Project Documentation Book
Project Documentation Book
Project Documentation Book
By
2023
DECLARATION
I hereby declare that this project has been written by me and is a record of my own
research work. It has not been presented in any previous application for a higher
degree of this or any other University. All citations and sources of information are
clearly acknowledged by means of reference.
_________________________________________________
_______________________________________________
Date
ii
CERTIFICATION
This is to certify that the content of this project entitled ‘Design And
Implementation of an Enhanced Crime Alert System with Multi-level User
Access’ was prepared and submitted by MARVELOUS SOLOMON EKPE in
partial fulfillment of the requirements for the degree of BACHELOR OF SCIENCE
IN COMPUTER SCIENCE. The original research work was carried out by him
under by supervision and is hereby accepted.
Supervisor
DEDICATION
iii
ACKNOWLEDGEMENT
iv
TABLE OF CONTENTS
DECLARATION ii
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGEMENT v
LIST OF TABLES ix
LIST OF FIGURES x
ABSTRACT xi
CHAPTER ONE 1
INTRODUCTION 1
v
1.7 Definition of Terms 5
CHAPTER TWO 8
LITERATURE REVIEW 8
2.1 Hostel 8
CHAPTER THREE 22
vi
3.2.4 Class diagram 37
CHAPTER FOUR 44
IMPLEMENTATION AND RESULT 44
4.1 Overview 44
CHAPTER FIVE 73
SUMMARY, CONCLUSION AND RECOMMENDATION 73
5.1 Summary 73
5.2 Conclusion 73
5.3 Recommendation 73
REFERENCES 76
vii
LIST OF TABLES
Table Page
viii
LIST OF FIGURES
Figure Page
ABSTRACT
ix
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
The city of Lagos, one of Nigeria’s most populous and vibrant urban areas,
faces ongoing challenges related to crime management and public safety. Traditional
crime reporting systems, reliant on manual processes and outdated technologies,
struggle to keep pace with the dynamic nature of criminal activities. As a result, there
is a pressing need for a modernized approach to crime reporting and response that
leverages cutting-edge technologies and community involvement.
The current landscape of crime reporting in Lagos is characterized by
inefficiencies, delays, and limited citizen participation. Manual reporting methods
often lead to delays in information dissemination, hindering swift responses from law
enforcement and emergency services. Moreover, the lack of real-time data integration
and mapping capabilities makes it difficult to visualize crime trends spatially and
allocate resources effectively.
Citizen engagement in crime prevention and reporting is another area that
requires attention. Many existing systems lack user-friendly interfaces and fail to
incentivize or empower ordinary citizens to actively participate in reporting criminal
activities. Enhancing community involvement is crucial for creating a more inclusive
and responsive crime management ecosystem that leverages the collective efforts of
both authorities and citizens.
2
updates and alerts, and facilitate location-based alert distribution. This translates into
faster response times from law enforcement, emergency services, and relevant
authorities, ultimately leading to improved crime resolution rates and enhanced public
safety.
Secondly, the multi-level user access structure embedded within the system
promotes collaborative efforts between citizens and response agencies. Ordinary
citizens gain a user-friendly platform to report crimes and receive updates on
incidents within their locality, fostering a sense of community involvement in crime
prevention. On the other hand, personnel at various levels, including police, fire
service, vigilantes, and administrators, benefit from targeted alerts, specific
responsibilities, and efficient resource allocation based on their expertise and
proximity to reported crimes. This collaborative approach not only enhances the
effectiveness of response efforts but also strengthens trust and communication
between the community and law enforcement agencies.
Furthermore, the integration of mapping systems and dynamic personnel
allocation features contributes significantly to proactive crime management strategies.
By visualizing crime locations in real-time and intelligently assigning personnel based
on proximity and expertise, the system optimizes resource utilization and response
times. This proactive approach not only aids in crime prevention but also enables
authorities to identify and address emerging crime trends swiftly, thus deterring
criminal activities and improving overall security levels in the Lagos locality.
In essence, the significance of this study lies in its potential to revolutionize
crime management practices by harnessing technology, fostering community
engagement, and implementing proactive response strategies. The outcomes of this
study have far-reaching implications for enhancing public safety, reducing crime
rates, and creating a more secure and resilient urban environment in Lagos..
4
b. Multi-level User Access: A system feature that allows different levels of
access permissions based on user roles, ensuring that users can only access
and perform actions relevant to their designated roles within the system.
c. Real-time Updates: Instantaneous and continuous updates or notifications
provided by the system, enabling stakeholders to receive timely
information about ongoing criminal incidents as they unfold.
d. Analytics: The process of gathering, analyzing, and interpreting data to
identify patterns, trends, and insights related to crime activities, aiding in
decision-making and proactive law enforcement strategies.
e. Communication Channels: Integrated platforms or tools within the system
that facilitate seamless communication and information sharing among law
enforcement agencies, community watch groups, and other stakeholders
involved in crime prevention and response efforts.
f. User Interface (UI): The graphical interface through which users interact
with the system, comprising elements such as menus, buttons, and screens
designed for ease of use and navigation.
g. Database Management System (DBMS): A software application that
manages and organizes data in databases, facilitating efficient data storage,
retrieval, and manipulation for the crime alert system.
h. Security Protocols: Measures and protocols implemented within the
system to safeguard sensitive data, prevent unauthorized access, and
ensure data confidentiality, integrity, and availability.
i. Complaint Management: A system module or feature that allows users to
register, track, and resolve complaints related to crime incidents, ensuring
transparent and efficient handling of grievances.
j. Scalability: The system's ability to handle increasing volumes of data,
users, and transactions without compromising performance, ensuring that
it can accommodate future growth and evolving needs effectively.
