Contents keep tracking on expired membership customer and call

Contents
Title. 2
Introduction. 2
Problem statement 3
Problem background. 4
Literature review.. 5
Project Aims &
Objectives. 7
Research Questions. 8
Research Design. 9
Reflection. 10
References. 11
 

 

 Title

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Fitness perform and analysis data with QR Code

 

Introduction

            In Malaysia, some fitness centers are still performing
tasks manually, such as recording data on a piece of paper, entering data into
the database while passing the front desk and so on. However, all the handmade
work posed difficulties and the problems had to be solved. After some research,
all existing tasks can be solved by developing a system to solve all human
tasks. By using this management system, many benefits are provided to the fitness
center, such as reduced time to record data, more efficient and reliable
processing tasks, faster data retrieval, higher data security and integrity.

            QR
code is something that small business
owners and entrepreneurs need to be aware of as it is increasingly becoming an
important tool. The QR code is basically a natural extension of traditional bar
codes, and everything from supermarket groceries to large container cargo. The
implementation of QR code is to store up to a lot of personal data such as
renew membership, view status of membership, reserve a locker, check in fitness
center and so on. Therefore, this personal unique QR code
will be generating once the user register and so it can work against database
management systems.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Problem statement

Time and resources consuming

When the system still recording data manually, it means
is still not notably great. It can only be done after the day-end of fitness center.
This is because worker must do updating records to database by manual which
require large volume of time. Besides, staffs always must keep tracking on
expired membership customer and call them. This action might require more times
to do it. Others than that, customers also require filling in their data every
time. In this situation, customers need to fill in relevant data such as name,
member id, time and signature if they pass through the front desk as consuming
extra time for that.
            Since all the data need to be
written on paper, which means they need a huge volume of paper. By using a lot
of paper, they must spend more on purchasing papers and it will cause the air
pollution.

 

Lack of security

Every management system must have a high-level
security to protect all the privacy data. The more users access the data, the
greater the risks of data security breaches. Corporations invest considerable
amounts of time, effort, and money to ensure that corporate data are used
properly. Furthermore, Data inconsistency exists when different versions of the
same data appear in different places. In this situation, the issues of data
security occurred as records on paper might be lost with no backup. Besides,
unusual redundancy data might occur as someone imitate others membership id
number.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Problem background

 

Solving
issue of time consuming
Based on the current management system, the whole system must be upgrade with
full computerized to perform it. With this upgrade, it will be cut down plenty
of time to process with customer. But the limitation I considered is if there
quite several customers in queue, it will slow down the progress. (Johansson, 2017)

Solving issue of resources consuming
Based on the current management system, this system still working on
paper-work recording which means it is require huge volume of paper to record
customer details. Indirectly, it involves cutting down trees. Deforestation is
one of the main environmental problems we’re facing in these times. (TheWorldCounts, 2014)

Improve security level
Based
on the current management system, security level apparently is weak as paper-work
recording will cause lack of security indirectly. Besides, with this manual
system staff might expose and lost the paper with full details of customer. Attackers
can operate and steal with impunity over a very long period. (eSecurity Planet, 2016)

Multitasking Issues
Based
on the current management system, fitness centre still working by human
multitasking. There might occur the limitation of human as handle multiple
tasks manually may cause the result with low quality output, data errors,
memory impairment and increased stress levels. (Chron, n.d.)

Response
of time issues
Based
on the current management system, the response time is the one of the core
attributes of customer service. Customers surely want that response to be
accurate and efficient. The problem of slow response time will bring the
affection of time consuming and reliability as when people try to get a locker
key but there is no one in counter, so mean that they must wait. (bizfluent, 2017)

 

 

 

 

 

 

 

Literature review

The
problem is time and resources consuming of the performance. Time and resource
is the main thing that the system hard to achieve expectation of users. Besides,
level of security is the trend on every management system due to user’s
personal details and data.

The
whole system must be upgrade with full computerized to perform it. When system
is fully performed by computer, it will be cutting down plenty of time to
process with request from customer. Otherwise, it will take huge time to do recording and any tasks
requested. (Johansson, 2017)  Paper-work
recording is requiring huge volume of paper to do recording. Indirectly, it will
bring the result of harming the earth due to cut down huge number of trees. As
we know deforestation is one of the main environmental problems we are facing
in these times. (TheWorldCounts, 2014) Weak security level will
cause the system not to secure at all times. Besides, with this manual system
staff might expose and lost the paper with full details of customer. Attackers
can operate and steal with impunity over a very long period. (eSecurity Planet, 2016) There might occur
the limitation of human as handle multiple tasks manually may cause the result
with low quality output, data errors, memory impairment and increased stress
levels. (Chron, n.d.) The response timing
issues is caused by cache. Customers surely want that response to be accurate
and efficient. The problem of slow response time will bring the affection of
time consuming and reliability. (bizfluent, 2017)

QR Code verification in this system
is used to verify the valid member of fitness centre. Members can check all the
details with a scan with their personal unique QR Code.

