Está en la página 1de 7

JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 54

A Case Study of the Development of


Document Management System in Oil and
Gas Company
Mohd Hilmi Hasan, and Daliainie Mat Saaid

Abstract—Information resources require proper management that can always ensure they are accessible in any condition. This
can be made possible through libraries that archive all the information documents. The objective of this paper is to present a
case study of the development of a document management system in an oil and gas company. The system was developed in
three-tier web-based architecture, and is able to provide several functionalities namely viewing and borrowing documents and
drawings of gas pipelines. The system is also able to rank documents based on fuzzy algorithm and provide e-mail notification
to users in registration and borrowing features. Two types of tests were performed to evaluate the system namely functional and
user acceptance tests. The latter was performed by a group of expert users from the company that was being studied in this
research. The system was successfully developed and believed can improve the company’s documents and drawings
management. The study implies potential time saving as users may now do the document’s details viewing and borrowing
online. In addition, the study also implies effectiveness in managing the documents and drawings. For future works, it is
proposed that more security measures be implemented to ensure reliability of the system. Moreover, a notification feature to
inform administrators of any requests made by user is also proposed to enhance the system.

Index Terms— Digital library, Document management, Information management.

——————————  ——————————

1 INTRODUCTION

I INFORMATION and knowledge management play


very important roles in any fields of business nowa-
days. Implementation of information and knowledge
row a document or drawing, the responsible administra-
tor will manually search for it between racks. Moreover, if
there is a need to see details of a particular document or
management has become the recent trend to ensure the drawing, the administrator has to be contacted over the
organization is ahead of its competitors [1]. Information phone, in which he/she requires a few days to reply with
resources require proper management that can always the requested details. Furthermore, there was also no me-
ensure they are accessible in any condition [2]. This can chanism for the company to keep track the document or
be made possible through libraries that archive all the drawing borrowing from their staffs. This would result in
information documents. Libraries promote numerous worse scenario such as document or drawing might be
significant roles namely information archival, knowledge lost, late to be returned and many others.
and information dissemination, information retrieval, Therefore, a document management system was pro-
social interaction and many others [3]. The advancement posed to overcome the above-mentioned problems. Nu-
in information and communication technology has merous works have shown that this kind of system will
changed the nature of information resources, which produce significant benefits to organizations. One exam-
among others evolved from physical documents into digi- ple is the Quezon City Public Library which has a web-
tal format [2, 4]. Numerous libraries have realized the based library management system to manage their opera-
importance of having digital cataloging and computer- tions [6]. The work in [2] studies the concept of institu-
based system to manage the information that they acquire tional repositories in e-learning to manage the digital arc-
[5]. hive of research documents, literatures and many others.
This paper presents a case study of document and Document management implementation via web tech-
drawing management system for an oil and gas company nology represents knowledge ecology and document life-
in Malaysia. This company has a department that keeps cycle model. This lifecycle model comprises five phases,
loads of gas pipeline documents and drawings in the li- namely creation, publication, organization, access, and
brary. There was no library system in place to manage destruction [7]. The study done in [8] redefines the elec-
these information documents. If there is a request to bor- tronic document management system (EDMS) by combin-
ing its basic components with auto-segregation feature,
———————————————— keyword analyzer and result matcher which make search-
 Mohd Hilmi Hasan is with CIS Department, Universiti Teknologi ing and retrieving of documents faster and easier. Securi-
PETRONAS, 31750 Tronoh, Perak, Malaysia. ty becomes one factor that may hinder companies or or-
 Daliainie Mat Saaid is a graduate from Universiti Teknologi PETRONAS, ganizations to implement web-based document manage-
31750 Tronoh, Perak, Malaysia.
ment system. This is due to the needs of a secure transac-
tion in document management system to avoid from ma-
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 55