5
CHAPTER TWO
LITERATURE REVIEW
2.1 Alert Systems
Alert systems are essential components in various sectors such as healthcare,
aviation, and emergency response. These systems are designed to deliver timely
notifications or warnings about specific events or conditions that necessitate attention
or action. In healthcare, alert systems can aid in the early identification of critical
conditions like acute kidney injury Park et al. (2018) or severe illness in COVID-19
patients (Yin et al., 2022). Aviation alert systems are crucial for flight safety by
issuing alerts for potential conflicts or hazards (Waldron et al., 2013; Cone et al.,
2019). Additionally, in disease surveillance, alert systems are vital for outbreak
detection and public health emergency management (Runge-Ranzinger et al., 2014;
Nguyen et al., 2019).
The concept of alert systems typically involves the interplay of attentional
networks, including alerting, orienting, and executive control functions (Fan et al.,
2002; Zani & Proverbio, 2017; Fan et al., 2009). The alerting function is responsible
for maintaining an adaptive alert state and responding to warning signals (Fan et al.,
2009). Orienting involves selecting relevant information from the environment, while
executive control manages conflicting information processing (Zani & Proverbio,
6
2017). These networks collaborate to enable individuals to effectively respond to
stimuli and make well-informed decisions.
Moreover, alert systems can vary in complexity and design based on the
specific application. For example, in aviation, alert systems may incorporate
automated conflict resolution features to enhance operator situational awareness
(Waldron et al., 2013). In healthcare, these systems may utilize artificial intelligence
and machine learning models to enhance prediction and decision-making processes
(Lee et al., 2021). Furthermore, alert systems in public health settings may integrate
risk assessment tools and surveillance algorithms to detect and respond to disease
outbreaks (Runge-Ranzinger et al., 2014; Runge-Ranzinger et al., 2016).
In summary, alert systems play a critical role in improving safety, efficiency,
and decision-making across various sectors. By harnessing advanced technologies and
understanding the underlying attentional networks, organizations can develop
effective alert systems that help mitigate risks, enhance response times, and ultimately
save lives
2.2 History of Alert Systems development
Alert systems have a rich history of development and implementation across
various domains. Kuligowski & Kimball (2018) discuss the guidance on alerts issued
by outdoor siren and short message alerting systems, emphasizing the importance of
public response to audible and short message alerts. Similarly, Kuligowski &
Wakeman (2017) review outdoor siren systems, highlighting the variability in siren
usage, testing, and education, which can lead to confusion among community
residents during emergencies.
In the medical field, Harrison et al. (2016) address the development and
implementation of sepsis alert systems, cautioning against potential issues like alert
fatigue and human error if not implemented considering big data. Tamblyn et al.
(2012) delve into physicians' responses to computerized alerts for psychotropic drugs,
noting that many alert systems rely on expert opinion rather than robust evidence.
Moreover, the design and evaluation of medication alerting systems have been a focus
of research. Zheng et al. (2021) present a tool for evaluating medication alerting
systems, emphasizing the importance of usability in such systems. Phansalkar et al.
(2010) review human factors principles for designing medication safety alerts,
stressing the significance of alert timing.
7
Additionally, Tamblyn et al. (2008) highlight the effectiveness of in-house
developed systems that target specific drug problems in altering prescribing practices.
The evolution of alert systems spans various fields, from public safety with outdoor
sirens to medical contexts with medication alerts. Understanding user responses,
incorporating human factors principles, and ensuring usability are crucial aspects in
the design and implementation of effective alert systems.
2.3 Alert Systems in Nigeria
Alert systems in Nigeria have advanced significantly across various sectors
including healthcare, agriculture, and emergency response. The implementation of
automated alert systems has been suggested to rectify errors in different fields, such as
medicine and transportation (Parasuraman & Riley, 1997). Within the healthcare
sector, research has concentrated on strategies to prevent adverse events by addressing
drug safety alerts (Sijs et al., 2006). Efforts have also been made to enhance patient
safety through the development of medication safety alerts within clinical information
systems (Phansalkar et al., 2010).
In agriculture, Nigeria has utilized alert systems effectively, including
initiatives like fertilizer subsidies and electronic wallet systems (Olayide et al., 2015).
Technological progress has been evident in the country with the introduction of online
monitoring systems for poultry diseases (Oyetunji, 2017). Furthermore, innovative
intelligent insole systems have demonstrated success in reducing the recurrence of
diabetic foot ulcers (Abbott et al., 2019).
