12.12.2012 Views

a web based hypermarket supply chain management system

a web based hypermarket supply chain management system

a web based hypermarket supply chain management system

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A WEB BASED HYPERMARKET SUPPLY<br />

CHAIN MANAGEMENT SYSTEM<br />

NAKIYINGI DIANA<br />

Reg.No: 2005/HD18/540U<br />

Bsc (Mak)<br />

Email:dnakiyingi@yahoo.com, Tel: +256-772-538-701<br />

A Project Report Submitted to School of Graduate Studies in<br />

Partial Fulfillment of the Requirements for the Award of the<br />

Degree of Master of Science in Computer Science of<br />

Makerere University<br />

Option: Computer Science<br />

June, 2008


DECLARATION<br />

I Nakiyingi Diana do hereby declare that this Project Report is original and has not been<br />

published and/or submitted for any other degree award to any other University before.<br />

.......................................<br />

Diana Nakiyingi<br />

BSc(Mak)<br />

Department of Computer Science<br />

Faculty of Computing and Information Technology<br />

Makerere University


APPROVAL<br />

This project report has been submitted for examination with the approval of the following<br />

supervisor(s):<br />

.......................................<br />

Dr.John Quinn,(PhD)<br />

Department of Computer Science<br />

Faculty of Computing and Information Technology<br />

Makerere University<br />

.......................................<br />

Mr.N.T Rwangoga<br />

Department of Computer Science<br />

Faculty of Computing and Information Technology<br />

Makerere University<br />

ii


DEDICATION<br />

To my family, my friends for their encouragement and support throughout my studies.<br />

iii


ACKNOWLEDGEMENTS<br />

I am very grateful to my supervisors Mr.N.T Rwangoga and Dr.John Quinn for their constructive<br />

ideas as well as guidance without which this report might have not been.<br />

I also want to express my appreciation to my former supervisor Prof.H.N.Muyingi for his<br />

guidance and support.<br />

My coursemates: Julius for his assistance and quality time and Salim for your ideas that<br />

have contributed to the successful completion of this research.<br />

Last but not least, I wish to express my gratitude to God who granted me life and good<br />

health throughout my studies. Thank you Lord!<br />

Diana Nakiyingi<br />

June 2008<br />

iv


Contents<br />

1 INTRODUCTION 1<br />

1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.3 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.3.1 General Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.3.2 Specific Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.4 Significance of Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.5 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

2 LITERATURE REVIEW 4<br />

2.1 State of the Art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

2.2 Current methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

2.2.1 Electronic Data Interchange(EDI) . . . . . . . . . . . . . . . . . . . . 6<br />

2.2.2 Radio Frequency Identification(RFID) . . . . . . . . . . . . . . . . . 7<br />

2.2.3 Point-of-Sale(POS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

2.2.4 Evaluation of current methodology . . . . . . . . . . . . . . . . . . . 9<br />

2.3 State of Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

3 METHODOLOGY 11<br />

v


3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

3.2 Establishment of Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

3.3 System Design & Development . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

3.3.1 System Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />

3.4 System Testing and Validation . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />

3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

4 SYSTEM REQUIREMENTS,DESIGN AND IMPLEMENTATION 16<br />

4.1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

4.1.1 Requirements Gathering . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

4.1.2 Diagramming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

4.1.3 Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

4.2 System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

4.3 Graphical User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

4.3.1 Reporting Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

4.3.2 Database Management System . . . . . . . . . . . . . . . . . . . . . . 22<br />

4.4 Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

4.5 Sales and Supply Forecast . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br />

4.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />

4.6.1 Database Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

4.6.2 Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

4.6.3 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

4.7 System Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29<br />

5 CONCLUSIONS AND RECOMMENDATIONS 32<br />

5.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />

vi


5.2 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br />

vii


List of Figures<br />

2.1 Basic <strong>supply</strong> <strong>chain</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

3.1 Application Development Model(Adapted from Software Engineering[24]) . . 12<br />

3.2 Conceptual Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />

3.3 Web Client/Server Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />

4.1 Activity Diagram for the <strong>supply</strong> <strong>chain</strong> . . . . . . . . . . . . . . . . . . . . . 16<br />

4.2 Application flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

4.3 Program flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

4.4 Reporting Interface for Suppliers . . . . . . . . . . . . . . . . . . . . . . . . 21<br />

4.5 POS Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />

4.6 Database Management System . . . . . . . . . . . . . . . . . . . . . . . . . 23<br />

4.7 POS Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

4.8 Flow diagram for messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br />

4.9 Flow diagram for <strong>web</strong> application security . . . . . . . . . . . . . . . . . . . 27<br />

4.10 Encrypted communication channel through SSL . . . . . . . . . . . . . . . . 29<br />

4.11 Processing a Sale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

4.12 Supplier -supplier interface interaction . . . . . . . . . . . . . . . . . . . . . 31<br />

viii


List of Tables<br />

2.1 Summary of the evaluation of POS, EDI & RFID . . . . . . . . . . . . . . . 9<br />

4.1 Tables in POS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

ix


ASP - Active Server Pages<br />

ACRONYMS<br />

EDI - Electronic Data Interchange<br />

EPC - Electronic Product Code<br />

GUI - Graphical User Interface<br />

HTML - Hypertext Markup Language<br />

HTTP - Hypertext Transfer Protocol<br />

HTTPS - Hypertext Transfer Protocol Secure<br />

IIS - Microsoft’s Internet Information Server<br />

JSP - Java Server Pages<br />

JDBC - Java Database Connectivity<br />

ODBC - Open Database Connectivity<br />

PHP - Php Hypertext Preprocessor<br />

PKI - Public Key Infrastructure<br />

POS - Point Of Sale<br />

RFID - Radio Frequency Identification<br />

SCM - Supply Chain Management<br />

SSL - Secure Sockets Layer<br />

SQL - Structured Query Language<br />

TCP/IP - Transmission Control Protocol/Internet Protocol<br />

x


ABSTRACT<br />

The current level of maturity of Web technology in application development has led to Hypermarkets<br />

exploiting it to solve some of their logistical problems like <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />

Web technology can be used to improve the efficiency of business processes through on-line<br />

means of communication within a distributed environment. This on-line means of communication<br />

enables coordination and collaboration between the different stakeholders within the<br />

<strong>supply</strong> <strong>chain</strong>, that is suppliers, third party providers, and customers.<br />

Through research we found out that most applications developed for use in retail business<br />

have focused on Point of Sale software, which mainly monitors sales, customers and inventory.<br />

However, the needs for <strong>hypermarket</strong>s go beyond sales, customers and inventory <strong>management</strong><br />

since these establishments deal with different suppliers hence a large <strong>chain</strong> of suppliers.<br />

Planning, coordination, collaboration, distribution are among the common problems these<br />

establishments face, needing a new <strong>system</strong> to put these into consideration.<br />

We focus on implementing a <strong>web</strong> <strong>based</strong> <strong>system</strong> to improve on the daily operations of Hypermarkets<br />

in order to satisfy customer requirements through establishing user and <strong>system</strong><br />

requirements for developing such applications. In addition, we designed a model that enables<br />

