We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Computerize and Customizing Class Record

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

THE PROBLEM AND ITS BACKGROUND This chapter discusses the background of the study statement of the problem, statement of the objectives, scope and limitation of the study. INTRODUCTION As the technology arises, its become necessary to propose a system that can meet the changing requirements like grading scheme generator with class record management. It includes computerize and customizing class record. Computes the grade of the students and generates the high and low performers in the class. Presently, the traditional and old way of computing grade

As new security threats evolve regularly, it become necessary to propose a system that can meet the changing requirements like radio frequency identification with SMS technology system.

Don't use plagiarized sources. Get Your Custom Essay on
Computerize and Customizing Class Record
Just from $13,9/Page
Get custom paper

It includes easy updates, monitoring of default users and also scalability to integrate new users. Presently, monitoring of the person entering and leaving the university becomes a major concern to its administration since its own population becomes larger and there are more people inquiring for admission and other interest.

The purpose of this study is to examine the use of Grading Scheme Generator with Class record management to see if the benefits associated with their use outweigh concerns in managing the class record. For these purposes proponents will use three categories: (1) comfort, which is the duration of calculation and the ease of use. (2) Accuracy that minimal error rates such as clarity, consistency, measurability, and (3) Availability which is the portion of a potential user group who can use radio frequency identification for technical recognition purposes.

Radio frequency identification is technological tools increase security, increase integrity of social programs such as, welfare, and eases the burden on individual who carry multiple forms of identification. If this is implemented, the universities will achieve greater speed and accuracy with regards to grades of the students and the good management of class records. Grading Scheme Generator with Class Record Management is a huge miles tone to the modernization of the universities.

It offers technology that not all universities can afford, if this implemented, PUP Santa Maria Campus will be the pioneer of this technology from other universities and campuses. BACKGROUND OF THE STUDY The Polytechnic University of the Philippines-SMB Campus is located at km. 39 Sitio Gulod, Pulong Buhangin, Sta. Maria, Bulacan which provide good quality of education and produces graduates who are academically competitive.

The University offers different degrees such as Information Technology, Department of Office Management Technology Accountancy, Civil Engineering, Hotel and Restaurant Management, Entrepreneurial Management, Secondary Education Major in Math and Secondary Education Major in Mathematics. The manual system of entering of the students and personnel entry in the campus is susceptible to intrusions and many aspects of problems concerns authorized entry.

In manual system various personnel and students can go through the university using their ID and at times, any form of identification like registration form of students that’s why it is hard to monitor all the students’ entry to and exit from the campus. Moreover, the guidelines for entering the university was not strictly imposed, there are policy that was violated like tampering of I. D and borrowing of I. D as said by the administration staff and security personnel. In this way the problem presented can be prevented through the smooth flow of following the policy in terms of no I.

D no entry for the students to be responsible. Thus, the proponents proposed the PUP-SMBC Student Monitoring System using Radio Frequency Identification (RFID) with SMS Advisory, to give a convenient and efficient process of monitoring and ensure the security of students of the university. According to Dreck (2000), Radio Frequency Identification (RFID) is a way for automatically identifies objects with radio waves, like a barcode that uses radio waves instead of light. This method of identification offers several advantages over traditional methods regarding ID: (i) the person to e identified is required to have an ID with tag at the point of identification. (ii) Identification based on the radio frequency identification techniques obviates the need to remember a password or carry a token. With the increased integration of computers and internet in our daily lives, it is necessary to protect sensitive and personal data. By the use of radio frequency identification techniques can potentially prevent unauthorized person. As a result, radio frequency identification is being deployed to enhance security.

Basic radio frequency identification with SMS technology system is made up of (1) a RFID (Radio Frequency Identification) reader (2) a RFID tag (3) a Personal Computer (PC) with connection to a LAN connection (4) a GSM (Global System for Mobile) modem and. (5) a database. In radio frequency identification, the Proponents are going to use radio frequency reader equipment in entering the premises. Student will have to tap their ID to the RFID reader for the system to recognize authorized person, which then records date and time of their entrance.

As the students gets out off the university, they had to log out to the system; the system then makes a record of his entrance and departure then sends a message to the parents. The parents will be receiving 3 messages, first is the log-in message then followed by advisory text which can be ALERT ON and ALERT OFF by the parents if they don’t want to receive any message and last is the log-out message. Conceptual Framework INPUT PROCESS OUTPUT Knowledge Requirements a. Rules and Regulations b. Students Information

Software Requirements a. Microsoft Visual Studio 2010 b. Microsoft Access 2007 c. Adobe Photoshop CS3 Hardware Requirements a. LAN Cable b. Computer c. Router d. Printer Enhanced the process of the traditional use of class records and get fast result of grades. “Grading Scheme Generator with Class Record” Determine Application Requirement Design Code and Develop a System Configure LAN Connection Install, System Configuration and Deploy Test and Improve EVALUATION Figure 1. 0 The Conceptual Framework The manual monitoring system includes ID presentation and confirmation.

In PUP-SMBC Student Monitoring System using RFID with SMS technology, there are several information required, the knowledge requirement which includes Rules and Regulations in terms of no I. D no entry and Students Information. The software requirement includes VB. net 2008, XAMP for MYSQL, Adobe Photoshop CS3, and SDK of ACR120. Also, the hardware requirements are RFID Reader, RFID Tag, Computer, Router, GSM Modem and UTP Cable CAT5. These data are fed to the proposed system in order to accommodate and monitor all who access to the University.

The processes that the proposed system does is determining application requirement, design code and develop a system, install, configure LAN connection, install system configuration and deploy, test and improve. After processing all information fed to the system, it will display the desired output. After several trials of implementing the proposed system, evaluation is being placed as one of the important phase to this study. Some error or bugs that are not seen by the proponents during the development study will be proceeding to the evaluation.

Evaluation will be the medium in altering the system errors. Statement of the Problem General Problem This study aimed to develop a system that will monitor every student’s entry to and exit from the Polytechnic University of the Philippines – Santa Maria Campus using Radio Frequency Identification and SMS technology. Specific Problems Specifically, this study sought to answer the following questions: 1. How will the proposed system monitor the students with the implementation of no ID no entry? 2. How will the proposed system access data using LAN connection? 3.

How will the proposed system provide appropriate time of arrival and departure of the students to their parents through SMS technology using batch processing? 4. How will the additional features like sending announcement and advisory will benefit the PUP-SMBC? Objective of the Study General Objective To develop a system that will monitor every student’s entry to and exit from the Polytechnic University of the Philippines – Santa Maria Campus. Specific Objectives 1. To monitor the students with the implementation of no ID no entry. 2. To access data using LAN connection. . To provide timely manner of arrival and departure information of the students to their parents though SMS Advisory using batch processing. 4. How will the additional features like sending announcement and advisory will benefit the PUP-SMBC? Scope and Limitation of the Study The scope of this study focuses on the monitoring of the daily log in and log out of the students of PUP-SMBC as a tool of the security personnel. Campus Security System using Radio Frequency Identification with SMS Advisory use LAN connection and has a restriction in each access level.

The database is only limited to students currently enrolled for the term at PUP-SMBC. The system is limited to determine the admission of visitors, in case there are visitors inside the campus; the security personnel will be the person in charge in monitoring their access inside the campus. In case of unread and lost of RFID Tag the system can provide an alternative way of log in and log out. The system is only for monitoring the log-in and log-out of record and does not include the attendance monitoring for every room assignments of the students.

The SMS Advisory use real time and batch processing in which message can send to the parents through mobile phone. In addition, the system has the capabilities to send announcement to all students, for instance there’s no classes on the following date as well as sending the particular event. The sending of announcement can select specific recipients of the message. The proposed system will run from 6am to 9pm. In case that have a power failure the system operation will resume to following day. The administrator or the person in-charged in the system can set the privileges for the client.

The client can also forced shutdown the client through mobile phone. Significance of the Study The proposed Grading Scheme Generator with Class Record Management would benefit the following: To the Professors This study will give opportunity to the Professors to make and customize his own class record that precise and efficient. Also, this study will give an accurate result of grades of the students. It also gives comfort to the professors in managing and making their own class record. Lastly, it automatically generates the top students.