Regarding emergency alerts, studies have explored efficient alert delivery
systems, emphasizing the integration of various alert mechanisms (Chang, 2021).
Additionally, real-time health monitoring systems utilizing smartphones and wearable
sensors have been developed to improve remote patient care (Kakria et al., 2015).
These systems have proven crucial in addressing public health challenges, such as the
potential spread of diseases like Lassa fever from Nigeria (Tuite et al., 2019).
The evolution of alert systems in Nigeria mirrors technological advancements
and a growing commitment to enhancing efficiency and safety across diverse
industries
2.4 Information System
8
A Crime Alert system is a mechanism designed to raise community awareness
about criminal activities, identify suspects, and communicate information swiftly
when a crime occurs (Akalis et al., 2008). These systems are crucial for enhancing
public safety and aiding law enforcement in apprehending suspects (Adams-Clark et
al., 2020). Crime alerts typically focus on violent crimes such as robbery, armed
robbery, and aggravated assault (Pelfrey et al., 2016). One of the most well-known
crime alert systems is the AMBER Alert, which was established in response to the
abduction and murder of a child in 1998 (Sicafuse & Miller, 2010). The AMBER
Alert system is specifically tailored to intervene in abduction cases in progress to
prevent further harm (Griffin et al., 2007).
Crime alert systems, including the AMBER Alert, have been scrutinized for
their effectiveness and impact on public safety. Some studies have suggested that the
AMBER Alert system may serve as a form of "crime control theater," where the
perceived benefits may not align with the actual outcomes (Miller et al., 2017; Griffin
& Miller, 2008). Despite debates on the effectiveness of such systems, they remain
integral in addressing immediate threats and mobilizing communities to assist in
crime prevention and resolution (Griffin et al., 2021).
In the context of universities, crime alert systems play a vital role in ensuring
the safety of students and staff by quickly disseminating information about crimes on
campus (Adams-Clark et al., 2020). These systems are part of a broader emergency
response strategy that leverages various communication channels, including text
alerts, to combat noise and capture attention during crises (Stephens et al., 2013).
Understanding the demographics and patterns of crime alerts is essential for
optimizing the effectiveness of these systems and tailoring responses to specific
threats (Pelfrey et al., 2016).
In conclusion, Crime Alert systems, such as the AMBER Alert, are essential
tools for enhancing public safety, raising awareness about criminal activities, and
mobilizing communities to prevent and address crimes effectively. While there are
ongoing discussions about the effectiveness and unintended consequences of such
systems, their role in immediate threat response and community engagement cannot
be understated.
9
2.4.1 Types of Information System
Crime alert systems can be classified into various types based on their
functionality, target audience, and mode of operation. Here are several types of crime
alert systems:
1. Public Crime Alert Systems: These systems are designed to disseminate crime
alerts and safety information to the general public. They often utilize platforms
like social media, mobile apps, email newsletters, and SMS alerts to reach a
wide audience. Public crime alert systems aim to enhance community
awareness and engagement in crime prevention efforts.
2. Law Enforcement Crime Alert Systems: These systems are tailored for use by
law enforcement agencies to monitor criminal activities, share intelligence,
and coordinate response efforts. They may include features such as real-time
crime mapping, suspect tracking, incident reporting, and information sharing
among law enforcement personnel.
3. Community-Based Crime Alert Systems: These systems involve collaboration
between law enforcement agencies and local communities or neighborhood
watch groups. They empower community members to report suspicious
activities, share crime-related information, and receive alerts about incidents
occurring in their vicinity. Community-based crime alert systems foster a
sense of shared responsibility for crime prevention and safety.
4. Campus Crime Alert Systems: These systems are specific to educational
institutions and are designed to alert students, faculty, and staff about safety
concerns, crime incidents, and emergency situations on campus. They may
include features such as panic buttons, emergency notifications, campus maps
with safety zones, and reporting tools for campus security.
5. Business or Corporate Crime Alert Systems: These systems are utilized by
businesses and corporations to monitor internal security threats, track theft or
fraud incidents, and ensure employee safety. They may incorporate
surveillance cameras, access control systems, alarm systems, and incident
reporting mechanisms to enhance security within the workplace.
6. Mobile Personal Safety Apps: These are mobile applications designed for
individuals to enhance their personal safety and receive crime alerts based on
10
their location. These apps often include features such as SOS alerts, GPS
tracking, safety tips, and real-time notifications about crime incidents nearby.
7. Traffic and Transportation Crime Alert Systems: These systems focus on
monitoring and preventing crime-related activities in transportation networks,
such as public transit systems, airports, and highways. They may include
surveillance cameras, license plate recognition systems, emergency call boxes,
and real-time alerts for law enforcement and security personnel.
Each type of crime alert system serves distinct purposes and targets specific
audiences, contributing to overall crime prevention and safety efforts within
communities, institutions, and businesses.
d. Risk Reduction: The SDLC includes testing activities that help identify and
address defects and bugs, reducing the risk of errors in the system.
Additionally, the maintenance phase ensures that the system remains up-to-
date and secure.
