Professional Documents
Culture Documents
chronically absent during kindergarten (both excused and unexcused absences) that these
students perform lower academically in first grade. This is true regardless of gender,
ethnicity or socioeconomic status. These findings are troublesome and indicate that there
is a need to educate families and school districts about the importance of school
attendance early on in a childs education.
Schools all over the world are finding it hard to make children understand the
importance of coming to school regularly and on time. Moreover, some students cut their
classes whether it is elementary school, high school or college. Attendance can be a very
big problem thats why more and more schools are implementing strategies to improve
school attendance and to help the parents keep track to their childrens log.
Thus, the proponent sees that the realization of the importance of technology in
schools and its successful implementation is a necessity. The proponent also believes that
increased mode of communications is the key to building healthy relations. Through SMS
technology and android mobile application, information dissemination will be a viable
option to automatically notify the parents regarding their childrens login and logout time
in school through the development of the proposed study entitled Ethernet Based Login
and Tracking System with Mobile Application for Living Stone International School.
Description of the Local Situation
The proposed study will be implemented in Living Stone International School
(LSIS). Situated along the perimeter of Angeles City, in the province of Pampanga. June
6, 2007 marked the beginning of the school as an institution for formal education. LSIS
had its initial take-off in the academe in school year 2007-2008, with Grades Five and Six
in the elementary level, and First and Third Years in the secondary level with a total of
seventeen (17) students. The school was granted government authority to operate by the
Department of Education of the Republic of the Philippines.
Recognition that was granted by the Department of Education in 2009, the number of
students continues to grow at a very stable rate, with approximately two hundred (200)
students during the school year 2009-2010. (http://www.livingstone.edu.ph)
Currently, the school does not have any student attendance monitoring system in
their entrance gates. Even advanced technology and devices like turn style are not
implemented in the school. Traditional system like NO ID NO Entrance policy is being
implemented. Also, students entrance and exit in school are not well-monitored. The
guard-in-charge allows the student to go out without checking their class schedule.
However, in case of unexpected emergencies, students can leave the campus upon
rendering a permission to leave the school. This slip is being approved by Ms. Carmen
Sampang, Assistant Principal or the School Principal, Ms. Amelita Tumagoy. Before
approving the said slip, the administrator needs to contact the parents regarding the
incident. After which, when parents are notified, student can leave the campus.
The proponent wants to have a first hand in proving the credibility and integrity
of the information that are deemed necessary in the students attendance monitoring
tracking system. This information is of great impact in the decision-making process and
need to reach the concerns the soonest possible time. For example, a regular grade
school students last subject ends at 5pm then suddenly the students logout time is 2pm.
In this scenario, the parent will be automatically notified with his child log-out time via
SMS and through logging his/her mobile application account. This information is
deemed important for the parents, knowing that their children are going out of the
campus earlier than their assigned class schedule.
In this regard, the proponent wants to eliminate this dilemma through developing
an innovative online mobile application system that will easily monitor the login and out
of the students. High-tech technology and devices like Radio Frequency Identification
(RFID) shield, Arduino Micro-controller, Ethernet Shield and Short Message Service
(SMS) will be the perfect tools to process and disseminate information faster and
accurate coming from a reliable source. The programming language to be used in
developing the mobile application is through B4Android. To easily manage the database,
the proponents will use mySQL and SQLite.
Through the proposed study, it will be a big help for the parents because it will
give them the assurance and comfort that their children are well-secured, and are
arriving and are going out of the school on time.
Foreign Review of Related Literature and Studies
Stated by King P., (2012), San Antonio is taking its cue [tracking kids with RFID]
from the Houston, TX, school district. It began using RFID chips to monitor students on
13 campuses in 2004. Houstons Spring Independent School District gave 28,000
students RFID badges to record when they get on and off school buses. The police and
school administrators provided the badges to ostensibly prevent truancy and child
abductions.
