Académique Documents
Professionnel Documents
Culture Documents
APPROVAL SHEET
The following Candidates namely: Biboso, Darwin J., Iraga Jay Christian G., Mendoza,
Allen Christian D., Mequiz, Glaiza A., have successfully completed the capstone project
entitled “Student Log Monitoring System with SMS Notification using RFID for CDSP”, there
by demonstrating knowledge of the skills needed to contribute to the scientific advancement of
their area of study This is in partial requirements for the Degree Bachelor of Science in
Information Technology
____________________________
Panel Chair
____________________________
Panel Member
_____________________________
Panel Member
_____________________________
Capstone Adviser
ENDORSEMENT SHEET
This Final Capstone Project entitled “STUDENT LOG MONITORING SYSTEM WITH
SMS NOTIFICATION USING RFID FOR CDSP”, prepared and submitted by Biboso,
Darwin J., Iraga, Jay Christian G., Mendoza, Allen Christian D., Mequiz, Glaiza A., in
partial fulfillment of the requirements for the degree Bachelor of Science in Information
Technology, has been examined, accepted, and recommended for oral defense.
________________
Date
4
ACKNOWLEDGEMENT
The proponents would like to extend their greatest and deepest appreciation to all the
people behind their success and accomplishment in this project. This capstone project is made
possible through the help of our Almighty Creator and support from everyone, including their
parents who keep on encouraging them to finish the research, their teachers who guide them
through, family and friends for their support for making them realize that at the end of the day
after all the hard works, pain, sleepless nights, misunderstandings, arguments, downfall and
failures, there are reasons to laugh and crack jokes even at the lowest point of their lives. All
their tears and hardships are worth it for they know that someday all their efforts will pay off.
significant advisor and professor: First and foremost, they would like to thank Prof. Kim Salamat
for being their adviser, mentor, inspiration and the one who shared his knowledge, patience and
attention for the project. They thank him so much. Second, they would like to thank Prof.
Abigael Fider for reading their paper and offered invaluable detailed advices on grammar. Third,
they would like to thank, Dr. Ma. Luisa R. Padlan to provide valuable advices for finishing the
capstone project.
To the friends of the proponents, Ma. Primera Gerez for borrowing her laptop, Mico
Bernard Fajardo and Jonathan Quebral for staying with them for the support while developing
the project and to Fajardo’s Family who accommodated the proponents at their residence for
several nights.
5
ABSTRACT
The system entitled Student Log Monitoring System with SMS notification using RFID
for Colegio De San Pedro. The existing traditional requires students to be manually monitored by
the guards at the gate every time they arrived and left the campus. Collecting students log by
using the developed system can help the school to monitored the student’s activity log inside the
campus. Student parents will be notified by sending an Short Message from the school when the
students arrived and left the school. Parents or guardians is one of the beneficiaries of developed
system because they can monitor too their child even they are not around at the campus. The
developed system is using the technology Radio Frequency Identification (RFID) helps to fasten
the process of collecting data or logs of the students. The developed system can issue a printed
report if necessary.
The developed system platform is web based, the coverage of the system is from Kinder
1 to Senior High School Students. Guards will monitor the ins and outs of every student, Admin
is in charge of the main functionalities of the system, gathering of data and information from the
students. The last chapter of this paper discussed the setting of the study, its population and
environment where we conducted some tests to identify the functionality and the usability of the
proposed system.