To the Students The study would benefit the students to have fast and accurate result of their grades. Also, they are able to see and check their grades. To the Parents This study will give awareness to the parents about the log in and log out of their child to the University through mobile phone. Which give them sense of security and this will ease their doubts if their child is really in the campus. This will give the parents more access on their son’s where-about even if they are not around. To the Proponents

This study will give as a basis for the future Proponents for more enhancement of their system. To the University The universities and campuses will have a faster result of grades of the students compare to the traditional way. Also, it will help to lessen human errors. Definition of Terms Antenna It is a tag antenna is the conductive element that enables the tag to send and receive data. Passive, low- (135 kHz) and high-frequency (13. 56 MHz) tags usually have a coiled antenna that couples with the coiled antenna of the reader to form a magnetic field.

UHF tag antennas can be a variety of shapes. Readers also have antennas which are used to emit radio waves. The RF energy from the reader antenna is “harvested” by the antenna and used to power up the microchip, which then changes the electrical load on the antenna to reflect back its own signals. Batch processing It is a Non-continuous (non-real time) processing of data, instructions, or materials. In data transmission, batch processing is used for very large files or where a fast response is not critical. The files to be transmitted are gathered over a period and then send together as a batch.

Cell phone It is a hand-held mobile radiotelephone for use in an area divided into small sections (cells), each with its own short-range transmitter/receiver. Chip It is a programmable digital electronic component (also called a microprocessor) designed to incorporate the functions of a central processing unit (CPU) onto a single semiconducting integrated circuit (IC). Multiple chips can serve as the CPU in a computer system, embedded system or handheld device. Client It is a requesting program or user in a client/server relationship. Database

It is a collection of information that is organized so that it can easily be accessed, managed, and updated. Frequency It is the number of occurrences of a repeating event per unit time. It is also referred to as temporal frequency. Local area network (LAN) It is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. Message It is a general display of information. Can be text or have element content. Radio Frequency Identification It is any method of identifying unique items using radio waves.

Typically, a reader (also called an interrogator) communicates with a transponder, which holds digital information in a microchip. But there are chipless forms of RFID tags that use material to reflect back a portion of the radio waves beamed at them. Real Time Processing It is a real time processing, there is a continual input, process and output of data. Data has to be processed in a small stipulated time period (real time), otherwise it will create problems for the system. Router It is a device that forwards data packets between telecommunications networks, creating an overlay internetwork.

A router is connected to two or more data lines from different networks. SDK It is a software development kit programming package that enables a programmer to develop applications for a specific platform. Typically an SDK includes one or more apis, programming tools, and documentation. Server It is a computer program that provides services to other computer programs (and their users) in the same or other computers. SIM It is a subscriber identity module (a SIM Card) is a smart card technology used exclusively with GSM-based networks.

It is a smart card that securely stores the key identifying a mobile phone service subscriber, as well as subscription information, preferences and text messages. SMS It is a service available on most digital mobile phones and other mobile devices, e. g. a Pocket PC, or occasionally even desktop computers, that permits the sending of short messages between mobile phones. Software It is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it. Structured Query Language

It is a database computer declarative language designed for managing data in relational (RDBMS), and originally based upon relational algebra and tuple relational calculus. System It is a set of detailed methods, procedures, and routines established or formulated to carry out a specific activity, perform a duty, or solve a problem. Systems Administrator It is a person employed to maintain and operate a computer system and/or network. Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES This Chapter presents the related literature and studies related to the study. It includes the Synthesis and Definition of Terms used in the study.

Review of Related Literature Foreign Literature The Origins of RFID According to Holloway (2009), Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. The first disturbing fact is that RFID is not a new technology. It was first used over sixty years ago by Britain to identify friend and foe aircraft in World War II and was part of refinement of Radar. It was during the Swinging Sixties that RFID started to be looked as a solution for the commercial world.

The first commercial applications involving RFID followed during the Seventies and Eighties. These commercial applications were concerned with identify some asset inside a single location. They were based on proprietary infrastructures. The third era of RFID started in 1998, when Proponents at the Massachusetts Institute of Technology (MIT) Auto-ID Centre began to research new ways to track and identify objects as they move between physical locations. This research, which has a global outlook, centred on radio frequency technology and how information held on tags can be effectively scanned and shared with business partners in near real time.

To do this we needed standards. So the work of the Auto-ID Centre focused on: •Reducing the cost of manufacturing RFID tags. •Optimising data networks for storing and delivering larger amounts of data. •Developing open standards. It became apparent that the ideas being proposed, combined with other ongoing technological and standardisation activities worldwide, would help to reduce the costs of RFID tagging. By 2003, the centre had over 100 sponsors from four continents. Its final task was to conduct a large field trial with 40 participating companies in 10 US cities.

Today, the work of the Auto-ID Centre has helped to make RFID economically viable for pallet and carton-level tagging. The technology is also becoming more affordable for high-value items. The Auto-ID Centre officially closed on 26 October 2003, transferring all its technology to EPCglobal. EPCglobal is now leading the development of industry-driven standards for the Electronic Product Code (EPC) Network to support the use of Radio Frequency Identification (RFID) in today’s fast-moving, information rich trading networks.

EPCglobal is a member-driven organisation comprised of leading firms and industries focused on creating global standards for the EPCglobal Network. The EPCglobal Network is a set of technologies that enable immediate, automatic identification and sharing of information on items in the supply chain. In that way, the EPCglobal Network will make organisations more effective by enabling true visibility of information about items in the supply chain. Table 1. 0 RFID Applications across broad range industries RFID Systems

According to Royer (2007), the basic RFID system consists of two main components, the small transponder, more commonly known as a tag, which is attached to the item needing identification and the interrogator, or reader, which in some cases is used to both power the tag and read its data without contact. Note that ‘reader’ is somewhat of a misnomer as the device in some cases can actually be used to write to the tag to change its data as well as reading from it. The basic components of the RFID system are shown in: Figure 2. 0 The two main components of the RFID system

The range of RFID implementations available are broad, and are covered in more depth in other FIDIS deliverables. Tag Cooney (2006), states that RFID tags are essentially radio transponders, i. e. they can receive and transmit using radio waves. Whilst all RFID tags at the basic level are used to store and transmit data, the variations in RFID tags are mainly due to their specific application. The application may dictate that the tag has to be readable over a certain range, and that will in turn dictate the technology just to transmit data and the amount of data it can store.

These factors have a further bearing on the form factor (i. e. shape and size) of the tags themselves. Typically the most decisive element of the tag is the aerial – greater reading range will generally require an aerial with a larger surface area. With applications such as smart cards, a large flat area exists which can house a suitable aerial. However, in other applications such as RFID tags used for medical identification, the size is of importance and as such the useable range is limited. In some cases this is a desirable feature which helps in increase the security of the device.

In case readers cannot receive the signals of tags e. g. placed on various products on a palette, repeater tags can be used. These tags simply act as a kind of proxy. They are powered with a battery and are able to receive and resend signals from other tags. Using repeater tags shielding can be circumvented and weak signals of tags in farer distances can be amplified. Figure 3. 0 Variety of RFID Tags Readers According to Banks et al (2008), the fundamental role of the reader is to interrogate the tag and retrieve its stored data. In the case of active tags this role is extended to bidirectional communication.

Whilst this is a seemingly simple task, the reader actually has to deal with potentially complex streams of data. This is, in part, because at any given times several RFID tags may well be within the polling range of the reader. When this happens the reader must be able to ensure the integrity of the data it is receiving. The functions of the reader are controlled by ‘middleware’, the software which runs inside the reader. This allows basic error checking, filtering, and low level control over the polling and tag reading. It also forms the interface between the reader module and the backend system. Readers can use one or more antennas.

RFID readers are classified into two: Fixed RFID if the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a “bubble” of RF energy that can be tightly controlled if the physics is well engineered. This allows a very definitive reading area for when tags go in and out of the interrogation zone. Mobile RFID if the reader is mobile when the reader reads tags, it is called mobile RFID. Mobile readers include hand held’s, carts and vehicle mounted RFID readers from manufacturers such as Motorola, Intermec, Impinj, Sirit, etc.

Figure 4. 0 Examples of Reader with associated Electronics There are different types of RFID to be aware of the next complication to the so far simple description about what RFID is. This is that there are different sorts of Tags available in the market. This typing of tags can also be done in a number of different ways. Table 2. 0 RFID Tags Types There are several versions of RFID that operate at different radio frequencies. The choice of frequency is dependent on the business requirements and read environment – it is not technology where ‘one size fits all’ applications.

