Decision Support
• Scenario Analysis: Evaluate various project scenarios to understand potential outcomes
and make informed decisions.
• Data-Driven Insights: Leverage big data and AI to gain insights into project
performance, helping to optimize processes and improve outcomes.
Future Trends
• Integration with IoT: Increased use of Internet of Things (IoT) devices for real-time
data collection and analysis, enhancing the capabilities of AI and expert systems.
• Advancements in AI: Ongoing improvements in AI algorithms and technologies will
lead to more accurate and reliable expert systems.
• Widespread Adoption: As the benefits of expert systems and AI become more apparent,
their adoption in the construction industry is expected to grow, leading to more
efficient, safe, and high-quality construction projects.
60