6
TABLE OF CONTENTS
Preliminaries Page
Acknowledgement---------------------------------------------------------- 4
Abstract---------------------------------------------------------------------- 5
List of Tables--------------------------------------------------------------- 11
Chapter I INTRODUCTION
Introduction ------------------------------------------------------------------ 12
Conceptual Framework------------------------------------------------------- 14
SYSTEMS
Foreign Literature------------------------------------------------------------- 18
Local Literature---------------------------------------------------------------- 19
Foreign Studies----------------------------------------------------------------- 20
Local Studies------------------------------------------------------------------- 21
Systems Review---------------------------------------------------------------- 22
Synthesis------------------------------------------------------------------------- 25
Planning Phase------------------------------------------------------------------ 27
Analysis Phase------------------------------------------------------------------- 27
Design Phase--------------------------------------------------------------------- 30
Development Phase------------------------------------------------------------- 34
Testing Phase-------------------------------------------------------------------- 34
Implementation Phase---------------------------------------------------------- 35
Test Cases------------------------------------------------------------------------ 47
8
Summary--------------------------------------------------------------------- 51
Conclusion------------------------------------------------------------------- 51
Recommendation------------------------------------------------------------- 52
Bibliography----------------------------------------------------------------- 53
List of Figures--------------------------------------------------------------- 9
List of Tables---------------------------------------------------------------- 11
Appendices
A. Letter of Request
C. Curriculum Vitae
9
LIST OF FIGURES
Page
LIST OF TABLES
Page
Chapter I
INTRODUCTION
Introduction
Identification (RFID) technology. The existing student log monitoring system requires students
to be manually monitored by the guards at the gate every time they arrived and specially when
they are leaving the campus. As common as it seems, such system lacks of automation, where a
number of problems may arise, this include the time unnecessarily consumed by the students as
they are being monitored by the guards and checked their identification cards with printed
schedules. Having a system that can automatically capture student's log by flashing their student
card at the RFID reader can really save all the records.
Daily log of students is one approach of the school to know if the student entering in the
school premises or leaving. In addition, the paper method required a data entry phase in order to
generate reports, which also suffered from similar problems. Therefore, using pen and paper was
ruled out from the beginning. That is why the proponents have come up to this project based on
RFID, which is being displayed every time they time in and out of the school.
13
The study will provide a RFID card for the students that they will use every time they
time in and time out of the campus. They will need to tap their card to RFID scanner and that is
provided in order to confirm their identity. With this approach, the admin can monitor the log of
the students without the hassle of manually looking to the log books.
Goals
The main goals of the study will be used to maintain a daily record of a student’s entering
and leaving the campus by automating the recording of date and time of their entry and exit. The
study will greatly contribute in implementing security for the assurance of the parents who
Objectives
The proponents set the main goal of the study to identify the record of time in and time
out of each student in the campus and provide a notification for their parent/guardian for
complacency purpose and also to provide a fast and effective way of monitoring student’s
presence through RFID Technology and provide a reliable source of students log report and a
Student log monitoring system helps to monitor the arrival and departure of each student
in school, it would also help to identify the activity log of each student once they entering or
14
leaving in the campus and by these it would be a great contribution in terms of students’ security
Student - The RFID Tags in their School ID will help the students to record their daily log at
Short messaging Service is made for them to know whether their children were entering and
Admin - The principal can easily monitor the students log and if there is an incident report of a
Future Researcher – In future researcher this will be serve as basis or reference to the future
Conceptual Framework
In this study figure 1 shows the process of the proposed system “Student Log Monitoring
System with Short Message Service using Radio Frequency Identification for Colegio De San
Pedro”. First, the person-in-charge needs to enter the student information such as name, student
id, and grade level. The student information will be recorded or updated with the current records
if there is a sudden change in the existing information for the reliability of the records. Then the
system will gather the logs of the students once they tap their id to the RFID reader when they
arrived or exit the campus and the system will send a short message notification to their
15
perspective parents or guardians to give them track of their pupil. The principal can easily
monitor the log of students who entered and leaved the campus.
Scope
The study provides a student log monitoring with short message using a technology such
as radio frequency identification for the automated log of students in Colegio de San Pedro and
generate a printed report. The study helps guardians/parents to give them track of their child
Limitation
In this study, college students, faculty, employee and visitors are not part of the user and
it is for limited for elementary to senior high school students, it cannot be used as a student’s
attendance for each subject; it is used only for monitoring the students who entered and left the
school premises. The system is not responsible for the security once the student’s left in the
school. The user mentioned above are exempted because they can free roam inside and out of the
campus. Employees of the school are using a biometric technology to record their attendance/log
to the school.
