TOPIC
AN ASSET MANAGEMENT SOFTWARE FOR THE ESTATE
DEPARTMNET
BY
RICHARD NARH
(051500707)
AND
HANNAH ADUSEI
(0515OO669)
JUNE, 2018
PROJECT MARKING SHEET
Title:
Balance of detail 5
Organisation and
Structure of the Logically developed structure 5
report (20%)
Correct citation of sources 5
Total 100
i
DECLARATION
We hereby declare that this project was undertaken by us and that it was the record of our own
investigation and under a supervision of a lecturer. It has neither been in part nor in whole that
has been presented for another Higher National Diploma (HND) elsewhere. References that are
cited are greatly acknowledged.
……………………………… ……………………………………..
…………………………………… . ……………………………………
…………………………………… ..…………………………………….
(SUPERVISOR)
…………………………………… ………………………………………
ii
ACKNOWLEDGEMENT
We humbly thank the Almighty God, our creator, our strong pillar, our source of inspiration,
wisdom, knowledge and understanding. He made us brilliant and has been the source of our
strength throughout this program and on His wings, have we soared high in Excellency in the
institution.
We would like to also express a deep sense of gratitude and thanks to our supervisor, without his
wise counsel and able guidance, it would have been impossible to complete the report in this
manner. We finally, express another gratitude and appreciation to our families and the
departmental members of Computer Science. We our indebted to all whosoever have contributed
in this project work and making us have a friendly stay in Kumasi Technical University. There
are others we might have failed to mention here due to lack of space. To all these people, we owe
you a huge debt of appreciation. God bless us all.
iii
ABSTRACT
There are differences in the ways in which institutions keep records of their ASSET, some opt
for record keeping in files, others in hard covered books and it has got its pros and cons. With
the growth in information handling, technology has proven to be the efficient way of keeping
records for a very long time, without damage or theft. For example, some of these records are
bucked up and kept on the cloud (online servers e.g. google drive). Used assets, unused assets
(damaged assets), asset location etc. are easily accessible and retrieved at ease with the help of
a software. Unlike the previous style where, if a file/book is misplaced then valuable records
are lost, reports on asset are difficult to produce upon request by management. Thanks to
technology that has resolved this difficult method of asset management.
This study analyzed the digital way of asset record handling with optimum efficiency. The
digital way of asset management will make work very easy for the asset department, in
registering asset, report generation, asset allocation, tracking asset etc.
This study analyzed the digital way of asset record handling with optimum efficiency. The
digital way of asset management will make work very easy for the asset department, in
registering asset, report generation, asset allocation, tracking asset etc. Asset records can be
kept for a very long time, improving the value of investment made and optimizing the use of
asset. With the software (AMS), staffs in the institution handles asset records in an efficient
way. With all these integrations/functions in the system, we have been able to meet our goal.
In our further research, we discovered diverse kinds of asset and its related management
methods. For example, Natural Asset Management, Cultural Asset Management, Human
Asset Management. These are some of the respective management methods: Fire Lines,
Cultural Asset Mapping, Human Asset Evaluation etc. We also found out that a structured
asset management system must provide information about both the short-term and long-term
impacts of allocating different amounts of resources among those activities.
iv
This system makes it easier for staff to keep records. Assets can be registered and their
locations tracked using asset code, damaged asset are also recorded and tracked with asset
codes. The weakness of the system that it cannot receive SMS notification of complains.
The system is robust, the main purpose of the Asset Management System is record keeping,
asset allocation, report generation and complain handling.
v
Table of contents
DECLARATION……………………………………………………………………………... ii
ABSTRACT .........................................................................................................................iv-v
vi
2.5 Development Tools ……………………………………………………….......... 30 – 33
CHAPTER FOUR............................................................................................................... 68
CHAPTER FIVE................................................................................................................84
vii
5.5 Conclusion..................................................................................................................... 85
REFERENCE ………………………………………………………………………. 86 – 87
APPENDIX …………………………………………………………………………......... 88
viii
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND
The Estate department is so far one of the largest department in Kumasi Technical
University. Under this department, there are sub departments (sections) which are the
Assets and services management section, Environmental and sanitation management
section and the Maintenance section.
Asset management aids businesses in maximizing the return on every investment. When
you rely on asset management to inform purchase decisions and stay on top of ongoing
maintenance, you will get more life out of your expensive assets. Additionally, by
improving assets utilization across the workforce, workflows become more efficient and
production increases. The elimination or reduction of waste from lost or stolen assets is
also reduced.
Finally, asset management enables the efficient scheduling of shared assets across
departments, reducing the need to purchase duplicate assets unnecessarily.
The assets and services section: this section deals, mainly with the management of assets.
Their main aim is to make sure the assets in their possession are properly cared for. Assets
are economic resources or useful or valuable things. They also submit budget covering
items needed from other departments. Examples of some assets the estate department
oversee are furniture, vehicles, plant and machinery and buildings (facilities) in the
university.
When equipment is delivered, it is received, at the store. Assets and Service Manager will
then be able to run a query that shows equipment have been received. The equipment will
then be located and the property tag number label will be affixed to the equipment.
Assets given out to workers will be handled by Asset Management. Assets Management
provides details such as equipment description, date, etc. Property tag number will be
assigned to equipment and entered into a file manually.
Departments notify Asset Management when they need equipment. The department will
provide documentation on the equipment needed and allocation. Asset Management will
assign a property tag number label and enter into a file manually.
1
The assets and services management are responsible for allocating Bangalore for staffs of
the institution. Before any Bangalore will be allocated to any staff a form has to be filled
and filed out completely, if not it will be returned to be completed before it can be given
out.
Some of the services under this section cover utilities (water, telephone, electricity etc.). It
is also recorded manually and also sometimes into a spreadsheet.
These are possible questions asked:
How are assets information recorded?
How are assets tracked?
How can the system help in assets and services management?