licious attack or information theft. The work done in [9] 2.2 System Architecture
presents a secured web-based document management Figure 1 shows the system architecture of the developed
system which implements the integration of digital signa- system. It was developed in three-tier architecture that
ture and PKI technologies. Furthermore, the work done in contains user interface, server, and back-end system and
[10] presents the document management system that is database. There are two types of users namely user and
applied in a university. It has received positive feedbacks administrator. Both types of user access the system via
from students, and proven to be able to improve efficien- web browser which requires the Internet connection on
cy and effectiveness of research as well as knowledge their computers. Their requests or actions will be sent to
sharing among students. the web hosting server.
The prototyping lifecycle was used in this research to The DDLS system modules, database and e-mail serv-
develop the system. A series of testing were done upon er application are installed on this web hosting server.
the prototype until it evolved as the final product. The The DDLS system will retrieve information from its data-
system contains several functionalities namely viewing base when a user makes a request for viewing or making
documents’ details, request for borrow, and e-mail notifi- reservation. The similar process applies when an adminis-
cation for user registration and confirmation of borrow trator accesses the system to perform approval, mainten-
requests. Besides, the system does also have a ranking ance or update process.
functionality that presents the popularity of documents The DDLS also contains a feature which notifies new
and drawings. Fuzzy algorithm was used to implement users about information on how to activate their accounts
this ranking functionality. The system was published in via e-mail. This feature is also functioning to notify users
the Internet so that the user acceptance test could be about the submission deadline of any items they bor-
done. This test was performed by seven expert users from rowed. An e-mail server application is installed on the
the company that was being studied in this work. web hosting server to enable this e-mail notification fea-
In a nutshell, the objective of this paper is to present a ture.
case study of the development of document management As mentioned earlier, the developed system has user
system for oil and gas company. The system is named as and administrator types of users. Figure 2 shows a Use
Document and Drawing Library System (DDLS). Case diagram that represents how the system interacts
with both types of user. A user can perform two processes
which are view documents’ details and request to borrow
2 METHODS the documents. Any borrowing request requires an ap-
proval from system administrator. The developed system
2.1 Development Tools also imposes a rule in which only registered users can
The DDLS system was developed as a web-based system make borrow request. On the other hand, an administra-
using PHP scripting language. The development was tor has an authority to check requests made by users, and
done using Adobe Dreamweaver CS3 software. Moreo- determines whether to reject or approve the requests. An
ver, MySQL was implemented as the database manage- administrator can also manage the database in terms of
ment system, while Apache was chosen as the server’s deleting and modifying information, as well as adding
operating system. new ones. Figure 3 contains activity diagram that
The system development was done using a Microsoft- represents all the activities or processes of user and ad-
based personal computer. This process included program ministrator as mentioned above.
coding and functional testing works. Then, the system
was hosted on a Linux web hosting server to make it ac-
cessible to users.

Fig. 1. System architecture.


JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 56
.

Fig. 2. Use Case diagram of DDLS system.

Fig. 3. Activity diagram.

Figure 4 shows the system’s sequence diagram in and this process is handled by the authentication feature
which it presents instruction messages passed among of the system. The document borrowing procedure is in-
user, administrator and the system during execution. itiated by user in which the request is processed by the
Both users and administrators must log in to the system, system’s request function. This process will then require a
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 57

decision of either approval or rejection from administra- Moreover, the Email module will be triggered for ex-
tor. ecution when there is new user registered or to remind
users on the submission deadlines of the documents they
borrowed. This module interacts with the e-mail server
application for creating and sending notification e-mail to
users.
Furthermore, the system has the Fuzzy module that
functions to rank documents according to the level of im-
portance and hits count. Figure 6 shows the graph of
Fuzzy degree of membership function (MF) of the docu-
ment.

Fig. 4. Sequence diagram.

