a web based hypermarket supply chain management system
a web based hypermarket supply chain management system
a web based hypermarket supply chain management system
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
A WEB BASED HYPERMARKET SUPPLY<br />
CHAIN MANAGEMENT SYSTEM<br />
NAKIYINGI DIANA<br />
Reg.No: 2005/HD18/540U<br />
Bsc (Mak)<br />
Email:dnakiyingi@yahoo.com, Tel: +256-772-538-701<br />
A Project Report Submitted to School of Graduate Studies in<br />
Partial Fulfillment of the Requirements for the Award of the<br />
Degree of Master of Science in Computer Science of<br />
Makerere University<br />
Option: Computer Science<br />
June, 2008
DECLARATION<br />
I Nakiyingi Diana do hereby declare that this Project Report is original and has not been<br />
published and/or submitted for any other degree award to any other University before.<br />
.......................................<br />
Diana Nakiyingi<br />
BSc(Mak)<br />
Department of Computer Science<br />
Faculty of Computing and Information Technology<br />
Makerere University
APPROVAL<br />
This project report has been submitted for examination with the approval of the following<br />
supervisor(s):<br />
.......................................<br />
Dr.John Quinn,(PhD)<br />
Department of Computer Science<br />
Faculty of Computing and Information Technology<br />
Makerere University<br />
.......................................<br />
Mr.N.T Rwangoga<br />
Department of Computer Science<br />
Faculty of Computing and Information Technology<br />
Makerere University<br />
ii
DEDICATION<br />
To my family, my friends for their encouragement and support throughout my studies.<br />
iii
ACKNOWLEDGEMENTS<br />
I am very grateful to my supervisors Mr.N.T Rwangoga and Dr.John Quinn for their constructive<br />
ideas as well as guidance without which this report might have not been.<br />
I also want to express my appreciation to my former supervisor Prof.H.N.Muyingi for his<br />
guidance and support.<br />
My coursemates: Julius for his assistance and quality time and Salim for your ideas that<br />
have contributed to the successful completion of this research.<br />
Last but not least, I wish to express my gratitude to God who granted me life and good<br />
health throughout my studies. Thank you Lord!<br />
Diana Nakiyingi<br />
June 2008<br />
iv
Contents<br />
1 INTRODUCTION 1<br />
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />
1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />
1.3 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />
1.3.1 General Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />
1.3.2 Specific Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />
1.4 Significance of Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />
1.5 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />
2 LITERATURE REVIEW 4<br />
2.1 State of the Art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />
2.2 Current methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />
2.2.1 Electronic Data Interchange(EDI) . . . . . . . . . . . . . . . . . . . . 6<br />
2.2.2 Radio Frequency Identification(RFID) . . . . . . . . . . . . . . . . . 7<br />
2.2.3 Point-of-Sale(POS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />
2.2.4 Evaluation of current methodology . . . . . . . . . . . . . . . . . . . 9<br />
2.3 State of Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />
3 METHODOLOGY 11<br />
v
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />
3.2 Establishment of Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />
3.3 System Design & Development . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />
3.3.1 System Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />
3.4 System Testing and Validation . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />
3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />
4 SYSTEM REQUIREMENTS,DESIGN AND IMPLEMENTATION 16<br />
4.1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />
4.1.1 Requirements Gathering . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />
4.1.2 Diagramming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />
4.1.3 Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
4.2 System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
4.3 Graphical User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
4.3.1 Reporting Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
4.3.2 Database Management System . . . . . . . . . . . . . . . . . . . . . . 22<br />
4.4 Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />
4.5 Sales and Supply Forecast . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br />
4.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />
4.6.1 Database Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />
4.6.2 Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />
4.6.3 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />
4.7 System Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29<br />
5 CONCLUSIONS AND RECOMMENDATIONS 32<br />
5.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />
vi
5.2 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br />
vii
List of Figures<br />
2.1 Basic <strong>supply</strong> <strong>chain</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />
3.1 Application Development Model(Adapted from Software Engineering[24]) . . 12<br />
3.2 Conceptual Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />
3.3 Web Client/Server Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />
4.1 Activity Diagram for the <strong>supply</strong> <strong>chain</strong> . . . . . . . . . . . . . . . . . . . . . 16<br />
4.2 Application flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />
4.3 Program flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
4.4 Reporting Interface for Suppliers . . . . . . . . . . . . . . . . . . . . . . . . 21<br />
4.5 POS Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />
4.6 Database Management System . . . . . . . . . . . . . . . . . . . . . . . . . 23<br />
4.7 POS Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />
4.8 Flow diagram for messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br />
4.9 Flow diagram for <strong>web</strong> application security . . . . . . . . . . . . . . . . . . . 27<br />
4.10 Encrypted communication channel through SSL . . . . . . . . . . . . . . . . 29<br />
4.11 Processing a Sale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />
4.12 Supplier -supplier interface interaction . . . . . . . . . . . . . . . . . . . . . 31<br />
viii
List of Tables<br />
2.1 Summary of the evaluation of POS, EDI & RFID . . . . . . . . . . . . . . . 9<br />
4.1 Tables in POS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />
ix
ASP - Active Server Pages<br />
ACRONYMS<br />
EDI - Electronic Data Interchange<br />
EPC - Electronic Product Code<br />
GUI - Graphical User Interface<br />
HTML - Hypertext Markup Language<br />
HTTP - Hypertext Transfer Protocol<br />
HTTPS - Hypertext Transfer Protocol Secure<br />
IIS - Microsoft’s Internet Information Server<br />
JSP - Java Server Pages<br />
JDBC - Java Database Connectivity<br />
ODBC - Open Database Connectivity<br />
PHP - Php Hypertext Preprocessor<br />
PKI - Public Key Infrastructure<br />
POS - Point Of Sale<br />
RFID - Radio Frequency Identification<br />
SCM - Supply Chain Management<br />
SSL - Secure Sockets Layer<br />
SQL - Structured Query Language<br />
TCP/IP - Transmission Control Protocol/Internet Protocol<br />
x
ABSTRACT<br />
The current level of maturity of Web technology in application development has led to Hypermarkets<br />
exploiting it to solve some of their logistical problems like <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />
Web technology can be used to improve the efficiency of business processes through on-line<br />
means of communication within a distributed environment. This on-line means of communication<br />
enables coordination and collaboration between the different stakeholders within the<br />
<strong>supply</strong> <strong>chain</strong>, that is suppliers, third party providers, and customers.<br />
Through research we found out that most applications developed for use in retail business<br />
have focused on Point of Sale software, which mainly monitors sales, customers and inventory.<br />
