Online Tailoring Management System PDF
Online Tailoring Management System PDF
Online Tailoring Management System PDF
By:
A project submitted to the department of Information Technology in the school of pure and
applied sciences in partial fulfillment of the requirements for the award of the degree of
bachelor of Business Information Technology.
OCT 2013
DECLARATION
I David Mutembei hereby declare that this Project Report pertaining Online Tailoring
Management System is my original work and has never been presented for a degree in any other
university. Therefore, no alteration/duplication of this work whatsoever without my permission.
Approval:
This project has been submitted for examination with my approval as the supervisor.
i
DEDICATION
I dedicate this proposal to my family for giving me the chance to be in university by pay my
school fees and believing in me.
To my friends for giving me the support I needed during the proposal writing and also for
helping me and anyone who is willing to adapt new changes and embrace technology.
May God bless you all.
ii
ABSTRACT
The project is aimed to automate the tailoring sector which is manually maintained. After the
automation this will mean better services and good keeping of records, data integrity, data
security, quick search and also paperless environment. The project has mainly tackled
management of information for the customers and in decision making.
Every user of the system will have to log into the system using username and password so that
security and authentication will be ensured. Once logged in, a customer can make and order,
check dress status or even give feedback. The system administrator is able to manage customer
information and also update records.
This will help in realizing the vision 2030 where the government wants its people to be digitally
informed and also automate all the government sectors and ministries, hence embracing
Electronic Governing.
iii
ACKNOWLEDGEMENT
I acknowledge the support of my family and my friends who have stood by me throughout my
studies and particularly for their unending support.
I pay gratitude to my supervisor Mr. Peter Matheka for guidance, support, patience and
understanding throughout the research period.
My sincere gratitude also goes to the entire Mt Kenya University fraternity for giving me an
opportunity to pursue my career there. Also to the lecturers, management and staff of Mount
Kenya University (Nairobi Campus) for their inputs especially in units that were essential in my
proposal writing and development of this project for their support, patient and believing in me.
iv
Contents
DECLARATION ............................................................................................................................. i
DEDICATION ................................................................................................................................ ii
ABSTRACT ................................................................................................................................... iii
ACKNOWLEDGEMENT ............................................................................................................. iv
CHAPTER ONE: INTRODUCTION ............................................................................................. 1
1.1 Background information ........................................................................................................... 1
1.2 Problem Statement .................................................................................................................... 1
1.3 Proposed Solution ..................................................................................................................... 2
1.4 Proposed Project Title ............................................................................................................... 2
1.5 Project Objectives ..................................................................................................................... 2
1.6 Justification ............................................................................................................................... 3
1.6 Scope .................................................................................................................................... 3
1.7 Risks and mitigations ....................................................................................................... 4
1.7.1 Risks....................................................................................................................................... 4
1.7.2 Mitigations ............................................................................................................................. 4
1.8 Monitoring and evaluation ........................................................................................................ 5
CHAPTER TWO: LITERATURE REVIEW ............................................................................. 6
2.1 Origins of the Term Bespoke tailoring ..................................................................................... 6
2.2 Developments in Tailoring Industry .................................................................................... 7
2.3 Becoming a Twenty-First Century Tailor Shop................................................................... 7
2.4 Moving online ...................................................................................................................... 8
2.4.1 Distance Tailoring ............................................................................................................ 8
2.4.2 Integrated Backend Solutions........................................................................................... 8
2.4.3 Social Media Marketing. .................................................................................................. 8
CHAPTER THREE: METHODOLOGY.................................................................................. 9
3.0 INTRODUCTION: ........................................................................................................... 9
3.1 FACT FINDING TECHNIQUES ......................................................................................... 9
3.1.1 Observation .................................................................................................................... 9
3.1.2 Interviews ............................................................................................................................... 9
