Nothing Special   »   [go: up one dir, main page]

Aso Mo Tali Mo (Dog Application)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

1

ASO MO TALI MO (DOG APPLICATION)

Christine Duran
Syrell Aubrey Acosta

May 15, 2020


2

TABLE OF CONTENTS
Chapter I
Introduction ………………………………………………………………………..…....5
1.1 Project Context ………………………………………………………..…..5
1.2 Purpose and Description.…………………………………………………..6
1.3 Objectives of the Project …………………………………………...…..…6
1.4 Scopes and Limitations of the Project.…………………………………….6
Chapter II
Review Related Literature ………………………………………………………………...7
Chapter III
Technical Background …………………………………………………………………….9
3.1 Technicalities of the project …………………………………………………..9
3.2 Language to be used …………………………………………………………10
3.3 how the project will work ……………………………………………………10
Chapter IV
Methodology …………………………………………………………………………….11
4.1 Environment …………………………………………………………………11
4.1.1 Locale of the study……………………………………………...….11
4.1.2 Population of the study……………………………………………..11
4.1.3 Organizational Chart/Profile .……………………………………...12
4.2 Requirement Specification ………………………………………………….13
4.2.1 Operational Feasibility …………………………………………….13
4..2.2 Functional Decomposition Diagram ……………………………...14
4.2.3 Technical Feasibility ……………………………………………....15
4.2.4 Gantt Chart ………………………………………………………...15
4.3 Requirements Modeling ………………………………………………….….16
4.3.1 Input Process Output Diagram ……………………………...……..17

4.3.2 Control……………………………………………………………..17
3

4.4 Data and Process Modeling …………………………………………….……..……17


4. 4.1 Context Diagram……………………………………………….……...….17
4.4.2 Zero Diagram of the developed system……………………………..….…18
.4.3 Data Flow Diagram ………………………………………………….….….18

4.5 Analysis …………………………………………………………………………….19


4.5.1 Cost-Benefit Analysis……………………………………………………..20
4.5.2 Risk Assessment Analysis……………………………………..…………..21
4.6 Design ……………………………………………………………………………….22
4.6.1 Wireframes………………………………………………………….……..22
4.7. Data Dictionary……………………………………………………………………..27
4.7.1 System Architecture ………………………………………………..……..29
4.8 Development………….30
4.8.1 Hardware Specification ……………………………………………….......30
4.8.2 Software Specification ………………………………………………….…30
4.8.3 Program Specification ………………………………………………..……31
4.8.4 Programming Environment ………………………………………..………31
4.8.5 Deployment Diagram …………………………………………………...…32
4.8.6 Testing ……………………………………………………………………..32
Chapter V
RESULTS AND DISCUSSION ………………………………………………………....34
Chapter VI
SUMMARY, CONCLUSION AND RECOMMENDATION ………………………......38
Summary of Findings ……………………………………………..……….……..38
Conclusion ………………………………………………………..………………39
Recommendation .………………………………………………………………...40
References ………………………………………………………………………………..41
4

ABSTRACT
Dogs have played an important role in the history of human civilization and were among the first
domesticated animals. They were important in hunter-gatherer societies as hunting allies and
bodyguards against predators.Although many still serve in these capacities, dogs are increasingly used
for social purposes and companionship. Today dogs are employed as guides for the blind and disabled
or for police work. Dogs are even used in therapy in nursing homes and hospitals to encourage patients
toward recovery. Humans have bred a wide range of different dogs adapted to serve a variety of
functions. This has been enhanced by improvements in veterinary care and animal husbandry.
5

CHAPTER I
INTRODUCTION

This chapter covers the introduction, project context, purpose and description, objective of the
project, and the Scope and limitation of the project.

1.1 Project Context


Dogs are long considered our best friends. Since the days of our civilizations, it is thought that
dogs have started to share the cities that we build and have lived in them - eating up our wastes,
protecting our livestocks, guarding us and sometimes irking us with their behaviour. Dogs are now
seen as a menace more than as loving inhabitants of our cities. An increasing number of human-
dog conflicts are a testimony to that. A new research has thrown some insights into the behavioural
aspects of stray dogs and has identified factors and measures that can help us make peace with the
strays. By being aware and understanding of the behaviours of strays, a lot of such conflicts can be
avoided, say the researchers.

1.2 Purpose and Description


The main goal of this study is to implement a system to be used as an effective tool in monitoring
the dogs in every barrangay of alicia. This system seeks to improve the process of Dog
information specially in their Vaccinations, Dog Pound, Adopted, Dog Bites.