2
suitable estate management system is one of the most significant problems in the industrial
sector. The need for selecting and using a suitable estate management system for a
particular project, together with the increase of different management systems, calls for
more organized methods of selection. To do this, decision criteria and factors related to the
selection of estate management methods and their properties must be carefully identified,
evaluated, and examined.
3
1.7 TOOLS FOR DEVELOPMENT
These are the necessary materials needed to develop this application: MySQL Server, Java
Programming Language, NetBeans IDE, Jasper iReport and Windows Platform.
4
CHAPTER TWO
5
In fact, there are a number of definitions for physical asset management. The view here is
that it should be about creating and sustaining value, during each respective stage, and
through all the life-cycle stages of an asset. Physical asset management involves a wide
range of disciplines and processes covering the life-cycle stages of creating, establishing,
exploiting and divesting a physical asset in a balanced manner to satisfy the continuum of
constraints imposed by business strategy, economy, ergonomics, technical and operational
integrity, and regulatory compliance. Maintenance and terotechnology (is a term that is
sometimes used to account for the life-cycle cost of an asset) are among the core
competencies that form the necessary capabilities for physical asset management.
However, the impact of maintenance and terotechnology are transparent from a cost- rather
than from a value-chain perspective. [3]
6
However, investment in assets (their acquisition, operation, maintenance, renewal and
disposal) should be guided by the likelihood of failure and its consequence to the
institution and regulator. The more we understand about the assets - the demand for the
assets, their condition and remaining useful life, their risk and consequence of failure, their
feasible renewal options (repair, refurbish, replace) and the cost of those options - the
higher the confidence we can have that our investment decisions are indeed the lowest life
cycle cost strategies for sustained performance at a level of risk the institution is willing to
accept.
7
The asset management policy sets the stage for the asset management program for the
entire organization. As such, it should be reviewed and approved at the highest levels of
the organization, and communicated and displayed with all other organizational policies,
such as quality, safety, etc.
8
The overall goal of the SAMP is to provide clear direction, accountability, and responsibility
for all those involved in the asset management program.
9
2.3 METHODS, PROCESSES AND CHALLENGES
Challenges of Computer-Based Asset Management System
Developing a custom application is a large sophisticated project from the idea stage to the
finished product and it takes a whole lot of time, money and requires a team of experts,
when developing a software, one normally has the user or users in mind, but once well
developed, it can be used for several other purpose the developer never thought of. Custom
application requires good planning and structure to prevent great ideas from turning to
helpless catastrophe.
In addition, a structured asset management system must provide information about both the
short-term and long-term impacts of allocating different amounts of resources among those
activities. Additionally, an agency manages many different types of resources, and the
structured asset management system should show the impact of limitations on the different
amounts of the various types of resources. These impacts should be expressed in terms of
performance measures. Programs developed during the planning stage are delivered and
periodically evaluated by the agency. Results from program delivery are monitored using
performance measures to quantify the asset management program’s effectiveness and to
allow timely corrective actions as needed.
10
Figure 1.1
11
consideration of qualitative issues;
links to the budget process;
engineering and economic analysis tools;
useful outputs, effectively presented; and
Continuous feedback procedures.
These asset management elements can be grouped into five major building blocks: basic
information, performance measures, needs analysis, program analysis, and program
delivery. In detail the individual components of each building block, providing a
comprehensive view of an asset management system. Asset management is a goal-driven
management process. To manage assets effectively, the decision-making process must be
aligned with the agency’s goals, objectives, and policies. Goals are expressed in terms of
objectives to be met over the planning horizon. Policies are developed to provide the
necessary framework to support achieving target objectives. Policies regarding engineering
standards, economic development, community interaction, political issues, administration
rules, and the agency’s organizational structure influence asset management components.
Performance Modeling
Performance models are used to predict future scenarios for the asset network. Projecting
the asset network condition over the planning horizon serves to identify future funding
needs. Appropriate selection of performance models is essential to effective asset
management. The selection of performance models is based on the types of assets being
managed and the data available in the agency’s data inventory to support the models.
12
Alternative Analysis Methodologies
Program analysis implies studying different alternatives that may be feasible for
implementation. Analytical tools are developed to assist agencies evaluating the
implications of different investment scenarios and work plan strategies. “What if” analyses
are usually performed to assess the impact of alternative management decisions? This type
of analysis is difficult, if not impossible, without the assistance of analytical tools.
Analytical tools to assist evaluating alternative decisions may involve simulation, life-
cycle costing, benefit/cost analysis, database query, optimization, risk analysis, and other
methodologies. Decision-support tools to assist an agency’s personnel in identifying needs
and comparing investment alternatives are essential in the asset management process.
Performance Monitoring
Monitoring the asset performance over the planning horizon serves to assess whether the
desired level of service is being accomplished or not. Performance monitoring requires
tracking performance over time, which allows the agency to detect changes in the asset
condition and to take necessary corrective actions if needed. The desired level of service
targeted by the agency may also be adjusted based on results from implementation.
Feedback
Feedback is an essential activity to maximize the agency’s benefits from an asset
management system. The asset management system should be capable of incorporating
lessons learned from monitoring the ongoing process. Goals, objectives, and the agency’s
policies may be adjusted based on feedback from implementation. However, great care
should be taken before modifying core components of the system. Frequent modifications
can damage its credibility. Major modifications to the system, including changes in
database requirements, prediction models, economic analysis techniques, and reporting
tools, deserve careful evaluation. Minor changes that simplify the flow of information in
the process are preferred. Particularly preferred are those changes that provide better
means of accomplishing the agency’s objectives without disturbing ongoing activities.
13
2.4 ASSET CATEGORIES
I. Human Asset
The most important asset at your company isn’t something you can put your hands on. It
isn’t equipment or the physical plant, and it isn’t data, technology, or intellectual property.
