Web-Based Student Violation Monitoring Information System Design at SMK Gandasari

−SMK Gandasari is one of the vocational high schools in Tangerang City. The purpose of the school authority is to improve student discipline related to increasing student discipline at school, namely by attendance in class or in attendance calls. Parents are still very concerned about the condition of the children at school, whether they really behave well or not

In the current era, the role of information technology is very important and is applied to the field of education both academically and non-academicly.In the academic field, from elementary school to university education, information technology has now been used to support educational progress.Information technology develops with various kinds of information delivery systems in the form of a Website or Android.This application facilitates data processing and delivery to its users.The use of the Website on the educational information application can be used for the delivery of complete, efficient and updated student data information.Gandasari Vocational School participates in realizing quality education and shaping the soul of the younger generation who has a balance between science and technology with noble character.
At SMK Gandasari Tangerang, data processing of student violations against educational activities is still managed manually.The data is still recorded in a book.Parents who want to know or control student activities and violations must wait during the report card distribution process.This makes the student monitoring system less effective because it is not monitored optimally by teachers and parents, but so far supervision of students is mostly only carried out by the school, especially the high level of parental activity, parents do not monitor the development of their children.her child at school.
In previous research, the Application of the Student Violation Monitoring Web Application System at SMKN 2 Tangerang, can help the work of counseling teachers in recording student violation data, calculating total points for violations, giving sanctions to students and making reports to be given to the school principal become easier and faster in a computerized manner [1] Based on some of the problems above, the author built a website for student violation information systems as a solution to existing problems with the title "Design of Web-Based Student Violation Monitoring Information System in Gandasari Vocational School".

RESEARCH METHODOLOGY
The type of research used in this writing process is Case Study Research, which is a series of scientific activities carried out intensively, in detail, and in depth about a program, event, and activity, either at the individual level, a group of people, institutions, or organizations.organization to gain in-depth knowledge of the event over a period of time and collect data from multiple sources.The stages of the research are observation, documents, reports, and interviews

System
According to [2] [3] , the system is a series consisting of two or more components that are interconnected and interact with each other to achieve a goal where the system is usually divided into smaller sub-systems that support a larger system.According to [4], the system is a set of interrelated elements or elements that influence each other in carrying out joint activities to achieve a goal.From some of these definitions, researchers can conclude that system design is to create or develop a system that can overcome problems in the previous system that has been previously analyzed.

Information
According to [4] Information is data that has been classified or interpreted for use in the decision-making process.According to Taufiq (2013) defines that: "Information is data that is processed so that it has added value and is useful for users".According to [5] the function of information is to increase knowledge and reduce the uncertainty of information users.The function of information is not to direct decision-making about what to do, but to reduce the diversity and uncertainty that causes a good decision to be made.

Monitoring
According to [6] monitoring is monitoring which can be explained as awareness of what one wants to know, high level monitoring is carried out in order to make measurements through time that indicate the movement of the destination or away from it.
According to [7] Monitoring is a continuous assessment of the function of project activities in the context of implementation schedules and of the use of project inputs by the target group in the context of design expectations.Based on the two definitions of monitoring, it can be concluded that monitoring is supervision or monitoring of an activity so as to produce useful information.The resulting information can make it easier to make decisions about future activities.
According to [8] broadly speaking, the stages in a monitoring system are divided into three major processes as shown in the following figure.The processes that occur in a monitoring system start from collecting data such as data from network traffic, hardware information, and others which are then analyzed in the data analysis process and in the end the data will be displayed [8].

Waterfall Model
The waterfall model according to [9] is a process of activities from specification, development, validation, and evolution and represents them as separate processes such as requirements specification, software design, implementation, testing, and so on.The waterfall method has the main stages of the waterfall model that reflect basic development activities.There are 5 (five) stages in the Waterfall method, namely requirements analysis and definition, system and software design, implementation and unit testing, integration and system testing, and operation and maintenance.The waterfall method has the main stages of the waterfall model that reflect basic development activities.There are 5 (five) stages in the Waterfall method, namely requirements analysis and definition, system and software design, implementation and unit testing, integration and system testing, and operation and maintenance.