3.1.3 Secondary Data Collection .......................................................................................... 10
3.2 SYSTEM DEVELOPMENT METHODOLOGY (SDLC) ............................................ 10
3.2.1 Waterfall Model ................................................................................................................... 10
3.2.1.1 Feasibility study ................................................................................................................ 11
v
3.2.1.3 Design. .............................................................................................................................. 12
3.2.1.5 Testing............................................................................................................................... 12
3.2.1.7 Maintenance. ..................................................................................................................... 12
3.2.1.8 Benefits of waterfall model ............................................................................................... 13
3.2.1.9 Criticisms of waterfall model............................................................................................ 13
3.3 CONCLUSION ....................................................................................................................... 14
3.4 SYSTEM ANALYSIS ........................................................................................................ 15
3.4.1 Existing System ............................................................................................................... 15
3.4.2 Problems of Existing System ........................................................................................... 15
3.4.3 Requirements Analysis .................................................................................................... 15
3.4.3.1 User Requirements ........................................................................................................ 15
3.4.3.2 Functional Requirements .............................................................................................. 16
3.4.3.3 Non-functional Requirements (NFR) ........................................................................... 16
3.4.3.4 System Requirements.............................................................................................. 17
3.4.3.4.1 Hardware requirements ........................................................................................... 17
3.4.3.4.2 Software Component System Requirement: .............................................................. 17
3.4.4: Use Case Diagram ...................................................................................................... 18
3.5: Data Flow Diagram ............................................................................................................ 19
3.6: SYSTEM DESIGN ............................................................................................................... 21
3.6.0: Introduction .................................................................................................................... 21
3.6.1 Data Modeling ............................................................................................................ 21
3.6.1.1 Conceptual design ............................................................................................................. 21
3.6.1.2 Data dictionary ........................................................................................................... 22
Table 3.1: Description of user login ............................................................................................. 22
Table 3.3: Description of top dresses measurements .................................................................... 23
Table 3.5: Description design of the feedback table ..................................................................... 24
Table 3.6: Description design of the finished garments table ....................................................... 25
Table 3.7: Description design of the administration information ................................................. 25
CHAPTER FOUR: IMPLEMENTATION (CODING AND TESTING) ................................... 26
4.0. Introduction ............................................................................................................................ 26
4.1. Coding .................................................................................................................................... 26
4.2 Application and Database Connection .................................................................................... 26
4.3. Testing.................................................................................................................................... 26
4.3.1. Functional Testing .............................................................................................................. 27
vi
4.3.2. System Testing .................................................................................................................... 27
4.3.2.1. Recovery Testing: ............................................................................................................ 27
4.3.2.2. Acceptance Testing .......................................................................................................... 27
4.3.2.3. User Acceptance testing ................................................................................................... 27
4.3.3. Unit testing .......................................................................................................................... 28
4.4. Test Data ................................................................................................................................ 28
4.5. File Conversion ...................................................................................................................... 28
4.6. Control ................................................................................................................................... 28
4.7 Physical Design:................................................................................................................. 29
Figure 4.0: Shows the home user interface. .................................................................................. 29