Definition of Terminologies
For further understanding of the study, the proponents include the technical terminology
and operational terminology that would help the future researchers to fully understand the
Technical Terminology
HTML – (Hyper Text Markup Language) a standardized system for tagging text files to achieve
automatically identify and track tags attached to objects. The tags contain electronically stored
information.
RS 232A – is a serial port that personal computers used them for connections not only to
modems, but also to printers, mice, data storage, uninterruptible power supplies, and other
peripheral devices.
TTL converter- are a range of USB to serial converter cables which provide connectivity
Operational Terminology
Moderator – a person in the first-line who monitors and maintained the system functionality.
Admin – a person who is allowed to access the system database and records.
Parents / Guardian- a person who received a SMS Notification from the school.
18
Chapter II
Related Literatures
Foreign
Barwuah & Ley (1997), found that one of the other participating colleges gave complete
commitment to a swipe card registration system, only to later discontinue it. In summer 10 the
entire college site was wired with readers and through 1990-1991 a pilot scheme ran on six
courses. This was reasonably effective, mainly because everyone knew it was a pilot and so staff
and students were vigilant about rooking it. Full implementation was introduced in 1999.
However, since this was a response to a need for careful monitoring following financial
difficulty it was not a strategically panned process. The swipe system was relatively primitive:
‘dumb’ readers which simply displayed a red light when a swipe was done. Cards were very
basic Lectures had to swipe two cards to identify themselves and the module or class they were
Nainan & Parekh (2013), found that the implementation of RFID technology has
definitely quickened the entire of process or recording attendance. The traditional method of
process. On average, based on experiment the total time taken to record the attendance of a class
Shinghai (2012), found that a RFID tag type of ID Card make the process of taking the
attendance easier, faster and secure as compared to conventional method. Students or workers
only need to place their ID card on the reader and their attendance will be taken immediately.
With real time clock capability of the system, attendance taken will be more accurate since the
Local
Dellosa & Hemedes (2014), found that the RFID system involves an RFID tag, an RFID
reader and a database. A reader scans the tag with the use of computer program and transmits the
information to the computer. The captured information will be processed for intended use.
Wireless transmission of identification data rather than by manual transcription increases the
quality and speed of data transmission and reception. Presently the library of Lyceum of the
Philippines Laguna is using a traditional system wherein students and employees will have to
write their names in the log sheet for their attendance in the library. The application of radio
Mr. Mojares (n.d), found that in the advent of technology, communication becomes faster
and easier in tap of a fingertip. In an academic institution parse, communication between parents
and school is very challenging and important one. It needs to full effort to understand one
20
another. One of the worries of the parents is that if their children are really attending or not in the
Alvarez (2015), found that the project was designed using RFID reader for the scanning
of RFID tags, RS 232 to TTL converter to convert the data coming from the reader. A visual
basic programming software was used for the program and Microsoft Access for the database.
Related Studies
Foreign
Mr. Patel (2012), found that recording and monitoring of class attendance is an area of
administration that can require significant amounts of time and effort in a school/university
environment, largely due to the amount of time required in lectures to get the necessary
information. This paper presents the integration of ubiquitous computing systems into classroom
for managing the students’ attendance using RFID technology. RFID technology can be a
powerful tool in helping to manage student’s attendance throughout the working school day and
also enhance classroom security. RFID technology has been applied to solve problems where it
is necessary to take automatically record the movements and locations of students in a classroom
of school/university environment.
Olaleye & Olaniyan (2013), found that this study has successfully designed and
developed an enterprise class mass SMS mailing system that support multiple users as well as
21
multiple SMS gateways, providing a unified interface and common set of features across many
SMS gateways which prevent vendor lock-in as users can choose among multiple SMS vendor
gateways.