<strong>hypermarket</strong>s to keep track of their large and diverse stock as well as obtaining <strong>supply</strong> and<br />

demand forecasts.<br />

We present a methodology that follows already tested and commonly used approach for software<br />

engineering projects.This approach was chosen because of the nature of the study and<br />

the objectives we aimed to achieve. We focus on establishing user requirements through literature<br />

review, direct gathering of information and direct technology testing using currently<br />

installed POS <strong>system</strong>s.<br />

After a review of our findings, we developed a prototype that could be used by big retail<br />

establishments to do their day to day business and manage <strong>supply</strong> <strong>chain</strong>s. Notable in this research<br />

is the need to exploit new client/server architecture like service oriented architectures<br />

which allow different applications to exchange data and participate in business processes.<br />

Standardized data exchange formats like Extensible Markup Language(XML) could also<br />

be considered since these facilitate sharing of structured data across different information<br />

<strong>system</strong>s particularly via the Internet unlike the popular EDI.<br />

xi


Chapter 1<br />

INTRODUCTION<br />

1.1 Background<br />

Hypermarkets are superstores which combine supermarkets and departmental stores resulting<br />

into establishments with a large and diverse range of products. These products include<br />

groceries and general merchandise. These stores tend to sell different brands of a variety of<br />

products which calls for a large <strong>chain</strong> of suppliers. Since these suppliers are different and distributed,<br />

issues of planning, coordination and collaboration arise. Supply <strong>chain</strong> <strong>management</strong><br />

is the process which encompasses sourcing and procurement, scheduling, order processing,<br />

inventory <strong>management</strong>, transportation, customer service and the information <strong>system</strong>s used<br />

to monitor these activities [10]. It ensures coordination and collaboration with suppliers,<br />

third-party service providers, intermediaries and customers.<br />

Web technology has become a means of communication, information and data exchange and<br />

its current level of maturity as an application development platform provides an efficient and<br />

effective opportunity for large establishments like <strong>hypermarket</strong>s to exploit it to solve some<br />

of their logistical problems like <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. This study aims at developing<br />

a <strong>system</strong> which is <strong>based</strong> on this technology that will enable <strong>hypermarket</strong>s to control their<br />

operations to satisfy customer requirements.<br />

1.2 Problem Statement<br />

Most applications developed for use in retail business have focused on Point of Sale software,<br />

which mainly monitors sales, customers and inventory [14]. However, the needs for<br />

1


<strong>hypermarket</strong>s go beyond sales, customers and inventory <strong>management</strong> since these stores deal<br />

in different brands of a variety of products on a large scale hence a large <strong>chain</strong> of suppliers.<br />

Issues of planning, coordination, collaboration, distribution and <strong>supply</strong> arise leading<br />

to the need for a <strong>system</strong> to put these into consideration. In this study, we seek to develop<br />

a <strong>system</strong> that can improve the performance of sales monitoring and <strong>supply</strong> monitoring to<br />

effectively ensure accurate stock controls. The monitoring and stock inventory <strong>management</strong><br />

functions ought to be done at two nodes, the supplier’s node and the customer, in this case<br />

the <strong>hypermarket</strong>s node. How to make this possible is the work that we attempt in this study.<br />

1.3 Objectives<br />

1.3.1 General Objective<br />

To develop an interactive <strong>web</strong> <strong>based</strong> <strong>system</strong> with a user friendly interface, that will enable<br />

<strong>hypermarket</strong>s to control their operations and satisfy customer requirements.<br />

1.3.2 Specific Objectives<br />

1. To review literature on <strong>hypermarket</strong> <strong>supply</strong> <strong>chain</strong> <strong>management</strong> <strong>system</strong>s inorder to<br />

identify existing gaps.<br />

2. To establish user and <strong>system</strong> requirements for developing a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong><br />

SCM <strong>system</strong> <strong>based</strong> on findings in (1) above.<br />

3. To design a model that enables <strong>hypermarket</strong>s to keep track of their large and diverse<br />

stock as well as obtain <strong>supply</strong> and demand forecasts from records of sales and customer<br />

history.<br />

4. To implement a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>.<br />

5. To test and validate the implemented <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>.<br />

1.4 Significance of Study<br />

Point of Sale(POS) which mainly monitors sales, customers and inventory is the most used<br />

information <strong>system</strong> application in <strong>hypermarket</strong>s. Hypermarkets do deal in a variety of<br />

2


products supplied by different suppliers. Enabling the suppliers monitor the products that<br />

they do <strong>supply</strong> to the <strong>hypermarket</strong> inorder to ease order processing which is the aim of<br />

this study will improve on the daily operations of the <strong>hypermarket</strong>s. And since there is<br />

economic development all over the world, there has been a shift from single stall shops to<br />

<strong>hypermarket</strong>s, which provide a huge retail facility satisfying all of consumers’routine weekly<br />

shopping needs.<br />

1.5 Scope<br />

Supply <strong>chain</strong> <strong>management</strong>(SCM) encompasses various activities such as sourcing and procurement,<br />

scheduling, order processing, inventory <strong>management</strong>, transportation, customer<br />

service and the information <strong>system</strong>s used to monitor these activities [10]. This study focused<br />

on order processing, inventory <strong>management</strong>, customer service and the information <strong>system</strong>s<br />

used to monitor them. Order processing involves order placement, order confirmation, order<br />

fulfillment and order inquiry. The <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong> developed shall enable<br />

the execution of order processing through on-line means of communication between the<br />

suppliers and the <strong>hypermarket</strong> by an instant messaging <strong>system</strong>. The POS <strong>system</strong> which is a<br />

component of the whole <strong>system</strong> used in the <strong>hypermarket</strong> shall manage sales, inventory and<br />

customers. The <strong>supply</strong> <strong>chain</strong> consisted of three entities; the organization(<strong>hypermarket</strong>), the<br />

supplier(s) and the end consumer(customer of the <strong>hypermarket</strong>).<br />

3


Chapter 2<br />

LITERATURE REVIEW<br />

2.1 State of the Art<br />

Research has been conducted on SCM regarding the objectives, the different ways on how<br />

it can be implemented, as well as the issues associated with it. SCM was looked at as the<br />

coordination of products and information flows among suppliers, manufacturers, distributors,<br />

retailers and customer(Fig.2.1) [12]. With appropriate exchange of information among<br />

these, costs can be reduced as well as improved customer service attained. The forecast was<br />

considered as the most crucial factor that could influence the <strong>supply</strong> <strong>chain</strong>. Forecasts are<br />

needed to enable firms in the <strong>supply</strong> <strong>chain</strong> to make planning and inventory decisions which<br />

mainly base on demand forecasts. When forecasts are inaccurate, this leads to back ordering<br />

in which the quantity that is ordered does not reflect the demand for the period it is supposed<br />

to cover. Information sharing and continuous coordination results in cost reduction<br />

for both the supplier and retailer [12].<br />

Figure 2.1: Basic <strong>supply</strong> <strong>chain</strong><br />

4


Modern SCM is regarded as the use of new information technologies in order to speed up<br />

information flow among different firms in the <strong>supply</strong> <strong>chain</strong> by use of linked information <strong>system</strong>s.<br />