The most valuable part of your company is the people, the human capital, and any plans to
move your business forward have to start there. Yet today’s business leaders are often
running a full-time sprint just to keep up with the day-to-day demands of business. This
means that human capital, the single most important asset a company needs to take the
next step in growth and innovation is often under used, or under developed. In fact, only 32
percent of global leaders are confident their organization has the necessary leadership
talent and skills to achieve their strategic goals, according to a recent Harvard Business
Publishing Survey of global professionals. [5]
An article written by Martin Allen (a software professional and industry driven in the
British Royal Air Force and the Royal Navy). Allen placed emphasis on the fact that
humans are a very important asset in an industry and must not be looked down upon.
Example he hammered on why humans are a great asset in the software industry, how
human assets are evaluated and enhance to boom production.
Adam Smith
Adam Smith Widely recognized as the “father of modern economics, in his seminal book,
“The Wealth of Nations,” included both tangible assets (machines, buildings, and land) and
humans as essential wealth-generating resources. Our present high technology industries
are eager to invest in and protect their tangible assets (such as computer networks), but the
modern accountancy paradigm forces the view of an employee as merely a cost. Humans
are indeed primary assets.
Adam Smith and I (Martin Allen) share more than nationality, we both believe that
humans are key assets in the pursuit of economically favorable results. For more years than
I care to admit to, I have held a strong conviction that substantial and sustainable advances
in industrial-scale software engineering will not come from new tools or programming
14
languages, they will not emerge from the hyperbole surrounding heavyweight or
lightweight processes; they will not come from accruing quality badges or collecting
metrics, and they will not arrive via a modeling notation (such as the Unified Modeling
Language). The potential for improvement is the most that various software tools,
techniques, and initiatives can ever deliver. Substantive progress has been and will
continue to be a direct consequence of employing software professionals and providing
them with a suitable environment in which to operate. Competent personnel are an
organization’s pivotal assets. Having an appropriately trained software workforce has a
double-edged effect. Educated teams focus on productive work, shared knowledge and
experience, give them the cohesion with which to address the intellectual tasks that
comprise engineering. Equally significant is that teams spend less time evaluating and
correcting substandard software artifacts simply because these are produced in negligible
quantities by competent engineers. While there is a widespread fallacy that technical issues
are the primary source of project woes, people aspects seem to dominate the most
expensive project disasters. Without a doubt, the majority of perceived difficulties are
simply symptomatic of intrinsic people factors (politics is a popular euphemism for these).
To quote from the influential book, “Peopleware”: For the overwhelming majority of the
bankrupt projects we studied, there was not a single technological issue to explain the
failure ... The major problems of our work are not so much technological as sociological in
nature. [6]
15
Rule 3: The number and seniority of software professionals employed within an
organization should be commensurate with the magnitude and criticality of the required
software systems.
Rule 4: Organizations should provide an environment conducive to the intellectual
task.
Rule 5: Management should recognize its primary functions are to attract, motivate,
facilitate, and retain talent. Teams should be given an identity, a vision, and quality
goals.
Rule 6: Teams should be organized with respect to member strengths and
competencies.
Rule 7: Dependable sources of knowledge should be provided in the form of textbooks
and training materials. Readers familiar with my May/June 2009 CrossTalk article will
recognize two of these rules. Attention was also drawn to three essential ingredients of
software development called the 3Ps: people, products, and processes [7].
16
Communication ability.
Attitude/commitment.
Adaptability.
Assertiveness.
Decent soft skills are particularly relevant where team interaction and influence are
important. One may expect the formality of an employee evaluation scheme to vary with
respect to the industry and the criticality of the application. With safety related software
systems in Europe, the range of individual and team competence is unacceptably wide. In
recent years, I have had the pleasure of working alongside competent professionals with
the requisite qualifications, training, and experience. I have also worked in critical
environments where, clearly, the engineers lacked even basic skills. Some years ago, I was
involved in an initiative to introduce a competence assessment scheme into a safety-related
industry sector. A significant number of managers and engineers were unwilling to take
part in the scheme until the objective criteria had been replaced by subjective criteria.
Those same people would probably balk at the idea of being passengers on an airplane
flown by a pilot who was not trained, but who had a pleasant voice over the speaker.
Unfortunate as it seems, adopting formal employee evaluation or competence assessment
schemes is like diet and exercise we need it to stay fit and healthy, but doing the things that
are best for us is not always easy. For safety-related systems, the British Health and Safety
Executive have published guidelines for introducing a competence management system
[8].
Could the certification of software engineering professionals be the answer (or part of the
answer) in establishing competence? As is often the case when challenged to answer a
software engineering question, we rely on respected sources of knowledge such as
CrossTalk. Perhaps, surprisingly, there is a lack of information on professional
certification; the obvious conclusion is that certification is at least an unpopular subject, or
even taboo. Without a doubt, there are leading academics and practicing professionals who
are concerned about the efficacy of certification programs. The core of the IEEE’s
Certified Software Development Associate and Professional efforts [9], the Software
Engineering Body of Knowledge, has been criticized, for example, its ability to encompass
17
all application domains is questionable. However, my own experiences (in various industry
sectors in Europe) show a multitude of people, particularly in technical leadership roles,
which would be fearful of successful certification initiatives that could expose their
shallow grasp of a deep discipline. Perhaps there are less formal and more palatable ways
of assessing an engineer’s competence. For instance, I have assembled a portfolio from the
many projects I have worked on. This collection includes samples of requirements
specifications, architectural designs, test specifications, process definitions, presentations,
lists of technical books read and owned, etc. This gives me the ability to show someone the
level of my experience and ability; yet, having a portfolio is far from common in our
industries and it receives very mixed reactions. As DeMarco and Lister suggest, “It would
be ludicrous to think of hiring a juggler without first seeing him perform” [6].
On the topic of hiring competent staff, professionals must be dismayed at the high
proportion of job advertisements, over a substantial period, focused on low-caliber skills.
For instance, experiences with a specific programming language or a particular
requirements management or design tool are often cited as essential skills. With regard to
requirements, the major skill is always in the specification: Tool proficiency can inject
quality into requirements management, not the specification thereof. A skilled engineer
will be trained to specify atomic, consistent, structured, and testable requirements; Wilson
provides a synopsis on requirements specification in [10].