The method that used for research
design is locating and defining issues or problems. The purpose of this step is
to focus revealing the nature
of the issue associated with the implementation. Second step of
research design is to design and create an overall plan on solving the
identification of problem. The
research plan is the framework for conducting a market research project. It
acquires details of necessary required information. Third
step is to collect data from the previous step of research design. Fourth step
is to interpreting research data to focus on checking the data and draw out the
conclusions to solve the problems. Final step is to report research findings. The findings should be presented in an understandable
format for use in the decision-making process. (AcqNotes, n.d.)

The limitation of the QR Code
verification is the scanning process might be long. Based on the long
processing of QR Code verification, before scanning and waiting for the landing page, the user must come up
with his cellphone and start the code reader. With a fast Internet connection,
this may work, but many users may lose patience with a variable 3G signal. (Charlton, 2011)

In a nutshell, QR Code
verification has limitations yet the effectiveness and efficiency can bring
convenient to us and I believe that all of this limitation can be overcome in
order to maintain the quality.

 

 

                

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Project Aims & Objectives

The aims for the project are to develop a system by
improving the facilities. The proposed system can overcome all the limitations
of the existing system such as paper-work recording. Secondly,
the system will provide proper
security by using QR code and reduces manual work.

The objectives for the project is to do emerge the high
security features for verifying of certain user such as personal unique QR
code. Customer data will be
insert to database immediately
once certain customer passes through the front desk.  Next to the point, fully computerized to
perform any tasks and handle within a second.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Research Questions

1.     What
image precision algorithm is most appropriate for the project?

2.     How the QR code scanner are stored in the database?

3.    
How
are they stored and how are they retrieved and other activities?

4.    
How
often does your research data be backed up to ensure short-term data security?

5.     How
have paper-work shows impacted customers in the traditional system?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Research Design

First step is locating and defining issues or problems. The purpose of this
step is to focus revealing the nature
of the issue associated with the implementation. In locating and defining the
issues or problems, the researcher should have to study the relevant background
information and know which way to used and needed. (AcqNotes, n.d.)

Second step of research design is to design and create
an overall plan on solving the identification of problem. The research plan is the framework for conducting a
market research project. It acquires details of necessary required information.
Besides, it will examine the hypotheses of interest, answers for research
questions and furnish information for decision making. (AcqNotes, n.d.)

Third step is to collect data from the previous step
of research design. This step revolved round obtaining the records that you
will need to solve the issue or trouble recognized. For instance, personal
interviewing from an office by telephone or through mail. (AcqNotes,
n.d.)

Fourth step is to interpreting research data. This
purpose of this step is to focus on checking the data and draw out the
conclusions to solve the problems. (AcqNotes, n.d.)

Final step is to report research findings. Based on
the previous steps, it must report to those who need data to determine a
decision. The findings should
be presented in an understandable format for use in the decision-making
process. In addition, management, should be presented orally using tables,
charts and graphs to enhance clarity and influence. (AcqNotes, n.d.)

           

 

 

 

 

Reflection

 

The limitation of the QR Code verification is the
scanning process can be long. Based on the long processing of QR Code
verification, before scanning and
waiting for the landing page, the user must come up with his cellphone and
start the code reader. With a fast Internet connection, this may work, but many
users may lose patience with a variable 3G signal. (Charlton, 2011)

            Based on the solutions that we know about the QR Code built
up with many pixels. So, the scan distance is very important to fasten up the
processing of scanning as it might be having a lot of unwanted pixels. Generally,
the higher the scanning distance, the faster the optimum
speed.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

AcqNotes.
(n.d.). Retrieved from 2017: http://acqnotes.com/acqnote/careerfields/5-steps-in-the-reasearch-process
bizfluent.
(26 9, 2017). Retrieved from bizfluent:
https://bizfluent.com/info-7830663-importance-response-time-service-industry.html
Charlton, G. (15 August, 2011). Econsultancy.
Retrieved from Econsultancy:
https://econsultancy.com/blog/7884-the-pros-and-cons-of-qr-codes
Chron.
(n.d.). Retrieved from
http://smallbusiness.chron.com/bad-effects-multitasking-32419.html
eSecurity Planet. (2016). Retrieved from https://www.esecurityplanet.com/network-security/lack-of-monitoring-weakens-database-security.html
Johansson, L. (31 5, 2017). CloudAMQP.
Retrieved from
https://www.cloudamqp.com/blog/2017-05-31-work-queues-in-rabbitmq-for-resource-intensive-tasks.html
TheWorldCounts. (2014). Retrieved from
http://www.theworldcounts.com/stories/Paper-Waste-Facts