However, the needs for <strong>hypermarket</strong>s go beyond sales, customers and inventory <strong>management</strong><br />
since these establishments deal with different suppliers hence a large <strong>chain</strong> of suppliers.<br />
Planning, coordination, collaboration, distribution are among the common problems these<br />
establishments face, needing a new <strong>system</strong> to put these into consideration.<br />
We focus on implementing a <strong>web</strong> <strong>based</strong> <strong>system</strong> to improve on the daily operations of Hypermarkets<br />
in order to satisfy customer requirements through establishing user and <strong>system</strong><br />
requirements for developing such applications. In addition, we designed a model that enables<br />
<strong>hypermarket</strong>s to keep track of their large and diverse stock as well as obtaining <strong>supply</strong> and<br />
demand forecasts.<br />
We present a methodology that follows already tested and commonly used approach for software<br />
engineering projects.This approach was chosen because of the nature of the study and<br />
the objectives we aimed to achieve. We focus on establishing user requirements through literature<br />
review, direct gathering of information and direct technology testing using currently<br />
installed POS <strong>system</strong>s.<br />
After a review of our findings, we developed a prototype that could be used by big retail<br />
establishments to do their day to day business and manage <strong>supply</strong> <strong>chain</strong>s. Notable in this research<br />
is the need to exploit new client/server architecture like service oriented architectures<br />
which allow different applications to exchange data and participate in business processes.<br />
Standardized data exchange formats like Extensible Markup Language(XML) could also<br />
be considered since these facilitate sharing of structured data across different information<br />
<strong>system</strong>s particularly via the Internet unlike the popular EDI.<br />
xi
Chapter 1<br />
INTRODUCTION<br />
1.1 Background<br />
Hypermarkets are superstores which combine supermarkets and departmental stores resulting<br />
into establishments with a large and diverse range of products. These products include<br />
groceries and general merchandise. These stores tend to sell different brands of a variety of<br />
products which calls for a large <strong>chain</strong> of suppliers. Since these suppliers are different and distributed,<br />
issues of planning, coordination and collaboration arise. Supply <strong>chain</strong> <strong>management</strong><br />
is the process which encompasses sourcing and procurement, scheduling, order processing,<br />
inventory <strong>management</strong>, transportation, customer service and the information <strong>system</strong>s used<br />
to monitor these activities [10]. It ensures coordination and collaboration with suppliers,<br />
third-party service providers, intermediaries and customers.<br />
Web technology has become a means of communication, information and data exchange and<br />
its current level of maturity as an application development platform provides an efficient and<br />
effective opportunity for large establishments like <strong>hypermarket</strong>s to exploit it to solve some<br />
of their logistical problems like <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. This study aims at developing<br />
a <strong>system</strong> which is <strong>based</strong> on this technology that will enable <strong>hypermarket</strong>s to control their<br />
operations to satisfy customer requirements.<br />
1.2 Problem Statement<br />
Most applications developed for use in retail business have focused on Point of Sale software,<br />
which mainly monitors sales, customers and inventory [14]. However, the needs for<br />
1
<strong>hypermarket</strong>s go beyond sales, customers and inventory <strong>management</strong> since these stores deal<br />
in different brands of a variety of products on a large scale hence a large <strong>chain</strong> of suppliers.<br />
Issues of planning, coordination, collaboration, distribution and <strong>supply</strong> arise leading<br />
to the need for a <strong>system</strong> to put these into consideration. In this study, we seek to develop<br />
a <strong>system</strong> that can improve the performance of sales monitoring and <strong>supply</strong> monitoring to<br />
effectively ensure accurate stock controls. The monitoring and stock inventory <strong>management</strong><br />
functions ought to be done at two nodes, the supplier’s node and the customer, in this case<br />
the <strong>hypermarket</strong>s node. How to make this possible is the work that we attempt in this study.<br />
1.3 Objectives<br />
1.3.1 General Objective<br />
To develop an interactive <strong>web</strong> <strong>based</strong> <strong>system</strong> with a user friendly interface, that will enable<br />
<strong>hypermarket</strong>s to control their operations and satisfy customer requirements.<br />
1.3.2 Specific Objectives<br />
1. To review literature on <strong>hypermarket</strong> <strong>supply</strong> <strong>chain</strong> <strong>management</strong> <strong>system</strong>s inorder to<br />
identify existing gaps.<br />
2. To establish user and <strong>system</strong> requirements for developing a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong><br />
SCM <strong>system</strong> <strong>based</strong> on findings in (1) above.<br />
3. To design a model that enables <strong>hypermarket</strong>s to keep track of their large and diverse<br />
stock as well as obtain <strong>supply</strong> and demand forecasts from records of sales and customer<br />
history.<br />
4. To implement a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>.<br />
5. To test and validate the implemented <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>.<br />
1.4 Significance of Study<br />
Point of Sale(POS) which mainly monitors sales, customers and inventory is the most used<br />
information <strong>system</strong> application in <strong>hypermarket</strong>s. Hypermarkets do deal in a variety of<br />
2
products supplied by different suppliers. Enabling the suppliers monitor the products that<br />
they do <strong>supply</strong> to the <strong>hypermarket</strong> inorder to ease order processing which is the aim of<br />
this study will improve on the daily operations of the <strong>hypermarket</strong>s. And since there is<br />
economic development all over the world, there has been a shift from single stall shops to<br />
<strong>hypermarket</strong>s, which provide a huge retail facility satisfying all of consumers’routine weekly<br />
shopping needs.<br />
1.5 Scope<br />
Supply <strong>chain</strong> <strong>management</strong>(SCM) encompasses various activities such as sourcing and procurement,<br />
scheduling, order processing, inventory <strong>management</strong>, transportation, customer<br />
service and the information <strong>system</strong>s used to monitor these activities [10]. This study focused<br />
on order processing, inventory <strong>management</strong>, customer service and the information <strong>system</strong>s<br />
used to monitor them. Order processing involves order placement, order confirmation, order<br />
fulfillment and order inquiry. The <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong> developed shall enable<br />
the execution of order processing through on-line means of communication between the<br />
suppliers and the <strong>hypermarket</strong> by an instant messaging <strong>system</strong>. The POS <strong>system</strong> which is a<br />
component of the whole <strong>system</strong> used in the <strong>hypermarket</strong> shall manage sales, inventory and<br />
customers. The <strong>supply</strong> <strong>chain</strong> consisted of three entities; the organization(<strong>hypermarket</strong>), the<br />
supplier(s) and the end consumer(customer of the <strong>hypermarket</strong>).<br />
3
Chapter 2<br />
LITERATURE REVIEW<br />
2.1 State of the Art<br />