Ahmad & Abbas (2015), found that in this study, they have proposed a push-based SMS
sending approach by GSM cellular network to remote monitoring of attendance of student based
on RFID. It is much faster and it has two components i.e. RFID tag and RFID reader.
Local
Morallo (2015), found that this study was developed to create an electronic attendance
and logging system using Radio Frequency Identification (RFID) and Short Messaging Service
(SMS) with a Web-based management system portal that allows user to access real time data to
ensure campus security and smart information management. The students will use RFID card
system to check in and out of the main entrance, to both track attendance and log time and
Claro & Libron (2013), Found that at this case, they are having problem of sending their
reports on time due to this. It took them two months to submit their reports to Manila branch.
Due to these problems, the proponents were challenged to develop their Records Management
Galicia & Co (2011), Found that this study aimed to develop a system that would monitor
the vehicle entry to Letran Calamba campus using a Radio Frequency Identification (RFID)
Technology. This project uses a gate barrier that would hinder the entering of vehicles in the
22
colegio’s vehicle main gate for inspection and verification of RFID card. It opens if the vehicle
owner has a valid RFID card to be read within the reader zone and displays the vehicle and
owner information on the monitor as well as the date and time of the current log-in.
Systems Review
In figure 2 shows the same process of the study which is the students once tap their RFID
Card into RFID Reader the system will process to displayed their time in/time out then system
will send a message to the guardian of the students to know if their children entering in the
Link:.http://jmisenet.com/journals/jmise/Vol_5_No_1_June_2018/2.pdf?fbclid=IwAR2_g4b2xu
K5JIu6FXOPuCnBXx78xWvZm6YB2VqkjuzHCfQNsacH37IGgjE
In figure 3 shows the output of the study, the system is achieving two aims, the first
objective is to register, record, and manage a student attendance using RFID tag, and the second
aim is to provide student information service such as name, grade level, time-in/time-out and
Link:https://www.researchgate.net/publication/322862382_Attendance_and_Information_Syste
m_Using_RFID_and_Web-Based_Application_for_Academic_Secto
Figure 3. Attendance and Information System using RFID and Web-Based Application for
Academic Sector
In figure 4 shows the process how to input the information of student and to provide a
reliable, secure, and efficient method of tracking the students’ arrival and departure from
school, Through SMS (Short Message Service) it can be easy to notify their parents or
guardians whenever they arrived or left the school premises. This idea when implemented
24
would also innovate the school in terms of modern technology; the management can easily
access the student’s individual information through their identification cards, and can
Link: - http://docshare01.docshare.tips/files/31412/314128975.pdf?fbclid
Synthesis
As stated in the foreign and local literature about in web-based system, the gathered
literary works and studies were carefully checked by the proponents to see its relevance to the
study. The related literature acquired by the proponents aided them in gaining more information
and ideas with relevance to the ongoing development of the attendance monitoring system.
Local and foreign studies helped the proponents to see and proved that the study was vital
to the client’s needs. All the studies gathered shows the probable and possible benefits and
advantages of the proposed system. The proponents learned that automating the process will
greatly enhance record management that will reduce the difficulty of manual computing, with the
use of the RFID technology, monitoring the time-in and time-out of the students will be easy.
With the help of an automated system with a database, achieving the said goals will be easy.
Similarly, making the overload computation in the proposed system automatic will greatly
reduce the time it takes to produce an output. The study also gives great importance to retrieval
of records. While the main focus of the proposed system of the proponents is the attendance
monitoring that will total the number of hours every day or week, other previous studies focused
only on other aspects of the system like record management and monitoring. Other system
provides only information system that will serve as a storage of data for the institution just to
monitor the data. Some system used notification like SMS that helps to disseminate information.