Unified Modeling Language (UML)
According to [10], Unified Modeling Language (UML) is a modeling language for systems or software with an objectoriented paradigm.Modeling is actually used to simplify complex problems in such a way that they are easier to learn and understand.A diagram in the form of a graph showing the elements of a model arranged to illustrate a particular part or aspect of the system.A diagram is part of a particular view and when drawn is usually allocated to a particular view.The types of diagrams include:

Use Case Diagram
According to [10] , "use case is a modeling for the behavior (behavior) of the information system to be made.Use cases describe an interaction between one or more actors and the information system that will be created.Roughly speaking, use cases are used to find out what functions are in an information system and who has the right to use those functions.

Statechart Diagram
Describing transitions and state changes (from one state to another) of an object in the system as a result of the stimuli received.In general, statechart diagrams describe certain classes (one class can have more than one statechart diagram)

Activity Diagram
According to [10], "Activity Diagrams describe the workflow (workflow) or activities of a system or business process or menu that is in the software".The thing to note here is that Activity diagrams describe system activities not what actors do, so activities that can be performed by the system.

Sequence Diagram
According to [10], "Sequence Diagrams describe objects in use cases by describing the life time of objects and messages sent and received between objects".Sequence Diagram shows the sequence of events occurring at a time.The Sequence Diagram component consists of an object written in a rectangular box named message represented by a line with an arrow and a time indicated by a vertical progress.

RESULT AND DISCUSSION
The Waterfall method is a system development method where one phase to another is carried out sequentially.In the process of implementing this Waterfall method, a step will be completed first starting from the first stage before proceeding to the next stage.The advantage of using this waterfall method is that requirements must be defined more deeply before the coding process is carried out, besides that the implementation process is carried out in stages from the first stage to the last stage in sequence.Besides that, the Waterfall method also allows as few changes as possible for the project to take place.

Current System Analysis
System analysis is one way or technique to describe problems and look for an overview of the system that is running which is then processed so as to produce an expected requirement so that it leads to a solution to the problems that exist in the system.This analysis process is very important to do as a basis for designing a new system and as a comparison material between the current system and the system to be developed.Procedure for the occurrence of violations A. Students come to school to take part in teaching and learning activities, if students violate it will be recorded by the BK teacher.B. The counseling teacher records student violations in the BK book, if the violation is minor, the student will be given a warning and if the violation is severe and repeated, a warning letter will be given.C. Data on the results of student violations are then recapitulated and given to the homeroom teacher D. The homeroom teacher notifies the homeroom teacher the results of the student violation data

A. Functional Needs
This type of requirement contains what processes will be carried out by the system.Functional requirements also contain information that must exist and be generated by the system.The needs analysis consists of: 1.There is a login facility 2. There is a search facility 3. Admin can manage users 4. Admin can manage majors 5. Admin can manage violations 6. Admin can manage achievements 7. Admin can input student achievement 8. Admin can input student violations 9. Admin can manage reports 10.Users can find out the results of student achievements and violations B. Non-Functional Needs 1.The system is easy to understand by the user 2. The system can be done in all types of browsers 3. Simple layout 4. Attractive appearance This use case is used to verify entry into the student achievement monitoring information system.Admin is in charge and has access rights to perform user account management operations, user data, manage violation data, and reports.Homeroom and homeroom teachers do login the application and view student violation data.This page displays the data settings for student violations that have been inputted, such as students arriving late, not wearing socks and so on.Admin can manage the breach data such as adding and deleting data.On this page displays the overall data report of students who have committed violations.From this violation data report, the teacher can find out which students often commit violations.So that actions can be taken such as reducing grades or calling parents and guardians of students to school.Admin can manage the data report to be submitted to the Principal.

CONCLUSION
Based on the research that has been carried out regarding the design of a web-based student achievement monitoring information system, the following conclusions can be drawn is the student violation monitoring information system can make the existing supervision or monitoring process in schools more effective than before.Every violation committed by students will be inputted into the application, making it easier for teachers to evaluate the process of teaching activities in schools, as well as evaluating reports to be given to schools and information to parents of students becomes easier and faster and more accurate, so that able to monitor the discipline of their children at school.Designing an information system for monitoring student violations using the PHP programming language and using the Laravel Framework, with this system it is easier to store data in the form of a database can reduce space.

Figure 3 .
Figure 3. Use Case Diagram Main Page

Figure 4 .Figure 5 .Figure 6 .Figure 7 .
Figure 4. Data of Violation Activity Diagram The Activity Diagram above illustrates the management of breach data.Admin can add violation data and input data for students who commit violations.

Figure 9 .
Figure 9. Report Page View

Table 1 .
Blackbox Testing Login