This aims at improving the coordination of operation processes, products and services<br />

which were required by customers. This in turn reduces costs in the <strong>supply</strong> <strong>chain</strong> and improves<br />

the quality of service offered to customers [2].<br />

Various methods are implemented to support <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. Information <strong>management</strong><br />

<strong>system</strong> applications by far have been the most used. These <strong>system</strong>s were designed<br />

depending on the specific objectives to be obtained and also on the areas where they were<br />

to be used. Most <strong>system</strong>s that were built aimed at enhancing customer relationships, monitoring<br />

product levels and sales [8]. Different applications were developed for both planning<br />

and execution of SCM. Collaborative Planning, Forecasting and Replenishment (CPFR) was<br />

designed for planning in inter-organizations. Electronic Data Interchange (EDI) and Vendor<br />

Managed Inventory (VMI) were designed for execution in inter-organizations. EDI involved<br />

the exchange of information from one computer to another through electronic means and<br />

VMI approach involved making contracts with suppliers by agreeing on stock levels and deciding<br />

how frequently to replenish and the quantities to deliver [15]. Warehouse Management<br />

System (WMS) which is concerned with the managing of warehouse resources such as space,<br />

labor, equipment and materials flow, and Yard Management System(YMS) were designed<br />

for execution in intra-organizations. Systems such as Customer Relationship Management<br />

(CRM) which focused on firms managing and maintaining customer relationships by storing<br />

their information were developed separately from <strong>system</strong>s which focused on fulfillment [5].<br />

The latest development in product identification is using Radio Frequency Identification<br />

(RFID) technology which is being introduced into the retail industry to enable the integration<br />

of their <strong>supply</strong> <strong>chain</strong>s [6]. The RFID technology constitutes of two parts; the tag<br />

and the tag reader also referred to as the scanner responsible for sensing an item and cross<br />

examining information about each item. The radio frequency tag consists of an antenna<br />

and a chip containing electronic product code. The tag broadcasts radio frequency when<br />

exposed to a scanner within a yard and is able to tell what product it is, when and where<br />

it was manufactured, where its components came from and when it will expire. The most<br />

commonly used in the retail business is the barcode reader. RFID enables stores to know<br />

their in-stock almost in real time since the distribution centers and warehouses can access<br />

5


the current store inventory as well as the information regarding the trend of demand through<br />

the Electronic Data Interchange (EDI) capabilities [6].<br />

The daily advancements in information technology has led to business partners adopting<br />

the Internet and Web technology in their <strong>supply</strong> <strong>chain</strong>. The Internet has led to a net work<br />

flow of information and with integration of the Web, this has lead to a variety of business<br />

partners in the <strong>supply</strong> <strong>chain</strong> participating in the <strong>supply</strong> <strong>chain</strong> processes. The Internet is<br />

a fast transmission of information over a net work which leads to a seamless real time<br />

communication between business partners. Information on the Internet can be exchanged<br />

through Web pages. A variety of products and services can be accessed on the Web sites of<br />

suppliers. Web technology provides real time flow of data between the different links of the<br />

<strong>supply</strong> <strong>chain</strong> leading to collaboration among business partners [7].<br />

2.2 Current methodologies<br />

2.2.1 Electronic Data Interchange(EDI)<br />

EDI, a data format used for inter-business messaging was partially responsible for reducing<br />

costs and increasing productivity in the manufacturing and service industries. EDI’s intended<br />

purpose was to provide a common messaging standard for businesses to communicate with<br />

other businesses. Rather than having to deal with a different data format for each trading<br />

partner, all businesses could convert their proprietary data format to EDI to send or receive<br />

messages and then convert EDI to their respective proprietary formats. Over the years, EDI<br />

has evolved into a mechanism for integrating back office <strong>system</strong>s and communication with<br />

business partners that has served its users well. However, it has inflexible, inherent, and<br />

practical problems that put a ceiling on its usefulness. EDI was an unlikely choice for a use<br />

other than inter-business messaging [23].<br />

EDI’s Problems<br />

Integration of EDI with an organization’s internal computer <strong>system</strong>s and with those of trading<br />

partners was considerably a difficult task. This was mainly due to the incompatibilities<br />

between EDI software and in-house applications, and the existence of several standards for<br />

information exchange of protocols, procedures, and data forms. There were also <strong>system</strong><br />

6


stability issues such as disaster recovery, data backup and error recovery which were major<br />

concerns of most business organisations[17].<br />

Security issues such as the disclosure of messages, modification of message contents, modification<br />

of message sequence, sender masquerade and repudiation of message origin or receipt<br />

were a serious concern for EDI users. The failure to detect such security risks could damage<br />

the communication and partnerships between trading partners [17].<br />

2.2.2 Radio Frequency Identification(RFID)<br />

RFID is a method of identifying items using radio waves and this technology allowed automatic<br />

collection of product data quickly and easily without human intervention [22]. It<br />

consists of the RFID tag or transponder, which is located on the object to be identified<br />

and was the data carrier in the RFID <strong>system</strong>;the RFID reader or transceiver, which is able<br />

to both read data from and write data to a transponder and the back-end database which<br />

associates records with data collected by readers [21]. The tag is made up of a microchip<br />

with a coiled antenna and a reader with an antenna which sends out electromagnetic waves<br />

that form a magnetic field when they couple with the antenna on the tag. The tag obtains<br />

power from the magnetic field which it uses to power the microchip circuits. The waves that<br />

the tag sends back to the reader are modulated by the chip and the reader converts the new<br />

waves into digital data [22].<br />

Problems with RFID<br />

Since RFID <strong>system</strong>s make use of the electromagnetic spectrum, they are relatively easy to<br />

jam using energy at the right frequency. This provides an inconvenience for consumers in<br />

stores in form of longer waits at the checkout. Also, active RFID tags that use a battery to<br />

increase the range of the <strong>system</strong> can be repeatedly interrogated to wear the battery down,<br />

disrupting the <strong>system</strong>. It should also be noted that radio waves cannot be read through<br />

metal. Simply wrapping several layers of aluminum foil around an item can defeat the<br />

security <strong>system</strong> in super stores [19].<br />

One of the primary issues to be concerned with a RFID implementation is the immaturity of<br />

the industry. Standards are only just being developed. Tags and readers are being modified<br />

and improved at a rapid rate. Competing technologies and non-crosscomplient <strong>system</strong>s<br />

7


still exist. This ongoing development could make equipment and tags obsolete, rendering<br />

investments in older equipment useless, and requiring expensive conversions and upgrades<br />

[21].<br />

A number of standards have been developed within the RFID market such as the International<br />