Chapter III
METHODOLOGY
The proponents will use the System Development Life Cycle (SDLC) such as planning,
quality web based that meets or exceeds user expectations, reaches completion within times. The
planning phase is a set of plans to help guide your team through the execution and closure phases
of the project. The analysis phase is part of the project where you identify the overall direction
that the project will take through the creation of the project strategy documents. The design
phase seeks to develop detailed specifications that emphasize the physical solution to the user’s
information technology needs. The development phase elaborates and builds on the learning
objectives and performance steps that were produces in the design phase by fleshing out all the
previous content that was created in the prior two phases, analysis and design, into a complete
learning environment. The testing phase is where you focus on investigation and discovery.
During the testing phase, developers find out whether their code and programming work
The maintenance phase involves making changes to hardware, software, and documentation to
Planning Phase
The proponents produced a web-based system using RFID card for students and conduct
a consultation meeting to the advisor for the documentation and development of the system and
from all this information, better understanding of the existing system’s problems will be gained.
Analysis Phase
After collecting all the needed requirements from the organization and the hard time for
planning what the system would be. The proponents will spend time for brainstorming session to
In this study shows the general overview and interactions of functionalities and the users,
for the Attendance Monitoring System with Short Message Service using Radio Frequency
Identification for Colegio de San Pedro USE CASE DIAGRAM. It showcases the different use
cases representing the process and their roles which represent the intended users and system
Architectural Design
This figure illustrates the architectural design of the study; this includes the
database model and the modules that are needed in the study.
Notification
Design Phase
Data Dictionary
In this figure 7 described the class table which contains the row_id, u_id, user, password,
role
In this figure 8 described the class table which contains the row_id, rf_id, log_date,
log_time, status
In this figure 9 described the class table which contains the row_id, stud_id, rf_id, fname,
mname, lname, bdate, gender, cnum, eadd, addrs, strand, grd_level, section, semester, avatar,
In this figure 10 described the class table which contains the row_id, uniq_id,
Database Schema
In this study design phase, the proponents designed the model of the database and the
user-interface that will be used on the study, this phase includes Database schema, and Prototype
of the system.
This figure illustrates the attributes of the tables that are going to be used into the
database.
33
Development Phase
In this study, the proponents should be used a MySQL (PhpmyAdmin) for front-end to
back-end.
Programming Languages:
Front-end:
Javascript is used by the proponents to create interactive effects within web browsers.
Ajax is used by the proponents as a technique for creating fast and dynamic web pages.
Back-end:
Ajax is used by the proponents as a technique for creating fast and dynamic web pages.
MySQL application is used by the proponents for a wide-ranging purpose, including data
PHP is a html-embedded web scripting language that is used by the proponents to create
Testing Phase
In this study the proponents have three strategies of testing. First is unit testing, the
proponents will examine on how the system work and they will also observe if there will be also
some possible errors may occur. Second is system testing, if the performance of the system will
be tested based on its objectives and functionalities will distributes as a system usability. And the
last is acceptance testing, the proponents will distribute a usability survey from the client as well
Implementation Phase
The system developed from December 2018 to February 2019 and will be implemented
on May 2019 and clarified out where in the user will exercise the system. Installation of the
Maintenance Phase
The maintenance of this study will be every 10 months and update and fixed bugs of the
system then conduct tests development in which the proponents can determine what to
development and create a manual process of the application then will update changes in
Chapter IV
RESULT AND DISCUSSION
The chapter provided the conducted and evaluative result of the corresponding
questionnaires conducted for the application testing evaluation from thirty (30) respondents,
which are administered to fifteen IT Experts and to fifteen Users. The questionnaires are based
on the ISO 9126 standards using the five Software Quality characteristics known as the
The proponents used a numerical scale as a tool for the system evaluation as shown in
Table 1. The Scale represents the numerical value while the Interpretation represents the
assessment of the numerical value. 5.00 is the highest rate while 1.00 is the lowest rate.
Suitability
3.07 Good
Accurateness
3.13 Good
Compliance
2.87 Good
Interoperability
2.87 Good
Security
3.27 Good
The Table 2a show that in Security the overall weighted mean is 3.04 which is Good. It is
stated as the highest point among the five components indicated in the study. While in
Accurateness the overall weighted mean is 3.13 and Suitably is 3.07 which both lies in Good.