Fig. 6. Graph of Fuzzy degree of membership function of the docu-


The function will then forward the result to user. Be-
ment.
sides, the review process initiated by a user will trigger
instructions to retrieve information from database. This
instruction will then forward the requested information The universe of discourse, hits, contains three catego-
for display to user. Moreover, the editing, deleting and ries namely low, medium and high. As shown in Figure 6,
adding information processed are performed by adminis- these three categories have combined MF degree values at
trator in which these processes involve manipulation of certain number of hits. Moreover, in this study, the max-
the system’s database. imum hits count was set to 35. The number of hits for
non-combined MF is gained directly from the graft. In
2.3 System Components contrast, the number of hits for combined MF is calcu-
Figure 5 shows the structure model of the developed sys- lated by using the following formula:
tem. The Main module contains the system’s user inter- Hits = (((mf1 x 10) x max1) + ((mf2 x 10) x max2)) / (mf1 +
face, as well as it integrates all other modules as a single mf2)
system. This module also contains the authentication in- Where,
structions of the system. The Admin module handles all mf1 is MF degree value of the first category, and mf2 is
administrators’ activities namely borrowing request ap- MF degree value of the second category, and
proval, and adding, deleting, and modifying information max1 is the hits value for the maximum MF degree value
in database. Besides, the User module contains features of the first category, and max2 is the hits value for the
for users to view information, make request and receive maximum MF degree value of the second category.
approval or rejection. For example, the number of hits for the document with
22 hits can be calculated as follow:
Main Hits = ((1 x 17.5) + (4 x 25)) / 5
This yields the hit number of 23.5. Another important
point to note is that the documents are also categorized in
terms of their importance, in which there are documents
known as “important” and there also documents indenti-
Admin User fied as “less important”. Therefore, all results yielded
from fuzzy calculation will be used to rank the docu-
ments. In this regard, responsible staff of the company
may gain further insight on documents, for example
which important document is hit for more than 15? Or
Fuzzy Email which less important document is hit for more than 25?
This information is beneficial for them to do additional
analysis.

Fig. 5. Modules contained in the DDLS system.


JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 58

3 RESULTS AND DISCUSSION


3.1 DDLS System
Any user has to register a usage account in order to use
the DDLS system. The registration process requires user
to fill in their details and provide a valid e-mail address.
The user registration verification is done by instructing
user to activate their account by clicking on the given link
sent by the system to their e-mail. Figure 7 shows the ex-
ample of the user registration verification e-mail.

Fig. 9. User information form to make borrowing request.

Fig. 7. Registration activation link sent to users via E-mail.

The DDLS system stores all the information of docu-


ments and drawings. Figure 8 shows the interface of the
system that displays documents’ information. Each doc-
ument is identified by its title. User may request to bor-
row document by selecting his/her preferred document
from the checkbox, and followed by clicking “Lend Re-
quest” button. To complete the borrowing request, user Fig. 10. Administrator’s page to approve users’ requests.
has to fill in information which are name, e-mail address,
start date, and return date as shown in Figure 9. After a 3.2 System Testing
borrowing request is completed, administrator has to ap- The DDLS system has been published in the Internet by
prove the particular request using the interface shown in hosting it on a hosting server. The system testing was
Figure 10. The status of any document that is approved to done by allowing respondents to access and use the sys-
be borrowed will then be changed to “Lent item”. User tem from the Internet. Two types of testing were per-
will be informed about the status of their request through formed in this study namely functional and user accep-
e-mail. tance testing. The former was done by the research team
members, in which the system’s functionalities were
tested based on the test cases that correspond to user re-
quirements. All the test cases, which comprise features for
both users and administrator, had successfully passed.
For user acceptance testing, seven expert users were
involved in the process. These users are professional
staffs of the company of this case study, who regularly
use the manual process of keeping documents and draw-
ings in their daily job assignments. The results of the test-
ing that had been carried out are presented as follow:

Fig. 8. Documents’ information displayed on system interface.


JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 59

Fig. 11. Question: How would you rate yourself as an internet user? Fig. 15. Question: Do you have any dificulties in using the DDLS
Outcome: beginner (1), good (2), expert (4). system? Outcome: no (7).

Fig. 12. Question: Before answering this survey, how familiar were
Fig. 16. Question: How beneficial is the DDLS system to you? Out-
you with the DDLS system? Outcome: not familiar (1), visited the
come: beneficial (3), very beneficial (4).
system (6).

