Aso Mo Tali Mo (Dog Application)
Aso Mo Tali Mo (Dog Application)
Aso Mo Tali Mo (Dog Application)
Christine Duran
Syrell Aubrey Acosta
TABLE OF CONTENTS
Chapter I
Introduction ………………………………………………………………………..…....5
1.1 Project Context ………………………………………………………..…..5
1.2 Purpose and Description.…………………………………………………..6
1.3 Objectives of the Project …………………………………………...…..…6
1.4 Scopes and Limitations of the Project.…………………………………….6
Chapter II
Review Related Literature ………………………………………………………………...7
Chapter III
Technical Background …………………………………………………………………….9
3.1 Technicalities of the project …………………………………………………..9
3.2 Language to be used …………………………………………………………10
3.3 how the project will work ……………………………………………………10
Chapter IV
Methodology …………………………………………………………………………….11
4.1 Environment …………………………………………………………………11
4.1.1 Locale of the study……………………………………………...….11
4.1.2 Population of the study……………………………………………..11
4.1.3 Organizational Chart/Profile .……………………………………...12
4.2 Requirement Specification ………………………………………………….13
4.2.1 Operational Feasibility …………………………………………….13
4..2.2 Functional Decomposition Diagram ……………………………...14
4.2.3 Technical Feasibility ……………………………………………....15
4.2.4 Gantt Chart ………………………………………………………...15
4.3 Requirements Modeling ………………………………………………….….16
4.3.1 Input Process Output Diagram ……………………………...……..17
4.3.2 Control……………………………………………………………..17
3
ABSTRACT
Dogs have played an important role in the history of human civilization and were among the first
domesticated animals. They were important in hunter-gatherer societies as hunting allies and
bodyguards against predators.Although many still serve in these capacities, dogs are increasingly used
for social purposes and companionship. Today dogs are employed as guides for the blind and disabled
or for police work. Dogs are even used in therapy in nursing homes and hospitals to encourage patients
toward recovery. Humans have bred a wide range of different dogs adapted to serve a variety of
functions. This has been enhanced by improvements in veterinary care and animal husbandry.
5
CHAPTER I
INTRODUCTION
This chapter covers the introduction, project context, purpose and description, objective of the
project, and the Scope and limitation of the project.
Chapter II
Review Related Literature
Katcher (1981) says that 99% of people talk to their animals and believe they understand to a degree. He says
that in most cases, pet owners use “Motherese” or baby talk (a simplified form of language used to help
children understand and learn to speak). Katcher believes that the bias against sentimentality in science has
blinded researchers' perceptions of the significant, distinctive role that pets play in people's lives and that we
must recognize this relationship as one that augments relationships with other humans.
Perin (1981) goes so far as to assert that dogs are a symbol of our own “memory of that magical once-in-a-
lifetime bond” we shared with our mothers. She says people have dogs for the “satisfaction of giving and
receiving complete and total love and devotion,” which is why dogs are idealized in modern society.
Finds that dog owners, based on intimate interactions with their dogs, come to regard them as “unique
individuals who are minded, empathetic, reciprocating, and well-aware of the basic rules and roles that govern
the relationship.” Dog owners see their dogs as consciously behaving so as to achieve certain goals in the
relationship. In short, dogs are seen as taking the role of the “other” in their relationship with their owners,
which requires owners in turn to take the role of the “animal other” in order to participate in the activities and
rituals that make up the relationship (Sanders, 1993).
Other research shows that dogs serve important human-to-human social functions as well. One participant
observational study at a public park documents dogs' role in exposing their human companions to encounters
with strangers (Robins et al., 1991
“That the dog is a loyal, true, and affectionate friend must be gratefully admitted, but when we come to
consider the psychical nature of the animal, the limits of our knowledge are almost immediately reached” – Sir
John Lubbock. (1889, p. 272)
The behavior of dogs was very important in the early history of comparative psychology. Darwin wrote
extensively about dog behavior, intelligence and emotions, often using his own dogs as examples. He believed
that dogs had emotions such as love, fear, shame, and rage, as well as dreams, and the ability to imitate and
reason (Darwin, 1871). Darwin also commented on how domestication impacted the behavior of domestic
dogs, decreasing their fear of humans, and he even argued for the evolution of distinct barks with various
meanings.
Darwin's neighbor in Downe, Sir John Lubbock, was one of the first to carry out experimental tests of the
intelligence of dogs.