Figure 4.4: Shows interface for customer to view his/her dress. .................................................. 32
CHAPTER FIVE: SUMMARY, LIMITATION, CONCLUSION AND RECOMMENDATIONS
....................................................................................................................................................... 33
5.0 Introduction ......................................................................................................................... 33
5.1 Summary ............................................................................................................................. 33
5.2 Limitations .......................................................................................................................... 33
5.3 Conclusions ......................................................................................................................... 33
5.4 Recommendations ............................................................................................................... 34
REFERENCES: ............................................................................................................................ 35
APPENDICES ...................................................................................................................... 37
APPENDIX A: Cost And Material Estimates ...................................................................... 37
APPENDIX B: ACTIVITY SCHEDULE ........................................................................... 38
APPENDIX C: GANTT CHART ........................................................................................ 39
APPENDIX D: SAMPLE CODES: .......................................................................................... 40
vii
List of figures:
Figure 3.0 water fall diagram………………………………………………………….…………11
Figure 3.1 use case diagram..………………………………………………………….…………18
Figure 3.2 Data flow diagram………………...……………………………………….…………20
Figure 3.3 Conceptual design...……………………………………………………….…………21
Figure 4.0 Home user interface testing……………………………………………….…………29
Figure 4.1 Ordering user interface testing…………………………………………….…………30
Figure 4.2 Admin login interface testing…………………………………………….…..………30
Figure 4.3 Admin update interface testing……………………………...…………….…………31
Figure 4.4 Interface to view finished dress testing………..………………………….…….……32
viii
List of tables:
Table 3.0 hardware requirements………………………………………….………….…………17
Table 3.1 Description of user login……………………………………..…………….…………22
Table 3.2 Description of customers information………………………………...………………23
Table 3.3 Description of top dress measurements………………………………….……………23
Table 3.4 Description of top dress measurements……………………………….………………24
Table 3.5 Description of customer feedback………………………………………….…………24
Table 3.6 Description of finished garments…………………………………………...…………25
Table 3.7 Description of admin information……………………………………..………………25
ix
CHAPTER ONE:INTRODUCTION
Online tailoring management system is a system aimed to assist in management of tailoring
activities within the industry. It will provide online services to customers such as: measurement
submission to their tailors, check whether their garments are finished and also help in proper
keeping of records.This will ensure availability of right information, information safety, easy
storage, access and retrieval.
The study aims at building a computerized tailoring management system that would be more
effective and efficient than the existing manual system
-1-
1.3 Proposed Solution
The proposed online tailoring management system will eliminate all these manual interventions
and increase the speed of the whole process. The system will allow customers to register online
and successfully submit their measurements.
The system has inbuilt validation system to validate the entered data. The customer can login to
the system to check on the status of the clothes for collection. The system will show the already
completed garments for clients to collect. The system also provides information about the cost of
each garment the customer intends to get knit. This data will be stored in the database for further
reference or audit.
-2-
1.6 Justification
Online Tailoring management system will break the geographical barriers and bring the whole
process into a quick and easy way to access tailors. It will automate the traditional tailoring
system into a modern computerized system. This will enhance data retrieval, storage and
security. It is also cost effective since it will cut down on travelling cost to get your
measurements taken and also going to check if your clothe has been made and is ready for
collection.
The clients can access their online tailors 24/7 and at any location provided they are connected to
the internet.
Due to the advancement in telecommunication e.g. undersea cabling, internet accessing speed is
expected to double as the cost reduces. This will make this system more efficient to use and offer
a competitive edge in the market.
1.6 Scope
The Online Tailoring Management System will permit to register and deliver measurements to
the tailor for the next process to follow.
It also maintains clients’ information and generating various reports about the tailor shop. The
main users of the project are clients and system Administrator.
It also enables customers to check the status of their garments i.e. if ready or not for collection.
The system provides information about the cost, the fabric type the customer want his/her dress
knit from, the duration a customer wants the dress finished, the type of material to be used,
quantity in terms of pairs needed and most importantly, the system computes the total cost and
avails that information to the customer.
However, online payment has not been achieved,but the customer is expected to pay either via
mobile money transfer services like m-pesa, pesapal or cash when they come to pick their
clothes.
-3-
1.7 Risks and mitigations
1.7.1 Risks
Some of the risks and threat that can affect this project are:-
Hosting – some host may be unreliable
Security risk – hackers and virus attack
Time – not able to complete the project in time
Cost of resources – not having adequate budget
1.7.2 Mitigations
Look for reliable people/company to host your program.
Use of security measures e.g. firewalls to protect from unauthorized people.
I will ensure that project schedule is followed for the project to finish in time.
Ensure that the required resources are available and within my budget.