Three primary frequency bands are being used for RFID: • Low Frequency (125/134 KHz) – Most commonly used for access control, animal tracking and asset tracking. • High -Frequency (13. 56 MHz) – Used where medium data rate and read ranges up to about 1. 5 meters are acceptable. This frequency also has the advantage of not being susceptible to interference from the presence of water or metals. • Ultra High-Frequency (850 MHz to 950 MHz) – offer the longest read ranges of up to approximately 3 meters and high reading speeds. RFID tags are further broken down into two categories: * Active RFID Tags are battery powered.

They broadcast a signal to the reader and can transmit over the greatest distances (100+ meters). Typically they can cost ? 5 – ? 20 or more and are used to track high value goods like vehicles and large containers of goods. Shipboard containers are a good example of an active RFID tag application. * Passive RFID Tags do not contain a battery. Instead, they draw their power from the radio wave transmitted by the reader. The reader transmits a low power radio signal through its antenna to the tag, which in turn receives it through its own antenna to power the integrated circuit (chip).

The tag will briefly converse with the reader for verification and the exchange of data. As a result, passive tags can transmit information over shorter distances (typically 3 meters or less) than active tags. They have a smaller memory capacity and are considerably lower in cost (less than ? 1) making them ideal for tracking lower cost items. There are two basic types of chips available on RFID tags, Read-Only and Read-Write: Read only chips are programmed with unique information stored on them during the manufacturing process – often referred to as a ‘number plate’ application.

The information on read-only chips cannot be changed. With Read-Write chips, the user can add information to the tag or write over existing information when the tag is within range of the reader. Read-Write chips are more expensive that Read Only chips. Applications for these may include field service maintenance or ‘item attendant data’ – where a maintenance record associated with a mechanical component is stored and updated on a tag attached to the component. Another method used is something called a “WORM” chip (Write Once Read Many). It can be written once and then becomes “Read Only” afterwards.

Frequencies and Range According to Finkenzeller (2003), RFID systems can operate over a large range of frequencies although the choice of frequency depends on the mode of operation and the application. One of the main factors to consider is the range over which the RFID reader and tag can communicate with each other which is directly affected by the frequency. Figure 5. 0 Illustration showing the broad range of frequencies within the electromagnetic spectrum that RFID systems can utilise RFID transmission frequencies are roughly classified into the three ranges:  * LF (low frequency, 30-300 kHz), HF (high frequency)/RF radio frequency (3-30 MHz) * UHF (ultra high frequency, 300 MHz-3 GHz)/microwave (>3 GHz). However, the specific absorption rate (i. e. how much energy is lost as it passes through an object) of non-conductive substances (and water) is smaller by a factor of 100 000 at 100 kHz than it is at 1 GHz, so practically no energy is lost. The result of this is that systems operating at these frequencies will typically have a greater range. That said, lower frequency systems are noted for their improved object penetration over higher frequency ones.

RFID systems are also classified by range into: * Close-coupling (0-1 cm), * Remote-coupling (0-1 m), * Long-range (>1 m) systems. These ranges represent the theoretical maximum that could be achieved, and although clearly an important factor, the achievable range of communication between RFID tag and reader is dependent not only on the frequency utilised, but also a host of other factors. This can be issues such as the positional accuracy of the transponder, the minimum distance between several transponders in practical operation and the speed of the transponder in the interrogation zone of the reader.

Data Rate According to Royer (2007), “typically, the data quantity a tag holds is in the region of a few bytes to a few kilobytes (sometimes referred to as n-bit). However, some tags only operate using 1 bit – that is the reader can only tell if a tag is there or not, and nothing else. This is useful in applications such as shop security Electronic Article Surveillance (EAS) where you want an alarm to sound if a tag passes through the door regardless of what the tagged item is”. Some n-bit tags are programmable, that is the data that they contain can be changed by the ‘reader’.

Systems that have this functionality typically use Induction Coupling as their means of communicating between reader and tag, and most IC systems utilise passive tags. Simpler programmable tags contain simple logic (known as a state machine) which can control read/write access or to perform fairly complex sequences as well as holding ‘state variables’. More complex varieties use a microprocessor which allows some degree of complex operations to be performed, and is ultimately more flexible than the state machine solution. Operation Type According to Royer (2007), the operation type of an RFID system is dependent on the application.

Essentially, the RFID system can operate based on one of two basic protocols: Full (or half) duplex (FDX / HDX) or sequentially (SEQ). During FDX / HDX the tag transponder sends its data when the RFID reader is asking for it. In the case of passive tags it is during the communication of the data request that power it is actually supplied, i. e. power is actually drawn from the communication signal itself. The difference between full and half duplex is simply that during full duplex, both the reader and tag and send data at the same time, whereas with half duplex, only one can send data at any one time.

In either case, the reader continuously supplies power to the tag. Backend Systems Wadham (2003) stated that valid data received from RFID tags is passed by the middleware to the backend system. The backend system is where data is manipulated and stored, and forms the data resource for the system users. Typically the backend system incorporates some sort of database which allows the linking of the RFID data to other stored information or storing of the tag details themselves.

For example, a given bit string RFID tag code is essentially useless as a piece of data in isolation, but if this unique code is associated with a given product or person, then the backend system can be used to cross reference the code and thus reveal the identity of the tagged item. Equally, a backend system may simply record the occurrences of RFID tags in specific locations, and thus tracking of tags becomes possible even if the identity of the tagged item is unknown.

The construction of the backend system is very application specific and can range from one computer which simply logs data, to banks of machines which perform complex analysis on data from thousands of distributed readers. Notably the backend system need not be geographically near to the RFID readers. Typical applications involve real time payment systems for access such as cashless motorway tollbooths. GSM Modem According to NowMobile. com Limited (2002), GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone.

From the mobile operator perspective, a GSM modem looks just like a mobile phone. When a GSM modem is connected to a computer, this allows the computer to use the GSM modem to communicate over the mobile network. While these GSM modems are most frequently used to provide mobile internet connectivity, many of them can also be used for sending and receiving SMS and MMS messages. ` Figure 6. 0 GSM Modem ACR120 Contactless Smart Card Reader According to Advanced Card Systems Ltd (2011), ACR120 Contactless Smart Card Reader is a compact and cost-effective smart card contactless reader and writer. Developed based on the 13. 6 MHz contactless (RFID) technology, it supports Mifare ® and ISO 14443 A and B cards. ACR120 has a proximity operating distance of up to 5 cm, depending on the type of contactless tag in use. The zversatile reader is also available in module form, as well as in both USB and Serial interfaces, allowing the device to be easily integrated into the PC environment and other systems. The compact design of ACR120 makes installation quick and handy in any location, making it an ideal tool for a broad range of applications, including public transport terminal, physical and logical access control, and even vending machines.

Figure 7. 0 ACR120 Contactless Smart Card Readers Category 5 cable (Cat 5) According to Wikimedia (2011), the highest-quality UTP cable, is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. It is also used to carry other signals such as telephony and video. The cable is commonly connected using punch down blocks and modular connectors. Most Category 5 cables are unshielded, relying on the twisted pair design and differential signalling for noise rejection.

Category 5 has been superseded by the Category 5e specification. Maximum cable segment length According to the ANSI/TIA/EIA standard for category 5e cable, (TIA/EIA 568-5-A) the maximum length for a cable segment is 100 meters (328 feet). If longer runs are required, the use of active hardware such as a repeater, or a switch, is necessary. The specifications for 10BASE-Tnetworking specify a 100 metre length between active devices. This allows for 90 metres of fixed cabling, two connectors and two patch leads of 5 metres, one at each end.

Figure 8. 0 Category 5 patch cable in T568B wiring. XAMMP According to Rajah (2010), “XAMMP is a small light apache distribution containing the most common web development technologies in the single package. Its content small size and portability make it the ideal tool for developing and testing application in PHP and MYSQL. ” Figure 9. 0 XAMP Control Panel Application RFID Tags Help Schools Keep Tabs According to Carman (2008), “Using RFID technology simply helps schools do more efficiently and effectively what they’re already doing manually”

Obstacles remain to RFID’s wider migration from the commercial arena to the educational market. First, some parents object that electronically tracking their children’s whereabouts might compromise their privacy. Still, as AT&T associate director of K–12 education marketing Kevin Carman points out, using RFID technology simply helps schools do more efficiently and effectively what they’re already doing manually—taking attendance, for example, and monitoring and controlling who enters and leaves their buildings. In addition to contending with privacy concerns, many schools ave yet to figure out what sort of tag would be easiest for students to keep with them at all times. Wallet cards are passes to keep track of visitors around the campus and send automatic alerts if anyone should wander into an unauthorized area or overstay a scheduled departure time. Moreover, some schools are already experimenting with RFID. Enterprise Charter School in Buffalo, N. Y. began using it three years ago. Improved Utilization of Resources According to Holloway (2009),” Being able to validate information relating to an item enables increased security.