1.3 Objectives of the project


This study aims to design and develop a system called Dog App for the municipality of Alicia, Isabela
in Monitoring the informations of dogs.
1. To study the impact of mobile app that will be used in monitoring.
2. To Know who are those taking care of their dogs.
1.4 Scope and Limitations of the Project
This project aims to develop the Dog Application Information System in the Municipality of Alicia. This
study is to facilitate the situation of dogs in every baranggay’s. In Vaccine montioring, it includes the Owners
Profile, Vaccine, and Reports. In Dog Pound Management, it includes Dogs Profile, AI Information collected,
and Reports, In Adpoted Management, it includes Owners Profile and Reports. In Dog Bites, it includes Owners
Profile, and Reports.
6

Chapter II
Review Related Literature

Katcher (1981) says that 99% of people talk to their animals and believe they understand to a degree. He says
that in most cases, pet owners use “Motherese” or baby talk (a simplified form of language used to help
children understand and learn to speak). Katcher believes that the bias against sentimentality in science has
blinded researchers' perceptions of the significant, distinctive role that pets play in people's lives and that we
must recognize this relationship as one that augments relationships with other humans.

Perin (1981) goes so far as to assert that dogs are a symbol of our own “memory of that magical once-in-a-
lifetime bond” we shared with our mothers. She says people have dogs for the “satisfaction of giving and
receiving complete and total love and devotion,” which is why dogs are idealized in modern society.

Finds that dog owners, based on intimate interactions with their dogs, come to regard them as “unique
individuals who are minded, empathetic, reciprocating, and well-aware of the basic rules and roles that govern
the relationship.” Dog owners see their dogs as consciously behaving so as to achieve certain goals in the
relationship. In short, dogs are seen as taking the role of the “other” in their relationship with their owners,
which requires owners in turn to take the role of the “animal other” in order to participate in the activities and
rituals that make up the relationship (Sanders, 1993).

Other research shows that dogs serve important human-to-human social functions as well. One participant
observational study at a public park documents dogs' role in exposing their human companions to encounters
with strangers (Robins et al., 1991

“That the dog is a loyal, true, and affectionate friend must be gratefully admitted, but when we come to
consider the psychical nature of the animal, the limits of our knowledge are almost immediately reached” – Sir
John Lubbock. (1889, p. 272)

The behavior of dogs was very important in the early history of comparative psychology. Darwin wrote
extensively about dog behavior, intelligence and emotions, often using his own dogs as examples. He believed
that dogs had emotions such as love, fear, shame, and rage, as well as dreams, and the ability to imitate and
reason (Darwin, 1871). Darwin also commented on how domestication impacted the behavior of domestic
dogs, decreasing their fear of humans, and he even argued for the evolution of distinct barks with various
meanings.

Darwin's neighbor in Downe, Sir John Lubbock, was one of the first to carry out experimental tests of the
intelligence of dogs.

Lubbock concluded that the dog had learned to communicate his wants effectively (Lubbock, 1889). Van's
successes inspired Lubbock to attempt to use this method to test the dog's color discrimination abilities as well
as its ability to count, but no results were.
7

Chapter III
TECHNICAL BACKGROUND

This chapter describes the technicalities of the project, details of technology to be used, and how the
project work.

3.1 Technicalities of the project

Figure 1. Project Framework

Figure 1 above shows the technical framework of the study. The system runs in a application Program. The
users (Admin user)access the system from the server to process different transactions such as inputting
information of the Dog owners regarding their Dog's number, imformation in Vaccinations, Dog Pound,
Adopted, Dog Bites.All transactions are stored in a database file in the server. The client user such as the
Information Officer and Inventory Officer requests queries directly from the database of the system. When
the query is satisfied by the system to generate the data and the response of the query is sent back to the
client users.

3.2 Language to be used


The following are the technologies used in the development of the system:

 C++ -is a high-level object-oriented programming language that helps programmers write

fast, portable programs.


8

 Pascal – is an imperative and procedural programming language, designed by Niklaus Wirth

as a small, efficient language intended to encourage good programming practices using

structured programming and data structuring.

3.3 how the project will work


The system will be constructed using C++ a proggraming language that provides a full suite of tools
for building Applications. The researcher use C++ in developing the mobile app, and Pascal for
designing the system. AI will be the used to collect and compute those restored data in the system.
9

CHAPTER IV

METHODOLOGY

This chapter discusses the methodology used in conducting the research and the tools used in design and
development. This chapter contains the following: Environment, Requirement Specification, Technical
Feasibility, Gantt Chart, Requirements Modeling, Data and Process Modeling, Data Flow Diagram, Analysis,
Design, Data Dictionary, Development, System Architecture.