Similarly, with design tools, and to quote Grady Booch, “CASE [Computer Assisted
Software Engineering] tools have allowed merely bad designers to produce bad designs
more quickly” [11].
18
Characteristics of Software Professionals versus Amateurs
Table 1
We can take one of the divergences between these groups of people and analyze it further.
Consider a sliding scale with art at one end and science at the other. If, by a process of task
analysis, we conclude that the creative nature of software engineering and its resilience to
practical mathematical proof places it nearer art than science, we must pause for thought.
Good literature is founded on the discipline of strict linguistic standards (e.g., punctuation,
spelling, and grammar), whereas music is founded on structures for tone, rhythm, and
notation. History has proven, therefore, that discipline has released creativity, not stifled it:
Discipline is as elemental to an artist, writer, or musician as it is to an engineer. When a
student receives a classical education in software engineering, this indoctrinates a view of,
and an approach to, the discipline that is not just different from common practices,
19
perceptions, and mythology, it is diametrically opposed. The gap between professional and
amateur is not a gap, it is a chasm. Therefore, in comparative arithmetic terms, it is ludicrous
to assume that 10 untrained personnel can perform even the work of a solitary professional.
Perhaps this accounts for the 10 to 1 productivity ratio recorded as long ago as 1975 by
Frederick P. Brooks in “The Mythical Man-Month” [12].
In 1980, I was a new graduate working in the British defense industry. I was approached
by a concerned manager who observed, “You appear to be faltering and are not producing
code as quickly as your peers.” No one amongst this large office of software developers
had ever witnessed a qualified and trained softie ratifying and specifying requirements,
devising software architecture, designing the software, defining test cases and recording
test results, as well as generating robust code. Wind the clock forward almost three decades
and, in a high-dependability environment, our team was tasked to review multiple software
requirements specifications produced by untrained personnel. Even with the availability of
practical guidelines, the authors had produced worthless specifications. Combined with the
worst that a bottom-up, functional software architecture has to offer, the project was in an
undesirable state. The real problem in such a scenario is that, again, a group of untrained
people cannot match the actual productivity of one professional. Equally, the majority will
dominate proceedings and a solitary professional will toil to correct the substantial but
substandard output of 10 untrained employees. Lean Engineering is a populist topic,
although it is well-documented that production oriented techniques do not transfer readily
into a (software)
development environment, also known as the make a cheeseburger, sell a cheeseburger
mentality discussed in [6].
However, one of the principles of Lean is the reduction of waste in a production line. In
terms of waste, having non-professional software personnel producing substandard
artifacts is analogous to having an untrained team preparing and then selling raw, frozen
burgers on a bun, with or without the cheese. In order to rectify this and similar waste
issues, an organization may choose to assess the capabilities and training needs of project
personnel, or choose to assess the competence of the management team that appointed and
20
tasked untrained personnel in the first instance. If the economic aspects of the software
engineering life cycle were ever to be modeled, the most significant variables in the
equation would reflect the human knowledge and experience. Then again, the life cycle has
been modeled and the people capability attributes are the most significant. Barry Boehm
identified this truism as early as the 1980s, and it is captured in COCOMO [13].
In addition, there are already significant clues here as to how to assess the value or
competence of software engineering personnel. However, if your organization is still
searching for a magical productivity enhancer, then look to laetrile1 for the futility of
searching for wonder cures, or “easy technological non-solutions” as described fully in
chapter 6 of [6] and again in Brooks’ “No Silver Bullet” chapter in [8].
21
opinions. As initial reluctance gives way to synergy, people will get into strong teams.
Having assembled a strong team of competent professionals, how should it be organized?
Brooks gives sound advice in his “The Surgical Team” [8] chapter. A surgeon and his
surgical assistant perform an operation, while supported by nurses, an anesthesiologist, and
administrative staff. This arrangement compares favorably with the roles of software
architect, software manager, programmers, testers, and an administrator2. Consider the
difference in the structure and formalism within different groups of musicians. A random
collection of musicians can meet for a jam session; without proper direction or sheet music,
the small group can still produce some decent, improvised sounds. Similarly, a small band
of jazz musicians can, given reasonable levels of competence and practice, entertain an
appreciative audience. However, to reach the excellence of a large professional orchestra is
a monumental challenge in systematic coordination, the conductor on the rostrum and the
sheet music are not just for show. For technical teams developing software intensive
systems of systems, the analogy is clear: Systematic and formal coordination is essential.
22
Conclusion
The legacies of Adam Smith and Robert Owen are an important reminder to us that people
are at the heart of commercial and social success. In our rapidly changing technological
world, it is worth considering their centuries-old wisdom. Perhaps there is an opportunity
for our organizations to look again at the value, rather than the cost, of their people assets.
When people are viewed truly as vital assets, then investment in them is sure to deliver a
mutually beneficial corporate future. This will, in turn, lead to greater customer
satisfaction.
23
Fire Management
The role of fire in the world’s vegetation is mixed. In some ecosystems natural fires are
essential to maintain ecosystem dynamics, biodiversity and productivity. Fire is also an
important and widely used tool to meet land management goals. However, every year,
wildfires burn millions of hectares of forest woodlands and other vegetation, causing the
loss of many human and animal lives and an immense economic damage, both in terms of
resources destroyed and the costs of suppression. There are also impacts on society and the
environment, for example, damage to human health from smoke, loss of biological
diversity, release of greenhouse gases, damage to recreational values and infrastructure.
Again, most fires are caused by people. The list of human motivations include land
clearing and other agricultural activities, maintenance of grasslands for livestock
management, extraction of non-wood forest products, industrial development, resettlement,
hunting, negligence and arson.
24
allocate resources in order to save lives, homes, personal property, and valuable natural
resources.