Standards Organisation (ISO) and Electronic Product Code (EPC) Global. Additionally,<br />

there are also a number of special interest groups including industry specific such as<br />

the American Trucking Association in the transport industry, mobile devices and computer<br />

industry or the Automotive Industry Action Group in the automotive industry that seek to<br />

influence RFID standards development which has led the non-uniformity in the technology<br />

standardisation therefore creating problems for consumers [20].<br />

There is lack of privacy that is the transactional data that is being held on the tag after the<br />

point of sale can easily be accessed by third parties [22].<br />

A variety of individual RFID products and services are on the market that is tags, readers,<br />

hardware, software which makes the total cost of implementation of RFID technology not<br />

transparent. The exact price calculation as part of a cost-benefit analysis is difficult because<br />

of the number of unknown variables. A RFID implementation cost analysis has to take into<br />

consideration not only the investment in the transponders and readers, but also other cost<br />

drivers, such as peripheral <strong>system</strong>s, software and integration efforts [21].<br />

2.2.3 Point-of-Sale(POS)<br />

POS refers to the in-store entering and accessing of product and/or customer information in<br />

order to facilitate product sale to the customer [18]. This mainly monitors sales, customers<br />

and inventory [14].<br />

Retailers believe that POS offers the ability to improve customer service by reducing checkout<br />

times,improving retail store <strong>management</strong> by maintaining both inventory value and<br />

strengthening inventory <strong>management</strong> that is reduced stockouts and inventory levels [18].<br />

POS Limitation<br />

Since <strong>hypermarket</strong>s deal in a huge and diverse range of products involving a large <strong>chain</strong><br />

of suppliers, this leads to issues of planning, coordination, collaboration, distribution and<br />

<strong>supply</strong>. POS is mainly concerned with sales, customers and inventory and yet suppliers do<br />

8


play an important role in the store operations.<br />

2.2.4 Evaluation of current methodology<br />

Research and development of technologies to aid in operations of <strong>supply</strong> <strong>chain</strong> cartels has<br />

been in existence for more then ten years [11]. EDI, POS and RFID are among the most<br />

prominent technologies used in <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. Evaluating the successes and<br />

shortcomings of these technologies can be viewed in terms of interaction, flexibility, cost of<br />

implementation and usability. EDI and RFID depend fully on a networked environment operating<br />

in realtime(RFID), store and forward (EDI). These two technologies have a common<br />

shortcoming in regard to cost of implementation, usability in relation to EDI needing trained<br />

personnel and RFID being a new technology on the market and not yet well proven.<br />

POS is a technology which has developed out of the need of small establishments mainly<br />

dealing in retail business and having small <strong>chain</strong>s of <strong>supply</strong>. The wide spread use of POS<br />

could be mainly attributed to its cost effectiveness in terms of implementaion and usability.<br />

One of the biggest setbacks of POS is its sequential mode of interaction and lack of networking<br />

capabilities which proves to be a shortcoming for large retail businesses like <strong>hypermarket</strong>s<br />

with numerous outlets.<br />

Table 2.1 shows a comparison of technologies used in <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />

Table 2.1: Summary of the evaluation of POS, EDI & RFID<br />

Method Interaction Flexibility Cost of Imple- Usability<br />

Mode<br />

mentation<br />

POS Sequential Operates in real<br />

time<br />

Cost effective Easy to use<br />

EDI Networking Doesn’t operate Expensive to imple- Usage by trained<br />

in real time ment<br />

Personnel<br />

RFID Networking Operates in real Expensive to imple- New technology,not<br />

time<br />

ment<br />

yet well proven<br />

2.3 State of Practice<br />

Dell computer which was founded by Michael Dell in 1984 adopted the Internet by launching<br />

their <strong>web</strong>site www.dell.com in 1994 [7]to enable direct sell of computers to its customers<br />

which is fast thus improving <strong>supply</strong> <strong>chain</strong> <strong>management</strong> to meet customer demands. This<br />

9


enabled Dell to involve suppliers into its operations as a company. Dell’s Web site enabled<br />

its customers to view prices for computer <strong>system</strong>s that were available, place their orders as<br />

well as keep track of the orders right up to shipping [7].<br />

Federal Express [10] enables customers to keep track of their packages in real time and this<br />

has led to its partnering with Hewlett-Packard. When orders for printers are made directly<br />

online on Hewlett-Packard Web site, Federal Express receives these orders as well via the<br />

Internet. Federal Express does the shipping of the orders from its ware house containing<br />

all products. It notifies both the customers and Hewlett-Packard by sending e-mails to<br />

customers letting them know that the goods are on their way and notices of inventory to<br />

Hewlett-Packard in order to continuously replace stock at Federal Express warehouse [10].<br />

Wal-Mart which is a leading hyper store was using VMI and APO which are best suited for<br />

linear relationships, but with new developments, it has been using EDI and now considering<br />

to use RFID [6].<br />

2.4 Conclusion<br />

In order to satisfy customer requirements, boost profits and revenues, companies through the<br />

effective collaboration and coordination with their various suppliers and distributors have<br />

created cartels we now know as <strong>supply</strong> <strong>chain</strong>s. As these cartels grow in size, many problems<br />

manifest ranging from communication, distribution and information exchange. Various technologies<br />

have been used to try to solve some of these problems for example EDI,RFID and<br />

POS which however have limitations as noted above (Section 2.2.4). However, when looked<br />

at individually, these technologies have some specific benefits we can exploit to develop a<br />

means of collaboration and coordination between retailers, suppliers and distributors as a<br />

means of achieving effective <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />

10


Chapter 3<br />

METHODOLOGY<br />

3.1 Introduction<br />

This chapter presents the methodology that was used in this study. The methodology chosen<br />

followed the already tested and commonly used approach for software engineering projectsa<br />

Software Development Life Cycle. This approach was chosen because of the nature of the<br />

study and the objectives stated.<br />

3.2 Establishment of Requirements<br />

Three key methodology tools were used to establish requirements for the <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong><br />

SCM <strong>system</strong>. The first method was that we reviewed literature from written and<br />

published materials related to <strong>supply</strong> <strong>chain</strong> <strong>management</strong> <strong>system</strong>s and <strong>hypermarket</strong>s. We<br />

also reviewed literature on specific technologies and platforms used to develop SCM <strong>system</strong>s.<br />

The second method under establishment of requirements involved direct gathering<br />

of information about the two <strong>hypermarket</strong>s used in the study(Gamestore and Uchumi in<br />

Kampala). The tools used in this case were direct observations, interviews, questionnaires<br />

and scenario simulations. The third method in establishment of the requirements involved<br />

direct technology testing using currently installed POS <strong>system</strong>s. This way, the functionality<br />

defficiencies of the existing <strong>system</strong>s were identified and recorded. The scope of this work was<br />

partly fixed by the findings after this activity.<br />

11


3.3 System Design & Development<br />

Developing Web applications requires a focus on meeting user needs. The model we choose<br />

for accomplishing this was <strong>based</strong> on a component <strong>based</strong> model with a linear approach to<br />

application development (Fig.3.1). Specifications and decisions about how the different application<br />

components would acomplish our applications objectives were taken into account<br />

for example issues like meeting the applications purpose and audience, effects and functionalities.<br />