Researchers used the Rapid Application Development (RAD). A type of software development methodology
that uses minimal planning in favor of rapid prototyping.

The planning of software development using RAD is interleaved with writing the software itself.

4.1 Environment

4.1.1 Locale of the study

The researcher conducted the study at Municipal Office of Department of Agriculture in the
Municipality of Alicia, Isabela.

4.1.2 Population of the study

The people who are involved in this study are the following: (1) Municipal Animal welfare Office,
(1)Pet Owners, (1) Baranggay Captains, (7) Animal Technician (10) IS Students who conducted the
study.
10

4.1.3 Organizational Chart/Profile

Municipality of Roxas

Animal Welfare office Pet Owner's

Figure 2. Organizational Chart.

The figure above shows the organizational chart of Roxas, Isabela where the study was
conducted.
11

4.2 Requirement Specification

4.2.1 Operational Feasibility

Materials Methods
Bond Paper
Manual filling of records
Manual Record Keeping
Record Book Poor
Monitoring of
Filling Box dogsVaccine,He
alth care
Municipal Animal
Desktop Computer
materials.
Brgy. Captain
Welfare Officer

Mobile Phones

Animal Welfare Office

People Machines

Figure 3. Fishbone Diagram

Figure 3 shows the fishbone diagram that explains the problems encountered by the Municipal
Animal welfare Office. The main problem focuses on poor monitoring of Dogs, Vaccine, and Health
Care Materials. As shown in the diagram, the specific problems are categorized based on Methods,
Machines, People and Materials.
12

4.2.2 Functional Decomposition Diagram

DOG APP

DOG POUND ADOPTED DOG BITE


VACCINE MANAGEMENT MANAGEMENT MANAGEMENT

OWNERS OWNER
Owners OWNER
PROFILE PROFILE PROFILE
MANAGEMENT

VACCINATIO
N HEALTH AI
HEALTH COMPIUTATIO
NON

REPORT REPORT REPORT


REPORT

Figure 4. Functional Decomposition Diagram

This Figure shows the functionality of the system. There are three major functionalities in the
system: Irrigation Monitoring it contains Barangay, Owner Profile, Vaccine, and Report. Dog Pound
Monitoring contains Barangay,Owners Profile, Health, Report. Adopted management it contains Dog
Profile, Health and Report. Dog Bite management it contains Owner Profile, Ai Computation, and
Report.
13

4.2.3 Technical Feasibility

4.2.4 Gantt Chart


The Gant chart below serves as the guide for the proponents in doing the project and to
determine whether the activities involved meet the project deadline.

Table 1. Gant chart of the different processes undergone by the researchers

The table shows the deliverables and the duration of the system, the deliverables .
14

4.3 Requirements Modeling

4.3.1 Input Process Output Diagram

Input Process Output

 User Log in
 User Log in
 Validate Owner
 User Log in  Validate Owner
Profile
 Owner Profile Profile
 Validate
 Vaccinations  Validate Vacinations
Vaccinations
 Dog Pound  Validate Dog pound
 Validate Dog pound
 Adopted  Validate Adopted
 Validate Adopted
 Dog bite Dogs
Dogs
 Health  Validate Dog Bite
 Validate Dog Bite
 AI Computation  Validate health
 Validate health
 Validate AI
 Report  Validate AI
Computation
Computation
 Validate Report
 Validate Report

feedback

Figure 5. Input-Process-Output Diagram

Figure 5 shows the Input Process Output. The Input box contains the user log in, Owner
Profile, Vaccinations, Dog Pounds, Adopted Dogs, Dog Bites, Health, AI Computation and Report.
The process box contains the user log in, Validate Owner Profile, Validate Vaccinations, Validate dog
pounds, Validate Adopted dogs, Validate Dog bites, Validate health, Validate AI Computation and
Validate Report. The output box contains the user log in, Validate Owner Profile, Validate
Vaccinations, Validate dog pounds, Validate Adopted dogs, Validate Dog bites, Validate health,
Validate AI Computation and Validate Report.
15

4.3.2 Control

The system provides log-in security to ensure that only the registered Admin and user can use
the system. The system verifies the Admin who registered through their personal information. The
system does not accept users who are not officially registered.