This individual identification contributes to more effective access control, reductions in shrinkage and other losses, and the ability to provide fast and efficient services at the point of need. Ability to authenticate information can prevent activities like counterfeiting and fraud”. Monitoring According to Brabb (2000), “Monitoring is really important to production by increasing individual performance and providing security for company’s personal records in monitoring one of the major concerns of the company since it serve as a tool for controllership; it is therefore essential that we must know the meaning of monitoring. Local Literature RFID shopping scanner debuts in the Philippines According to Narajos (2004), a new RFID-based system for scanning baskets in a retail outlet has been developed and shown for the first time in the Philippines. The new Waverider system was developed by an industrial design student at De La Salle University in the Philippines, and was based on Trolley Scan’s UHF RFID technology, which itself was originally developed as a barcode replacement technology for retail stores. “Lots has been written and demonstrated about the scanning of supermarket trolleys (carts) using RFID in major retail stores.

Initially there was the Supertag demonstration in Pretoria, South Africa, in 1994, and more recently there has been the Branders Automatic checkout system for trolleys,” said Mike Marsh, managing director for Trolley Scan. ” Marsh suggests that one answer may be the Waverider system which was demonstrated live in a small store in the Philippines. Narajos designed, built and installed the automatic self-service scanning system for baskets which can also be integrated with an anti-shoplifting system (such as the one integrated into Trolley Scan’s own Trolleyponder protocols), and includes features for bagging the goods after scanning.

Review of Related Studies Foreign Studies Application of RFID in Automotive Lifecycle RTC states the analysis of ABI Research which notes that the auto-industry always stands in the first place of the RFID application market from 2002 to 2008. In the near future, due to the maturity of RFID technology and cost down efforts, the application of RFID will apply the whole lifecycle of automotive from manufacturing to after sales service, then junk recycle. According to these issues, RTC/ITRI invests a lot of resources in the research and implementation initiatives in automotive RFID lifecycle application.

The automotive lifecycle application arena of RFID technology can be categorized as follows: 1. Automotive identification and management in product line: such as engine assembly scheduling automatic identification, production line automatic identification. 2. Automotive automatic identification and management: such as automotive pre-delivery inspection pedigree tracking, dealer new automotive inventory monitoring. 3. Automotive active differentiation service: such as new automotive safety guiding, a range of differentiation service, seed-automotive pedigree tracking. . Anti-theft security service: such as automotive anti-theft service, genuine parts authentication. 5. Automatic access control and value-added service: such as freeway electronic toll collection, parking lot application, cross-industry integrated value-added services. Application of RFID in Hospitals Research by Ker and Yoder (2004), a pilot test was conducted by Holbert Systems for Medi Clinic Hospital Group to monitor the time spent by patience in operation theatres. In the test, RFID tag was attached to patience bed before entering the operation theatre.

An RFID Reader was deployed in each theatre and a data buffer in each theatre complex. This enabled information regarding patient’s identity and exact time spent during surgery to be transmitted to a software interface competent of communicating with the hospital’s information system. This application will certainly improve the payments terms with insurance companies. Application of RFID in unlocking cars and home According to Myers (2000, Para. 5) aptly phrases it, “Many techies are implanting RFID under their skins so that they can do things ranging from opening door locks to unlocking computer games.

It will make lives so simple. With just a wave of the hand one would be able to open items ranging from doors to computers and no need to worry about the keys and passwords. The chip costs a few dollars. The problem which might be faced would be terms of accidentally opening the doors and computers which can be dangerous. ” Local Studies Radio Frequency Identification Technology to Combat Medicine Counterfeiting, Protects Patient’s Heath According to Del Rosario et al. (2003), “RFID-chip is a site that is in its latest initiative to promote patient safety by combating pharmaceutical counterfeiting.

Pfizer Inc. has begun to ship its first product containing radio frequency identification (RFID) tags to its customers in the United States. ” RFID technology is being added to all sildenafil citrate sold in the U. S. to enable pharmacies and wholesalers to verify the unique electronic product code, or EPC, on its packaging. Pfizer is the first pharmaceutical company to put in place a comprehensive program of this type focused on EPC authentication as a means of deterring counterfeiting. Sildenafil citrate was selected for the RFID project because it has been a major target for counterfeiters.

Pfizer has invested several million dollars to date in the technology, which encourages counterfeiting because it is both difficult and expensive to duplicate. RFID tags incorporate the EPC into each package, case and pallet of sildenafil citrate. Pharmacists and wholesalers use specially-designed electronic scanner that communicate the code over the internet to a secure Pfizer website. ” The primary goal for adding the technology is to enhance patient safety. ” said Tom McPhillips, vice president of Pfizer’s U. S. Trade Group. We want pharmacists who fill prescription for Pfizer medicines, and patients who use those medicines, to have increased confidence that they are receiving authentic product and not a potentially dangerous face. We are creating additional barriers for criminals who might attempt to counterfeit our products. ” The company’s application of RFID is not yet capable of “tracking and tracing” medicines through the distribution system. “Track and Trace” requires that all parts of the supply chain invest in compatible technology and agree to capture and share information about product movement.

Pfizer will continue to explore the use of this technology including “track and trace” during the coming year. Pfizer application of RFID also does allow for the collection of any patient information. The company is working cooperatively with standards setting bodies, states, governments, the FDA, industry groups and its customers to establish policies for the widespread application of RFID in the future. But, while the technology offers great promised as an anti-counterfeiting tool, it alone will not eliminate drugs counterfeiting.

Pfizer believes the problem must be addressed on many different fronts, including tightening state regulations for the licensing and distribution pharmaceutical products, modifying business practices, increasing enforcement and using technology effectively. Pfizer anticipates that it will take several years before RFID is applied broadly throughout the pharmaceutical industry in the U. S. and worldwide. Standards must be developed to govern technology and data exchange also, RFID also will require pharmaceutical distribution industry to change the way it does business.

Philippines Gets Three Frequency Bands for RFID According to Ashton et al. (2005), China is reluctant to adopt foreign RFID standards; there are reports that Philippines have assigned three frequency bands for the use of RFID tags and readers. The National Telecommunications Commission (NTC) of the country has used the rules and guidelines drafted by telecommunications regulators to bring order and some form of regulation to the technology that is already being used in an unregulated manner in the country. IP Communications reports:

Popular RFID devices currently being used locally are radio tags and barriers used in stores to prevent shoplifting, as well as so-called e-Pass devices attached to cars that use the South Super Highway toll system. Manual System According to Cantorna (1996), “Manual system in retrieving, maintaining, securing and filing of records consume time and effort. There are cases of misplaced records. Furthermore, these files were only kept in envelopes, folders or in wooden tracks. There are also instances when the right information is given to a wrong person which may affect the quality service. According to Orancillo et al. (2001), “We can compare manual system from automated system by considering these factors; in using manual system there are problems in that old system. First, it is time consuming; you have to consume a lot of time to be able to look for the files of the students who has violation. Second, it is under manned; they have no enough people to conduct their transaction. The third problem is that there is waste of effort that you need to make records manually and exerting your effort in writing all the possible information of the student who has violations.

Lastly, is waste of money that you need enough supplies and materials to support the different information that are in their transactions. ” Technology According to De Guzman et al. (2000), “Technology has never been stop from growing, with the present situation that the world has, it is a common knowledge that the growing facts regarding technology will always give an individual a better edge in his work. Technology has always been part of everyday life, from home to any places. Computer could always be a perfect example of a technology that never stops from changing.

With the current trends that it brought almost all manual works are performed with the aid of computers. ” SQL (Structured Query Language) According to Catolico et al. (2002), “SQL (Structured Query Language) database delivers rapid return on your data management, investment, supports the rapid development of enterprise-class business applications that can give your company a critical competitive challenge business demands and different kinds of data management solution. ” Synthesis Radio Frequency Identification (RFID) technology is used to identify and the track objects using radio waves.