One of the key advantages of UML is its ability to ensure consistency and
coherence in system design and implementation. By establishing a standardized
notation, UML promotes a shared understanding among designers and developers,
reducing the risk of errors resulting from misunderstandings.
12
interactions. Additionally, UML supports prototyping, allowing stakeholders to
visualize and interact with the system before its actual development.
13
illustrate system components and their interconnections, while state diagrams model
system states and transitions.
14
2.7.1 System Development Tools
The relevance of OOP in system design and Implementation is significant and can
be seen in various aspects:
15
d. Scalability: OOP aids in building scalable applications by breaking down
systems into manageable objects, capable of handling large amounts of data
and user interactions.
e. Reusability: OOP promotes code reuse through the creation of reusable
objects, reducing the need to write new code from scratch and saving time and
effort.
16
crimes has been discussed, emphasizing its focus on prevention compared to other
crime control programs (Griffin et al., 2007). However, some researchers have
expressed concerns about the potential theatrical nature of AMBER Alerts, suggesting
they may serve as symbolic solutions to socially constructed crimes (Griffin & Miller,
2008). In the realm of technology, advancements in neural surveillance and intrusion
detection systems have been explored for real-time crime detection, focusing on
reducing false positives and enhancing alert classification (Potter et al., 2020; Orang
et al., 2012). Furthermore, the utilization of augmented reality technologies in mobile
crime prevention systems has been studied to offer users visual crime-related
information overlaid on their physical surroundings (Liao et al., 2020).
Future research directions include optimizing alert mechanisms to improve
their appropriateness and reduce alert fatigue, ensuring that alerts are serious and
relevant to users (Chien et al., 2022; Kopel et al., 2014). Additionally, exploring users'
preferences and behaviors towards crime alerts, particularly in areas prone to natural
disasters or high crime rates, can further enhance the effectiveness of alert systems
(Kopel et al., 2014).
In conclusion, enhanced crime alert systems are indispensable tools for
community safety and crime prevention. By considering factors such as crime
severity, interface design, and the potential theatrical nature of alerts, researchers can
continue to enhance these systems to better serve and protect the public.
17
CHAPTER THREE
METHODOLOGY OF THE STUDY
3.1 Method of Identification of User and System Requirements
The process of identifying user and system requirements for the Enhanced
Crime Alert System with Multi-level User Access was thorough and comprehensive.
It began with stakeholder interviews involving law enforcement agencies, community
watch groups, local authorities, and citizens. These interviews provided valuable
insights into specific needs, expectations, and challenges related to crime reporting
and response. The discussions helped in understanding desired features,
functionalities, and usability requirements crucial for designing an effective crime
alert system.
Lastly, workshops and focus groups were organized with representatives from
different user categories, including ordinary citizens, law enforcement personnel, and
system administrators. These collaborative sessions facilitated discussions on defining
functionalities, access levels, reporting protocols, and workflows within the system.
The input gathered from these workshops and focus groups helped refine the system
requirements, ensuring alignment with the needs and expectations of all stakeholders.
18
In the Identification of System Requirements section, the specific requirements of
the Automated Hostel Allocation and Information System are thoroughly discussed.
These requirements encompass both functional and non-functional aspects of the
system.
a. Non-functional requirements:
b. Functional requirements:
19
a) User Registration and Authentication: Users should be able to create
accounts, log in securely, and manage their profiles, including personal
information and notification preferences.
b) Crime Reporting: Users should have the ability to report various types
of crimes, including descriptions, locations, and supporting evidence,
through an intuitive reporting interface.
c) Alert Distribution: The system should automatically send alerts to
relevant personnel (police, fire service, etc.) based on the type and
location of reported crimes, ensuring swift responses and interventions.
d) Mapping and Visualization: Integration with Google Maps API to
visually represent crime locations, provide real-time tracking of
responders, and optimize personnel allocation based on proximity to
reported incidents.
e) User Roles and Access Control: Implement a three-tiered user structure
(ordinary users, personnel, admin) with specific permissions and
responsibilities, ensuring secure and role-based access to system
features and data.
f) Complaint Management: Include a module for users to lodge
complaints, track complaint status, and provide feedback on resolution
processes, enhancing transparency and accountability.
g) Analytics and Reporting: Provide tools for analyzing crime data,
generating reports on crime trends, hotspots, and response times,
aiding in decision-making and resource allocation for law enforcement
agencies.
c. Hardware requirements:
a) Server Infrastructure: Deploy servers capable of handling high traffic
loads, data processing, and storage requirements, ensuring scalability,
reliability, and performance.
b) Networking Equipment: Ensure robust network infrastructure with
high-speed connectivity, redundancy, and failover mechanisms to
support real-time data transmission and communication between
system components.