Fire Lines
Next, wildland firefighters usually focus on establishing a fire line. A fire line is a break in
fuels created by removing all vegetation up to an existing barrier. The barrier can be:
Bare mineral soil
A natural feature (such as a rock outcrop, creek, or other body of water)
A constructed surface (such as a road or driveway)
Fire lines are started at an anchor point, usually the coldest part of the fire. The anchor
point ensures a safe barrier between the fire and any unburned vegetation that could ignite
and trap firefighters. The width of a fire line depends on topography, types of fuels, and
weather, all factors that determine fire behavior.
Also, Fire lines often are constructed using hoe dads, shovels, or bulldozers. A prescribed
burn is another method, also called a burn out. Aerial support is another tactic. Helicopters
and air tanks dump fire retardants on the landscape to establish fire lines and protect
structures, not to extinguish flames.
After a fire line has been established, firefighters must ensure that it will keep the fire from
spreading. When it’s windy, wildfires can jump fire lines, requiring firefighters to move to
another location and start building a fire line all over again.
MOPPING UP
Once a fire is securely contained within a fire line, firefighters look for hot spots near the
fire line where vegetation is still burning and extinguish them using water from fire
engines and helicopters. This keeps wind from reigniting and spreading the fire. Ground
crews then move through the burned area with water and hoe dads, turning over every
stump and log to make sure it is cold.
A wildland fire is not considered out until a thorough mop-up has been done and no smoke
has been seen for several days to weeks. Many large wildland fires, especially in
wilderness areas, are not completely extinguished until rain or snow begins to fall. [15]
25
Land Management (Sustainable Land Management)
Sustainable Land Management is a knowledge-based procedure that aims at integrating the
management of land, water, biodiversity, and other environmental resources to meet
human needs while sustaining ecosystem services and livelihoods. The term sustainable
land management is used, for example, in regional planning and soil or environmental
protection but also in property and estate management. The World Bank defines
Sustainable Land Management as a process in a charged environment between
environmental protection and the guarantee claim of ecosystem services on the one hand.
On the other hand, it is about productivity of agriculture and forestry with respect to
demographic growth and increasing pressure in land use. "SLM is defined as a knowledge-
based procedure that helps integrate land, water, biodiversity, and environmental
management (including input and output externalities) to meet rising food and fiber
demands while sustaining ecosystem services and livelihoods.
Now let look at some management practices;
Improper land management can lead to land degradation and a significant reduction in the
productive and service (biodiversity niches, hydrology, carbon sequestration) functions of
watersheds and landscapes." The United Nations Economic Commission for Europe
(UNECE) applies the term in a much wider context. Besides agriculture and forestry, they
include the mineral extraction sector, property and estate management. "Land management
is the process by which the resources of land are put to good effect. It covers all activities
concerned with the management of land as a resource both from an environmental and
from an economic perspective. It can include farming, mineral extraction, property and
estate management, and the physical planning of towns and the countryside." In the course
of national politics and programs only few European states use the terminology
"sustainable land management." Here Australia and New Zealand are to be mentioned as
both countries have agreed on sustainable land management with respect to climate change
as part of their government programs.
In the European context the definition of the European Network for Land Use Management
for Sustainable European Cities (LUMASEC) may be used as a reference.
It emphasizes the inter- and trans disciplinary cooperation on sustainable land
management: "As management is the human activity meaning the action of people working
26
together in the aim to accomplish desired goals, land use management is a process of
managing use and development of land, in which spatial, sector-oriented and temporary
aspects of urban policy are coordinated.
Resources of land are used for different purposes, which may produce conflicts and
competitions, and land use management has to see those purposes in an integrated way.
Therefore, land management covers the debate about norms and visions driving the policy-
making, sector-based planning both in the strategic and more operative time spans, spatial
integration of sectorial issues, decision-making, budgeting, implementation of plans and
decisions and the monitoring of results and evaluation of impacts."
In recent years, urban planning, arts and culture, economic development, and city
administration have found common ground in a raised awareness of the importance of
culture to a community's livability and prosperity. In fact, cultural vitality is increasingly
referred to as one of the four pillars of sustainability, along with social equity, economic
health, and environmental responsibility.
Numerous cities across North America have begun to leverage cultural assets for attracting
business, investment, and people. Smaller municipalities often have serious challenges in
competing with their larger urban cousins to achieve these kinds of successes. Cultural
asset mapping (CAM) is used to understand and interpret the complex interrelationships of
cultural elements for use in strategic planning and economic development and is scalable
for use in smaller municipalities.
27
Cultural asset mapping has been defined as: "a process of collecting, recording, analyzing,
and synthesizing information in order to describe the cultural resources, networks, links,
and patterns of usage of a given community or group."
However, maps are most often understood as the indispensable tools that help us navigate
our physical world. Cultural asset maps, by representing the spatial relationships between
such things as artists, markets, fairgrounds, heritage sites, and buildings, help tell us about
who we are, based on our unique identity, history, and cherished stories, in other words,
our culture.
In addition, there are two categories for these maps: (1) resource maps, identifying and
recording tangible cultural resources, such as buildings or locations; and, (2) community
identity maps, identifying intangible cultural resources, such as the stories and traditions
that define community identity.
Also cultural resource information that is spatially-based, allows it to be integrated
into municipal projects and land use planning in a number of ways:
Awareness and marketing - promoting culture with residents and tourists.
Economic development - targeting or facilitating entrepreneurial investment in creative
cultural industries.
Planning and policy - informing municipal decision-making relating to land use, social
planning, heritage planning, urban design, and place making.
Networks and collaboration, facilitating partnerships with cultural groups and
identifying opportunities to maximize assets [18]
28
In addition, Massachusetts Cultural Council has produced a cultural assets inventory check
list, which identifies cultural assets as including: theaters, museums, movie houses, cultural
centers, art galleries, performance spaces, festivals, farmers’ markets, open studios,
galleries, concerts, walking tours, historic districts, and buildings on the National Historic
Register, artist studios, rehearsal spaces, recording studios, film studios, and creative
economy businesses.