The radio waves are transmitted by a reader via an antenna attached to the reader. The transmitted signal is modulated and backscattered to the reader by an RFID tag. The RFID tag consist an integrated circuit and antenna. An RFID consists of an interrogator also known as the reader, the transporter or the tag, and a host computer which controls the reader, stores and displays the resulting the data. An antenna, connected to the reader, is used to communicate between the reader and the tag.

Many data and information are now stored in databases because database offers secure storage. A lot of computer owners, owners of small businesses, end-users in large organizations and programmers are now using the Structural Query Language (SQL) because it is helpful in database manipulation. Upon the system development, the proponents gathered important data to provide the necessary requirements in developing the project proposal that will respond to the need of fast, more accurate and efficient PUPSMB Student monitoring system using RFID with SM Technology.

The review of related literature and studies collected serve as the backbone of the study. Based on the review of related literature and studies gathered from different sources, a PUPSMB Student monitoring system using RFID with SMS Technology is capable of providing effective, reliable, efficient and accurate monitoring system in the subject area. Chapter 3 RESEARCH METHODOLOGY In this chapter, the proponents will be discussing the different research and system design methods that will be used for the proposed system.

These were used to gather necessary information relevant to the study in order to attain the objectives of this study. This chapter will focus on the different methods used for the research, system development, and statistical treatments. This chapter will also illustrate the research population, research instrument, research design, data gathering procedure and analytical tools. System Design This study will use the Waterfall Model of System Development Life Cycle that represents the software life cycle using processes and products.

The system development life cycle of the project is a conceptual model use in project management that describes the stages involved in an information system development project from an initial feasibility study through maintenance of the completed application. The system development typically includes initiation, planning, design, development, testing, implementation, and maintenance phases. Implementation Initiation Planning Analysis Testing Design Maintenance Figure 10. 0 Waterfall Model of System Development Initiation and Planning

Project initiation and planning are the first phases of the project life cycle. These phases are the most important because improperly planned result to project failure. The Proponents begin with an investigation regarding the problems of log-in and log-out of the students in the University of the Philippines, Sta. Maria, Bulacan Campus. Proponents conducted a questionnaire for the admin and security guard, and a survey to the students of the Polytechnic University of the Philippines and parents of the students.

Design In this phase, the design of PUP-SMBC Student Monitoring System using RFID with SMS technology system is prepared. Before starting the actual coding, the requirement specifications from the previous phases are studied by the Proponent in able to provide the desired output. The Proponent reviewed the system requirements, system architecture and the proponents carefully designed the system using adobe Photoshop CS3 in VB. net 2008. Analysis The proponents captured all the requirements of the system in this phase.

The Proponent gathered the requirements from the end-user by researching to another university and consultation, these requirements are analyzed for their validity and the possibility of incorporating the requirements in the PUPSMBC Student Monitoring System Using RFID with SMS Technology (system to be developed) is also studied. Finally, after a cautious analysis by the Proponents, requirement specification document is created which serves the purpose of guideline for the next phase of the Waterfall model being used. Testing

The system then now be tested, it must undergo a series of test using sample data to reduce the number of bugs or defects and make revisions based on the side of the end-user to completely obtain its goal. Implementation Once the system is tested and free from bugs and errors the new application is installed for people to use. The server would be placed at the AVR which can be access by the administrator. The client would be placed at the guard house as a tool of the security guard with a numpad and a wide Monitor for effective viewing of the picture on every students log in and log out at the PUPSMB.

There will be two log-in section and two log-out section for the students. Maintenance It includes making changes to improve a system performance, correct problems, enhance security or address user requirements. There are many reasons for the change. Change could happen because of some unexpected input values into the system. The proponents have conceptualized this scenario. That is why the Proponent developed software to accommodate changes that could happen during the post implementation period.

Methods of Research Used This chapter identifies the methodology of research method used in conducting the study to attain the needed information that can be used to the proposed project. Descriptive Method The main goal of this type of research is to describe the data and characteristics about what is being studied. Descriptive research is mainly done when a Proponent wants to gain a better understanding of the topic. It is quantitative and uses surveys and also the use of probability sampling.

The Proponents distributed questionnaires to 315 of the students in the Polytechnic University of the Philippines, Santa Maria, Bulacan, 315 of the student’s parents, 2 administrations staff and 2 security personnel. The proponents provide questionnaires wherein respondents are directed to a certain choices among provided options. It may be to select a score on a scale, or respond to provided categories. When the questionnaires have been returned with a satisfactory response rate, the data is analyzed and reported.

Descriptive statistics such as weighted means, percentage, demographic data, etc were used. The Proponents used survey research method as a tool in documentary analysis in gathering data. The survey is a non-experimental, descriptive research method. The proponents also used books, electronic sources and unpublished thesis from the other Universities that is related and supportive to the development of the system. The proponents gathered information only at PUPSMB during school year 2010-2011.

Before the development process of the proposed system, the proponents analyzed and interpreted the survey results from Polytechnic University of the Philippines, Santa Maria, Bulacan students regarding the current security access system of the Polytechnic University of the Philippines. Creative Method The proponents used RFID as a medium of the study instead of the traditional I. D system. It will improve the efficiency of monitoring the access of the target beneficiaries. Population, Sample Size and Sampling Technique

The population of Polytechnic University of the Philippines – Santa Maria, Bulacan Campus has a total of 812 male students and 1,259 female students and has a total of 2,071 students as of July 22, 2011 college students according to the campus registrar of PUP-SMBC, the focused of the study was on the selected 315 students of the Polytechnic University of the Philippines – Santa Maria, Bulacan Campus and 315 parents of the students. The sampling technique used by the Proponents for the survey and evaluation form of the students is proportionate quota sampling  technique.

It is use when you know the distribution of target people across a set of groups to ensure that minorities are properly represented in the study. Also, the Proponents used random sampling technique for the survey of student’s parents. It is the purest form of probability sampling. Each member of the population has an equal and known chance of being selected. When there are very large populations, it is often difficult or impossible to identify every member of the population. Description of Respondents

Students. The respondents of this study were 315 of the students of Polytechnic University of the Philippines – Santa Maria, Bulacan Campus who uses the PUPSMB the traditional way of security access. They were given survey sheets to be filled up. The students were asked to answer a survey sheet with question regarding the current rules, regulation and operation of the PUPSMB security access. The questionnaire has open ended questions . The answers were analyzed through a statistical method. Parents.

The respondents of this study were 315 parents of the students of Polytechnic University of the Philippines – Santa Maria, Bulacan Campus. They were given survey sheets to be filled up. The parents were asked to answer a survey sheet with question. The questionnaire has open ended questions . The answers were analyzed through a statistical method. Administrations. The respondents of this study were 3 administrations staff of the students of Polytechnic University of the Philippines – Santa Maria, Bulacan Campus. They were given survey sheets to be filled up.

The administrations staff was asked to answer a survey sheet with question. The questionnaire has open ended questions. Security Personnel. The respondents of this study were 2 security personnel of the students of Polytechnic University of the Philippines – Santa Maria, Bulacan Campus. They were given survey sheets to be filled up. The security personnel were asked to answer a survey sheet with question regarding the manual security system and the offenses that they encountered. The questionnaire has open ended questions. Research Instruments

The Proponent enclosed a letter of approval and permission to Engr. Aureluz Torres PUPSMB Director to allow the Proponent to conduct the study, the Proponent also gathered information from books, internet sources and written studies that were used as reference to this study. Also, the Proponent prepared questionnaire and conduct an interview to fully analyze the proposed study if it is feasible. Data Gathering Procedure The primary sources of data were the students, security personnel, parents of the students and Administration staff.

The survey questionnaire is administered and asked to fill up necessary information for the respondent’s profile and to answer the sets of questions presented in the survey. The finished papers were retrieved and evaluated. Operation and Testing Procedure Listed here is the recommended operation and testing procedure for the proposed PUPSMBC Student Monitoring System using RFID with SMS Technology. Operation Procedure The following are suggested operation procedures in using the PUPSMBC Student Monitoring System using RFID with SMS Technology.

For the System Administrator 1. Add, Modify and Delete Record Information. 2. Add, Modify and Delete Student Information. 3. View Reports/Print Reports. 4. Set the Privileges for the Client. 5. Post and send announcement. For Security Guard 1. Adjustment of the System(Manually Log In and Log Out) 2. Searching Students Log Information Testing Procedures The following steps are performed in testing the system software. 1. The system is tested on a LAN Connection. 2. Sample data are used in testing the system. 3. Administrator users simulated a computer monitoring.