Figure 3.1: Application Development Model(Adapted from Software Engineering[24])<br />

The design of the <strong>system</strong> was <strong>based</strong> on three software components, graphical user interface(the<br />

front end), the <strong>web</strong> server&PHP scripting language(middleware/business logic) and<br />

the database <strong>management</strong> <strong>system</strong>(back end). Figure 4.2 shows the software components<br />

12


used in <strong>system</strong> design.<br />

3.3.1 System Development<br />

Figure 3.2: Conceptual Framework<br />

A linear approach to application developemnt model was selected because in a Web <strong>based</strong><br />

development environment it is possible for many of these steps shown above to develop concurrently.<br />

We mainly focused on Planning, which included defining the target audience,<br />

purpose, objectives, and policies for the application development and use, Analysis; which<br />

involved checking the technical construction of the Web application with validation tools, Design;<br />

which involved separating information into page-sized chunks, context, and navigation<br />

cues and a consistent look and feel and finally Implementation; which involved creating an<br />

extendible directory and file structure using HTML tools where helpful and using templates<br />

for supporting consistent look and feel.<br />

A client/server architecture as shown in Figure 3.3. was included to facilitate <strong>system</strong> distribution<br />

since the <strong>system</strong> was to be used at different points which could be geographically<br />

distributed. Hence a mechanism to distribute the <strong>system</strong> using client/server architecture<br />

was choosen. Web browers were used to develop the client interface, middleware applica-<br />

13


tions were developed in PHP to act as interaction interfaces between the backend which is<br />

an SQL <strong>based</strong> database.<br />

The tools selected/used to develop the SCM <strong>system</strong> were those that would enable the implementation<br />

of the <strong>system</strong> to be platform independent.Since the client interface was developed<br />

in HTML which is easily implemented and interpreted by all <strong>web</strong> browsers, the application<br />

front end then would be accessed on the different platforms which have browsers that are<br />

HTML standard complaint. The <strong>web</strong> server and the database backend that would enable<br />

the distribution of the application were <strong>based</strong> on Apache <strong>web</strong> server and MySQL database<br />

server which can also be implemented on different operating <strong>system</strong> platforms.<br />

Figure 3.3: Web Client/Server Architecture<br />

3.4 System Testing and Validation<br />

Regular <strong>system</strong> testing and validation of the SCM <strong>system</strong> was done to ensure that model<br />

quality and integrity is maintained throughout the development process. System testing<br />

14


standards and procedures were set up to be used to verify that the <strong>system</strong> met the goals<br />

that were set up. Since we were using a component model development scheme, each component/unit<br />

was tested individually prior to making it available for intergration into the final<br />

<strong>system</strong> setup. For purposes of validating the <strong>system</strong>, proposive sampling of potential users<br />

was used and feedback from them was used to incorporate the necessary adjustment and<br />

inclusions that were demanded.<br />

3.5 Conclusion<br />

The steps used here acted as an overall development methodology and life cycle which were<br />

also dependant upon avaliable tools, timeline and end user willingness to be involved in the<br />

final testing of the <strong>system</strong>. Implicit in the methodology adapted was the concept of bringing<br />

the SCM <strong>system</strong> core functionality up quickly and then refining the application/<strong>system</strong> <strong>based</strong><br />

upon user feedback.<br />

15


Chapter 4<br />

SYSTEM<br />

REQUIREMENTS,DESIGN AND<br />

IMPLEMENTATION<br />

The <strong>supply</strong> <strong>chain</strong> of our scope constituted of three entities;the organisation(<strong>hypermarket</strong>),<br />

the supplier(s) and the end consumer(the customer of the <strong>hypermarket</strong>). Hypermarkets deal<br />

in a huge range of products which are distributed by different suppliers with the need for<br />

placing orders for the various products well on time to satisfy the end consumer’s needs.<br />

Figure 4.1 shows the repetitive process of product consumption and replenishment.<br />

Figure 4.1: Activity Diagram for the <strong>supply</strong> <strong>chain</strong><br />

16


4.1 System Requirements<br />

In order to fulfill this stage of software development,this process was divided into three action<br />

areas which included requirements gathering, diagramming and prototyping.<br />

4.1.1 Requirements Gathering<br />

In this stage, the idea of the <strong>system</strong> was broken down into functionality that was to be in<br />

the application. For example, using a scenario were a user wants to add a new item to the<br />

application, how would this happen? On a high level, they would click a button which would<br />

show them a page allowing them to enter content. To break this down further, we needed<br />

to ask more questions like Can the user put in description? How do they insert them?<br />

How do they get on the server? What if the user wants to adjust the stock? Answering<br />

these questions helped determine what features were needed to implement. A final list of<br />

requirements was got which stated what functionality the application must have, should<br />

have, or that we wanted it to have. Important functionality was prioritized in form of<br />

features that were absolutely needed in the application at the top of the list. These were<br />

deemed essentials to having a usable application. Next, functionality that should be in the<br />

application but wouldn’t be critical if it didn’t appear was also included.<br />

4.1.2 Diagramming<br />

Use cases and application flow were mapped out visually to get a better sense of how everything<br />

would bind together.<br />

Application Flow<br />

The application flow provided a map of the application. In this flow, boxes for each page<br />

that the user would see within the application are represented, and arrows were used to<br />

demonstrate the expected flow the user will take through the application (Fig.4.2).<br />

This step was done to help visualize how related functionality would be tied together. In<br />

doing this, one would discover that there were ways to combine functionality or that there<br />

17


Figure 4.2: Application flow Diagram<br />

was a need to break it up into multiple steps. This step helped to gain a greater sense of<br />

the application by completing it thoroughly.<br />

Program Flow<br />

This emphasized the use of a basic mechanism of request-response activity by users to give a<br />

visual display of how users where to interact with the <strong>web</strong> application. This is because users<br />

are always requesting and submitting information with in the application . It so happens<br />

that occassionally users will be sending information to the SCM <strong>system</strong> in relation to a<br />

specific object and that the module was needed to have an interface to handle this.<br />

18


4.1.3 Prototyping<br />

Figure 4.3: Program flow Diagram<br />

A prototype, was built to gain insight on what the final product would actually look like.<br />

In this case, it helped eliminate problems before into programming the final application. In<br />

developing this application, three components were used in prototype development which<br />

included visual design, HTML prototype and usability testing.<br />

Visual Design<br />

A layout was established and elements were grouped together which helped gain a sense<br />

for how the application was going to work. Graphic design application was used and we<br />

were able to easily add new elements, resize and rotate to achieve a perfect layout of the<br />

application. Greater prominence was given to elements or tasks that were more important<br />

and those that were less important were minimized or hidden. Prominence of a given function<br />

was expressed in various ways such as size, colour, or positioning.<br />

19


HTML Prototype<br />

Once the visual design for the application was developed, we built the HTML prototype. An<br />