Lastly in Compliance and Interoperability the overall weighted mean is 2.87 which lies in Good
and this is the lowest among the five components indicated in the study
The overall weighted mean is 3.04 which states that the level of Functionality
Suitability
3.27 Good
Accurateness
3.33 Good
Compliance
3.40 Good
Interoperability
3.13 Good
Security
3.47 Good
The Table 2b show that in Security the overall weighted mean is 3.47 which is Good. It is
stated as the highest point among the five components indicated in the study. While in
Compliance the overall weighted mean is 3.40, Accurateness is 3.33 and Suitability is 3.27
which all three lies in Good. Lastly in Interoperability the overall weighted mean is 3.13 which
lies in Good and this is the lowest among the five components indicated in the study
The overall weighted mean is 3.32 which states that the level of Functionality
Maturity
Good
2.67
Fault Tolerance
Good
2.73
Recoverability
Good
3.20
Overall weighted mean
Good
2.87
The Table 3a show that in Recoverability the overall weighted mean is 3.20 which is
Good. It is stated as the highest point among the three components indicated in the study. While
in Fault Tolerance the overall weighted mean is 2.73 which lies in Good. Lastly in Maturity the
overall weighted mean is 2.67 which lies in Good and this is the lowest among the three
The overall weighted mean is 2.87 which states that the level of Reliability
Maturity
Good
2.53
Fault Tolerance
Good
3.40
Recoverability
Very Good
3.53
Overall Weighted Mean
Good
3.16
The Table 3b show that in Recoverability the overall weighted mean is 3.53 which is
Good. It is stated as the highest point among the three components indicated in the study. While
in Fault Tolerance the overall weighted mean is 3.40 which lies in Good. Lastly in Maturity the
overall weighted mean is 2.53 which lies in Good and this is the lowest among the three
The overall weighted mean is 3.16 which states that the level of Reliability
Understandability
Very Good
3.67
Learnability
Very Good
3.73
Operability
Very Good
3.53
Overall Weighted Mean Very Good
3.64
The Table 4a show that in Learnability the overall weighted mean is 3.73 which is Good.
It is stated as the highest point among the three components indicated in the study. While in
Understandability the overall weighted mean is 3.67 which lies in Good. Lastly in Operability
the overall weighted mean is 2.53 which lies in Good and this is the lowest among the three
The overall weighted mean is 3.64 which states that the level of Usability Characteristics
Understandability
Good
3.40
Learnability
Good
3.40
Operability
Very Good
3.60
Overall Weighted Mean
Good
3.47
The Table 4b show that in Operability the overall weighted mean is 3.60 which is Very
Good. It is stated as the highest point among the three components indicated in the study. While
in Understandability and Learnability the overall weighted mean is 3.40 which lies in Good and
The overall weighted mean is 3.47 which states that the level of Usability Characteristics
Time Behavior
Good
2.73
Resources Behavior
Good
2.80
Overall Weighted Mean
Good
2.77
The Table 5a show that in Resource Behavior the overall weighted mean is 2.80 which is
Good. It is stated as the highest point among the two components indicated in the study. While in
Time Behavior the overall weighted mean is 2.73 which lies in Good and this is the lowest
The overall weighted mean is 2.77 which states that the level of Efficiency
Time Behavior
3.60 Very Good
Resources Behavior
Good
3.20
Overall Weighted Mean
3.40 Good
The Table 5b show that in Time Behavior the overall weighted mean is 3.60 which is
Good. It is stated as the highest point among the two components indicated in the study. While in
Resource Behavior the overall weighted mean is 3.20 which lies in Good and this is the lowest
The overall weighted mean is 3.40 which states that the level of Efficiency
Analyzability
Good
2.93
Changeability
Good
2.93
Stability
Good
3.00
Testability
Good
2.93