Lubbock concluded that the dog had learned to communicate his wants effectively (Lubbock, 1889). Van's
successes inspired Lubbock to attempt to use this method to test the dog's color discrimination abilities as well
as its ability to count, but no results were.
7
Chapter III
TECHNICAL BACKGROUND
This chapter describes the technicalities of the project, details of technology to be used, and how the
project work.
Figure 1 above shows the technical framework of the study. The system runs in a application Program. The
users (Admin user)access the system from the server to process different transactions such as inputting
information of the Dog owners regarding their Dog's number, imformation in Vaccinations, Dog Pound,
Adopted, Dog Bites.All transactions are stored in a database file in the server. The client user such as the
Information Officer and Inventory Officer requests queries directly from the database of the system. When
the query is satisfied by the system to generate the data and the response of the query is sent back to the
client users.
C++ -is a high-level object-oriented programming language that helps programmers write
CHAPTER IV
METHODOLOGY
This chapter discusses the methodology used in conducting the research and the tools used in design and
development. This chapter contains the following: Environment, Requirement Specification, Technical
Feasibility, Gantt Chart, Requirements Modeling, Data and Process Modeling, Data Flow Diagram, Analysis,
Design, Data Dictionary, Development, System Architecture.
Researchers used the Rapid Application Development (RAD). A type of software development methodology
that uses minimal planning in favor of rapid prototyping.
The planning of software development using RAD is interleaved with writing the software itself.
4.1 Environment
The researcher conducted the study at Municipal Office of Department of Agriculture in the
Municipality of Alicia, Isabela.
The people who are involved in this study are the following: (1) Municipal Animal welfare Office,
(1)Pet Owners, (1) Baranggay Captains, (7) Animal Technician (10) IS Students who conducted the
study.
10
Municipality of Roxas
The figure above shows the organizational chart of Roxas, Isabela where the study was
conducted.
11
Materials Methods
Bond Paper
Manual filling of records
Manual Record Keeping
Record Book Poor
Monitoring of
Filling Box dogsVaccine,He
alth care
Municipal Animal
Desktop Computer
materials.
Brgy. Captain
Welfare Officer
Mobile Phones
People Machines
Figure 3 shows the fishbone diagram that explains the problems encountered by the Municipal
Animal welfare Office. The main problem focuses on poor monitoring of Dogs, Vaccine, and Health
Care Materials. As shown in the diagram, the specific problems are categorized based on Methods,
Machines, People and Materials.
12
DOG APP
OWNERS OWNER
Owners OWNER
PROFILE PROFILE PROFILE
MANAGEMENT
VACCINATIO
N HEALTH AI
HEALTH COMPIUTATIO
NON
This Figure shows the functionality of the system. There are three major functionalities in the
system: Irrigation Monitoring it contains Barangay, Owner Profile, Vaccine, and Report. Dog Pound
Monitoring contains Barangay,Owners Profile, Health, Report. Adopted management it contains Dog
Profile, Health and Report. Dog Bite management it contains Owner Profile, Ai Computation, and
Report.
13
The table shows the deliverables and the duration of the system, the deliverables .
14
User Log in
User Log in
Validate Owner
User Log in Validate Owner
Profile
Owner Profile Profile
Validate
Vaccinations Validate Vacinations
Vaccinations
Dog Pound Validate Dog pound
Validate Dog pound
Adopted Validate Adopted
Validate Adopted
Dog bite Dogs
Dogs
Health Validate Dog Bite
Validate Dog Bite
AI Computation Validate health
Validate health
Validate AI
Report Validate AI
Computation
Computation
Validate Report
Validate Report
feedback
Figure 5 shows the Input Process Output. The Input box contains the user log in, Owner
Profile, Vaccinations, Dog Pounds, Adopted Dogs, Dog Bites, Health, AI Computation and Report.
The process box contains the user log in, Validate Owner Profile, Validate Vaccinations, Validate dog
pounds, Validate Adopted dogs, Validate Dog bites, Validate health, Validate AI Computation and
Validate Report. The output box contains the user log in, Validate Owner Profile, Validate
Vaccinations, Validate dog pounds, Validate Adopted dogs, Validate Dog bites, Validate health,
Validate AI Computation and Validate Report.