20
d. Software requirements:
a) Backend Framework: Utilize Node.js and Express for developing the backend
logic, APIs, and business logic, ensuring scalability, modularity, and
performance optimization.
b) Database Management System: Employ MongoDB as the database solution
for storing crime data, user information, and system configurations, providing
flexibility, scalability, and efficient data retrieval.
c) Mapping and Location Services: Integrate Google Maps API and relevant
libraries for mapping crime locations, optimizing route planning for
responders, and enhancing visualizations within the system.
d) Security Tools: Implement security libraries, encryption algorithms, and
authentication mechanisms (such as JWT) to ensure data security, user
authentication, and access control within the system.
This section highlights the important entities of the software which are:
a. Registered Users
a) User Registration and Profile Management: Ordinary users should be
able to register for an account, log in securely, and manage their
21
profiles, including personal information, contact details, and
notification preferences.
b) Crime Reporting: Users should have the ability to report various types
of crimes, including descriptions, locations, and supporting evidence,
through a simple and intuitive reporting interface.
c) View Crime Alerts: Users should be able to view a list of reported
crimes, including details such as crime type, location, date/time, and
status updates on ongoing investigations or resolutions.
d) Receive Alerts: Users should receive real-time alerts and notifications
about crime incidents occurring within their specified locality or areas
of interest, ensuring timely awareness and potential safety measures.
22
a) User Management: Personnel heads and administrators should have
privileges to manage user accounts, roles, permissions, and access control
settings within the system.
b) Resource Allocation: Personnel heads should be able to assign
responsibilities, tasks, and areas of coverage to personnel based on their
expertise, availability, and proximity to reported incidents.
c) Analytics and Reporting: Admins should have access to analytical tools for
generating reports on crime trends, hotspots, response times, and overall
system performance, aiding in decision-making and resource allocation.
d) System Configuration: Admins should be able to configure system
settings, customize workflows, set up automated alerts and notifications,
and manage integrations with external systems or databases.
e) Training and Support: Provide training materials, documentation, and
support resources for personnel heads and admins to effectively utilize and
manage the system, ensuring optimal system performance and user
satisfaction.
The use case diagram for this system describes the various actors or users of
the system and the actions they can perform. Figure 3.1 shows the different roles of
the users and the conditions that must be met for each actor to perform specific
activities successfully.
Table 3.1 of the use case diagram presents the “User Registration” process
which involves the user filling out a registration form, providing their personal
information and creating a login ID and password. The user's information is then
23
stored in the system's database and they are granted access to the Hostel allocation
and information system.
Table 3.2 describes the "Book Hostel" use case, which can be performed by
registered user, in this case, student. The user logs in to the system, selects the "Book
Hostel" option, fills in the required information, and submits the form. The system
runs it algorithm and assigns a room randomly to the user.
Admin
24
Table 3.1: Register User use case
Use case Name User Registration
Actors Admin
Flow of Events The system administrator logs in to the Automatic
Hostel Allocation and Information System.
The administrator selects the "User Registration"
option.
The system prompts the administrator to enter the
user details (e.g., name, email, phone number, etc.).
The administrator submits the user details to the
system.
The system saves the user details.
Entry Condition The system administrator must have the necessary credentials
to log in to the Automatic Hostel Allocation and Information
System.
Exit Condition The user is registered on the database.
Quality The Automatic Hostel Allocation and Information System must
Requirements ensure the security of user information.
25
Table 3.2: Book Hostel use case
Use case Name Book Hostel
Actors Student
Flow of Events The student logs in to the Automatic Hostel Allocation
and Information System.
The student selects the "Book Hostel" option.
The student select level from the level drop down
menu.
The student clicks the submit button
The Hostel Allocation and Information System allots a
room to the student and notifies the student with an
alert “Room Alloted”.
Entry Condition The student must be logged in to the Hostel Allocation and
Information System.
Exit Condition The Automatic Hostel Allocation and Information System
displays a notification to user to confirm that the room and
hostel has been allotted.
Quality a. The Automatic Hostel Allocation and Information System
Requirements must ensure students that already have rooms can’t book
rooms twice.
c. The Automatic Hostel Allocation and Information System
should be reliable and consistent in allotting and randomizing
rooms to users.
Table 3.3 displays the use case for creating porters. The actor of this use case
is the administrator user. The administrator navigates to the "Create Porter" page, fills
26
the form with the necessary or required information and submit to upload the
information to the database.
Table 3.4 shows the use case for adding hostel. The actor of this use case is the
Administrator. The authenticated Admin clicks on “Hostels” in the dashboard, then
choose from the dropdown options of either “Manage Hostels” or “Add Hostel”
options. The admin clicks the “Add Hostel” option to register a hostel which involves
the admin filling out a form, providing details about the hostel to be added in the
required fields of the form. The hostel data is then stored in the system's database and
it is added to the list of registered hostel.
Table 3.5 shows the use case of making complaints. The actor of this use case
is the student. The authenticated student clicks on “Complaints” where the students
fills the fields of the complaints form with the required information. The student
clicks submit, then the form is uploaded to the database and the system notifies the
student that the complaints has been submitted.
27
Table 3.3: Create porter use case
Use case Name Create porter
Actors Admin
Flow of Events The system administrator logs in to the automated
hostel allocation system.
The administrator selects the "Create Porter" option
from the dashboard.
The system displays a registration form with fields
required to create porter.