Research has been conducted on SCM regarding the objectives, the different ways on how<br />
it can be implemented, as well as the issues associated with it. SCM was looked at as the<br />
coordination of products and information flows among suppliers, manufacturers, distributors,<br />
retailers and customer(Fig.2.1) [12]. With appropriate exchange of information among<br />
these, costs can be reduced as well as improved customer service attained. The forecast was<br />
considered as the most crucial factor that could influence the <strong>supply</strong> <strong>chain</strong>. Forecasts are<br />
needed to enable firms in the <strong>supply</strong> <strong>chain</strong> to make planning and inventory decisions which<br />
mainly base on demand forecasts. When forecasts are inaccurate, this leads to back ordering<br />
in which the quantity that is ordered does not reflect the demand for the period it is supposed<br />
to cover. Information sharing and continuous coordination results in cost reduction<br />
for both the supplier and retailer [12].<br />
Figure 2.1: Basic <strong>supply</strong> <strong>chain</strong><br />
4
Modern SCM is regarded as the use of new information technologies in order to speed up<br />
information flow among different firms in the <strong>supply</strong> <strong>chain</strong> by use of linked information <strong>system</strong>s.<br />
This aims at improving the coordination of operation processes, products and services<br />
which were required by customers. This in turn reduces costs in the <strong>supply</strong> <strong>chain</strong> and improves<br />
the quality of service offered to customers [2].<br />
Various methods are implemented to support <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. Information <strong>management</strong><br />
<strong>system</strong> applications by far have been the most used. These <strong>system</strong>s were designed<br />
depending on the specific objectives to be obtained and also on the areas where they were<br />
to be used. Most <strong>system</strong>s that were built aimed at enhancing customer relationships, monitoring<br />
product levels and sales [8]. Different applications were developed for both planning<br />
and execution of SCM. Collaborative Planning, Forecasting and Replenishment (CPFR) was<br />
designed for planning in inter-organizations. Electronic Data Interchange (EDI) and Vendor<br />
Managed Inventory (VMI) were designed for execution in inter-organizations. EDI involved<br />
the exchange of information from one computer to another through electronic means and<br />
VMI approach involved making contracts with suppliers by agreeing on stock levels and deciding<br />
how frequently to replenish and the quantities to deliver [15]. Warehouse Management<br />
System (WMS) which is concerned with the managing of warehouse resources such as space,<br />
labor, equipment and materials flow, and Yard Management System(YMS) were designed<br />
for execution in intra-organizations. Systems such as Customer Relationship Management<br />
(CRM) which focused on firms managing and maintaining customer relationships by storing<br />
their information were developed separately from <strong>system</strong>s which focused on fulfillment [5].<br />
The latest development in product identification is using Radio Frequency Identification<br />
(RFID) technology which is being introduced into the retail industry to enable the integration<br />
of their <strong>supply</strong> <strong>chain</strong>s [6]. The RFID technology constitutes of two parts; the tag<br />
and the tag reader also referred to as the scanner responsible for sensing an item and cross<br />
examining information about each item. The radio frequency tag consists of an antenna<br />
and a chip containing electronic product code. The tag broadcasts radio frequency when<br />
exposed to a scanner within a yard and is able to tell what product it is, when and where<br />
it was manufactured, where its components came from and when it will expire. The most<br />
commonly used in the retail business is the barcode reader. RFID enables stores to know<br />
their in-stock almost in real time since the distribution centers and warehouses can access<br />
5
the current store inventory as well as the information regarding the trend of demand through<br />
the Electronic Data Interchange (EDI) capabilities [6].<br />
The daily advancements in information technology has led to business partners adopting<br />
the Internet and Web technology in their <strong>supply</strong> <strong>chain</strong>. The Internet has led to a net work<br />
flow of information and with integration of the Web, this has lead to a variety of business<br />
partners in the <strong>supply</strong> <strong>chain</strong> participating in the <strong>supply</strong> <strong>chain</strong> processes. The Internet is<br />
a fast transmission of information over a net work which leads to a seamless real time<br />
communication between business partners. Information on the Internet can be exchanged<br />
through Web pages. A variety of products and services can be accessed on the Web sites of<br />
suppliers. Web technology provides real time flow of data between the different links of the<br />
<strong>supply</strong> <strong>chain</strong> leading to collaboration among business partners [7].<br />
2.2 Current methodologies<br />
2.2.1 Electronic Data Interchange(EDI)<br />
EDI, a data format used for inter-business messaging was partially responsible for reducing<br />
costs and increasing productivity in the manufacturing and service industries. EDI’s intended<br />
purpose was to provide a common messaging standard for businesses to communicate with<br />
other businesses. Rather than having to deal with a different data format for each trading<br />
partner, all businesses could convert their proprietary data format to EDI to send or receive<br />
messages and then convert EDI to their respective proprietary formats. Over the years, EDI<br />
has evolved into a mechanism for integrating back office <strong>system</strong>s and communication with<br />
business partners that has served its users well. However, it has inflexible, inherent, and<br />
practical problems that put a ceiling on its usefulness. EDI was an unlikely choice for a use<br />
other than inter-business messaging [23].<br />
EDI’s Problems<br />
Integration of EDI with an organization’s internal computer <strong>system</strong>s and with those of trading<br />
partners was considerably a difficult task. This was mainly due to the incompatibilities<br />
between EDI software and in-house applications, and the existence of several standards for<br />
information exchange of protocols, procedures, and data forms. There were also <strong>system</strong><br />
6
stability issues such as disaster recovery, data backup and error recovery which were major<br />
concerns of most business organisations[17].<br />
Security issues such as the disclosure of messages, modification of message contents, modification<br />
of message sequence, sender masquerade and repudiation of message origin or receipt<br />
were a serious concern for EDI users. The failure to detect such security risks could damage<br />
the communication and partnerships between trading partners [17].<br />
2.2.2 Radio Frequency Identification(RFID)<br />
RFID is a method of identifying items using radio waves and this technology allowed automatic<br />
collection of product data quickly and easily without human intervention [22]. It<br />
consists of the RFID tag or transponder, which is located on the object to be identified<br />
and was the data carrier in the RFID <strong>system</strong>;the RFID reader or transceiver, which is able<br />
to both read data from and write data to a transponder and the back-end database which<br />
associates records with data collected by readers [21]. The tag is made up of a microchip<br />
with a coiled antenna and a reader with an antenna which sends out electromagnetic waves<br />
that form a magnetic field when they couple with the antenna on the tag. The tag obtains<br />
power from the magnetic field which it uses to power the microchip circuits. The waves that<br />