Mexicos Universidad Regiomontana is using RFID to prevent theft of laptop
computers it issues to staff and faculty. The Paul L. Foster School of Medicine, in Texas,
is tracking state-of-the-art equipment to improve inventory management. And universities
in the United Arab Emirates are RFID-tagging diplomas, to ensure the documents'
validity. In addition, some parents and educators have developed innovative applications
to help students learn and improve their health (O Connor C., 2012) .
Also, as stated by OConnor, In early 2005, Brittan Elementary School, in
Northern California, invited a now-defunct startup to install an RFID-based automated
attendance-tracking system. The school wanted to test whether the technology, which
would collect the identification number encoded to the RFID-enabled school IDs issued
to students, would give teachers more time to teach and provide accurate records on
student whereabouts, which would prove useful in the event of a student disappearance or
other emergency.
According to Rosen, D. (2012), Students and parents in San Antonio, TX, are up
in arms over a decision by the Northside Independent School District to require students
at two local schools to wear RFID-equipped nametags as part of the Student Locator
Project. The two schools: John Jay High School and Anson Jones Middle School, plan to
use the nametags to pinpoint student locations both at the school and outside its premises.
In addition, students are required to use the microchip ID when checking out school
library books, registering for classes and paying for school lunches.
Additionally, Rosen stated that in 2010, the Contra Costa County School District
received a $50,000 grant to put RFID tags into basketball jerseys that students are
supposed to wear while at school. The bulk of the grant went toward setting up sensors
around the school to read the tags and computer systems to actually monitor where each
student is. The program tracks preschool children.
Many schools in area of Houston have set up the new technology known as RFID
(radio frequency identification), these are chips which will be in scholars ID cards, the
school management is thinking about the students security, but most of the parents think
it will be dangerous for the students, although it concerns for protection of the student it
might be a risky step. But the school management feels that it is a great advantage for the
school and for the students, earlier in California and in different schools like in the Santa
Fe school and spring districts, to keep track on students and whereabouts about the where
there are in the campus. Even though this technology is expensive it is very useful asset,
the principle of bailey middle school in spring who have adapted this technology told that
its a great asset and leaders of the school tell that by adapting this device is helping in
students turnout (number of attendance) and also improves security (Security Software
Resources,2013).
Dan Hobson, Managing Director for M:Science commented, "Berkshire College
of Agriculture understands how using SMS OnLine can help them communicate more
effectively with students. There is pressure on schools and colleges to continuously
integrate modern technology into their infrastructure. Using SMS is an example of how
this can be done with benefits to the college, and the whole learning experience."
As affirmed by Lakshmi B., (2012), Using RFID Technology to Develop an
Attendance System and Avoid Traffic Congestion around Kindergartens RFID: Radiofrequency identification (RFID) is the use of a wireless non-contact system that uses
radio-frequency electromagnetic fields to transfer data from a tag attached to an object,
for the purposes of automatic identification and tracking. Some tags require no battery
and are powered by the electromagnetic fields used to read them. Others use a local
power source and emit radio waves (electromagnetic radiation at radio frequencies).The
tag contains electronically stored information which can be read from up to several
meters (yards) away. Unlike a bar code, the tag does not need to be within line of sight of
the reader and may be embedded in the tracked object.
Furthermore Lakshimi explained that school authorities in the Japanese city of
Osaka are now chipping childrens clothing, back packs, and student IDs in a primary
school. A school in Doncaster, England is piloting a monitoring system designed to keep
tabs on pupils by tracking radio chips in their uniforms. St Charles Sixth Form College in
west London, England, started September, 2008, is using an RFID card system to check
in and out of the main gate, to both track attendance and prevent unauthorized entrance.
Similarly, Whitcliffe Mount School in Cleckheaton, England uses RFID to track pupils
and staff in and out of the building via specially designed card.
Also, another mobile application that has some features identical to the proposed
study is uAttend. According to Carlsbad, CA (PRWEB) May 21, 2013 uAttend offers a
versatile product line that is made up of advanced fingerprint and facial recognition
biometric solutions, RFID (proximity card readers), as well as Smart phone and mobile
applications. This variety of product enables businesses to accurately record employee
work hours with multiple options for punching in and out.