The administrator adds the necessary information and
click the submit button.
The system displays a prompt that the porter has
been registered.
Entry Condition The system administrator must have the necessary
credentials to log in to the hostel allocation system.
Exit Condition The system notifies the admin that the porter have been
created.
Quality The system should be able to handle a large number of
Requirements porter creation task simultaneously without any delay or
downtime.
28
Table 3.4: Create Hostel use case
Use case Name Create hostel
Actors Admin
Flow of Events The system administrator logs in to the automated
hostel allocation system.
The administrator selects the "Hostel" option from
the dashboard which splits into two “Create Hostel”
and “Manage Hostel” on the dashboard
The administrator selects the “Create Hostel” option.
The system displays a registration form with fields
required to create hostel.
The administrator adds the necessary information and
click the submit button.
The system displays a prompt that the Hostel has
been created.
Entry Condition The system administrator must have the necessary
credentials to log in to the hostel allocation system.
Exit Condition The system displays a notification to the admin that the
hostel have been created.
Quality The system should be able to handle a large number of
Requirements Hostel creation task simultaneously without any delay or
downtime.
29
Table 3.5: Complaints use case
Use case Name Complaints
Actors Student
Flow of Events The Student logs in to the automated hostel
allocation system.
The Student selects the "Complaints" option from the
dashboard.
The system displays a complaint form with fields
required for a complaint.
The student fills the form with the necessary
information and click the submit button.
The system displays a prompt that the complaint has
been submitted.
Entry Condition The Student must have the necessary credentials to log in to
the hostel allocation system.
Exit Condition The system displays a notification alert to the student that
the complaints has been submitted.
Quality The system should be able to handle a large number of
Requirements complaints submission processes simultaneously without any
delay or downtime.
30
For the Automatic Hostel Allocation and Information System, sequence
diagrams were utilized to illustrate the chronological order of actions and interactions
between the system components and users involved in various processes. These
diagrams provide a visual representation of the flow of events within the system.
Some of the processes designed with this diagram include logging in, Booking Hostel,
creating Hostel and making Complaints
a. Login sequence
Figure 3.2 below, describes the login activity. The user requests the login form
from the frontend application. The user then has to put in their details e.g., Email and
Password. Next, the credentials from the login form are stored as variables and the
database is queried using SQL statements on the availability of the credentials on the
database.
31
Figure 3.3 below, describes the Book Hostel sequence. In the sequence, the
authenticated user – student, clicks on the “Book Hostel” option on the dashboard.
The Front-End application then prompts the user for details on current level, which is
then stored in a variable which is processed on the Back-end and considered with
other variable such as gender to allocated a random room suitable for the student. The
database then stores the room and hostel number allocated to the student and in the
case of duplicate booking command, the Back-end checks if the student has been
allotted a hostel before proceeding with the correct action which is either to allocate a
hostel or reject the request of allocation and alert the user that hostel can not be
allotted twice.
33
Figure 3.5: Complaints sequence
Figure 3.6 shows the activity diagram for the system. In this system, users can
log in to their accounts with specific roles. If a user logs in successfully, they can
access their account with their assigned role. If the login is unsuccessful, the user will
be prompted to try again. On successful login the user – student, can book hostel,
apply for hostel, lodge complaints, view room details, print room details and view
activity logs. The user – porter, can register student, manage student details, receive
complaints and view logs. If the user is an admin, they can perform all the activities of
the user – porter, and several other activities such as creating hostel, managing
hostels, creating porter and managing porters.
34
Figure 3.6: Activity Diagram of System Architecture
The class diagram in Figure 3.7 below depicts the relationships between the
system entities, and the attributes of these entities represent the columns of the tables
modeled in the database. The user context is composed of properties that define the
users of the system, such as account holders and administrators, and includes various
methods used for performing different operations and objects associated with this
context.
35
Figure 3.7: System class diagram
Figure 3.8 is a diagram that shows the overall system architecture as well as
how the various building components interact with one another. The user is served
webpages that are hosted on localhost or intranet server. The user can then take
actions on the web app by making function calls. The functions which are written in
PHP in the backend and SQL for the database manipulations.
36
Figure 3.8 Architecture of the System
Figure 3.8 shows the relationship between different components of the software and
how they would be connected.
37
REFERENCES
Oduor, C., Acosta, F., & Makhanu, E. (2014). The adoption of mobile
technology as a tool for situational crime prevention in kenya..
https://doi.org/10.1109/istafrica.2014.6880669
Park, M. and Lee, H. (2020). Smart city crime prevention services: the incheon
free economic zone case. Sustainability, 12(14), 5658.
https://doi.org/10.3390/su12145658
Pelfrey, W., Keener, S., & Perkins, M. (2016). Examining the role of
demographics in campus crime alerts. Race and Justice, 8(3), 244-269.
https://doi.org/10.1177/2153368716675475
Sidhu, B., Barnes, G., & Sherman, L. (2017). Tracking police responses to
“hot” vehicle alerts: automatic number plate recognition and the cambridge
crime harm index. Cambridge Journal of Evidence-Based Policing, 1(4), 211-
224. https://doi.org/10.1007/s41887-017-0016-9
38
Cone, A., Wu, M., & Lee, S. (2019). Detect-and-avoid alerting performance for
high-speed uas and non-cooperative aircraft.. https://doi.org/10.2514/6.2019-
3313
Fan, J., Gu, X., Guise, K., Liu, X., Fossella, J., Wang, H., … & Posner, M.