the tag sends back to the reader are modulated by the chip and the reader converts the new<br />
waves into digital data [22].<br />
Problems with RFID<br />
Since RFID <strong>system</strong>s make use of the electromagnetic spectrum, they are relatively easy to<br />
jam using energy at the right frequency. This provides an inconvenience for consumers in<br />
stores in form of longer waits at the checkout. Also, active RFID tags that use a battery to<br />
increase the range of the <strong>system</strong> can be repeatedly interrogated to wear the battery down,<br />
disrupting the <strong>system</strong>. It should also be noted that radio waves cannot be read through<br />
metal. Simply wrapping several layers of aluminum foil around an item can defeat the<br />
security <strong>system</strong> in super stores [19].<br />
One of the primary issues to be concerned with a RFID implementation is the immaturity of<br />
the industry. Standards are only just being developed. Tags and readers are being modified<br />
and improved at a rapid rate. Competing technologies and non-crosscomplient <strong>system</strong>s<br />
7
still exist. This ongoing development could make equipment and tags obsolete, rendering<br />
investments in older equipment useless, and requiring expensive conversions and upgrades<br />
[21].<br />
A number of standards have been developed within the RFID market such as the International<br />
Standards Organisation (ISO) and Electronic Product Code (EPC) Global. Additionally,<br />
there are also a number of special interest groups including industry specific such as<br />
the American Trucking Association in the transport industry, mobile devices and computer<br />
industry or the Automotive Industry Action Group in the automotive industry that seek to<br />
influence RFID standards development which has led the non-uniformity in the technology<br />
standardisation therefore creating problems for consumers [20].<br />
There is lack of privacy that is the transactional data that is being held on the tag after the<br />
point of sale can easily be accessed by third parties [22].<br />
A variety of individual RFID products and services are on the market that is tags, readers,<br />
hardware, software which makes the total cost of implementation of RFID technology not<br />
transparent. The exact price calculation as part of a cost-benefit analysis is difficult because<br />
of the number of unknown variables. A RFID implementation cost analysis has to take into<br />
consideration not only the investment in the transponders and readers, but also other cost<br />
drivers, such as peripheral <strong>system</strong>s, software and integration efforts [21].<br />
2.2.3 Point-of-Sale(POS)<br />
POS refers to the in-store entering and accessing of product and/or customer information in<br />
order to facilitate product sale to the customer [18]. This mainly monitors sales, customers<br />
and inventory [14].<br />
Retailers believe that POS offers the ability to improve customer service by reducing checkout<br />
times,improving retail store <strong>management</strong> by maintaining both inventory value and<br />
strengthening inventory <strong>management</strong> that is reduced stockouts and inventory levels [18].<br />
POS Limitation<br />
Since <strong>hypermarket</strong>s deal in a huge and diverse range of products involving a large <strong>chain</strong><br />
of suppliers, this leads to issues of planning, coordination, collaboration, distribution and<br />
<strong>supply</strong>. POS is mainly concerned with sales, customers and inventory and yet suppliers do<br />
8
play an important role in the store operations.<br />
2.2.4 Evaluation of current methodology<br />
Research and development of technologies to aid in operations of <strong>supply</strong> <strong>chain</strong> cartels has<br />
been in existence for more then ten years [11]. EDI, POS and RFID are among the most<br />
prominent technologies used in <strong>supply</strong> <strong>chain</strong> <strong>management</strong>. Evaluating the successes and<br />
shortcomings of these technologies can be viewed in terms of interaction, flexibility, cost of<br />
implementation and usability. EDI and RFID depend fully on a networked environment operating<br />
in realtime(RFID), store and forward (EDI). These two technologies have a common<br />
shortcoming in regard to cost of implementation, usability in relation to EDI needing trained<br />
personnel and RFID being a new technology on the market and not yet well proven.<br />
POS is a technology which has developed out of the need of small establishments mainly<br />
dealing in retail business and having small <strong>chain</strong>s of <strong>supply</strong>. The wide spread use of POS<br />
could be mainly attributed to its cost effectiveness in terms of implementaion and usability.<br />
One of the biggest setbacks of POS is its sequential mode of interaction and lack of networking<br />
capabilities which proves to be a shortcoming for large retail businesses like <strong>hypermarket</strong>s<br />
with numerous outlets.<br />
Table 2.1 shows a comparison of technologies used in <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />
Table 2.1: Summary of the evaluation of POS, EDI & RFID<br />
Method Interaction Flexibility Cost of Imple- Usability<br />
Mode<br />
mentation<br />
POS Sequential Operates in real<br />
time<br />
Cost effective Easy to use<br />
EDI Networking Doesn’t operate Expensive to imple- Usage by trained<br />
in real time ment<br />
Personnel<br />
RFID Networking Operates in real Expensive to imple- New technology,not<br />
time<br />
ment<br />
yet well proven<br />
2.3 State of Practice<br />
Dell computer which was founded by Michael Dell in 1984 adopted the Internet by launching<br />
their <strong>web</strong>site www.dell.com in 1994 [7]to enable direct sell of computers to its customers<br />
which is fast thus improving <strong>supply</strong> <strong>chain</strong> <strong>management</strong> to meet customer demands. This<br />
9
enabled Dell to involve suppliers into its operations as a company. Dell’s Web site enabled<br />
its customers to view prices for computer <strong>system</strong>s that were available, place their orders as<br />
well as keep track of the orders right up to shipping [7].<br />
Federal Express [10] enables customers to keep track of their packages in real time and this<br />
has led to its partnering with Hewlett-Packard. When orders for printers are made directly<br />
online on Hewlett-Packard Web site, Federal Express receives these orders as well via the<br />
Internet. Federal Express does the shipping of the orders from its ware house containing<br />
all products. It notifies both the customers and Hewlett-Packard by sending e-mails to<br />
customers letting them know that the goods are on their way and notices of inventory to<br />
Hewlett-Packard in order to continuously replace stock at Federal Express warehouse [10].<br />
Wal-Mart which is a leading hyper store was using VMI and APO which are best suited for<br />
linear relationships, but with new developments, it has been using EDI and now considering<br />
to use RFID [6].<br />
2.4 Conclusion<br />
In order to satisfy customer requirements, boost profits and revenues, companies through the<br />
effective collaboration and coordination with their various suppliers and distributors have<br />
created cartels we now know as <strong>supply</strong> <strong>chain</strong>s. As these cartels grow in size, many problems<br />
manifest ranging from communication, distribution and information exchange. Various technologies<br />
have been used to try to solve some of these problems for example EDI,RFID and<br />
POS which however have limitations as noted above (Section 2.2.4). However, when looked<br />
at individually, these technologies have some specific benefits we can exploit to develop a<br />
means of collaboration and coordination between retailers, suppliers and distributors as a<br />
means of achieving effective <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />
10
Chapter 3<br />
METHODOLOGY<br />
3.1 Introduction<br />
This chapter presents the methodology that was used in this study. The methodology chosen<br />