The Admin users also added records. Evaluation Procedure To determine the acceptability and usability of the project, the Proponents conducted a survey and conducted an interview to determine the problem about the existing system used by the Polytechnic University of the Philippines, Santa Maria, Bulacan security access and the possible solution to the problem, reliability and functionality of the existing system. 1. Preliminary Evaluation. Initial evaluation is conducted by distributing survey questionnaires with the Polytechnic University of the Philippines students.

The 315 respondents answered all the questions honestly and efficiently, because of the problems found by the research the proponents became able to conclude that it is feasible to develop the proposed system. The system will be also evaluated base on the technicality so that all suggestions and revisions will be noted and included in the system. 2. Final Evaluation. To evaluate the acceptability of the project, evaluation sheets were given to the target users of the proposed study.

With the evaluation, the proponents determined the possible solution that may satisfy the needs of their target users and beneficiaries. Statistical Treatment of Data For the gathered data in survey, the proponents utilized the percentage for the presentation of the qualitative data. The Formula: n ? _ N___ 1 + ne2 Where: n = sample size represented by the total no. Of students N = population size e = desired margin of error For the gathered data in software evaluation, the proponents utilized the Arithmetic Mean for the presentation of qualitative data.

The Formula: P= fn ? 100 % Where: P = percentage f = frequency n = total number of respondents The proponents utilized the Verbal Interpretation Model presents a set of numerical scale with the corresponding descriptive scale. This aid the proponents to constitute the effectiveness and efficiency of the system based on the performance. Verbal Interpretation for Software Evaluation Table 3. 0 Verbal Interpretation for 5 points Numerical Scale| Descriptive Scale| 4. 01-5. 00| Excellent| 3. 01-4. 00| Very Good| 2. 01-3. 00| Good| 1. 01-2. 0| Fair| 0-1. 00| Poor| Table 4. 0 Verbal Interpretation for 10 points Numerical Scale| Descriptive Scale| 8. 01-10. 00| Excellent| 6. 01-8. 00| Very Good| 4. 01-6. 00| Good| 2. 01-4. 00| Fair| 0-2. 00| Poor| Table 5. 0 Verbal Interpretation for 20 points Numerical Scale| Descriptive Scale| 16. 01-20. 00| Excellent| 12. 01-16. 00| Very Good| 8. 01-12. 00| Good| 4. 01-8. 00| Fair| 0-4. 00| Poor| Table 6. 0 Verbal Interpretation for 20 points Numerical Scale| Descriptive Scale| 80. 2-100| Excellent| 60. 4-80. 19| Very Good| 40. 6-60. 9| Good| 20. 8-40. 59| Fair| | Poor| CHAPTER 4 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter presents the result of data gathered by the proponents in column presentation as well as the analysis and interpretation of such data. Presentation of Results In order to acquire information necessary to system development, the use of data gathering tool such as questionnaire and software evaluation serve as an instrument to indentify the problems of the proposed system and formulate solution through the proposed project.

And to presents the gathered data into numerical form, the results were interpreted and presented in column. Survey Result of PUP-SMB Campus Students Interpretation: Poor Excellent Figure 11 Survey Results for Question No. 1 of PUPSMBC Students As shown in Figure 11, 2% of the respondents answered yes, when they were asked if they have ever tried to use an “RFID with SMS Advisory” and 98% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 6 answered yes and 39 answered no, 45 students from BSA in which everyone answered no, 45 students from BSCE in which everyone answered no, 45 students from BSEM in which everyone answered no, 45 students from BSSE in which everyone answered no, 45 students from BSHRM in which everyone answered no, 45 students from DOMT in which everyone answered no.

With this gathered data, the Proponents concluded that 6 out of 315 respondents have tried to use an RFID with SMS Advisory, it signifies poor interpretation. Interpretation: Poor Excellent Figure 12 Survey Results for Question No. 2 of PUPSMBC Students As shown in Figure 11, 8% of the respondents answered yes, when they were asked if they were to choose between the University’s existing system and RFID with SMS Advisory and 92% answered no. This data are gathered based on the answers of the respondents, selected PUP students from different courses.

It consists of 45 students from BSIT where in 1 answered Manual and 44 answered Automatic, 45 students from BSA where in 6 answered Manual and 39 answered Automatic, 45 students from BSCE in which everyone answered Automatic, 45 students from BSEM where in 4 answered Manual and 41 answered Automatic, 45 students from BSSE where in 9 answered Manual and 36 answered Automatic, 45 students from BSHRM where in 3 answered Manual and 42 answered Automatic, 45 students from DOMT where in 3 answered Manual and 42 answered Automatic.

With this gathered data, the Proponents concluded that 289 out of 315 respondents were chosen RFID with SMS Advisory, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 13 Survey Results for Question No. 3 of PUPSMBC Students As shown in Figure 11, 89% of the respondents answered yes, when they were asked if they think if the RFID with SMS Advisory can ensure the security of various students of the university and 11% answered no. This data are gathered based on the answers of the respondents, selected PUP students from different courses.

It consists of 45 students from BSIT where in 43 answered yes and 2 answered no, 45 students from BSA where in 38 answered yes and 7 answered no, 45 students from BSCE where in 37 answered yes and 8 answered no, 45 students from BSEM where in 42 answered yes and 3 answered no, 45 students from BSSE where in 38 answered yes and 7 answered no, 45 students from BSHRM where in 38 answered yes and 7 answered no, 45 students from DOMT where in 44 answered yes and 1 answered no.

With this gathered data, the Proponents concluded that 280 out of 315 respondents thought that the RFID with SMS Advisory can ensure the security of various students of the university, it signifies excellent interpretation Interpretation: Excellent Poor Figure 14 Survey Results for Question No. 4 of PUPSMBC Students As shown in Figure 11, 95% of the respondents answered yes, when they were asked if they think if the RFID with SMS Advisory can provide a convenient and efficient security access compared with the Universities traditional system and 5% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 44 answered yes and 1 answered no, 45 students from BSA where in 42 answered yes and 3 answered no, 45 students from BSCE where in 40 answered yes and 5 answered no, 45 students from BSEM where in 43 answered yes and 2 answered no, 45 students from BSSE where in 42 answered yes and 3 answered no, 45 students from BSHRM where in 44 answered yes and 1 answered no, 45 students from DOMT in which everyone answered yes.

With this gathered data, the Proponents concluded that 300 out of 315 respondents thought that the RFID with SMS Advisory can provide a convenient and efficient security access compared with the Universities traditional system, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 15 Survey Results for Question No. 5 of PUPSMBC Students Figure 17: Question 7 As shown in Figure 11, 92% of the respondents answered yes, when they were asked if they think RFID with SMS Advisory can prevent any form of misidentification and unauthorized person entering the campus and 8% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 43 answered yes and 2 answered no, 45 students from BSA where in 42 answered yes and 3 answered no, 45 students from BSCE where in 42 answered yes and 3 answered no, 45 students from BSEM where in 38 answered yes and 7 answered no, 45 students from BSSE where in 40answered yes and 5 answered no, 45 students from BSHRM where in 42 answered yes and 3 answered no, 45 students from DOMT where in 44 answered yes and 1 answered no.

With this gathered data, the Proponents concluded that 289 out of 315 respondents thought that the RFID with SMS Advisory can ensure the security of various students of the university, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 16 Survey Results for Question No. 6 of PUPSMBC Students As shown in Figure 11, 91% of the respondents answered yes, when they were asked if they are in favour if RFID with SMS Advisory being used in the security of various students of the university and 9% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT in which everyone answered yes, 45 students from BSA in which everyone answered yes, 45 students from BSCE where in 37 answered yes and 8 answered no, 45 students from BSEM where in 40 answered yes and 5 answered no, 45 students from BSSE where in 36 answered yes and 9 answered no, 45 students from BSHRM where in 40 answered yes and 5 answered no, 45 students from DOMT in which everyone answered yes.

With this gathered data, the Proponents concluded that 288 out of 315 respondents were in favour if RFID with SMS Advisory was being used in the security of various students of the university, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 17 Survey Results for Question No. 7 of PUPSMBC Students As shown in Figure 11, 89% of the respondents answered yes, when they were asked if they are willing to support the RFID with SMS Advisory if the system will be implemented and 11% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 44 answered yes and 1 answered no, 45 students from BSA where in 38 answered yes and 7 answered no, 45 students from BSCE where in 36 answered yes and 9 answered no, 45 students from BSEM where in 39 answered yes and6 answered no, 45 students from BSSE where in 36 answered yes and 9 answered no, 45 students from BSHRM where in 41 answered yes and 4 answered no, 45 students from DOMT in which everyone answered yes.