(2009). Testing the behavioral interaction and integration of attentional
networks. Brain and Cognition, 70(2), 209-220.
https://doi.org/10.1016/j.bandc.2009.02.002
Fan, J., McCandliss, B., Sommer, T., Raz, A., & Posner, M. (2002). Testing the
efficiency and independence of attentional networks. Journal of Cognitive
Neuroscience, 14(3), 340-347. https://doi.org/10.1162/089892902317361886
Lee, T., Chen, J., Cheng, C., & Chang, C. (2021). Does artificial intelligence
make clinical decision better? a review of artificial intelligence and machine
learning in acute kidney injury prediction. Healthcare, 9(12), 1662.
https://doi.org/10.3390/healthcare9121662
Nguyen, A., Soulaphy, C., Marks, M., & Musto, J. (2019). Improving measles
syndromic surveillance via dried blood spot testing in laos 2016-17. Online
Journal of Public Health Informatics, 11(1).
https://doi.org/10.5210/ojphi.v11i1.9838
Park, S., Baek, S., Ahn, S., Lee, K., Hwang, H., Ryu, J., … & Kim, S. (2018).
Impact of electronic acute kidney injury (aki) alerts with automated
nephrologist consultation on detection and severity of aki: a quality
improvement study. American Journal of Kidney Diseases, 71(1), 9-19.
https://doi.org/10.1053/j.ajkd.2017.06.008
Runge-Ranzinger, S., Kroeger, A., Olliaro, P., McCall, P., Tejeda, G., Lloyd,
L., … & Coelho, G. (2016). Dengue contingency planning: from research to
policy and practice. Plos Neglected Tropical Diseases, 10(9), e0004916.
https://doi.org/10.1371/journal.pntd.0004916
Runge-Ranzinger, S., McCall, P., Kroeger, A., & Horstick, O. (2014). Dengue
disease surveillance: an updated systematic literature review. Tropical
Medicine & International Health, 19(9), 1116-1160.
https://doi.org/10.1111/tmi.12333
Waldron, T., Stroiney, S., & Haga, R. (2013). Automated conflict resolution for
airport traffic using graduated intervention..
https://doi.org/10.1109/dasc.2013.6712615
Yin, Z., Xu, J., Wang, K., Hao, X., Tan, X., Li, H., … & Yang, J. (2022).
Predictive risk factors at admission and a “burning point” during
39
hospitalization serve as sequential alerts for critical illness in patients with
covid-19. Frontiers in Medicine, 9. https://doi.org/10.3389/fmed.2022.816314
Harrison, A., Gajic, O., Pickering, B., & Herasevich, V. (2016). Development
and implementation of sepsis alert systems. Clinics in Chest Medicine, 37(2),
219-229. https://doi.org/10.1016/j.ccm.2016.01.004
Phansalkar, S., Edworthy, J., Hellier, E., Seger, D., Schedlbauer, A., Avery, A.,
… & Bates, D. (2010). A review of human factors principles for the design and
implementation of medication safety alerts in clinical information systems.
Journal of the American Medical Informatics Association, 17(5), 493-501.
https://doi.org/10.1136/jamia.2010.005264
Tamblyn, R., Huang, A., Taylor, L., Kawasumi, Y., Bartlett, G., Grad, R., … &
Pinsonneault, A. (2008). A randomized trial of the effectiveness of on-demand
versus computer-triggered drug decision support in primary care. Journal of the
American Medical Informatics Association, 15(4), 430-438.
https://doi.org/10.1197/jamia.m2606
Zheng, W., Dort, B., Marcilly, R., Day, R., Burke, R., Shakib, S., … &
Baysari, M. (2021). A tool for evaluating medication alerting systems:
development and initial assessment. Jmir Medical Informatics, 9(7), e24022.
https://doi.org/10.2196/24022
Abbott, C., Chatwin, K., Foden, P., Hasan, A., Sange, C., Rajbhandari, S., … &
Reeves, N. (2019). Innovative intelligent insole system reduces diabetic foot
40
ulcer recurrence at plantar sites: a prospective, randomised, proof-of-concept
study. The Lancet Digital Health, 1(6), e308-e318.
https://doi.org/10.1016/s2589-7500(19)30128-1
Chang, S. (2021). 5g wireless emergency alerts based on image code and cell
clustering. Ieee Access, 9, 139214-139227.
https://doi.org/10.1109/access.2021.3118686
Olayide, O., Tetteh, I., & Popoola, L. (2015). Trends and policy correlates of
agricultural production and agricultural production sustainability outcomes in
ghana and nigeria. Journal of Sustainable Development, 8(9), 71.
https://doi.org/10.5539/jsd.v8n9p71
Phansalkar, S., Edworthy, J., Hellier, E., Seger, D., Schedlbauer, A., Avery, A.,
… & Bates, D. (2010). A review of human factors principles for the design and
implementation of medication safety alerts in clinical information systems.