followed the already tested and commonly used approach for software engineering projectsa<br />
Software Development Life Cycle. This approach was chosen because of the nature of the<br />
study and the objectives stated.<br />
3.2 Establishment of Requirements<br />
Three key methodology tools were used to establish requirements for the <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong><br />
SCM <strong>system</strong>. The first method was that we reviewed literature from written and<br />
published materials related to <strong>supply</strong> <strong>chain</strong> <strong>management</strong> <strong>system</strong>s and <strong>hypermarket</strong>s. We<br />
also reviewed literature on specific technologies and platforms used to develop SCM <strong>system</strong>s.<br />
The second method under establishment of requirements involved direct gathering<br />
of information about the two <strong>hypermarket</strong>s used in the study(Gamestore and Uchumi in<br />
Kampala). The tools used in this case were direct observations, interviews, questionnaires<br />
and scenario simulations. The third method in establishment of the requirements involved<br />
direct technology testing using currently installed POS <strong>system</strong>s. This way, the functionality<br />
defficiencies of the existing <strong>system</strong>s were identified and recorded. The scope of this work was<br />
partly fixed by the findings after this activity.<br />
11
3.3 System Design & Development<br />
Developing Web applications requires a focus on meeting user needs. The model we choose<br />
for accomplishing this was <strong>based</strong> on a component <strong>based</strong> model with a linear approach to<br />
application development (Fig.3.1). Specifications and decisions about how the different application<br />
components would acomplish our applications objectives were taken into account<br />
for example issues like meeting the applications purpose and audience, effects and functionalities.<br />
Figure 3.1: Application Development Model(Adapted from Software Engineering[24])<br />
The design of the <strong>system</strong> was <strong>based</strong> on three software components, graphical user interface(the<br />
front end), the <strong>web</strong> server&PHP scripting language(middleware/business logic) and<br />
the database <strong>management</strong> <strong>system</strong>(back end). Figure 4.2 shows the software components<br />
12
used in <strong>system</strong> design.<br />
3.3.1 System Development<br />
Figure 3.2: Conceptual Framework<br />
A linear approach to application developemnt model was selected because in a Web <strong>based</strong><br />
development environment it is possible for many of these steps shown above to develop concurrently.<br />
We mainly focused on Planning, which included defining the target audience,<br />
purpose, objectives, and policies for the application development and use, Analysis; which<br />
involved checking the technical construction of the Web application with validation tools, Design;<br />
which involved separating information into page-sized chunks, context, and navigation<br />
cues and a consistent look and feel and finally Implementation; which involved creating an<br />
extendible directory and file structure using HTML tools where helpful and using templates<br />
for supporting consistent look and feel.<br />
A client/server architecture as shown in Figure 3.3. was included to facilitate <strong>system</strong> distribution<br />
since the <strong>system</strong> was to be used at different points which could be geographically<br />
distributed. Hence a mechanism to distribute the <strong>system</strong> using client/server architecture<br />
was choosen. Web browers were used to develop the client interface, middleware applica-<br />
13
tions were developed in PHP to act as interaction interfaces between the backend which is<br />
an SQL <strong>based</strong> database.<br />
The tools selected/used to develop the SCM <strong>system</strong> were those that would enable the implementation<br />
of the <strong>system</strong> to be platform independent.Since the client interface was developed<br />
in HTML which is easily implemented and interpreted by all <strong>web</strong> browsers, the application<br />
front end then would be accessed on the different platforms which have browsers that are<br />
HTML standard complaint. The <strong>web</strong> server and the database backend that would enable<br />
the distribution of the application were <strong>based</strong> on Apache <strong>web</strong> server and MySQL database<br />
server which can also be implemented on different operating <strong>system</strong> platforms.<br />
Figure 3.3: Web Client/Server Architecture<br />
3.4 System Testing and Validation<br />
Regular <strong>system</strong> testing and validation of the SCM <strong>system</strong> was done to ensure that model<br />
quality and integrity is maintained throughout the development process. System testing<br />
14
standards and procedures were set up to be used to verify that the <strong>system</strong> met the goals<br />
that were set up. Since we were using a component model development scheme, each component/unit<br />
was tested individually prior to making it available for intergration into the final<br />
<strong>system</strong> setup. For purposes of validating the <strong>system</strong>, proposive sampling of potential users<br />
was used and feedback from them was used to incorporate the necessary adjustment and<br />
inclusions that were demanded.<br />
3.5 Conclusion<br />
The steps used here acted as an overall development methodology and life cycle which were<br />
also dependant upon avaliable tools, timeline and end user willingness to be involved in the<br />
final testing of the <strong>system</strong>. Implicit in the methodology adapted was the concept of bringing<br />
the SCM <strong>system</strong> core functionality up quickly and then refining the application/<strong>system</strong> <strong>based</strong><br />
upon user feedback.<br />
15
Chapter 4<br />
SYSTEM<br />
REQUIREMENTS,DESIGN AND<br />
IMPLEMENTATION<br />
The <strong>supply</strong> <strong>chain</strong> of our scope constituted of three entities;the organisation(<strong>hypermarket</strong>),<br />
the supplier(s) and the end consumer(the customer of the <strong>hypermarket</strong>). Hypermarkets deal<br />
in a huge range of products which are distributed by different suppliers with the need for<br />
placing orders for the various products well on time to satisfy the end consumer’s needs.<br />
Figure 4.1 shows the repetitive process of product consumption and replenishment.<br />
Figure 4.1: Activity Diagram for the <strong>supply</strong> <strong>chain</strong><br />
16
4.1 System Requirements<br />
In order to fulfill this stage of software development,this process was divided into three action<br />
areas which included requirements gathering, diagramming and prototyping.<br />
4.1.1 Requirements Gathering<br />
In this stage, the idea of the <strong>system</strong> was broken down into functionality that was to be in<br />
the application. For example, using a scenario were a user wants to add a new item to the<br />
application, how would this happen? On a high level, they would click a button which would<br />
show them a page allowing them to enter content. To break this down further, we needed<br />
to ask more questions like Can the user put in description? How do they insert them?<br />
How do they get on the server? What if the user wants to adjust the stock? Answering<br />
these questions helped determine what features were needed to implement. A final list of<br />
requirements was got which stated what functionality the application must have, should<br />
have, or that we wanted it to have. Important functionality was prioritized in form of<br />
features that were absolutely needed in the application at the top of the list. These were<br />
deemed essentials to having a usable application. Next, functionality that should be in the<br />
application but wouldn’t be critical if it didn’t appear was also included.<br />
4.1.2 Diagramming<br />