-4-
1.8 Monitoring and evaluation
It was done by weekly meeting with my supervisor. I was able to report the progress and
challenges encountered. I also worked and highly appreciated on changes recommended to
improve the quality of this project to this level of standard.
-5-
CHAPTER TWO: LITERATURE REVIEW
Literature review is a text written by someone to consider the critical points of current
knowledge including substantive findings as well as theoretical and methodological contributions
to a particular topic. Main goals are to situate the current study within the body of literature and
to provide context for the particular reader. (Cooper, 1998)
A tailor is one that makes, repairs, and alters garments such as suits, coats, and dresses.
(answers.com, 2012)
A tailor makes custom cloths wear of various styles like jackets, skirts or trousers that go with
them, for men or women. An alterations specialist adjusts the fit of completed garments, usually
ready-to-wear, or restyles them. Designers choose combinations of line, proportion, color, and
texture for intended garments. They may have no sewing or patternmaking skills, and may only
sketch or conceptualize garments. ( Lancaster, 2013)
-6-
2.2 Developments in Tailoring Industry
In Uganda, there has been development of tailoring school where a total number of 50 students
are currently enrolled. They also currently employ four staff members who are specialized in
different areas of dressmaking and designing. During the last two years, 58 students have
successfully graduated from this institution, some of which have chosen to team up in order to
start up their own businesses. The school strongly encourage students to form teams, since it is
easier for a group than for a single individual to handle the challenges of establishing an own
business. (Margaret, 2011)
According to Richard (2012), he brought a rebellious streak to the heritage of suit making; he has
become a pillar of the modern menswear establishment. His bold colour and innovative twists
have proved irresistible to the rock n' roll elite.
Modernization of the style and approach of the traditional tailors to current designs has brought
increased profits, time wastage and also reduced the number of tailors who depended on
traditional technologies within the Savile Row in London (Ozwald et.al, 2013).
According to Shaw (2001), he says that the only man who behaves sensibly is his tailor shop is
the one who takes his measurements anew every time he sees me, while all the rest go on with
their old measurements and expect me to fit them.(Shaw, 2001).
The growth of online retail and advances in web technologies has enabled smaller bespoke
manufacturers to re brighten cottage industry practices to reach global audiences. Bespoke
industries are experiencing a strong resurgence with the advent of collective digital market
places such StanfordRow.com. The ruling cited the Oxford English Dictionary definition of
bespoke as "made to order", and considered that despite the fact a bespoke suit was "fully hand-
made and the pattern cut from scratch, with an intermediary baste stage which involved a first
fitting so that adjustments could be made to a half-made suit", while a suit made-to-measure
"would be cut, usually by machine, from an existing pattern, and adjusted according to the
customer's measurements", "both fully bespoke and made-to-measure suits were "made to order"
-7-
in that they were made to the customer's precise measurements and specifications, unlike off-the-
peg suits". (Michael at.al 2011)
According to Custom Tailors and Designers Association-CTDA (2012) At Gaebler, we're seeing
a trend in tailor shop startups toward a greater integration of technology with traditional tailoring
business activities. While many older shops are hesitant to embrace technology-rich business
models, younger entrepreneurs are capturing market share by leveraging technology on multiple
fronts:
2.4.1 Distance Tailoring. Distance tailoring allows startups to expand their reach beyond the
geographic limitations of the local marketplace. Customers perform their own
measurements (with guidance) and place orders online. Although many tailors use this
approach to take advantage of cheap labor overseas, it's possible to leverage a distance
tailoring framework. (gaebler.com, 2012)
2.4.2 Integrated Backend Solutions. Tailor shops are like any other SMB (small and medium
business) in the sense that there are multiple behind-the-scenes business tasks that must
be routinely performed. With today's technology, accounting, billing, inventory, shipping
and other software solutions can be integrated to create a highly functional and seamless
backend system.(gaebler.com, 2012)
2.4.3 Social Media Marketing. Social media resources like Facebook and Twitter allow tailor
shop startups to convert satisfied customers to brand advocates. By actively engaging
your customers on these and other sites, you can encourage positive conversations around
your products and your brand (gaebler.com, 2012).