HTML implementation of the design helped point out possible problems with the interface<br />

design. For example, what happens when users resize their font or the size of their browser<br />

window? How would the design look across multiple browsers? One could find that something<br />

does not work quite right thus a need to go back to the design stage and redo certain<br />

elements.<br />

Usability Testing<br />

On any project, it’s a good idea to do usability testing. In this case, this involved showing<br />

it to a selected number of people to help in the testing. We also so it as a good idea to show<br />

the prototype to the type of people we expected to use the application because their input<br />

was deemed invaluable and could help determine if the design would work or not. This was<br />

done during the visual design, prototyping and even during development.<br />

4.2 System Design<br />

For rapid application development, a component <strong>based</strong> model of software design and development<br />

was used. The components herein included graphical user interface(client), <strong>web</strong><br />

server/business logic layer and the backend(database <strong>management</strong> <strong>system</strong>).<br />

4.3 Graphical User Interface<br />

A <strong>web</strong> browser <strong>based</strong> GUI implemented in HTML acted as the client side of the SCM <strong>system</strong>.<br />

This was divided into two interfaces that is the reporting interface and the POS interface.<br />

4.3.1 Reporting Interface<br />

The reporting application constituted of two interactive interfaces embedded as primary<br />

components of the POS <strong>system</strong> and the other interface for enabling the different suppliers(Fig.4.6)to<br />

view information only regarding their products. This has been backed up by a<br />

20


security mechanism which uses SSL(ref: 4.6 Security) and password authentication to allow<br />

the different suppliers to log in and view their products.<br />

POS Interface<br />

Figure 4.4: Reporting Interface for Suppliers<br />

The POS interface was divided into unique units which through their interactions make up<br />

the POS component of the SCM <strong>system</strong>. These included Sales, Reports, Configuration,<br />

Backup, User <strong>management</strong>, Customers and Items see Figure 4.7.<br />

21


Figure 4.5: POS Interface<br />

4.3.2 Database Management System<br />

The database <strong>system</strong> provided a central repository for all information regarding the <strong>hypermarket</strong>s<br />

and the suppliers. The application layer(business logic) inserts and retrieves all<br />

the information regarding the daily transactions of the SCM <strong>system</strong> and report generation<br />

method(Fig 4.3).<br />

22


The Point Of Sale <strong>system</strong><br />

Figure 4.6: Database Management System<br />

The database component responsible for servicing the POS component of the SCM <strong>system</strong><br />

constituted of units(tables) which held information in regard to Sales, Customers, Discounts,<br />

Brands, and Category <strong>management</strong> among others as shown in Table 4.1.<br />

23


Table 4.1: Tables in POS<br />

Table Purpose<br />

Sales Contain overall sale details<br />

Customers Hold information regarding customers<br />

Discounts Keep track of item discounts<br />

Brands Contain information regarding the different product brands<br />

Categories Handling of the different categories of brands of products<br />

Sales Items Hold item information for sales<br />

Suppliers Hold information about suppliers<br />

Users Hold information regarding the users of the <strong>system</strong><br />

Items Store information regarding items<br />

24


Figure 4.5 is a schema showing the interaction between the various tables in POS.<br />

4.4 Messaging<br />

Figure 4.7: POS Schema<br />

An Instant Messaging component (class) was intergrated into the SCM <strong>system</strong> to provide<br />

communication capabilities. This was to cater for instances when the supplier and the<br />

<strong>hypermarket</strong> users could be accessing the <strong>system</strong> at the same time. The <strong>hypermarket</strong>s<br />

25


could also have dedicated staff to respond to queries from suppliers by instant supplier<strong>hypermarket</strong><br />

communication(Refer to Figure 4.8). This could do away with costs incurred<br />

in telecommunication between supplier-<strong>hypermarket</strong> in issue resolving hence benefiting both<br />

parties.<br />

Figure 4.8: Flow diagram for messaging<br />

4.5 Sales and Supply Forecast<br />

We adapted a simple moving average model to incorporate forecasting capabilities within the<br />

<strong>system</strong>. This assisted in the estimation for future sales and demand being able to predict the<br />

quantity of products that need to be ordered and supplied. An unweighted mean of monthly<br />

sales for a period of a year were used as the data points for predicting sales and <strong>supply</strong>.<br />

26


4.6 Security<br />

With <strong>web</strong> applications security is very vital since these applications are accessible over networks.<br />

Web applications provide access to backend databases and hence control valuable<br />

data and are much more difficult to secure since the have some form of data capture, transmission<br />

and retrieval . As a result, these are prone to a wide variety of threats/attacks<br />

(Figure 4.9).<br />

Figure 4.9: Flow diagram for <strong>web</strong> application security<br />

In the SCM, security has been implemented at three levels, application, database and network.<br />

27


4.6.1 Database Security<br />

Database security involves allowing or denying user actions on the database and the objects<br />

within it. The processes and procedures that protect the database from unintended activity<br />

such as authenticated misuse, malicious attacks or accidental mistakes made by authorized<br />

individuals or processes [29]. Data in the database was protected by the use of MySQL<br />

Privilege <strong>system</strong>, which provided authentication that is assurance that the user is the one<br />

claimed and authorization that is whether the user has the necessary privileges to carry out<br />

query requests. User privileges included selecting, inserting, deleting, dropping, updating<br />

among others[3].<br />

4.6.2 Network Security<br />

The exchange of information over the network was protected by the use of the Secure Sockets<br />

Layer (SSL) cryptographic <strong>system</strong> implemented using openSSL to establish an encrypted<br />

communication channel using public key infrastructure(PKI)(Fig.4.8) [16]. PKI enables users<br />

of an unsecure public network such as the Internet to securely and privately exchange data<br />

through the use of a public and a private cryptographic key pair that is obtained and shared<br />

through a trusted authority [3].<br />

4.6.3 Application Security<br />

Application Security can be defined as the protection of software applications against threats<br />

[27]. This was implemented using Adminpro Class. AdminPro is a user authentication class<br />

<strong>based</strong> on a MySQL database and the PHP Session functions. This class can Login and logout<br />

a user via Web <strong>based</strong> forms, expire the session of an authenticated user if it passed a given<br />

session timeout and require to authenticate again, display error messages and point the user<br />

to the login page when the user is not authenticated or the login session expired and also<br />

check whether a logged user has administrator or user group privilege [28].<br />

28


Figure 4.10: Encrypted communication channel through SSL<br />

4.7 System Implementation<br />

We used a local area network as an implementation test ground since the conditions on<br />