Use cases and application flow were mapped out visually to get a better sense of how everything<br />
would bind together.<br />
Application Flow<br />
The application flow provided a map of the application. In this flow, boxes for each page<br />
that the user would see within the application are represented, and arrows were used to<br />
demonstrate the expected flow the user will take through the application (Fig.4.2).<br />
This step was done to help visualize how related functionality would be tied together. In<br />
doing this, one would discover that there were ways to combine functionality or that there<br />
17
Figure 4.2: Application flow Diagram<br />
was a need to break it up into multiple steps. This step helped to gain a greater sense of<br />
the application by completing it thoroughly.<br />
Program Flow<br />
This emphasized the use of a basic mechanism of request-response activity by users to give a<br />
visual display of how users where to interact with the <strong>web</strong> application. This is because users<br />
are always requesting and submitting information with in the application . It so happens<br />
that occassionally users will be sending information to the SCM <strong>system</strong> in relation to a<br />
specific object and that the module was needed to have an interface to handle this.<br />
18
4.1.3 Prototyping<br />
Figure 4.3: Program flow Diagram<br />
A prototype, was built to gain insight on what the final product would actually look like.<br />
In this case, it helped eliminate problems before into programming the final application. In<br />
developing this application, three components were used in prototype development which<br />
included visual design, HTML prototype and usability testing.<br />
Visual Design<br />
A layout was established and elements were grouped together which helped gain a sense<br />
for how the application was going to work. Graphic design application was used and we<br />
were able to easily add new elements, resize and rotate to achieve a perfect layout of the<br />
application. Greater prominence was given to elements or tasks that were more important<br />
and those that were less important were minimized or hidden. Prominence of a given function<br />
was expressed in various ways such as size, colour, or positioning.<br />
19
HTML Prototype<br />
Once the visual design for the application was developed, we built the HTML prototype. An<br />
HTML implementation of the design helped point out possible problems with the interface<br />
design. For example, what happens when users resize their font or the size of their browser<br />
window? How would the design look across multiple browsers? One could find that something<br />
does not work quite right thus a need to go back to the design stage and redo certain<br />
elements.<br />
Usability Testing<br />
On any project, it’s a good idea to do usability testing. In this case, this involved showing<br />
it to a selected number of people to help in the testing. We also so it as a good idea to show<br />
the prototype to the type of people we expected to use the application because their input<br />
was deemed invaluable and could help determine if the design would work or not. This was<br />
done during the visual design, prototyping and even during development.<br />
4.2 System Design<br />
For rapid application development, a component <strong>based</strong> model of software design and development<br />
was used. The components herein included graphical user interface(client), <strong>web</strong><br />
server/business logic layer and the backend(database <strong>management</strong> <strong>system</strong>).<br />
4.3 Graphical User Interface<br />
A <strong>web</strong> browser <strong>based</strong> GUI implemented in HTML acted as the client side of the SCM <strong>system</strong>.<br />
This was divided into two interfaces that is the reporting interface and the POS interface.<br />
4.3.1 Reporting Interface<br />
The reporting application constituted of two interactive interfaces embedded as primary<br />
components of the POS <strong>system</strong> and the other interface for enabling the different suppliers(Fig.4.6)to<br />
view information only regarding their products. This has been backed up by a<br />
20
security mechanism which uses SSL(ref: 4.6 Security) and password authentication to allow<br />
the different suppliers to log in and view their products.<br />
POS Interface<br />
Figure 4.4: Reporting Interface for Suppliers<br />
The POS interface was divided into unique units which through their interactions make up<br />
the POS component of the SCM <strong>system</strong>. These included Sales, Reports, Configuration,<br />
Backup, User <strong>management</strong>, Customers and Items see Figure 4.7.<br />
21
Figure 4.5: POS Interface<br />
4.3.2 Database Management System<br />
The database <strong>system</strong> provided a central repository for all information regarding the <strong>hypermarket</strong>s<br />
and the suppliers. The application layer(business logic) inserts and retrieves all<br />
the information regarding the daily transactions of the SCM <strong>system</strong> and report generation<br />
method(Fig 4.3).<br />
22
The Point Of Sale <strong>system</strong><br />
Figure 4.6: Database Management System<br />
The database component responsible for servicing the POS component of the SCM <strong>system</strong><br />
constituted of units(tables) which held information in regard to Sales, Customers, Discounts,<br />
Brands, and Category <strong>management</strong> among others as shown in Table 4.1.<br />
23
Table 4.1: Tables in POS<br />
Table Purpose<br />
Sales Contain overall sale details<br />
Customers Hold information regarding customers<br />
Discounts Keep track of item discounts<br />
Brands Contain information regarding the different product brands<br />
Categories Handling of the different categories of brands of products<br />
Sales Items Hold item information for sales<br />
Suppliers Hold information about suppliers<br />
Users Hold information regarding the users of the <strong>system</strong><br />
Items Store information regarding items<br />
24
Figure 4.5 is a schema showing the interaction between the various tables in POS.<br />
4.4 Messaging<br />
Figure 4.7: POS Schema<br />
An Instant Messaging component (class) was intergrated into the SCM <strong>system</strong> to provide<br />
communication capabilities. This was to cater for instances when the supplier and the<br />
<strong>hypermarket</strong> users could be accessing the <strong>system</strong> at the same time. The <strong>hypermarket</strong>s<br />
25
could also have dedicated staff to respond to queries from suppliers by instant supplier<strong>hypermarket</strong><br />
communication(Refer to Figure 4.8). This could do away with costs incurred<br />
in telecommunication between supplier-<strong>hypermarket</strong> in issue resolving hence benefiting both<br />
parties.<br />
Figure 4.8: Flow diagram for messaging<br />
4.5 Sales and Supply Forecast<br />
We adapted a simple moving average model to incorporate forecasting capabilities within the<br />
<strong>system</strong>. This assisted in the estimation for future sales and demand being able to predict the<br />
quantity of products that need to be ordered and supplied. An unweighted mean of monthly<br />
sales for a period of a year were used as the data points for predicting sales and <strong>supply</strong>.<br />
26
4.6 Security<br />
With <strong>web</strong> applications security is very vital since these applications are accessible over networks.<br />
Web applications provide access to backend databases and hence control valuable<br />
data and are much more difficult to secure since the have some form of data capture, transmission<br />
and retrieval . As a result, these are prone to a wide variety of threats/attacks<br />
(Figure 4.9).<br />
Figure 4.9: Flow diagram for <strong>web</strong> application security<br />
In the SCM, security has been implemented at three levels, application, database and network.<br />
27
4.6.1 Database Security<br />
Database security involves allowing or denying user actions on the database and the objects<br />