As the technology of garment production is advancing, many small-scale suit tailors are
gradually developing their capacity to garment manufacturing level while others are still
struggling to be considered in the industry. (Leykun et.al, 2012)
-8-
CHAPTER THREE:METHODOLOGY
3.0 INTRODUCTION:
The term methodology means the techniques and procedures adopted by conducting a research
study. It outlines how the data will be collected, and the tools for collecting data, system
methodology, the proposed system input and output, users and system development tools.
3.1.1 Observation
I will use this technique to collect information about how the current system operates and its
processes. This involves systematically watching and recording the behaviors and characteristics
of operations and processes. It gives more detailed and context related information and can adapt
to events as they occur, however, the method may be time consuming.
3.1.2 Interviews
I will conduct an oral interview whereby i will interview business owners, suppliers and buyers
to get a deeper insight of how the system is going to work. I prefer this method because it gives
more information from various interviewees and offers greater flexibility as the opportunity to
restructure questions is there, especially in case of unstructured interview. It’s preferred because
it will provide a closer contact between the users and the developer hence dispelling the
probability of the completed system being rejected by users.
This technique also:
Permits clarification of questions
Has high response rate than written questionnaires
It is suitable for use with both literate and illiterates
Get full range and depth of information
Develops relationship with client
Can be flexible with client
-9-
3.1.3 Secondary Data Collection
This is data I will collect from existing sources e.g. from the books, internet, journals and
magazines that where collected by other researchers and analysis was done. It is from this data
that I will then compare with the primary data and make a final decision and conclusion.
- 10 -
Figure 3.0: water fall diagram
- 11 -
3.2.1.3 Design.
At this stage i will make an overall design of the system architecture and physical design which
includes User interface and Database design. It’s at this stage that I will identify any faults before
moving onto the next stage. The output of this stage is the design specification which is used in
the next stage of implementation.
3.2.1.4 Coding/Implementation.
At this stage, I will begin coding as per the design specification(s). The output of this step is one
or more product components built according to a pre-defined coding standard and debugged,
tested and integrated to satisfy the system architecture requirements.
3.2.1.5 Testing.
In this stage, i will ensure both individual and integrated whole are methodically verified to
ensure they are error free and satisfy customer requirements. I will involve both unit testing of
individual code modules, system testing of the integrated product and acceptance testing
conducted by or on behalf of customer. I will ensure bugs found are corrected before moving to
the next stage. I will also prepare, review and publish Product documentation at this stage.
3.2.1.6 Installation.
It is done once the product has been tested and certified as fit for use. The system is prepared for
use at customer site. I will do delivery via internet or physical delivery depending on user needs.
3.2.1.7 Maintenance.
This stage occurs after installation. It involves making modifications on the system to improve
performance. Such changes are user initiated or as a result of bugs being discovered which were
initially not known. These modifications are recorded for documentation and system update.
- 12 -
3.2.1.8 Benefits of waterfall model
It improves on quality: getting requirements and design first helps to catch and correct
possible errors at the design stage than at the testing stage, after all components have
been integrated.
Simple and easy to understand and use
Easy to manage due to the rigidity of deliverables and review process
Phases are processed and completed one at a time
- 13 -
3.3 CONCLUSION
The online Tailoring system will ease the work of clients by allowing them to send their
measurement online thus cutting on transport expenses and time. It will ease communication
between the tailor and the client and also to access each other.
It provides information about the cost, the fabric type the customer want his/her dress knit from,
the urgency at which a customer wants the dress finished, the type of material to be used,
quantity in terms of pairs needed and most importantly, the system computes the total cost and
avails that information to the customer.
Therefore, this system will be more beneficial to implement.