15
4.3.2 Control
The system provides log-in security to ensure that only the registered Admin and user can use
the system. The system verifies the Admin who registered through their personal information. The
system does not accept users who are not officially registered.
Figure 6.
USERNAME & PASSWORD
Vacination USERNAME & PASSWORD
Dog Pound
s Dog Pound MGT
Vacinations
REPORT
REPORT
LIST OF REPORT
o List of Dog Pounds
USERNAME & PASSWORD GRANTED Dog App USERNAME & PASSWORD GRANTED
REPORT REPORT
CROP
Adopted PESTICIDE Dog Bite
USERNAME & PASSWORD USERNAME & PASSWORD
Dogs
lER
List Vacinations
Context Diagram
16
Figure 6 shows context data flow the diagram of the system. It contains four major entries:
CROPS, IRRIGATION, PESTICIDE MANAGEMENT, FERTILIZER MANAGEMENT.
The researchers used the Data Flow Diagram to identify the flow of the system.
1.0
LOG IN Tbl.LOG IN
2.0
VACINATIONS Tbl.VACINATION
3.0
DOG POUNDS Tbl.DOG POUND
5.0
DOG BITE Tbl.DOG
BITE
6.0
REPORT Tbl.REPORT
Figure 7 shows that the User login into the system. The User manages the Login, Vacinations,
Dog Pounds, Adopted, Dog Bite, and Report. All transactions are stored in their tables in the database.
4.4.3 Data Flow Diagram
1.0
LOG IN TBL.LOG IN
2.0
OWNER PROFILE TBL. OWNER PROFILE
DOG APP
3.0
REPORT
17
Figure 8 shows that the User login into the system. The Survey Officer manages the Login,
Profile owner, Report. All transactions are stored in their tables in the database.
4.5 Analysis
4.5.1 Cost-Benefit Analysis
Table 2. Cost-Benefit Analysis
WINDOWS 8,000.00
MySQL 0.00
XAMPP 0.00
C++ 0.00
PASCAL 0.00
TOTAL SOFTWARE COST 8,00.00
Development Cost
Programmer’s Cost 30,000.00
Hardware Depreciation 1,960.83
Software Depreciation 558.33
Electricity 400.00
Total Development Cost 32,919.16
The table above shows all the expenses under the development of the system. It specifically
contains the equipment used and the salary of each programmer that is under the construction of
the system.
Risk
Elements
19
The table above shows the summary of a risk management plan and it contains the Event
(Risk Elements) its Risk and Consequence and graded its probability, mitigation, impact,
contingency, risk, reduction, and exposure.
4.6 Design
4.6.1 Wireframes
User side
WELCOME
DOG APP
USERNAME :
PASSWORD :
Forgot password ?
20
LOG IN
Sign up
NAME :
USERNAME :
SUBMIT
21
DOG PHOTO
Date : Day :
Location :
_____ LIST
22
RICE VARIETY
FARM LOCATION
SUBMIT
FARMS
Table 4. tbl_Login
Field Name Type Length Primary Key Description
Username Int 10 Yes Username
Password Vachar 10 No Pasword
Table5. Tbl_Profile
Table6. Tbl_Vaccinations.
Field Name Type Length Primary Key Description
Id_No Varchar 10 Yes Owner Id_No
Owner Name Varchar 50 No Name of Owner
Owner Name Varchar 50 No Name of Owner
Address Varchar 50 No Owner Addres
Nickname Varchar 50 No Owner Nickname
NameSpouse Varchar 50 No Name of Spouse
Birthdate Varchar 50 No Owner Birthdate
LV Varchar 50 No Development Zone
UV Varchar 50 No Development Zone
BP Varchar 50 No Development Zone
HILLY Varchar 50 No Development Zone
Total Varchar 50 No Total development
Zone
Owner Varchar 50 No Tenurial Status
Tenant Varchar 50 No TenurialStatus
Lessee Varchar 50 No Tenurial Status
Total Varchar 50 No Total Tenurial
25
Table7. Tbl_DogPoundProfile
Table18._Barangay
FIELD NAME TYPE LENGTH PRIMARY KEY DESCRIPTION
This figure shows the three-tier architecture broken down as follows: client tier, data tier,
application tier.
Data layer: comprise data utilities, data access components and servicebagents.