within it. The processes and procedures that protect the database from unintended activity<br />
such as authenticated misuse, malicious attacks or accidental mistakes made by authorized<br />
individuals or processes [29]. Data in the database was protected by the use of MySQL<br />
Privilege <strong>system</strong>, which provided authentication that is assurance that the user is the one<br />
claimed and authorization that is whether the user has the necessary privileges to carry out<br />
query requests. User privileges included selecting, inserting, deleting, dropping, updating<br />
among others[3].<br />
4.6.2 Network Security<br />
The exchange of information over the network was protected by the use of the Secure Sockets<br />
Layer (SSL) cryptographic <strong>system</strong> implemented using openSSL to establish an encrypted<br />
communication channel using public key infrastructure(PKI)(Fig.4.8) [16]. PKI enables users<br />
of an unsecure public network such as the Internet to securely and privately exchange data<br />
through the use of a public and a private cryptographic key pair that is obtained and shared<br />
through a trusted authority [3].<br />
4.6.3 Application Security<br />
Application Security can be defined as the protection of software applications against threats<br />
[27]. This was implemented using Adminpro Class. AdminPro is a user authentication class<br />
<strong>based</strong> on a MySQL database and the PHP Session functions. This class can Login and logout<br />
a user via Web <strong>based</strong> forms, expire the session of an authenticated user if it passed a given<br />
session timeout and require to authenticate again, display error messages and point the user<br />
to the login page when the user is not authenticated or the login session expired and also<br />
check whether a logged user has administrator or user group privilege [28].<br />
28
Figure 4.10: Encrypted communication channel through SSL<br />
4.7 System Implementation<br />
We used a local area network as an implementation test ground since the conditions on<br />
LANs can be tuned to mimic a wide area network or the internet. A test environment which<br />
simulated daily activities within a <strong>hypermarket</strong> were created so as to be able to use the functions<br />
created in the <strong>system</strong> like inventory, sales and order requests. For example, processing<br />
a sale required logging into the POS interface of the <strong>system</strong>, which then provided a guided<br />
interaction through the use of links and description from the beginning to the end of a given<br />
sale. Functions like customer selection,item selection and discount provision are provided<br />
before commiting records into the database and performing receipt issuing and closing a<br />
given sale(Fig.4.9). Figure 4.10 shows the a few functions that can be carried out on the<br />
supplier interface of the SCM <strong>system</strong>.<br />
29
Figure 4.11: Processing a Sale<br />
30
Figure 4.12: Supplier -supplier interface interaction<br />
31
Chapter 5<br />
CONCLUSIONS AND<br />
RECOMMENDATIONS<br />
5.1 Conclusions<br />
The general objective of this study was to develop an interactive <strong>web</strong> <strong>based</strong> <strong>system</strong> with<br />
a user friendly interface enabling <strong>hypermarket</strong>s to control their operations and satisfy customer<br />
requirements. Inorder to achieve this various activities had to be carried out. These<br />
included; reviewing of literature on <strong>hypermarket</strong> SCM <strong>system</strong>s, establishing user and <strong>system</strong><br />
requirements for developing a <strong>web</strong> <strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>, designing a model that<br />
enables <strong>hypermarket</strong>s to keep track of their large and diverse stock as well as obtain <strong>supply</strong><br />
and demand forecasts from records of sales and customer history and finally implement a <strong>web</strong><br />
<strong>based</strong> <strong>hypermarket</strong> SCM <strong>system</strong>. During the carrying out of these activities some hurdles<br />
were faced here and there. Lots of literature was available on Supply Chain Management but<br />
little was found about <strong>hypermarket</strong>s since these are just upcoming due to economic development.<br />
The available literature about <strong>hypermarket</strong>s was basically tending towards commerce.<br />
In the establishing of <strong>system</strong> requirements information from already used <strong>system</strong>s was used<br />
since <strong>web</strong> <strong>based</strong> <strong>system</strong>s have similar qualities. During the establishing of user requirements<br />
a few hyperstores in Kampala were visited, some of which were not receptive. A mechanism<br />
was devised to enable <strong>hypermarket</strong>s to keep track of their stock as well as obtain <strong>supply</strong><br />
and demand forecasts from records of sales and customer history. The identified gaps in the<br />
already used applications in <strong>hypermarket</strong>s left us no choice but to concentrate on filling these<br />
gaps thus no need to design a model. Various tools were available for <strong>system</strong> development<br />
and implementation. The choice of tools mainly depended on rapid application development<br />
32
as well as user friendliness.<br />
5.2 Recommendations<br />
The client/server architecture was used in developing this <strong>system</strong> however other architectures<br />
could be put into consideration like service oriented architecture since this allows different<br />
applications to exchange data and participate in business processes.<br />
Standardized data exchange formats like Extensible Markup Language(XML) could be considered<br />
since these facilitate sharing of structured data across different information <strong>system</strong>s<br />
particularly via the Internet unlike EDI which allows the transfer of structured data by<br />
agreed message standards from one computer <strong>system</strong> to another.<br />
33
Bibliography<br />
[1] Sila, I., Ebrahimpour, M. and Birkholz, C. (2006).Quality in <strong>supply</strong> <strong>chain</strong>s: an empirical<br />
analysis. Supply Chain Management: An International Journal Volume 11 Number 6<br />
pp. 491-502.<br />
[2] Wouters, M. (2006). Implementation costs and redistribution mechanisms in the economic<br />
evaluation of <strong>supply</strong> <strong>chain</strong> <strong>management</strong> initiatives. Supply Chain Management:<br />
An International Journal Volume 11 Number 6 pp. 510-521.<br />
[3] Gilmore, J.W. (2006). Beginning PHP and MySQL 5: From Novice to Professional<br />
Second Edition.<br />
[4] Damien, P.(2005).Determinants of business-to-business e-commerce implementation and<br />
performance: a structural model. Supply Chain Management: An International Journal<br />
Volume 10 Number 2 pp. 96-113.<br />
[5] Sherer, A.S. (2005).From <strong>supply</strong>-<strong>chain</strong> <strong>management</strong> to value network advocacy: implications<br />
for e-<strong>supply</strong> <strong>chain</strong>s. Supply Chain Management: An International Journal<br />
Volume 10 Number 2 2005 pp. 77-83.<br />
[6] Prater, E., Frazier, G.V. and Reyes, P.M. (2005). Future impacts of RFID on e-<strong>supply</strong><br />
<strong>chain</strong>s in grocery retailing. Supply Chain Management: An International Journal Volume<br />
10 Number 2 pp.134-142.<br />
[7] Yen, D.C., Tan, X. and Chou, D.C. (2004).Web technology and <strong>supply</strong> <strong>chain</strong> <strong>management</strong>.<br />
Information Management and Computer Security Volume 12<br />
338-349.<br />
Number 4 pp.<br />
[8] James, M., Grosvenor, R. and Prickett, P. (2004). e-Distribution: Internet-<strong>based</strong> <strong>management</strong><br />
of a <strong>supply</strong> <strong>chain</strong>. Supply Chain Management: An International Journal Volume<br />
9 Number 1 pp.7-15.<br />
34
[9] Sommerville,I.(2004).Software<br />
ISBN:0321210263.<br />
Engineering.7th Edition Addison Wesley,<br />