- 14 -
3.4 SYSTEM ANALYSIS
- 15 -
3.4.3.2 Functional Requirements
Functional requirements capture the intended behavior of the system. This behavior may be
expressed as services, tasks or functions the system is required to perform. Therefore the
proposed system is able to:
Capture customer information, store it and make it available at the time of need.
Present the users with a real-time display on the garments status.
Generate reports accurately and timely
Search and display customer information details
Computes the total cost of a garment depending on the selected fabric, type of material,
quantity and duration and avails that information to the customer.
- 16 -
3.4.3.4 System Requirements
TOTAL 83 000
Table 3.0: Hardware Requirements
- 17 -
3.4.4: Use Case Diagram
A use case diagram shows the interaction between the system and its environment.
The components of a use case diagram are:
Actors: Represent external entities of the system i.e. People who interact with the system
that is being modeled. For example, customers and system administrator will be the
actors of the proposed system.
Use Cases: Use cases are functional parts of the system. Examples are recording and
submitting measurements.
Associations: Associations are shown between actors and use cases, by drawing a solid
line between them. This only represents that and actor uses the use case.
Log in
Register
Make an order
Give feedback
Generate report
Customer
Update records
Administrator
Store records
- 18 -
3.5: Data Flow Diagram
Data flow diagrams (DFDs) were used to illustrate the flow of information in a system.
They are hardware independent and do not reflect decision points. They demonstrate the
information and how it flows between specific processes in a system. They provide one kind of
documentation for reports. These diagrams help to show how data moves and changes through
the system in a graphical top-down fashion. They also help to give graphical representation of
the system’s components, processes and the interfaces between them.
When it came to conveying how data flows through systems (and how that data was transformed
in the process), DFDs were the method of choice over technical descriptions for three principal
reasons:
DFDs are easier to understand by technical and non-technical audiences.
They provide a high-level system overview, complete with boundaries and connections to
other systems.
They provide a detailed representation of the system components.
The diagram below shows the flow of data through the proposed system. It depicts the flow of
information and the transformation that is applied as data moves from input to output.
- 19 -
Start
Login
Register
No
Authori
zed?
Yes
Yes
Make
order
Stop
- 20 -
3.6: SYSTEM DESIGN
3.6.0: Introduction
This involves transforming the software requirements into an architecture that describes its top-
level structure and identifies the software components and developing a detailed design for each
software components. For each requirement, a set of one or more design elements will be
produced.
A model is a representation of reality and can be built for existing systems as a way to better
understand those systems or proposed systems as a way to document business requirements or
technical design.
Registers
Clients User
System
- 21 -
3.6.1.2 Data dictionary
This contains all data definitions for cross-referencing and for managing and controlling access
to the information repository / database. It provides a very thorough interface description
(comparable to Interface Control Documents) that is independent of the model itself. Changes
made to a model may be applied to the data dictionary to determine if the changes have affected
the model’s interface to other systems.
Data dictionaries do not contain any actual data from the database, only book keeping
information for managing it. Without a data dictionary, however, a database management system
cannot access data from the database. Below are the illustrations:
- 22 -
Table 3.2: Description of customers’ information
- 23 -
Table 3.4: Description of bottom dresses measurements
- 24 -
Table 3.6: Description design of the finished garments table
- 25 -
CHAPTER FOUR: IMPLEMENTATION (CODING AND TESTING)
4.0. Introduction
It is the processes of putting the proposed system in operation. Some of the Activities undertaken
by the analyst are Training personnel who will use the system. There is also provision of user
manual and help page for efficient use of the system.
Next is to install Computer Equipment and internet to help them connect with their clients in the
globe. This will facilitate the full functionality of this proposed system. Equipment should be
acquired from recognized vendor. These include central processing unit (CPU), Ethernet cables,
routers, output and input devices e.g. keyboard, mouse, monitor and all secondary storage
devices. The hardware and software vendors have major responsibility for installing these
equipment. The analyst then determines the functional changes. E.g. may analyze the job
function changes caused by the computerized system.