4.4 Data and Process Modeling

4.4.1 Context Diagram

Figure 6.
USERNAME & PASSWORD
Vacination USERNAME & PASSWORD
Dog Pound
s Dog Pound MGT
Vacinations
REPORT
REPORT

LIST OF REPORT
o List of Dog Pounds
USERNAME & PASSWORD GRANTED Dog App USERNAME & PASSWORD GRANTED

USERNAME & PASSWORD USERNAME & PASSWORD GRANTED


LIST OF CROP LIST OF PESTICIDE
LIST OF REPORT
LIST OFREPORT

REPORT REPORT
CROP
Adopted PESTICIDE Dog Bite
USERNAME & PASSWORD USERNAME & PASSWORD
Dogs

lER
List Vacinations
Context Diagram
16

Figure 6 shows context data flow the diagram of the system. It contains four major entries:
CROPS, IRRIGATION, PESTICIDE MANAGEMENT, FERTILIZER MANAGEMENT.

4.4.2 Zero Diagram of the developed system

The researchers used the Data Flow Diagram to identify the flow of the system.

1.0
LOG IN Tbl.LOG IN

2.0
VACINATIONS Tbl.VACINATION

3.0
DOG POUNDS Tbl.DOG POUND

DOG APP 4.0


ADOPTED Tbl.ADOPTED

5.0
DOG BITE Tbl.DOG
BITE

6.0
REPORT Tbl.REPORT

Figure 7. Zero diagram Administrator Level

Figure 7 shows that the User login into the system. The User manages the Login, Vacinations,
Dog Pounds, Adopted, Dog Bite, and Report. All transactions are stored in their tables in the database.
4.4.3 Data Flow Diagram

1.0
LOG IN TBL.LOG IN

2.0
OWNER PROFILE TBL. OWNER PROFILE
DOG APP

3.0
REPORT

17

Figure 8. Data Flow Diagram of the System (Survey Officer)

Figure 8 shows that the User login into the system. The Survey Officer manages the Login,
Profile owner, Report. All transactions are stored in their tables in the database.

4.5 Analysis
4.5.1 Cost-Benefit Analysis
Table 2. Cost-Benefit Analysis

WINDOWS 8,000.00
MySQL 0.00
XAMPP 0.00
C++ 0.00
PASCAL 0.00
TOTAL SOFTWARE COST 8,00.00

Development Cost
Programmer’s Cost 30,000.00
Hardware Depreciation 1,960.83
Software Depreciation 558.33
Electricity 400.00
Total Development Cost 32,919.16

Schedule 1 Programmer’s Salary


Programmer’s Salary 10,000.00
No. of Months Develop 3
Total Programmer’s Salary 30,000.00
Schedule 2 – Hardware Depreciation
Total Hardware Cost 23,530.00
Estimated Useful Life 5
No. of Months 12
No. of Months Develop 3
Total Hardware Depreciation Cost 1,960.83

Schedule 3 – Software Depreciation


18

Total Software Cost 6,700.00


Estimated Useful Life 5
No. of Months 12
No. of Months Develop 3
Total Software Depreciation Cost 558.33
Schedule 4 – Electricity
No. of Kilowatts used 50
Amount Per kilowatt 8.00
Total Electricity Cost 400.00

The table above shows all the expenses under the development of the system. It specifically
contains the equipment used and the salary of each programmer that is under the construction of
the system.

4.5.2 Risk Assessment Analysis


Table 3. Risk Assessment Analysis

Risk
Elements
19

The table above shows the summary of a risk management plan and it contains the Event
(Risk Elements) its Risk and Consequence and graded its probability, mitigation, impact,
contingency, risk, reduction, and exposure.

4.6 Design
4.6.1 Wireframes
User side

WELCOME

DOG APP

USERNAME :

PASSWORD :

Forgot password ?
20

LOG IN

Sign up

Figure 9. User Log in

NAME :

USERNAME :

SUBMIT
21

FIGURE 10 . User sign up

DOG PHOTO

Date : Day :

Location :

_____ LIST
22

FIGURE 11. USER NOTIFICATION

RICE VARIETY

FARM LOCATION

SUBMIT

FIGURE 11. ADD BUTTON


23

FARMS

FIGURE 11. ADD BUTTON


24

4.7.1 Data Dictionary

Table 4. tbl_Login
Field Name Type Length Primary Key Description
Username Int 10 Yes Username
Password Vachar 10 No Pasword