27
4.8 Development
Hardware Specs
Intel(R)Pentium(R)
Processor Type: Intel Celeron Processor 2.4 GHz
Number of Cores: Dual Core
CPU:G630 2.70 GHz
CPU Upgradability: Upgradable
Chipset Type: Intel E7230
RAM
Memory Installed Size: 2.00 GB
Technology: DDR2 SDRAM-ECC
Memory Speed: 533,0 MHz
Hard Disk: 500 GB
Hard Drive Interface Type: Serial SATA-150
Spindle Speed: 7200.0 rpm
The table above shows the recommended hardware specifications needed by the system to run.
It must meet the necessary hardware specifications to avoid miscalculations and the hanging of the
system.
C++ - is a high level programming language develop by Bjarne Stroustrup at Bell Labs. C++
designers and programmers to test their work on their computers without any access
to the Internet.
Back End
Pascal – the developers used this for data collection.
29
4.8.6 Testing
Compatibility Testing
The developer used this type of testing to determine how compatible the system
interface into different android versions such as Oreo, Lollipop, and Nougat.
30
Evaluation
The researcher will use the Software Quality Standard (ISO 25010) in evaluating the system as
perceived by users’ acceptability concerning: Functionality, Performance, Efficiency, and Usability.
The system will be evaluated by the IT Experts and the users of the system in the Municipality
of Alicia. The researchers used the Likert scale to determine, evaluate and to give feedback to the
system. According to Likert 1932 formula and interpreting the result is shown below. This has been
used to determine whether the respondents rated “Strong Agree (SA)”, “Agree (A)”, “Undecided (U)”,
“Disagree (DA)”, and “Strongly Disagree (SD)”.
CHAPTER V
RESULTS AND DISCUSSION
USER LOG IN
32
This module allows the user to open his\her account in the system
User Sign up
33
Add Button
CHAPTER VI
This chapter the summary of findings, conclusions drawn and recommendations based on the
Summary of Findings
Based on the analyzed data, the following are the salient findings of the study as reflected on
1. The developed system “DOG APP” of the Municipality of Alicia contained the following
functionalities:
o Manage User
o Pet’s Owner Profile
o Monitor Vacinations
o Monitor Dog Pounds
o Monitor Adopted Dogs
o Monitor Dog Bites
o Sent SMS
o Back-up Database
o Print reports
Monitoring of Vacinations
Monitoring of Dog Pounds
Monitoring of Adopted Dogs
Monitoring of Dog Bites
Municipal Summary Report of Vacinations
Municipal Summary Report of Dog Pounds
Municipal Summary Report of Adopted Dogs
Municipal Summary Report of Dog Bites
36
Base on the result of the evaluation, the researcher found out that the developed System when
evaluated by the respondents using the ISO 25010 instrument, the criterion Perceived Functionality
obtained weighted mean of 4.53 which is equivalent to Very Great Extent qualitative rating. It
implicates that developed system meets the functionality requirement from the user. The Perceived
Performance Efficiency obtained a weighted mean of 4.39 which is equivalent to Very Great Extent
quantitative rating. It statistically implies that the developed systems perform efficiently. The criterion
Perceived Usability obtained a weighted mean of 4.49 which is equivalent to Very Great Extent
quantitative rating. It further implies that the system is usable for the user.
The developed System obtained an overall qualitative rating of 4.47 with an equivalent
qualitative rating of “Very Great Extent”, in terms of Functionality, Performance Efficiency and
Usability as assessed by the respondents.
Conclusion
Based on the findings of this study, the following conclusions are drawn:
The developed system was used as an interactive software system that facilitated animal welfare
authorities compile useful information from a combination animal welfare raw data and information to
identify and solve problems and make decisions as regards to Vaccine, Dog Pound, Adopted Dog and
Dog bites Monitoring.
The developed system has a strong potential to do monitoring and recording information about
Vaccine, Dog Pound, Adopted Dog and Dog bites Monitoring. It can greatly constitute the solution to
addressing the problems about monitoring and recording of Dogs health in the Municipality of Alicia.
37
Recommendation
Based on the findings and conclusions reached, the researcher recommends the following:
1. Municipal Animal Welfare Office in the Municipality of Alicia must implement the developed
REFERENCES
https://www.britannica.com/animal/dog/Domestication
http://pawsphilippines.weebly.com/strays-why-are-there-stray-cats-and-dogs.html
38
https://dpcpsi.nih.gov › filesPDF
https://www.avma.org › resources