29
2.5 DEVELOPMENT TOOLS
A. MYSQL
MySQL is an open source relational database management system (RDBMS) based on
Structured Query Language (SQL). MySQL runs on virtually all platforms,
including Linux, UNIX, and Windows. Although it can be used in a wide range of
applications, MySQL is most often associated with web-based applications and online
publishing and is an important component of an open source enterprise stack
called LAMP. LAMP is a Web development platform that uses Linux as the operating
system, Apache as the Web server, MySQL as the relational database management system
and PHP as the object-oriented scripting language.
MySQL is selected in building this application because of the following reasons:
Firstly, MySQL is undeniably fast. It is a true multi-threaded database server that excels at
retrieving information. MySQL was originally designed for the purpose of querying
information at an amazingly fast pace. Again in the interest of speed, MySQL designers
made the decision to offer fewer features than other major database competitors, such as
Sybase and Oracle. However, despite having fewer features than the other commercial
database products, MySQL still offers all of the features required by most database
developers.
Secondly, MySQL includes solid data security layers that protect sensitive data from
intruders. Rights can be set to allow some or all privileges to individuals. Passwords are
encrypted.
In addition, it supports several development interfaces: Development interfaces include
JDBC, ODBC, and scripting (PHP and Perl), letting you create database solutions that run
across all major platforms, including Linux, UNIX, and Windows. Aside all this MySQL
can handle almost any amount of data, up to as much as 50 million rows or more. The
default file size limit is about 4 GB. However, you can increase this number to a theoretical
limit of 8 TB of data.
To every merit there is a corresponding demerit. MySQL in as much as it is fast it is very
limited in its usability for real-time applications, and it offers no OLAP (Online Analytical
Processing) functions. This is special methods for the management and analysis of
multidimensional data. OLAP-capable database systems are often called data warehouses.
30
Another related issue is that According to Digital Ocean, MySQL tends to be somewhat
less reliable than its peers. These stability issues are related to the manner in which it
handles certain functions (such as references, transactions, and auditing). While the
database is certainly still usable in light of these problems, they do tend to make MySQL a
poor choice for certain use cases [20]. This is why MySQL is the better choice in this
project.
B .JAVA
Java is a computer programming language originally developed by James Gosling at Sun
Microsystems (which has since been acquired by Oracle Corporation) and released in 1995
as a core component of Sun Microsystems' Java platform. The language derives much of
its syntax from C and C++, but it has fewer low-level facilities than either of them.
Java has significant advantages over other languages and environments that make it
suitable for just about any programming task. Some of the reasons JAVA is the best choice
for this project is because Java is easy to learn, Java was designed to be easy to use and is
therefore easy to write, compile, debug, distributed and multithreading than other
programming languages. Again Java is object-oriented; this allows you to create modular
programs and reusable codes. In addition, Java is platform-independent; one of the most
significant advantages of Java is its ability to move easily from one computer system to
another. The ability to run the same program on many different systems is crucial to World
Wide Web software, and Java succeeds at this by being platform-independent at both the
source and binary levels. Because of Java's robustness, ease of use, cross-platform
capabilities and security features, this makes JAVA the best and suitable language for this
project.
Inasmuch as JAVA has a profound merit over other languages, let consider a few demerits
of this language.
To start, Java Takes More Memory Space, this is one of the big problems in the Java
language and developers of the language haven’t been able to overcome this problem. Java
takes more memory space than the other native programming languages like C and C++.
Also java is relatively slower than its native languages like C and C++, it also consumes lot
of memory. Above all JAVA is the best language and suitable for this project.
31
C. NETBEANS
NetBeans is an integrated development environment (IDE) for Java. NetBeans allows
applications to be developed from a set of modular software components called modules.
NetBeans runs on Microsoft Windows, macOS, Linux and Solaris platforms. Also the IDE
is free or its open source.
Let consider some fantastic reasons why NetBeans is the best IDE (Integrated
Development Environment) for this project.
To start NetBeans provides a Powerful GUI Builder. The GUI (Graphical User
Interface) Builder (formerly known as Project Matisse) supports a sophisticated yet
simplified Swing Application Framework and Beans Binding. Now you can build GUIs in
a natural way. Again, Profiling and Debugging Tools
With NetBeans IDE profiler, you get real time insight into memory usage and potential
performance bottlenecks. Furthermore, you can instrument specific parts of code to avoid
performance degradation during profiling. The “HeapWalker” tool helps you evaluate Java
heap contents and find memory leaks. Also, Through the NetBeans IDE build process,
which relies on industry standards such as Apache Ant, make, Maven, and rake, rather than
a proprietary build process, you can easily customize projects and add functionality. You
can build, run, and deploy projects to servers outside of the IDE. [21].
Like earlier said, there are some demerits associated with this tool and let take a look at a
few:
The NetBeans IDE is a bit slow to load as compared to other IDE’s and again, it consumes
lot of memory space than lighter IDE’s. Finally, some advance tools require training.
Above all NetBeans IDE is the suitable tool to use for this project.
D.JASPER iREPORT
Jasper iReports is an open source java reporting engine. Jasper iReports is a Java class
library, and it is meant for those Java developers who need to add reporting capabilities to
their applications. iReport can help to generate database reports.
Let consider some fundamental reasons why Jasper iReport is suitable for this project
32
Jasper iReport comes bundled with JDBC drivers for several open source relational
database system, such us MySQL, PostgreSQL, HSQLDB and others. If we want to
connect to a different database, we need to add the JDBC driver to iReport’s CLASSPATH
and boom! we have connected to iReport. Also iReport has a plugin in NetBeans and this
makes the iReport and the IDE a compatible tool to use alongside the JAVA language. To
add but a little, Jasper iReport Designer is also open source software.
There are some few drawbacks with the usage of this application, Jasper does not allow
you to create two sources inside one report. You need to create sub report to do so. Again,
it does not support joining data sources and also it’s a little bit complex. In the afore
mentioned points Jasper iReport is very suitable to build reporting in this management
system.
To conclude these are the tools we will use for the development of the project. Almost all
the tools are easy to get as they are open source and provide favorable environment to
work with, they all support the windows platform since that will be our main working area.