With this gathered data, the Proponents concluded that 290 out of 315 respondents were willing to support the RFID with SMS Advisory if it is implemented, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 18 Survey Results for Question No. 8 of PUPSMBC Students As shown in Figure 11, 92% of the respondents answered yes, when they were asked if they think the implementation of RFID with SMS Advisory will increase the security of the campus and 8% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 43 answered yes and 2 answered no, 45 students from BSA where in 43 answered yes and 2 answered no, 45 students from BSCE where in 36 answered yes and 9 answered no, 45 students from BSEM where in 37 answered yes and 8 answered no, 45 students from BSSE where in 36 answered yes and 9 answered no, 45 students from BSHRM where in 40 answered yes and 5 answered no, 45 students from DOMT in which everyone answered yes.

With this gathered data, the Proponents concluded that 280 out of 315 respondents thought that the implementation of RFID with SMS Advisory will increase the security of the campus, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 19 Survey Results for Question No. 9 of PUPSMBC Students As shown in Figure 11, 90% of the respondents answered yes, when they were asked if they are willing to obey to the new regulation of the campus if the system will be implemented and 10% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 44 answered yes and 1 answered no, 45 students from BSA where in 38 answered yes and 7 answered no, 45 students from BSCE where in 35 answered yes and 10 answered no, 45 students from BSEM where in 43 answered yes and 2 answered no, 45 students from BSSE where in 39 answered yes and 6answered no, 45 students from BSHRM where in 38 answered yes and 7 answered no, 45 students from DOMT in which everyone answered yes.

With this gathered data, the Proponents concluded that 282 out of 315 respondents were willing to obey to the new regulation of the campus if the system will be implemented, it signifies excellent interpretation. Interpretation: Excellent Poor Figure 20 Survey Results for Question No. 10 of PUPSMBC Students As shown in Figure 11, 80% of the respondents answered yes, when they were asked if they are willing that an additional feature, in which parents can monitor your entry to and exit from PUP-SMBC, be implemented as part of the RFID Monitoring System and 20% answered no.

This data are gathered based on the answers of the respondents, selected PUP students from different courses. It consists of 45 students from BSIT where in 39 answered yes and 6 answered no, 45 students from BSA where in 36 answered yes and 9 answered no, 45 students from BSCE where in 37 answered yes and 8 answered no, 45 students from BSEM where in 34 answered yes and 11 answered no, 45 students from BSSE where in 37 answered yes and 8 answered no, 45 students from BSHRM where in 35 answered yes and 10 answered no, 45 students from DOMT where in 38 answered yes and 7 answered no.

With this gathered data, the Proponents concluded that 254 out of 315 respondents were willing that an additional feature, in which parents can monitor your entry to and exit from PUP-SMBC be implemented as part of the RFID Monitoring System, it signifies excellent interpretation. Figure 21 Summary of Survey Result of PUP-SMB Campus Students Figure 21 shows that, the In question no. 1, 98% of the respondents don’t tried to use RFID with SMS Advisory. In question no. 2, 92% choose RFID with SMS Advisory. In question no. 3, 89% thinks that the proposed system can ensure the security of various students of the university.

In question no. 4, 95% thinks that RFID with SMS Advisory can prove a convenient and efficient security access compared with the Universities traditional system. In question no. 5, 92% thinks that RFID with SMS Advisory can prevent any form of misidentification and unauthorized person entering the campus. In question no. 6, 91% are in favour if RFID with SMS Advisory is being used for the security of various students of the university. In question no. 7, 89% are willing to support the system. In question no. 8, 92% thinks that the implementation of RFID with SMS Advisory will increase the security of the campus.

In question no. 9, 90% are willing to obey to the new regulation of the campus if the system will be implemented. In question no. 10, 80% are willing that an additional feature, in which parents can monitor your entry to and exit from PUP-SMBC, be implemented as part of the RFID Monitoring System. Survey Results of the Parents Figure 22 Survey Results for Question No. 1 of the Parents Interpretation: Excellent Poor As shown in Figure 22, 100% of the respondents answered yes, when they were asked if they have a child at PUP-SMBC.

This data are gathered based on the answers of the respondents. It consists of 315 parents in which everyone answered yes. Figure 23 Survey Results for Question No. 2 of the Parents Interpretation: Excellent Poor As shown in Figure 23, 92% of the respondents answered yes, when they were asked if they are aware about the schedule of their child and 8% answered no. This data are gathered based on the answers of the respondents. It consists of 315 parents where in 289 answered yes and 26 answered no. Interpretation: Excellent Poor Figure 24 Survey Results for Question No. of the Parents As shown in Figure 24, 87% of the respondents answered yes, when they were asked if they are sure that the schedule of their child is reliable and 13% answered no. This data are gathered based on the answers of the respondents. It consists of 315 parents where in 273 answered yes and 42 answered no. Figure 25 Survey Results for Question No. 4 of the Parents Interpretation: Poor Excellent As shown in Figure 25, 19% of the respondents answered yes, when they were asked if there’s a time that your child lied to you regarding their schedule and 81% answered no.

This data are gathered based on the answers of the respondents. It consists of 315 parents where in 61 answered yes and 254 answered no. Interpretation: Excellent Poor Figure 26 Survey Results for Question No. 5 of the Parents As shown in Figure 26, 100% of the respondents answered no, when they were asked if they are aware about the RFID with SMS Advisory. This data are gathered based on the answers of the respondents. It consists of 315 parents in which everyone answered no. Interpretation: Excellent Poor Figure 27 Survey Results for Question No. 6 of the Parents

As shown in Figure 27, 100% of the respondents answered yes, when they were asked if they want this proposed system to be implemented. This data are gathered based on the answers of the respondents. It consists of 315 parents in which everyone answered yes. Interpretation: Excellent Poor Figure 28 Survey Results for Question No. 7 of the Parents As shown in Figure 28, 100% of the respondents answered yes, when they were asked if they think the proposed system will help them as a parent to monitor their child. This data are gathered based on the answers of the respondents.

It consists of 315 parents in which everyone answered yes. Interpretation: Excellent Poor Figure 29 Survey Results for Question No. 8 of the Parents As shown in Figure 29, 93% of the respondents answered yes, when they were asked if they are willing to received text message regarding the log-in and log-out of their child in the campus and 7% answered no. This data are gathered based on the answers of the respondents. It consists of 315 parents where in 294 answered yes and 21 answered no. Interpretation: Excellent Poor Figure 30 Survey Results for Question No. 9 of the Parents

As shown in Figure 30, 100% of the respondents answered yes, when they were asked if ever the proposed system will be implemented are they willing to support. This data are gathered based on the answers of the respondents. It consists of 315 parents in which everyone answered yes. Figure 31 Summary of Survey Result of the Parent Figure 31 shows that, the In question no. 1, 100% of the respondents have a child in PUP-SMBC. In question no. 2, 92% are aware about the schedule of their child. In question no. 3, 87% thinks that they are sure that the schedule of their child is reliable.

In question no. 4, 19% answered yes when the respondents asked if there times that their chid lied to them regarding their schedule. In question no. 5, 100% are not aware about the RFID with SMS Advisory. In question no. 6, 100% want the proposed system to be implemented. In question no. 7, 100% thinks that the proposed system will help them as a parent to monitor their child. In question no. 8, 93% are willing to receive text message regarding the log-in and log-out of your child in the campus. In question no. 9, 100% are willing to the proposed system if the system will be implemented.