LANs can be tuned to mimic a wide area network or the internet. A test environment which<br />

simulated daily activities within a <strong>hypermarket</strong> were created so as to be able to use the functions<br />

created in the <strong>system</strong> like inventory, sales and order requests. For example, processing<br />

a sale required logging into the POS interface of the <strong>system</strong>, which then provided a guided<br />

interaction through the use of links and description from the beginning to the end of a given<br />

sale. Functions like customer selection,item selection and discount provision are provided<br />

before commiting records into the database and performing receipt issuing and closing a<br />

given sale(Fig.4.9). Figure 4.10 shows the a few functions that can be carried out on the<br />

supplier interface of the SCM <strong>system</strong>.<br />

29


Figure 4.11: Processing a Sale<br />

30


Figure 4.12: Supplier -supplier interface interaction<br />

31


Chapter 5<br />

CONCLUSIONS AND<br />

RECOMMENDATIONS<br />

5.1 Conclusions<br />

The general objective of this study was to develop an interactive <strong>web</strong> <strong>based</strong> <strong>system</strong> with<br />

a user friendly interface enabling <strong>hypermarket</strong>s to control their operations and satisfy customer<br />

requirements. Inorder to achieve this various activities had to be carried out. These<br />

included; reviewing of literature on <strong>hypermarket</strong> SCM <strong>system</strong>s, establishing user and <strong>system</strong><br />

requirements for developing a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>, designing a model that<br />

enables <strong>hypermarket</strong>s to keep track of their large and diverse stock as well as obtain <strong>supply</strong><br />

and demand forecasts from records of sales and customer history and finally implement a <strong>web</strong><br />

<strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>. During the carrying out of these activities some hurdles<br />

were faced here and there. Lots of literature was available on Supply Chain Management but<br />

little was found about <strong>hypermarket</strong>s since these are just upcoming due to economic development.<br />

The available literature about <strong>hypermarket</strong>s was basically tending towards commerce.<br />

In the establishing of <strong>system</strong> requirements information from already used <strong>system</strong>s was used<br />

since <strong>web</strong> <strong>based</strong> <strong>system</strong>s have similar qualities. During the establishing of user requirements<br />

a few hyperstores in Kampala were visited, some of which were not receptive. A mechanism<br />

was devised to enable <strong>hypermarket</strong>s to keep track of their stock as well as obtain <strong>supply</strong><br />

and demand forecasts from records of sales and customer history. The identified gaps in the<br />

already used applications in <strong>hypermarket</strong>s left us no choice but to concentrate on filling these<br />

gaps thus no need to design a model. Various tools were available for <strong>system</strong> development<br />

and implementation. The choice of tools mainly depended on rapid application development<br />

32


as well as user friendliness.<br />

5.2 Recommendations<br />

The client/server architecture was used in developing this <strong>system</strong> however other architectures<br />

could be put into consideration like service oriented architecture since this allows different<br />

applications to exchange data and participate in business processes.<br />

Standardized data exchange formats like Extensible Markup Language(XML) could be considered<br />

since these facilitate sharing of structured data across different information <strong>system</strong>s<br />

particularly via the Internet unlike EDI which allows the transfer of structured data by<br />

agreed message standards from one computer <strong>system</strong> to another.<br />

33


Bibliography<br />

[1] Sila, I., Ebrahimpour, M. and Birkholz, C. (2006).Quality in <strong>supply</strong> <strong>chain</strong>s: an empirical<br />

analysis. Supply Chain Management: An International Journal Volume 11 Number 6<br />

pp. 491-502.<br />

[2] Wouters, M. (2006). Implementation costs and redistribution mechanisms in the economic<br />

evaluation of <strong>supply</strong> <strong>chain</strong> <strong>management</strong> initiatives. Supply Chain Management:<br />

An International Journal Volume 11 Number 6 pp. 510-521.<br />

[3] Gilmore, J.W. (2006). Beginning PHP and MySQL 5: From Novice to Professional<br />

Second Edition.<br />

[4] Damien, P.(2005).Determinants of business-to-business e-commerce implementation and<br />

performance: a structural model. Supply Chain Management: An International Journal<br />

Volume 10 Number 2 pp. 96-113.<br />

[5] Sherer, A.S. (2005).From <strong>supply</strong>-<strong>chain</strong> <strong>management</strong> to value network advocacy: implications<br />

for e-<strong>supply</strong> <strong>chain</strong>s. Supply Chain Management: An International Journal<br />

Volume 10 Number 2 2005 pp. 77-83.<br />

[6] Prater, E., Frazier, G.V. and Reyes, P.M. (2005). Future impacts of RFID on e-<strong>supply</strong><br />

<strong>chain</strong>s in grocery retailing. Supply Chain Management: An International Journal Volume<br />

10 Number 2 pp.134-142.<br />

[7] Yen, D.C., Tan, X. and Chou, D.C. (2004).Web technology and <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />

Information Management and Computer Security Volume 12<br />

338-349.<br />

Number 4 pp.<br />

[8] James, M., Grosvenor, R. and Prickett, P. (2004). e-Distribution: Internet-<strong>based</strong> <strong>management</strong><br />

of a <strong>supply</strong> <strong>chain</strong>. Supply Chain Management: An International Journal Volume<br />

9 Number 1 pp.7-15.<br />

34


[9] Sommerville,I.(2004).Software<br />

ISBN:0321210263.<br />

Engineering.7th Edition Addison Wesley,<br />

[10] Lankford,W.M. (2004), ”Supply <strong>chain</strong> <strong>management</strong> and the Internet” Supply Chain<br />

Management: An International Journal Volume 28 Number 4 2004 pp. 301-305.<br />

[11] NIST, (1996). Electronic Data Interchange.Federal Information Processing Standards<br />

Publication 161-2<br />

[12] Zhao, X., Xie, J.and Zhang,W.J.(2002). The impact of information sharing and coordination<br />

on <strong>supply</strong> performance Supply Chain Management: An International Journal<br />

Volume 7 Number 1 2002 pp. 24-40.<br />

[13] Greenspan,J.and Bulger,B.(2001). MySQL/PHP Database Applications M and T Books<br />

ISBN:0-7645-3537-4.<br />

[14] Muench,C.(2006). ”phpPos PHP Point of Sale v9.0 Installation and user Guide” URL<br />

address: http://www.phppointofsale.com/documentation/help.htm 12.12.2006, 13:48.<br />

[15] Eoin,L.(2003).Introduction to Supply and Materials Management. The Chartered Institute<br />

of Purchasing and Supply Easton House ISBN:1-86124-126-7.<br />

[16] Thomas,S.(2000).SSL & TLS Essentials, Securing the Web John Wiley and Sons,Inc.<br />

ISBN: 0-471-38354-6.<br />

[17] Jun, M. and Cai, S. (2003).Key obstacles to EDI success: from the US small manufacturing<br />

companies’ perspective. Industrial Management and Data Systems Volume 103<br />

Number 3 pp. 192-203.<br />

[18] Weber,M.W. and Kantamneni, P.S. (2002).POS and EDI in retailing: underlying benefits<br />

and barriers. Supply Chain Management: An International Journal Volume 7 Number<br />

5 pp. 311-317.<br />

[19] Saygin, C., Cha, K., Zawodniok, M., Z, Ramachandran, A. and Sarangapani<br />

J.(2006).Interference mitigation and read rate improvement in RFID-<strong>based</strong> networkcentric<br />

environments. Sensor Review Volume 26 Number 4 pp. 318-325.<br />

[20] Zhang, G., Lai, F. and Hutchinson, J.(2006).Radio frequency identification(RFID) in<br />