We chose to work on windows because of its user friendly environment and it is easy to
use though it’s not an open source OS.
33
CHAPTER THREE
3.1 INTRODUCTION
A conceptual schematic overview as an overall vision for addressing the research
Problem is presented in this chapter. This overall vision was used as a preliminary
framework upon which the requirement analysis and design approaches were crafted.
The system requirement analysis phase involves the investigation of the structure of
current system, with the objective of identifying the problem and difficulties with the
existing system. The purpose of the existing requirement analysis phase is to obtain a
thorough and detailed understanding of the need as defined in the project. The major step
involved in the phase includes defining the user requirement and studying the current
system to verify the problems. The performance expected by the new system is also
defined in this phase in order to meet the user requirements. The information gathered
from various documents were analyzed and evaluated and the finding reviewed in order to
establish specific system objectives.
There are two major activities in this phase: problem understanding or analysis and the
requirements of the new system that is to be developed.
In problem analysis, our aim is to understand the problem and its context, and the
requirement of the new system that is to be developed. The requirements specification
document specifies all functional and performance requirements, the format of inputs and
outputs, and all design constraints that exist due to security reasons.
34
DOMAIN:
For each attribute associated with an entity set, we must identify a domain of possible
values, for example the domain associated with the attribute name of the staff might be of
the set of 20-character string.
KEY:
Further, for each entity set we choose a key. A key is a minimal set of attribute whose
values uniquely identify an entity in a set. Since there is more than one user we designate
one of them as primary key. For now, we will assume that each entity set contains at least
one set of attributes that uniquely identify an entity in the entity set, that is the set of
attributes that contains a key.
35
Requirement gathering and analysis
System design
Implementation
Testing
Deploying of system
Maintenance
36
3.6 SYSTEM ARCHITECTURE
A Use Case diagram shows a representation of the user’s interaction with the system and
depicting the specification of a use case. A use case diagram can portray the different types
of a system and the various way that the user interacts with the system. This type of
diagram is typically used in conjunction with the textual use case and will often be
accompanied by other types of diagrams as well.
37
3.7 THE BACK END OF THE SYSTEM
The backend consists of the database, which contains the entities and attributes, the entity
relation diagram and dataflow diagram.
Database: Database is a collection of information that is organized so that it can be easily
accessed, managed and updated. In a database data is organized into rows, columns and
tables and it is indexed to make it easier to find relevant information. The database name
used for the system is ”estatemgt_db”.
Dataflow
Data flow gives a pictorial view of how data flow into, around and out of the system. The
user will request the login for accessibility, the user could either be rejected or have full
access into the next phase (Main Manu), the system will check the user’s details from the
data store called “credentials” and then the details will be sent back.
Let consider the various tables with their attributes and values.
38
Accommodation Handling
Table 1 Accommodation
Table 2 Account
39
Complain Handling
40
Damaged Assets Handling
Table 6 Flat_details
41
Generators and Polytanks Handling
Table 7 gen_polytanks
Inspection Handling
42
Laundry Services Handling
Table 9 Laundry_services
Report Handling
43
Vendors Handling
Table 11 Vendors
IP Setup Handling
Table 12 ipsetup
44
Asset Register Handling
45
Building Location Handler
46
The Asset Management System ER Diagram
47
These are the meaning of the various symbols used in the ER diagram
48
Continuation of the previous diagram
49
Continuation of the previous diagram
These are the meaning of the various symbols used in the Data Flow diagram:
50
3.8 DESIGN METHODOLOGY
LOGIN
The login is very essential to help users interact with the system. This will be the first point
of access to the system. It has a login and a configure IP button. First the admin configures
the IP to the server if the system will work on a Local Area Network (LAN). After this is
successful, other users also configures their system to synchronize with the admins system
using admins IP. Now admin and other users can log into the system by entering their
username and password in a text field and click on login button to gain access into the
system. User is denied access if username and password is wrong. There is a forgot
password option where any user can click and reset the account.
CREATE ACCOUNT
A default account is being created in the system for the user to login. It is required that a
user creates a new account before using the system else the user cannot access other
components in the system. After account is being created successfully, re-login by clicking
the logout button and enter your new username and password.
THE ASSET
This is the main part of the Asset Management System which has two menus (QUICK
ACCESS and ASSET MENU) which also contains other sub-menu (drop-down menu) of
other components.
Let’s take a look at the two menus.
To start, the first menu QUICK ACCESS contains some quick components the user will
want to visit even when browsing other forms or pages such as Asset registration, Report,
complain etc.
Again, the next menu is ASSET MENU which contains the main component of the system.
The sub menu under this menu contains vendors (vendor list, cubicle allocation), cleaning
and services (generators and polytanks, laundry services, inspections), accommodation.
The user selects any of these components and performs the necessary operations.
51
ACCOUNT MANAGEMENT
The account management is where the user can update his or her account records.
COMPLAIN
This is where departmental complains are recorded and reviewed when necessary.
REPORT
This is where the report about the various assets are generated and printed via a printer.
ASSET REGISTRATION
Asset registration is where the user can register assets. It is one of the most important
aspect of the system.
52
The following are the use case diagrams of the various functions of the system.
The Login
Create Account
53
Account Management
Complain
54
Report
Asset Registration
55
The following are the flowchart diagrams of the various functions of the systems.
Login
56
Create Account
57
The Asset
58
Continuation of the Asset
59
Continuation of the Asset
Asset Registration
60
Continuation of the Asset
61
Account Management
Complain
62
Report
63
These are the various interfaces of the system.
Login
Create Account
64
The Asset
Account management
65
Complain
Report
66
Asset Registration
Flat Details
67
CHARTER FOUR
The first named folder contains the connection.java class for handling the connection string
for all other classes that communicate with the database.
The second named folder contains Gen_and_Polytanks.java, Inspection.java, Laundry.java.
This class file handles updates, searches, deletes, clear and save operations on data.