Journal of the American Medical Informatics Association, 17(5), 493-501.
https://doi.org/10.1136/jamia.2010.005264
Sijs, H., Aarts, J., Vulto, A., & Berg, M. (2006). Overriding of drug safety
alerts in computerized physician order entry. Journal of the American Medical
Informatics Association, 13(2), 138-147. https://doi.org/10.1197/jamia.m1809
Tuite, A., Watts, A., Kraemer, M., Khan, K., & Bogoch, I. (2019). Potential for
seasonal lassa fever case exportation from nigeria. American Journal of
Tropical Medicine and Hygiene, 100(3), 647-651.
https://doi.org/10.4269/ajtmh.18-0753
Adams-Clark, A., Bhuptani, P., Smith, C., & Freyd, J. (2020). University crime
alerts: do they contribute to institutional betrayal and rape myths?. Dignity a
41
Journal on Sexual Exploitation and Violence, 5(1).
https://doi.org/10.23860/dignity.2020.05.01.06
Akalis, S., Banaji, M., & Kosslyn, S. (2008). Crime alert!. Du Bois Review
Social Science Research on Race, 5(02), 217.
https://doi.org/10.1017/s1742058x08080181
Griffin, T. and Miller, M. (2008). Child abduction, amber alert, and crime
control theater. Criminal Justice Review, 33(2), 159-176.
https://doi.org/10.1177/0734016808316778
Griffin, T., Miller, M., Hoppe, J., Rebideaux, A., & Hammack, R. (2007). A
preliminary examination of amber alert's effects. Criminal Justice Policy
Review, 18(4), 378-394. https://doi.org/10.1177/0887403407302332
Griffin, T., Williams, J., & Kadleck, C. (2021). Amber alert effectiveness
reexamined. Criminal Justice Policy Review, 33(1), 23-44.
https://doi.org/10.1177/08874034211026366
Miller, M., Alvarez, M., & Weaver, J. (2017). Empirical evidence for amber
alert as crime control theater: a comparison of student and community samples.
Psychology Crime and Law, 24(2), 83-104.
https://doi.org/10.1080/1068316x.2017.1390573
Pelfrey, W., Keener, S., & Perkins, M. (2016). Examining the role of
demographics in campus crime alerts. Race and Justice, 8(3), 244-269.
https://doi.org/10.1177/2153368716675475
Adams-Clark, A., Bhuptani, P., Smith, C., & Freyd, J. (2020). University crime
alerts: do they contribute to institutional betrayal and rape myths?. Dignity a
Journal on Sexual Exploitation and Violence, 5(1).
https://doi.org/10.23860/dignity.2020.05.01.06
Akalis, S., Banaji, M., & Kosslyn, S. (2008). Crime alert!. Du Bois Review
Social Science Research on Race, 5(02), 217.
https://doi.org/10.1017/s1742058x08080181
42
Chien, S., Chen, Y., Chien, C., Chin, Y., Yoon, C., Chen, C., … & Li, Y.
(2022). Alerts in clinical decision support systems (cdss): a bibliometric review
and content analysis. Healthcare, 10(4), 601.
https://doi.org/10.3390/healthcare10040601
Griffin, T. and Miller, M. (2008). Child abduction, amber alert, and crime
control theater. Criminal Justice Review, 33(2), 159-176.
https://doi.org/10.1177/0734016808316778
Griffin, T., Miller, M., Hoppe, J., Rebideaux, A., & Hammack, R. (2007). A
preliminary examination of amber alert's effects. Criminal Justice Policy
Review, 18(4), 378-394. https://doi.org/10.1177/0887403407302332
Kopel, D., Sims, V., & Chin, M. (2014). Taking emergency warnings seriously.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting,
58(1), 1129-1133. https://doi.org/10.1177/1541931214581236
Liao, T., Yang, H., Lee, S., Xu, K., & Bennett, S. (2020). Augmented
criminality: how people process in situ augmented reality crime information in
relation to space/place. Mobile Media & Communication, 8(3), 360-378.
https://doi.org/10.1177/2050157919899696
Orang, Z., Moradpour, E., Navin, A., Ahrabim, A., & Mirnia, M. (2012). Using
adaptive neuro-fuzzy inference system in alert management of intrusion
detection systems. International Journal of Computer Network and Information
Security, 4(11), 32-38. https://doi.org/10.5815/ijcnis.2012.11.04
Pelfrey, W., Keener, S., & Perkins, M. (2016). Examining the role of
demographics in campus crime alerts. Race and Justice, 8(3), 244-269.
https://doi.org/10.1177/2153368716675475
Potter, M., Gridley, H., Lichtenstein, N., Hines, K., Nguyen, J., & Walsh, J.
(2020). Low-light environment neural surveillance..
https://doi.org/10.1109/mlsp49062.2020.9231894
43