Table5. Tbl_Profile

Field Name Type Length Primary Key Description


LastName Varchar 50 No LastName of owner
FirstName Varchar 50 No FirstName of owner
Middle Name Varchar 50 No MiddleName of
owner
Name of Spouse Varchar 50 No Name of spouse
Nickname Varchar 50 No Owner Nickname
NameSpouse Varchar 50 No Name of Spouse
Birthdate Varchar 50 No Owner Birthdate

Table6. Tbl_Vaccinations.
Field Name Type Length Primary Key Description
Id_No Varchar 10 Yes Owner Id_No
Owner Name Varchar 50 No Name of Owner
Owner Name Varchar 50 No Name of Owner
Address Varchar 50 No Owner Addres
Nickname Varchar 50 No Owner Nickname
NameSpouse Varchar 50 No Name of Spouse
Birthdate Varchar 50 No Owner Birthdate
LV Varchar 50 No Development Zone
UV Varchar 50 No Development Zone
BP Varchar 50 No Development Zone
HILLY Varchar 50 No Development Zone
Total Varchar 50 No Total development
Zone
Owner Varchar 50 No Tenurial Status
Tenant Varchar 50 No TenurialStatus
Lessee Varchar 50 No Tenurial Status
Total Varchar 50 No Total Tenurial
25

Table7. Tbl_DogPoundProfile

Field Name Type Length Primary Key Description


Id_No Varchar 10 Yes Owner Id_No
Owner Name Varchar 50 No Name of Owner
Address Varchar 50 No Owner Addres
Nickname Varchar 50 No Owner
Nickname
NameSpouse Varchar 50 No Name of Spouse
Birthdate Varchar 50 No Owner Birthdate
NII-Mariis Varchar 50 No Irregated type
CIS Varchar 50 No Irregated type
WPSTW Varchar 50 No Irregated type
WPOSP Varchar 50 No Irregated type
SFR Varchar 50 No Irregated type
Spring Varchar 50 No Irregated type

Table18._Barangay
FIELD NAME TYPE LENGTH PRIMARY KEY DESCRIPTION

Province Varchar 50 Yes Province


Municipality Varchar 50 No Municipality
Zipcode Varchar 50 No Zipcode
Barangay Name Varchar 50 No Barangay Name
Barangay Address Varchar 50 No Barangay Address
26

4.7.2 System Architecture

Figure Figure23. Three Tier Architecture

This figure shows the three-tier architecture broken down as follows: client tier, data tier,
application tier.

Presentation layer: contains UI components as well as the components processing them


Business layer: composed of workflows, business entities and components.

Data layer: comprise data utilities, data access components and servicebagents.
27

4.8 Development

4.8.1 Hardware Specification

Table 19. Hardware Specification

Hardware Specs
Intel(R)Pentium(R)
Processor Type: Intel Celeron Processor 2.4 GHz
Number of Cores: Dual Core
CPU:G630 2.70 GHz
CPU Upgradability: Upgradable
Chipset Type: Intel E7230
RAM
Memory Installed Size: 2.00 GB
Technology: DDR2 SDRAM-ECC
Memory Speed: 533,0 MHz
Hard Disk: 500 GB
Hard Drive Interface Type: Serial SATA-150
Spindle Speed: 7200.0 rpm

The table above shows the recommended hardware specifications needed by the system to run.
It must meet the necessary hardware specifications to avoid miscalculations and the hanging of the
system.

4.8.2 Software Specification

 C++ - is a high level programming language develop by Bjarne Stroustrup at Bell Labs. C++

adds object – oriented features to its predecessor, C.

 Pascal – is an imperative and procedural programming language, designed by Niklaus Wirth

as a small, efficient language intended to encourage good programming practices using

structured programming and data structuring.


28

4.8.3 Program Specification


User
 User log-in
 Vaccinations
 Dog Pounds
 Adopted Dog
 Dog Bite
 Print Report

4.8.4 Programming Environment


The following tools are used in the development of the project:
 Front End
 Adobe Photoshop - The developers used this to design and to edit pictures that are
embedded in the system. Button and images were edited using this software for
styling and designing.
 C++. The developers used this scripting language because it provides a full suite of

tools for building dynamic websites.

 XAMPP. The researcher used this as a development tool, to allow website

designers and programmers to test their work on their computers without any access

to the Internet.

 Back End
 Pascal – the developers used this for data collection.
29

4.8.5 Deployment Diagram

Figure 24. Deployment Diagram


The figure shows how the system was deployed and how the data focus on the system works.
The user will store data from the database for the AI computation and when the computation was
complete it will automatically saved to the server. The admin is responsible in the update of the
application.