Overall Weighted Mean
Good
2.95
The Table 6a show that in Stability the overall weighted mean is 3.00 which is Good. It is
stated as the highest point among the four components indicated in the study. While in
Analyzability, Changeability and Testability the overall weighted mean is 2.93 which all three
lies in Good and the lowest among the four components indicated in the study
The overall weighted mean is 2.95 which states that the level of Maintainability
Analyzability
Good
3.33
Changeability
Good
3.40
Testability
Good
3.24
Stability
Good
3.13
Overall Weighted Mean
Good
3.29
The Table 6b show that in Changeability the overall weighted mean is 3.40 which is
Good. It is stated as the highest point among the four components indicated in the study. While
in Analyzability the overall weighted mean is 3.33 which lies in Good. Testability the overall
weighted mean is 3.27 which lies in Good. Lastly in Stability the overall weighted mean is 3.13
and which lies in Good the lowest among the four components indicated in the study
The overall weighted mean is 3.29 which states that the level of Maintainability
Adaptability
Good
3.33
Installability
Good
3.40
Conformance
Good
2.80
Replace Ability
Good
2.93
Overall Weighted Mean
Good
3.18
The Table 7a show that in Installability the overall weighted mean is 3.40 which is Good.
It is stated as the highest point among the four components indicated in the study. While in
Adaptability the overall weighted mean is 3.33 and Replace Ability is 2.93 which both lies in
Good. Lastly in Conformance the overall weighted mean is 2.80 which lies in Good and this is
The overall weighted mean is 3.18 which states that the level of Portability
Adaptability
3.53 Very Good
Installability
3.27 Good
Conformance
Very Good
3.53
Replace Ability
Good
3.30
Overall Weighted Mean
3.44 Good
The Table 7b show that in Adaptability and Conformance the overall weighted mean is
3.53 which is Good. It is stated as the highest point among the four components indicated in the
study. While in Replace Ability, the overall weighted mean is 3.30 which lies in Good. Lastly in
Installability the overall weighted mean is 3.27 which lies in Good and this is the lowest among
The overall weighted mean is 3.18 which states that the level of Portability
Criteria
Overall Weighted Overall Weighted
Verbal Interpretation Verbal Interpretation
Mean Mean
The Table 8 shows the overall total result of the system testing and evaluation conducted
to the fifteen IT Experts and to fifteen User respondents. For IT Experts, the Usability the overall
weighted mean is 3.64 which is Good. It is stated as the highest point among the six components
indicated in the study. While in the Portability the overall weighted mean is 3.18, Functionality is
3.04, Maintainability is 2.95 and Reliability is 2.87 which all lies in Good. Lastly in Efficiency,
the overall weighted mean is 2.77 which lies in good and this is the lowest among the six
components indicated in the study. For the Users, the Usability the overall weighted mean is 3.47
which is Good. It is stated as the highest point among the six components indicated in the study.
While in the Portability the overall weighted mean is 3.44, Efficiency is 3.40, Functionality is
3.32 and Maintainability is 3.29 which all lies in Good. Lastly in Reliability, the overall
weighted mean is 3.16 which lies in good and this is the lowest among the six components
Test Cases
Figure 13 shows the students time-in/time-out when the RFID cards tap on the
RFID reader
Figure 14 shows the log in interface for the moderator and registrar
Figure 15 shows that the field text must be filled in order to log in the system.
53
Figure 17 shows the overall count of the basic education students, the moderator
can print the current total of the students.
54
Figure 19 shows where the registrar can input the information of the student
Figure 20 shows the information of the current information, logs of the student.
The moderator can print the activity log of the student.