[10] Lankford,W.M. (2004), ”Supply <strong>chain</strong> <strong>management</strong> and the Internet” Supply Chain<br />
Management: An International Journal Volume 28 Number 4 2004 pp. 301-305.<br />
[11] NIST, (1996). Electronic Data Interchange.Federal Information Processing Standards<br />
Publication 161-2<br />
[12] Zhao, X., Xie, J.and Zhang,W.J.(2002). The impact of information sharing and coordination<br />
on <strong>supply</strong> performance Supply Chain Management: An International Journal<br />
Volume 7 Number 1 2002 pp. 24-40.<br />
[13] Greenspan,J.and Bulger,B.(2001). MySQL/PHP Database Applications M and T Books<br />
ISBN:0-7645-3537-4.<br />
[14] Muench,C.(2006). ”phpPos PHP Point of Sale v9.0 Installation and user Guide” URL<br />
address: http://www.phppointofsale.com/documentation/help.htm 12.12.2006, 13:48.<br />
[15] Eoin,L.(2003).Introduction to Supply and Materials Management. The Chartered Institute<br />
of Purchasing and Supply Easton House ISBN:1-86124-126-7.<br />
[16] Thomas,S.(2000).SSL & TLS Essentials, Securing the Web John Wiley and Sons,Inc.<br />
ISBN: 0-471-38354-6.<br />
[17] Jun, M. and Cai, S. (2003).Key obstacles to EDI success: from the US small manufacturing<br />
companies’ perspective. Industrial Management and Data Systems Volume 103<br />
Number 3 pp. 192-203.<br />
[18] Weber,M.W. and Kantamneni, P.S. (2002).POS and EDI in retailing: underlying benefits<br />
and barriers. Supply Chain Management: An International Journal Volume 7 Number<br />
5 pp. 311-317.<br />
[19] Saygin, C., Cha, K., Zawodniok, M., Z, Ramachandran, A. and Sarangapani<br />
J.(2006).Interference mitigation and read rate improvement in RFID-<strong>based</strong> networkcentric<br />
environments. Sensor Review Volume 26 Number 4 pp. 318-325.<br />
[20] Zhang, G., Lai, F. and Hutchinson, J.(2006).Radio frequency identification(RFID) in<br />
China: opportunities and challenges. International Journal of Retail and Distribution<br />
Management Volume 33 Number 12 pp. 905-916.<br />
35
[21] Li, S., Visich, J.L., Khumawala, B.M. and Zhang, C. (2006).Radio frequency identification<br />
technology: applications, technical challenges and strategies. Sensor Review<br />
Volume 26 Number 3 pp. 193-202.<br />
[22] Jones, P., Clarke-Hill, C., Shears, P., Comfort, D. and Hillier, D. (2004).Radio frequency<br />
identification in the UK: opportunities and challenges. International Journal of Retail<br />
and Distribution Management Volume 32 Number 3 pp. 164-171.<br />
[23] Chang-tseh,H.and Binshan,L.(2004).Impact of standardization on EDI in B2B development.<br />
Industrial Management and Data Systems Volume 104 Number 1 pp. 68-77.<br />
[24] Sommerville,I.(2000).Software<br />
ISBN:9780201398151.<br />
Engineering.5th Edition Addison Wesley,<br />
[25] Octavian,A.W(1999). ”The Conceptual Architecture of the Apache Web Server” URL<br />
address: http://www.cs.ucsb.edu/˜tve/cs290i-sp01/papers/concept Apache Arch.htm<br />
25.11.2007, 18:48.<br />
[26] Brayton, J., Finneman, A., Turajski, N. and Wiltsey, S. (2006). ”PKI” URL<br />
address: http://searchsecurity.techtarget.com/sDefinition/0,,sid14 gci214299,00.html<br />
13.01.2008, 22:57.<br />
[27] Main,A., Van Oorschot,P.C.(2003). Software Protection and Application Security:Understanding<br />
the Battleground.<br />
[28] PHP Classes (1999-2008). ”Class: AdminPro class” URL address:<br />
http://www.phpclasses.org/browse/package/1830.html 13.01.2008, 00:20.<br />
[29] Wikipedia,the free encyclopedia (2008). ”Database Security” URL address:<br />
http://en.wikipedia.org/wiki/Database security 13.01.2008, 21:50.<br />
[30] Alberta E-future Centre(2007). ”Supply Chain Management” URL address: http://efuture.ca/alberta<br />
23.01.2008, 18:54.<br />
36
Appendix 1SQL statements used to create the different tables in POS.<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos brands‘;<br />
CREATE TABLE ‘pos‘.‘pos brands‘ (<br />
‘brand‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos categories‘;<br />
CREATE TABLE ‘pos‘.‘pos categories‘ (<br />
‘category‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos customers‘;<br />
CREATE TABLE ‘pos‘.‘pos customers‘ (<br />
‘first name‘ VARCHAR(75) NOT NULL DEFAULT ”,<br />
‘last name‘ VARCHAR(75) NOT NULL DEFAULT ”,<br />
‘account number‘ VARCHAR(10) NOT NULL DEFAULT ”,<br />
‘phone number‘ VARCHAR(25) NOT NULL DEFAULT ”,<br />
‘email‘ VARCHAR(40) NOT NULL DEFAULT ”,<br />
‘street address‘ VARCHAR(150) NOT NULL DEFAULT ”,<br />
‘comments‘ BLOB NOT NULL DEFAULT ”,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos discounts‘;<br />
CREATE TABLE ‘pos‘.‘pos discounts‘ (<br />
‘item id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘percent off‘ VARCHAR(60) NOT NULL,<br />
37
‘comment‘ BLOB NOT NULL,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos items‘;<br />
CREATE TABLE ‘pos‘.‘pos items‘ (<br />
‘item name‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />
‘item number‘ VARCHAR(15) NOT NULL DEFAULT ”,<br />
‘description‘ BLOB NOT NULL DEFAULT ”,<br />
‘brand id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘category id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘supplier id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘buy price‘ VARCHAR(30) NOT NULL,<br />
‘unit price‘ VARCHAR(30) NOT NULL,<br />
‘supplier catalogue number‘ VARCHAR(60) NOT NULL,<br />
‘tax percent‘ VARCHAR(5) NOT NULL,<br />
‘total cost‘ VARCHAR(40) NOT NULL,<br />
‘quantity‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘reorder level‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos sales‘;<br />
CREATE TABLE ‘pos‘.‘pos sales‘ (<br />
‘date‘ DATE NOT NULL DEFAULT ’0000-00-00’,<br />
‘customer id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘sale sub total‘ VARCHAR(12) NOT NULL,<br />
‘sale total cost‘ VARCHAR(30) NOT NULL,<br />
‘paid with‘ VARCHAR(25) NOT NULL,<br />
‘items purchased‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘sold by‘ INT(8) NOT NULL DEFAULT ’0’,<br />
38
‘comment‘ VARCHAR(100) NOT NULL,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos sales items‘;<br />
CREATE TABLE ‘pos‘.‘pos sales items‘ (<br />
‘sale id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘item id‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘quantity purchased‘ INT(8) NOT NULL DEFAULT ’0’,<br />
‘item unit price‘ VARCHAR(15) NOT NULL,<br />
‘item buy price‘ VARCHAR(30) NOT NULL,<br />
‘item tax percent‘ VARCHAR(10) NOT NULL,<br />
‘item total tax‘ VARCHAR(12) NOT NULL,<br />
‘item total cost‘ VARCHAR(12) NOT NULL,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos suppliers‘;<br />
CREATE TABLE ‘pos‘.‘pos suppliers‘ (<br />
‘supplier‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />
‘address‘ VARCHAR(100) NOT NULL DEFAULT ”,<br />
‘phone number‘ VARCHAR(40) NOT NULL DEFAULT ”,<br />
‘contact‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />
‘email‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />
‘other‘ VARCHAR(150) NOT NULL DEFAULT ”,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
DROP TABLE IF EXISTS ‘pos‘.‘pos users‘;<br />
CREATE TABLE ‘pos‘.‘pos users‘ (<br />
39
‘first name‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />
‘last name‘ VARCHAR(50) NOT NULL DEFAULT ”,<br />
‘username‘ VARCHAR(20) NOT NULL DEFAULT ”,<br />
‘password‘ VARCHAR(60) NOT NULL DEFAULT ”,<br />
‘type‘ VARCHAR(30) NOT NULL DEFAULT ”,<br />
‘id‘ INT(8) NOT NULL AUTO INCREMENT,<br />
PRIMARY KEY (‘id‘)<br />
)<br />
ENGINE = InnoDB<br />
40
Appendix 2POS Home Page<br />
41
Appendix 3Login Page into the Reporting Interface for suppliers<br />
42
Appendix 4Logout Page into the Reporting Interface for suppliers<br />
43
Appendix 5Home Page for CK and Company Ltd<br />
44
Appendix 6Home Page for Century Bottling Company Ltd<br />
45
Appendix 7Home Page for Nile Breweries Ltd<br />
46
Appendix 8Home Page for Crown Beverages Ltd<br />
47
Appendix 9Web Page for the different Report Categories on the Reporting<br />
Interface for Suppliers<br />
48
Appendix 10An example of a <strong>web</strong> page for Stock Report<br />
49
Appendix 11Web Page for the different Graph Categories on the Reporting<br />
Interface for Suppliers<br />
50
Appendix 12An example of a <strong>web</strong> page for Stock Graph<br />
51