4.8.6 Testing
Compatibility Testing
The developer used this type of testing to determine how compatible the system
interface into different android versions such as Oreo, Lollipop, and Nougat.
30

Evaluation
The researcher will use the Software Quality Standard (ISO 25010) in evaluating the system as
perceived by users’ acceptability concerning: Functionality, Performance, Efficiency, and Usability.

The system will be evaluated by the IT Experts and the users of the system in the Municipality
of Alicia. The researchers used the Likert scale to determine, evaluate and to give feedback to the
system. According to Likert 1932 formula and interpreting the result is shown below. This has been
used to determine whether the respondents rated “Strong Agree (SA)”, “Agree (A)”, “Undecided (U)”,
“Disagree (DA)”, and “Strongly Disagree (SD)”.

Table 20. Likert Scale


Scale Rating Qualitative Rating
5 4.21 - 5.0 Strongly Agree
4 3.41 - 4.20 Agree
3 2.61 – 3.40 Undecided
2 1.81 – 2.60 Disagree
1 1.00 – 1.80 Strong Disagree
31

CHAPTER V
RESULTS AND DISCUSSION

USER LOG IN
32

This module allows the user to open his\her account in the system

User Sign up
33

This module allows the user to create an account

User Activity/ Notification

In this module it will show the overall activities of the application


34

Add Button

This module allows to create more activities


35

CHAPTER VI

SUMMARY, CONCLUSION AND RECOMMENDATION

This chapter the summary of findings, conclusions drawn and recommendations based on the

results of the study.

Summary of Findings
Based on the analyzed data, the following are the salient findings of the study as reflected on

the result of the evaluation by the Users and the IT Experts:

1. The developed system “DOG APP” of the Municipality of Alicia contained the following
functionalities:
o Manage User
o Pet’s Owner Profile
o Monitor Vacinations
o Monitor Dog Pounds
o Monitor Adopted Dogs
o Monitor Dog Bites
o Sent SMS
o Back-up Database
o Print reports
 Monitoring of Vacinations
 Monitoring of Dog Pounds
 Monitoring of Adopted Dogs
 Monitoring of Dog Bites
 Municipal Summary Report of Vacinations
 Municipal Summary Report of Dog Pounds
 Municipal Summary Report of Adopted Dogs
 Municipal Summary Report of Dog Bites
36

2. The extent of Compliance of the Developed Application to Software Quality Standards


(ISO 25010)

Base on the result of the evaluation, the researcher found out that the developed System when
evaluated by the respondents using the ISO 25010 instrument, the criterion Perceived Functionality
obtained weighted mean of 4.53 which is equivalent to Very Great Extent qualitative rating. It
implicates that developed system meets the functionality requirement from the user. The Perceived
Performance Efficiency obtained a weighted mean of 4.39 which is equivalent to Very Great Extent
quantitative rating. It statistically implies that the developed systems perform efficiently. The criterion
Perceived Usability obtained a weighted mean of 4.49 which is equivalent to Very Great Extent
quantitative rating. It further implies that the system is usable for the user.

The developed System obtained an overall qualitative rating of 4.47 with an equivalent
qualitative rating of “Very Great Extent”, in terms of Functionality, Performance Efficiency and
Usability as assessed by the respondents.

Conclusion
Based on the findings of this study, the following conclusions are drawn:
The developed system was used as an interactive software system that facilitated animal welfare
authorities compile useful information from a combination animal welfare raw data and information to
identify and solve problems and make decisions as regards to Vaccine, Dog Pound, Adopted Dog and
Dog bites Monitoring.

The developed system has a strong potential to do monitoring and recording information about
Vaccine, Dog Pound, Adopted Dog and Dog bites Monitoring. It can greatly constitute the solution to
addressing the problems about monitoring and recording of Dogs health in the Municipality of Alicia.
37

Recommendation
Based on the findings and conclusions reached, the researcher recommends the following:
1. Municipal Animal Welfare Office in the Municipality of Alicia must implement the developed

system to address the problems of every pets/Dogs of every barangay.

2. The interface of the system must be consistent in all users.

REFERENCES

https://www.britannica.com/animal/dog/Domestication

http://pawsphilippines.weebly.com/strays-why-are-there-stray-cats-and-dogs.html
38

https://dpcpsi.nih.gov › filesPDF

A Review of Literature and Animal Welfare/Regulatory ... - DPCPSI - NIH

https://www.avma.org › resources

Animal Welfare Literature Reviews | American Veterinary Medical Association

https://www.literature review of practices to save animal lives - cloudfront.net

You might also like