Figure 21 shows where the moderator can update or change the SMS
notification
Chapter V
SUMMARY, CONCLUSION AND RECOMMENDATION
Summary
After the survey conducted, the proponents got the results on how the IT experts and User
able to access the system based on the different criteria of the survey. The functionality
characteristics of the system got 3.32 (Good) from IT experts and 2.87 from(Users). The
reliability of the system received a 3.16 (Good) from the IT experts and a 3.64(Very Good) from
the Users. The IT experts gave a 3.47 (Good) and the Users gave 2.77 (Good) for the Usability of
the system. The efficiency of the system got a good grade from the respondents. A grade of 3.40
(Good) from the IT experts and 2.95 (Good) from the Users. The maintainability and the
portability of the system receive a 3.29 (Good) and 3.18(Good) from the IT Experts and the
Users. The criteria of the survey results to an overall mean of 3.07(Good) from the IT experts
and 3.35 (Good) from the Users.
Conclusion
The reliability and the maintainability of the system got the lowest mean from the IT
experts based on the results of the survey. The reliability characteristics of the system got 3.16
(Good) and the maintainability characteristics got 3.29 (Good). The results showed that the
system occur problems and can’t access functionally. The result also showed that the system
can’t easily update can’t easily allow modification and expansion of the system.
58
Recommendation
For future researchers, the proponents recommend to the study how to include all the
college students and employee to the current system and study how to upgrade the current
system to a future attendance monitoring system because the system is focusing only in students
activity log inside the campus.
59
BIBLIOGRAPHY
Adjei Barwuah & Phil Walk ley (1997) Monitoring Students Attendance
Link: https://files.eric.ed.gov/fulltext/ED406548.pdf
Alberto D. Galicia & Auralyn Graciella A. Co (2011), Vehicle Id System Using Radio Frequency
Link:https://ejournals.ph/article.php?id=382&fbclid=IwAR2X3i50Z0gGS_qjd2KmTQwEW3q_uRNA0r7
D3uHxrcDNeK2RPyxpDW6q2dE
Dennies Claro & Karen Keith Libron (2013), Records Management Information System with
SMS Notification System
Link:https://ejournals.ph/article.php?id=6114&fbclid=IwAR2uEPfq1SuHEqArCvzWZJuAQ6BmaLPdN
F0oMCNTMbXdGItUTNmd6u-Y3uo
Farhan Ahmad & Syed Wasi Abbas (2015),Students Attendance Monitoring System Base
on RFID and GSM Network
Link:https://mail.google.com/mail/u/0/#inbox/FMfcgxwBVqTdJClrnCLSxtsfVBfpjSnC?projector=1&mes
sagePartId=0.1
Isaac M. Morallo (2015), Laguna Student Electronic Attendance and Logging System (LPU-
LAGUNA SEALS)
Link: https:/ww.researchgate.net/publication/
Manuel Luis R. Alvarez (2015), RFID Based Employee Attendance Monitoring System for
LSPU SPCC
60
Link:https://mail.google.com/mail/u/0/#inbox/FMfcgxwBVqTdJDtHWSTpWqHDGFMTZMJM?projector
=1&messagePartId=0.1
Mr. Philip Villamin Mojares (n.d) Notified: An SMS and RFID- Based iNotification System of
Lipa City Colleges
Link:https://mail.google.com/mail/u/0/#inbox/RdDgqcJHpWcvcDjPmkrjgSdhVZsKQrGCbBcZcJGVXMm
G?projector=1&messagePartId=0.1
Link: https://studylib.net/doc/8791495/inotified--an-sms-and-rfid-based-notification-system-of-l
Link: http://iosrjen.org/Papers/vol4_issue6%20(part-2)/A04620109.pdf
Rhowel M. Dellosaa & Elino Hemedes (2014) Developing a User Monitoring System for the
LPU-Laguna Library
Link: https://arxiv.org/abs/1306.5381
SumitaNainan & Romin Parekh (2013) RFID Technology based Attendance Management System
Link: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.3846&rep=rep1&type=pdf+
Zatin Shinghai (2012) Anytime Anywhere- Remote Monitoring of Attendance System based on
RFID using GSM Network
Link: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.3846&rep=rep1&type=pdf+