4.1. Coding
Coding is the construction of the actual system using specific language. For this proposed
system, I have used php to actualize the system. It is a scripting language, more secure and web
based.
4.3. Testing
Testing is the process of verifying and validating the system for the conformance with
specification and meeting the customer’s requirements. The objectives of testing are to ensure
that the system programs is error free, guarantee the system end users can interact with the
system well and ensure that the components of the system interface are working well.
- 26 -
4.3.1. Functional Testing
The purpose of functional testing is to ensure that the program performs all the functions that
were originally specified, that all the input is correctly accepted. It relates to the whole system
and does not require a technical understanding of the system. All the functions of the system as
originally specified are systematically tested to ensure that nothing has been accidentally omitted
or misinterpreted. A positive attempt is made to anticipate errors than an inexperienced user
might make, and tests made to check the effect of such errors and ensure that they do not result
in incorrect actions or bad data being stored in the database.
- 27 -
4.3.3. Unit testing
After the parts of the system are completed they are first tested. All the new hardware,
procedural manuals and all system interfaces must be tested to ensure that they meet the required
standards.
4.6. Control
Control measures to be put in place for the system is; Password where the user is required to
enter his/her password to log in. It is only to authorize users.
The antivirus software should be used to clean up the viruses harmful to the application. Physical
security such as keeping the system in a safe room- Ensure that there are firm windows and
Doors and guarding the place.
- 28 -
4.7 Physical Design:
Home Interface Testing
- 29 -
Ordering User Interface Testing
Figure 4.1:
Shows the bottom dress ordering user interface.
- 30 -
The admin interface above, validates and ensures the authorized administrator logs in.
after login, the administrator can view orders made, update finished clothes or remove a
user from database.
Figure 4.3:
Shows the admin update interface.
Enables admin to update the status details of the garment in the finished table so as to enable the
customer search and retrieve his/her clothe. The customer searches from the home page.
- 31 -
Interface to view finished dress
This interface enables the customer to view his/her dress by searching from the home page using
the customer id. If the clothe is finished, the customer sees it and can go to collect else he/she is
asked to kindly check again.
- 32 -
CHAPTER FIVE: SUMMARY, LIMITATION, CONCLUSION AND
RECOMMENDATIONS
5.0 Introduction
This chapter describes the objectives of the system stipulated in earlier chapter, limitation of the
system, conclusion and recommendation of the system.
5.1 Summary
As discussed in the previous chapters the main problem addressed was dealing with online
tailoring management. It is the above situation that drove us to techniques of developing this
Online Tailoring Management System to enable users handle details of their clothes efficiently
and effectively. The project has implemented Most of the objectives stipulated in earlier
chapters. The online tailoring management system offers a number of benefits to the user and can
capture data, store, and view, add and delete the records entered.
It also provides information to the customer about the fabrics to be used, quantity in terms of
pairs, urgency and computes the total cost of knitting the garment.
5.2 Limitations
Problems Encountered during System Design: Limited time to finish up the work, limited
numbers of computers with the internet in the faculty hence it becomes difficult to download
PHP codes from the internet and inadequate financial support to facilitate the project.
It’s as a result of time factor also that limited the development and incorporation of online
payment capabilities, however, the system displays relevant information about the cost of
knitting a specific garment ordered depending on the fabric chosen, material used, quantity
required and the urgency at which it’s required.
5.3 Conclusions
The core reason for the establishment of a tailoring management system is to enable the
customers and administrators in a convenient, fair and timely manner of interaction. Therefore
the IT used by whoever uses the system should support the core objective of the system if it is to
remain relevant. A lot still needs to be done in the IT department in order to make available
- 33 -
technology effective. This may involve training of the staffs on how to enter right and relevant
data into the system and the management to keep updating the hardware and software
requirements of the system. IT and computer systems need to be kept being upgraded as more
and more IT facilities software are introduced in today’s IT market.