Fig. 13. Question: How many times have you visited the DDLS sys- Fig. 17. Question: How would you describe your experience using
tem over the last month? Outcome: 1 to 3 times (4), 4 to 6 times (2), the DDLS system? Outcome: good (1), excellent (6).
more than 10 times (1).
The last three questions asked in the user acceptance
test were about the DDLS system performance with re-
gards to level of difficulty in using it, its benefits, and the
respondents’ experience when using the system as shown
in Figure 15, Figure 16 and Figure 17 respectively. Based
on these three questions, the composite respondents’
feedbacks were determined in which four system catego-
ries were defined namely worst, poor, good and best.
Figure 18 shows this outcome, in which 81% of the feed-
back is rated as best, while 19% is rated as good. There is
0% rated as poor and worst.

Fig. 14. Question: How many items have you viewed from the DDLS
system over the last month? Outcome: none (1), 1 to 3 (3), 4 to 6 (1),
7 to 10 (2).
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 60
national Conference on Information and Multimedia Technology,
2009 (ICIMT '09), 2009.
[9] J. Shi and J. Ouyang, “eSign: An Enterprise Portal for Secure
Document Management,” IEEE International Conference on In-
formation Reuse and Integration, 2005.
[10] H. Baban and S. Mokhtar, “Online Document Management
System for Academic Institutes,” 2010 International Conference
on Information Management, Innovation Management and Industrial
Engineering (ICIII), 2010.

Mohd Hilmi Hasan obtained his Bachelors of Technolgy (Hons.)


inInformation Techology from Universiti Teknologi PETRONAS
in2002. He then received Masters of Information Technology (eS-
Fig. 18. Composite respondents’ feedback on the DDLS system cience) from The Australian National University in 2004. Currently, he
performance. is working as lecturer in Universiti Teknologi PETRONAS, whichhis
roles amongst others are teaching and doing research. His re-search
interests are mobile computing and artificial intelligence. Hehad se-
cured a number of research grants from the university’s inter-nal
4 CONCLUSION grant as well national grant awarded by Malaysian government.

The objectives of this study had successfully been Daliainie Mat Saaid was an undergraduate student of Universiti
achieved in which the developed system allows users to Teknologi PETRONAS. She graduated and obtained Bachelors of-
Technology (Hons.) in Information and Communication Technology in
view documents and drawing details, request for borrow 2011.
and receive notification regarding registration and bor-
row requests via e-mail. By having this, it is believed that
the system could benefit the company that was being stu-
died in this work to manage their pipeline documents and
drawings.
The system requires a hosting server to locate its PHP
application modules, databases and also the e-mail server
software. The system also contains fuzzy algorithm to
rank documents based on popularity. The system was
developed in 3-tier architecture in which users may just
use the system through web browser application inter-
face.
For future works, security measures can be en-
hanced to allow only authenticated users to register as the
system users. Furthermore, the system could also be em-
bedded with notification feature to inform administrators
of any requests made by users. This notification allows
information to be pushed to administrators that enhanced
the system as a whole.

REFERENCES
[1] M.M. Ariffin and J. Ontol, “Designing Knowledge Map for a
Knowledge-Based Organization – An Industrial Case Study,”
Journal Of Computing, vol. 2, no. 12, pp. 1-8, 2010.
[2] A.K. Dhiman, “Institutional Repositories in E-Learning,” IJCA
Special Issue on “Wireless Information Networks & Business Infor-
mation System”, 2011.
[3] S. Neal, “The Virtual Library – a Market Perspective,” The Bot-
tom Line: Managing Library Finances, vol. 10, no. 3, 1997.
[4] A.K. Dhiman and Y. Rani, Learn - Computer Basics and its Appli-
cation in Libraries, Ess Ess Publications, New Delhi, 2005.
[5] H.G. Sastry, G. Manjunath and L.C. Reddy, “User Interface
Design Challenges for Digital Libraries,” International Journal of
Computer Applications, vol. 15, no. 6, pp. 7-13, 2011.
[6] D. Stevens, http://www.qcpubliclibrary.org. 2002.
[7] M. Ginsburg, “Intranet Document Management Systems as
Knowledge Ecologies,” 33rd Annual Hawaii International Confe-
rence on System Sciences, 2000.
[8] K.G. Alberto, C.M. Abella, M.G.C.E. Sicat, J.D. Niguidula and
J.M. Caballero, “Compiling Remote Files: Redefining Electronic
Document Management System Infrastructure (CReED),” Inter-

También podría gustarte