China: opportunities and challenges. International Journal of Retail and Distribution<br />

Management Volume 33 Number 12 pp. 905-916.<br />

35


[21] Li, S., Visich, J.L., Khumawala, B.M. and Zhang, C. (2006).Radio frequency identification<br />

technology: applications, technical challenges and strategies. Sensor Review<br />

Volume 26 Number 3 pp. 193-202.<br />

[22] Jones, P., Clarke-Hill, C., Shears, P., Comfort, D. and Hillier, D. (2004).Radio frequency<br />

identification in the UK: opportunities and challenges. International Journal of Retail<br />

and Distribution Management Volume 32 Number 3 pp. 164-171.<br />

[23] Chang-tseh,H.and Binshan,L.(2004).Impact of standardization on EDI in B2B development.<br />

Industrial Management and Data Systems Volume 104 Number 1 pp. 68-77.<br />

[24] Sommerville,I.(2000).Software<br />

ISBN:9780201398151.<br />

Engineering.5th Edition Addison Wesley,<br />

[25] Octavian,A.W(1999). ”The Conceptual Architecture of the Apache Web Server” URL<br />

address: http://www.cs.ucsb.edu/˜tve/cs290i-sp01/papers/concept Apache Arch.htm<br />

25.11.2007, 18:48.<br />

[26] Brayton, J., Finneman, A., Turajski, N. and Wiltsey, S. (2006). ”PKI” URL<br />

address: http://searchsecurity.techtarget.com/sDefinition/0,,sid14 gci214299,00.html<br />

13.01.2008, 22:57.<br />

[27] Main,A., Van Oorschot,P.C.(2003). Software Protection and Application Security:Understanding<br />

the Battleground.<br />

[28] PHP Classes (1999-2008). ”Class: AdminPro class” URL address:<br />

http://www.phpclasses.org/browse/package/1830.html 13.01.2008, 00:20.<br />

[29] Wikipedia,the free encyclopedia (2008). ”Database Security” URL address:<br />

http://en.wikipedia.org/wiki/Database security 13.01.2008, 21:50.<br />

[30] Alberta E-future Centre(2007). ”Supply Chain Management” URL address: http://efuture.ca/alberta<br />

23.01.2008, 18:54.<br />

36


Appendix 1SQL statements used to create the different tables in POS.<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos brands‘;<br />

CREATE TABLE ‘pos‘.‘pos brands‘ (<br />

‘brand‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos categories‘;<br />

CREATE TABLE ‘pos‘.‘pos categories‘ (<br />

‘category‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos customers‘;<br />

CREATE TABLE ‘pos‘.‘pos customers‘ (<br />

‘first name‘ VARCHAR(75) NOT NULL DEFAULT ”,<br />

‘last name‘ VARCHAR(75) NOT NULL DEFAULT ”,<br />

‘account number‘ VARCHAR(10) NOT NULL DEFAULT ”,<br />

‘phone number‘ VARCHAR(25) NOT NULL DEFAULT ”,<br />

‘email‘ VARCHAR(40) NOT NULL DEFAULT ”,<br />

‘street address‘ VARCHAR(150) NOT NULL DEFAULT ”,<br />

‘comments‘ BLOB NOT NULL DEFAULT ”,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos discounts‘;<br />

CREATE TABLE ‘pos‘.‘pos discounts‘ (<br />

‘item id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘percent off‘ VARCHAR(60) NOT NULL,<br />

37


‘comment‘ BLOB NOT NULL,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos items‘;<br />

CREATE TABLE ‘pos‘.‘pos items‘ (<br />

‘item name‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />

‘item number‘ VARCHAR(15) NOT NULL DEFAULT ”,<br />

‘description‘ BLOB NOT NULL DEFAULT ”,<br />

‘brand id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘category id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘supplier id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘buy price‘ VARCHAR(30) NOT NULL,<br />

‘unit price‘ VARCHAR(30) NOT NULL,<br />

‘supplier catalogue number‘ VARCHAR(60) NOT NULL,<br />

‘tax percent‘ VARCHAR(5) NOT NULL,<br />

‘total cost‘ VARCHAR(40) NOT NULL,<br />

‘quantity‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘reorder level‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos sales‘;<br />

CREATE TABLE ‘pos‘.‘pos sales‘ (<br />

‘date‘ DATE NOT NULL DEFAULT ’0000-00-00’,<br />

‘customer id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘sale sub total‘ VARCHAR(12) NOT NULL,<br />

‘sale total cost‘ VARCHAR(30) NOT NULL,<br />

‘paid with‘ VARCHAR(25) NOT NULL,<br />

‘items purchased‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘sold by‘ INT(8) NOT NULL DEFAULT ’0’,<br />

38


‘comment‘ VARCHAR(100) NOT NULL,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos sales items‘;<br />

CREATE TABLE ‘pos‘.‘pos sales items‘ (<br />

‘sale id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘item id‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘quantity purchased‘ INT(8) NOT NULL DEFAULT ’0’,<br />

‘item unit price‘ VARCHAR(15) NOT NULL,<br />

‘item buy price‘ VARCHAR(30) NOT NULL,<br />

‘item tax percent‘ VARCHAR(10) NOT NULL,<br />

‘item total tax‘ VARCHAR(12) NOT NULL,<br />

‘item total cost‘ VARCHAR(12) NOT NULL,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos suppliers‘;<br />

CREATE TABLE ‘pos‘.‘pos suppliers‘ (<br />

‘supplier‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />

‘address‘ VARCHAR(100) NOT NULL DEFAULT ”,<br />

‘phone number‘ VARCHAR(40) NOT NULL DEFAULT ”,<br />

‘contact‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />

‘email‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />

‘other‘ VARCHAR(150) NOT NULL DEFAULT ”,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

DROP TABLE IF EXISTS ‘pos‘.‘pos users‘;<br />

CREATE TABLE ‘pos‘.‘pos users‘ (<br />

39


‘first name‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />

‘last name‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />

‘username‘ VARCHAR(20) NOT NULL DEFAULT ”,<br />

‘password‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />

‘type‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />

‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />

PRIMARY KEY (‘id‘)<br />

)<br />

ENGINE = InnoDB<br />

40


Appendix 2POS Home Page<br />

41


Appendix 3Login Page into the Reporting Interface for suppliers<br />

42


Appendix 4Logout Page into the Reporting Interface for suppliers<br />

43


Appendix 5Home Page for CK and Company Ltd<br />

44


Appendix 6Home Page for Century Bottling Company Ltd<br />

45


Appendix 7Home Page for Nile Breweries Ltd<br />

46


Appendix 8Home Page for Crown Beverages Ltd<br />

47


Appendix 9Web Page for the different Report Categories on the Reporting<br />

Interface for Suppliers<br />

48


Appendix 10An example of a <strong>web</strong> page for Stock Report<br />

49


Appendix 11Web Page for the different Graph Categories on the Reporting<br />

Interface for Suppliers<br />

50


Appendix 12An example of a <strong>web</strong> page for Stock Graph<br />

51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!