The researcher acknowledges the fact that this system does not handle all staffs the tailor shops
have like the asset section and staff members in the tailor shop. The researcher therefore suggests
that for further research into building a system that captures all fields as pertains the tailor shop.
5.4 Recommendations
Training of all the members of the staff in the tailor shops to get accustomed to the system will
be a priority. This being a new system, some members of the staffs’ management will get
threatened that the computerized tailoring management system will replace their jobs. I would
recommend that management of the tailor shops educates the staff on how this system will
operate and how it will supplement their efforts i.e. customers will only visit them during clothes
collection. For the efficiency of the system, users of the need to be thoroughly educated about the
operations of the system especially on how to register, give their details, make orders and on how
to check on their dress status. They should also know how to login using username and password
which should be kept confidential.
Access to the server room should be physically guarded against unauthorized person; the server
room should be dust free and fully protected with an air conditioner of 1100BTU to prevent the
server from over-heating. Backup media like External hard disks, CDs, Diskettes and Flush disks
can be used for backups and storage of data.
- 34 -
REFERENCES:
Paula Deitz (25 August 1996). "Savile Row's Ambassador to the Court of Kings".The New
York Times.Retrieved 9 January 2009.
Dunn, Bill (14 April 2003). "The Battle for Savile Row".BusinessWeek.Retrieved 9 January
2009.
Norton, Kate (31 October 2006). "Savile Row Never Goes Out of Style".
BusinessWeek.Retrieved 9 January 2009.
"Hardy Amies UK stores to close following sale to Fung Capital". Retail Week. 2008-11-11.
Retrieved 2009-10-08.
Piet Schreuders, Adam Smith, Mark Lewisohn (30 Jun 2008). Beatles London: The Ultimate
Guide to Over 400 Beatles Sites in and Around London. Anova Books.pp. 53.
http://www.thereporterethiopia.com/Society/the-promising-tailor-industry.html
- 35 -
http://www.bbc.co.uk/britishstylegenius/content/21811.shtml
http://lotro-wiki.com/index.php/Tailor
www.answers.com/topic/tailor
Vintage-style clothing website ModCloth Inc. “It used to be about search -- that was Amazon
Day, Peter (2003-04-29). "How secret agent Hardy Amies stayed in Vogue during the war".
London: The Telegraph. Retrieved 2009-10-09.
- 36 -
APPENDICES
- 37 -
APPENDIX B: ACTIVITY SCHEDULE
- 38 -
APPENDIX C: GANTT CHART
Gantt chart
1 Proposal
2 Field Study
3 Analysis
4 Database
Design
5 Interface
Design
6 Coding and
Testing
7 System
testing &
Integration
8 Documentat
ion
- 39 -
APPENDIX D: SAMPLE CODES:
<?php
include("heading.php");
?>
<html>
<head>
<title>Admin</title>
<link href="css/design.css" rel="stylesheet" type="text/css" />
<style type="text/css">
#loginform {
border: 2px solid #600;
background:-color: #FFC;
width: 280px
}
#loginform form {
margin: 5px;
}
label {
display: block;
width: 90px;
float: left;
clear: both;
}
label, input {
margin-bottom: 4px;
}
</style>
</head>
<body>
<div id="wrapper">
- 40 -
<h1>Welcome To Admin Page</h1>
<h3>Pleaser enter admin username!</h3>
<div id="loginform">
<form method="post" action="checklogin.php" name="form1" >
<label for="username">Username:</label>
<input type="text" name="username" id="username" /><br/>
<label for="password">Password:</label>
<input type="password" name="password" id="password" /><br/>
<input type="submit" name="submit" value="Login"/>
</form>
<!-- end div#welcome -->
</div>
<!-- end div#content -->
<div id="sidebar">
</ul>
</div>
<div style="clear: both; height: 1px"></div>
</div>
</div>
</body>
</html>
- 41 -