68
Again, the fourth folder contains Complain.java, Main_Menu.java, Reports.java,
View_complain.java, login.java, main_ams.java. The complaint handles records on
complain collected from sectors of the university and save into the database, to review and
delete complaint, it is handled by View_complain.java class. The Main_Menu is the first
point of contact after login, it takes care of how the user navigate to other main interfaces
of the system e.g. Reports, Asset etc. The report handles report generation and printing via
a printer. The user is able to print a periodic report upon demand by management. The
reports generated by the system includes accommodation report, vendors report, flat detail
report etc. here the user is required to keep a generated report in a folder and its name is
saved in a database for future review. The login is where the user is required to enter
his/her username and password to gain access into the system, user is denied access if
username and password is incorrect. NOTE: the default username and password is
default and the admin is required to delete this account after creating his. For the
purpose of testing we used “scanc” and “cypher” as our created account username and
password respectively. The main_ams is the actual working area of the system where
almost all activities of this application takes place.
The fifth named folder contains icons and other images used on buttons, labels and panels
in the application.
69
2. Test Packages
By default, this package is created by NetBeans (the IDE) and it contains nothing.
3. Libraries
This is also a default library created by the platform which handles the necessary libraries
(Libraries are simply a bundle of java classes that are imported in a java class or project
during development) the application requires to run efficiently. Some of these libraries are
mysql-connector-java-5.1.20-bin.jar, rs2xml.jar, jcalendar-1.4.jar etc.
70
JLabel: this control was also used often in the system to display simple text to guide
user in form filling. It was also used to handle icons on the login form.
This is the next interface after login successful. It is the main navigation menu of the
application
71
Figure 4.1 A working interface of the Main Menu
This interface helps the user to create account and login. NOTE: an image size of not more
than 600KB should be used when creating account.
This interface is for account management, account can be updated, deleted and password
window is triggered here.
72
This is where all complains are recorded
73
The user view complains here and can trigger delete event.
This is the main working area of the system which contains almost all necessary
component to work on. It has only two menus (QUICK ACCESS and ASSET MENU).
74
This interface contains information on flat details
A simple calculator the user uses to handle basic calculation when dealing with flat details
75
Figure 4.9 A working interface of calculator
76
With the help of this interface a report is generated and printed via a printer. Report is
also saved or is removed
77
This is where vendors’ information’s are taken
78
Generator and polytanks are serviced periodically. Its records are taken here.
79
Reports from inspection collected are recorded here.
80
This is where assets are first registered into the system
The prompt that appear when a user login with the default account and tries to access other
interfaces except create account.
81
Figure 4.19 A prompt on Main Manu using default account
82
Password Validation when a user’s password mismatch
83
Validating text field to accept only digit when creating account
84
CHAPTER FIVE
5.0 INTRODUCTION
A summary of the overall project will be made and a discussion stating whether the objectives
stated in chapter one are being met and how they were achieved during the project. A future
prospect of the implemented project shall be included in this chapter.
85
5.4 Limitations of the system
The limitation of the assets management system is that the system cannot receive SMS
notification of complains.
5.5 Conclusion
The assets management system has been completed successfully and tested with integration of
the features of every software component for its development. It would help reduce the
manual way of keeping records in the estate department.
86
REFERECNES
[1]. http://simple.werf.org/Books/Contents/Getting-Started-(2)/What-is-Asset-Management-
[2]. http://1000projects.org/asset-management-system-project.html
[3].https://docslide.net/documents/ieee-2004-ieee-international-engineering-management-
conference-singapore-58acbd39c3b2b.html ( E. Amadi-Echendu Department of Engineering
and Technology Management, University of Pretoria, South Africa )
[4]. https://hpreliability.com/the-key-3-asset-management-documents/
[5]. https://qz.com/403391/why-human-capital-is-your-companys-greatest-asset/ {QARTZ
Harvard Business School Executive Education, Sunday, February 17, 2018}
[6]. DeMarco, Tom, and Timothy Lister. Peopleware: Productive Projects and Teams. New
York: Dorset House, 1999.
[7]. Allen, Martin. “From Substandard to Successful Software.” CrossTalk May/June 2009
<www.stsc.hill.af.mil/ crosstalk/2009/05/0905Allen.pdf>.
[8]. Health and Safety Executive, The Institution of Electrical Engineers, and The British
Computer Society. Managing Competence for Safety-Related Systems. 2007
<www.hse.gov.uk/human factors/topics/mancomppt1.pdf>.
[9]. IEEE Computer Society. “Certification and Training for Software Professionals.” 2009
<www.computer. org/portal/web/certification>.
[10]. Wilson, William M. “Writing Effective Natural Language Requirements Specifications.”
CrossTalk Feb. 1999 <www.stsc.hill.af.mil/crosstalk/1999/02/wilson.pdf>.
[11]. Booch, Grady. Object-Oriented Analysis and Design with Applications. Menlo Park, CA:
Addison Wesley, 1994.
[12]. Brooks, Frederick P. The Mythical ManMonth: Essays on Software Engineering. 20th
Anniversary Edition. Reading, MA: Addison-Wesley, 1995.
[13]. Boehm, Barry W. Software Engineering Economics. Upper Saddle River, NJ: Prentice
Hall PTR, 1981.
[14]. http://institute.smartprosperity.ca/sites/default/files/finaldesignedsept18mnai.pdf
{DEFINING AND SCOPING MUNICIPAL NATURAL ASSETS SEPTEMBER 2017; Tuesday,
February 26, 2018}
87
[15]. http://idahofirewise.org/fire-ecology-and-management/fire-management-strategies-and-
tactics/ {Firewise Culture Fire Ecology & Management, 27th February, 2018 }
88
APPENDIX
This involves how to setup the application for first use.
The application folder contains “Wamp server”, this must be installed. It will serve as the
backend database handler for the software
Install java which will also be in the application folder, Java provides a runtime
environment (JVM) for the software.
The application setup can now be run and installed by double clicking on the setup (AMS)
and follow the installation guide to install.
A database file is included also in the application folder with the name “estatemgt_db”,
This should also be imported as possible into the Wamp server.
89