Evaluation Results of PUP-SMB Campus Students Table 7. 0 Evaluation Criteria 1 Criteria| Points| Mean| Interpretation| Correctness| | | | * Generate accurate result. | 20| 18. 85| Excellent| Table 7 shows that in terms of correctness, the proposed system accumulates a mean of 18. 85, it signifies excellent interpretation. Table 8. 0 Evaluation Criteria 2 Criteria| Points| Mean| Interpretation| Reliability | | | | * Can handle failures and has an error handling failures. | 10| 9. 33| Excellent|

Table 8 shows that in terms of reliability, the proposed system accumulates a mean of 9. 33, it signifies excellent interpretation. Table 9 Evaluation Criteria 3 Criteria| Points| Mean| Interpretation| Efficiency| | | | * System can run in longer hours, outputs are correct in generating report. | 10| 9. 41| Excellent| Table 9 shows that in terms of efficiency, the proposed system accumulates a mean of 9. 41, it signifies excellent interpretation Table 10. 0 Evaluation Criteria 4 Criteria| Points| Mean| Interpretation| Integrity| | | | * Security is reinforced. System protected by a username and password. 5| 4. 39| Excellent| Table10 shows that in terms of integrity, the proposed system accumulates a mean of 4. 39, it signifies excellent interpretation Table 11. 0 Evaluation Criteria 5 Criteria| Points| Mean| Interpretation| Usability| | | | * Needs of the end-user is obtained. | 10| 8. 56| Excellent| Table 11 shows that in terms of usability, the proposed system accumulates a mean of 8. 56, it signifies excellent interpretation Table12. 0 Evaluation Criteria 6 Criteria| Points| Mean| Interpretation| Maintainability| | | | * Ease of identifying what needs to be changed. | 10| 9. 32| Excellent|

Table 12 shows that in terms of maintainability, the proposed system accumulates a mean of 9. 32, it signifies excellent interpretation. Table 13. 0 Evaluation Criteria 7 Criteria| Points| Mean| Interpretation| Portability| | | | * Software will work under different configuration. | 10| 8. 33| Excellent| Table13 shows that in terms of portability, the proposed system accumulates a mean of 8. 33, it signifies excellent interpretation. Table 14. 0 Evaluation Criteria 8 Criteria| Points| Mean| Interpretation| Interoperability| | | | * The extent or ease, to software. | 10| 8. 53| Excellent|

Table 14 shows that in terms of interoperability, the proposed system accumulates a mean of 8. 53, it signifies excellent interpretation. Table 15. 0 Evaluation Criteria 9 Criteria| Points| Mean| Interpretation| Testability| | | | * Ease of validation, software meets the requirement. | 5| 4. 54| Excellent| Table 15 shows that in terms of testability, the proposed system accumulates a mean of 4. 54, it signifies excellent interpretation. Table 16. 0 Evaluation Criteria 10 Criteria| Points| Mean| Interpretation| Flexibility| | | | * Ease of changing the software to meet revised requirement. | 10| 8. 46| Excellent|

Table 16 shows that in terms of flexibility, the proposed system accumulates a mean of 8. 46, it signifies excellent interpretation. Table 17. 0 Summary of Software Evaluation Results of the PUP-SMB Campus Students Criteria| Mean| Interpretation| Correctness| 18. 85| Excellent| Reliability| 9. 33| Excellent| Efficiency| 9. 41| Excellent| Integrity| 4. 39| Excellent| Usability| 8. 56| Excellent| Maintainability| 9. 32| Excellent| Testability| 4. 54| Excellent| Flexibility| 8. 46| Excellent| Portability| 8. 33| Excellent| Interoperability| 8. 53| Excellent| Table 17 shows the overall results of software evaluation of PUP-SMB Campus Students.

Each criterion is presented with its accumulated mean and the corresponding interpretation. With the data gathered in the above table, the proponents concluded that the proposed RFID with SMS Advisory meets all the criteria required in developing an effective system application. CHAPTER 5 SUMMARY, CONCLUSION AND RECOMMENDATION This chapter discusses the summary of the entire study and includes the conclusion arrived by the proponents and the necessary recommendation for the proposed system. Summary The development of PUP-SMB Students Monitoring System using RFID with SMS Advisory was proposed at PUP-SMB campus located at Km. 8 Pulong Buhangin, Sta. Maria, Bulacan to increase the security of the campus. This study was proved to be technically and operationally feasible the use of some analytical tool such as Data Flow Diagram, survey form and system evaluation. The technically of the system reflected on the result of the survey forms and its operation was highlighted in the results of system evaluation. The proponents cited the advantage of using RFID and SMS technology. The system proved the usefulness of RFID and SMS Technology in securing records nd all logs are been monitored by the system. The bonafide students, admin staff, security personnel and parents of the students are the respondents of the system as well as the beneficiaries of this study. Summary of Findings According to the results of the surveys, the development of “PUP-SMBC Students Monitoring System using RFID with SMS Advisory” can ensure the security of the data being recorded and the data sent to the parents of the students. It will also give a convenient and efficient way of monitoring the log-in and log-out of the students in the Campus.

The survey form consists of different questions that serve as the basis of the system. It includes basic question that supports the development of the system. The system composed of 315 respondents of students, 315 parents of the students, 2 security personnel and 2 administration staff. In familiarization for the RFID with SMS Advisory 100% students answered YES, while the parents answered 100% of YES. In the support for the implementation of the proposed system 100% of the parents answered YES while the students answered 88 % of YES and 12% of NO.

The system evaluation form consist of 10 criteria which are Correctness (the completeness of the system), Reliability (system can handle failures set by the user), Efficiency (system can run in longer hours), Integrity (security is reinforced), Usability (needs of the end-user is obtained), Maintainability (system can described/ locate the errors during runtime), Testability (ease of validation), Flexibility (ease of validation that the software meets revised requirements), Portability (the extent to which the software will work under different computer configurations), Interoperability (the extent, or ease, to which software components work together). For the correctness of the system 13. 85 is the weighted mean . In reliability 9. 33 is the weighted mean. In efficiency 9. 41 is the weighted mean. In integrity 6. 39 is the weighted mean.

For the usability 8. 56 is the weighted mean. In maintainability 9. 32 is the weighted mean. In testability 6. 33 is the weighted mean. For the flexibility 8. 53 is the weighted mean. In portability 9. 54 is the weighted mean. For the interoperability 9. 46 is the weighted mean. Conclusion Based on the findings, the following conclusions were drawn: 1. The PUP-SMBC Students Monitoring System using RFID with SMS Advisory can monitor the students with the implementation of no ID no entry by utilizing the proposed system. It provides a high level of security for the purpose of individual identification in which all actions will be monitored by the system. 2.

The PUP-SMBC Students Monitoring System using RFID with SMS Advisory can access data using LAN connection by allowing the administrator to manipulate all the data being fed to the system. Also the administrator will have the full access on the system in order to maintain the organized compilation of records through LAN connection. 3. The PUP-SMBC Students Monitoring System using RFID with SMS Advisory can provide appropriate time of arrial and departure of the students to their parents by using batch processing in which students will have to tap their ID to the RFID reader for the system to recognize authorized person, which then records date and time of their entrance.

As the students gets out off the university, they had to log out to the system; the system then makes a record of his entrance and departure then sends a message to the parents in a specific period of time. 4. Through the proposed system “PUP-SMBC Student Monitoring System using RFID with SMS Advisory”, the system can always keep track of every student’s entry to and exit from the university. Thus, the university will be able to have a better security and will s serve as a big improvement of the campus. However, the efficiency of the proposed system depends on the ability of the in-charge to facilitate the systems operation. Recommendation Based on the conclusions presented, the proponents would like to recommend the following to the future Proponents for further enhancement of the system. 1.

The system must add additional information with regard to student’s information. 2. The system should be more user friendly in terms of creativity, add some flash animations to be more interactive. 3. This system is in LAN connection, the administrator and users has its own mode of access to use in comes of searching log-in and log-out information. Bibliography Electronic Sources Dreck, (2000). “RFID” www. corprfid. att. com/edu Carman, (2008). “RFID Tags Help Schools Keep Tabs” www. corp. att. com/edu Holloway,(2009). “Intoduction: RFID” http://www. scribd. com/doc/25376932/Rfid-Introduction Narajos,(2004). ” RFID shopping scanner debuts in the Philippines” http://www. usingrfid. com/news/read. sp? lc=z51921ox293zg NowMobile. com Limited, (2002). “GSM Modem” http://www. nowsms. com/faq/what-is-a-gsm-modem Rajah, (2010). “Introduction to XAMMP” http://www. slideshare. net/narendranshanker/xampp-4198829 Royer,(2007). “A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification(RFID)” http://www. fidis. net/resources/deliverables/hightechid/int-d3700/doc/6/multiple/ Wikimedia, (2011). “Category 5 Cable” http://en. wikipedia. org/wiki/Category_5_cable#Environmental_ratings Books Banks et al. (2008). RFID Applied. pg. 13-47. Brabb. (2000). Business Data Processing. pg. 156

Cite this Computerize and Customizing Class Record

Computerize and Customizing Class Record. (2016, Oct 02). Retrieved from https://graduateway.com/computerize-and-customizing-class-record/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page