The latest mobile application for iPhone and iPad users is one of the many easy to use
solutions that allow employees to remotely record their time and attendance. The updated
software version also makes it more convenient for floor supervisors and HR
administrators to manage the system on their handheld devices, eliminating the need for
accessing a computer.
Dissimilar with uAttend, the proposed study is an Android Application that can
only be installed in Android gadgets. Furthermore, the proposed study will only focus
with the students log records and will not include facial recognition and fingerprint
technology.
To easily manage the time logs of the students and to be produced a scalable
system, the proposed study will be making use of Ethernet technology. According to
Harper L., (2008), Popularity of Ethernet in todays business environment is triggered by
several benefits, out of which simplicity, granularity, and flexibility that it offers top the
list. These benefits enable enterprises to implement solutions that enable them to
integrate several useful features, such as Private Networks (VPN), Voice-over-Internet
Protocol (VoIP), audio and video teleconferencing, Virtual remote storage, multimedia
content sharing, and many more other useful features that helps them take their business
to new heights. Some of the many benefits that Ethernet offers an enterprise are:
simplicity, high bandwidth, scalability, easy provisioning and flexibility.
Moreover in the Philippines, East Central College is also using ID System using
RFID with SMS Technology for East Central College. The main goal of the study is to
modify the old process of monitoring the absences and the late of the student of San
Vicente Pilot School for Philippine Craftsmen. Also, the propose system will be able to
notify the parents or guardian of the student via Short Message Services (SMS) according
to the presence of their child. Lately, other schools are not able to monitor the attitude of
their students and could not reach for the parents to consult about their children. The
proposed study also targets to fasten up the process of checking up the schedule of the
students of San Vicente Pilot School for Philippine Craftsmen and to reach up with the
parents in case of any trouble or some unnecessary event via an SMS (Aijuushi, 2012).
Unlike the RFID system in PUP and ECC, the proposed system is more complex
and advanced since it will be implemented through android mobile application
technology. Parents can view the time logs of their children through logging into their
mobile application account.
Limitation
The study does not cover the following inquiries; parents SMS query on the
schedule of the high school teachers as well as those of the students, school activities,
school notices, queries on the account balance/payables of students (e.g. enrolment,
miscellaneous and other). The proposed system cannot monitor the exact location of the
student specifically, tracking within the campus, such as visits to the Library, Play area,
Canteen and other various internal facilities. The proposed system has a parameter that
only range from one to two feet within the RFID reader. Upon the online registration of
the parents in the proposed mobile app, only the log in and out of the students record
will be shown.
Conceptual Framework
The proponent aims to present an Ethernet Based Login and Tracking System
with Mobile Application that would produce accurate and fast result of information.
The proponent conducted some interviews with the different administrative
officers in Living Stone International School to gather information.
Data gathered to analyze the problem of the existing in order for the researcher to
create the proposed system. To determine that the study will be effective, some test will
be conducted to know if the existing system needs to replaced and proceed in proposing
an Ethernet Based Login and Tracking System with Mobile Application.
SMS Student
Attendance Log Access
Using Android App
Entrance gate with RFID
Reader
comes inside or goes outside the room. The student RFID will be read, this will trigger
the server to the prompt message to the parents on the whereabouts of the students.
Methodology
This section deals with the methodologies used as a set of customary and
acknowledged techniques with the duration of data gathered in the study being carried
out. The research method used by the proponent describes what the activity of the
research is, how to proceed, how to assess progress, and what comprises success.
The proponent will be using a descriptive type of research method. This type of
research is also a grouping that includes many particular research methodologies and
procedures, such as observations, surveys, self-reports, and tests. The four parameters of
research will help the proponent to understand how descriptive research in general is
similar to, and different from, other types of research.
Through this method, the proponent can conduct the research properly and use it
as a guide in coming up with solutions and accurate results.
To determine and give importance to the behavior of making decisions for the
innovation of the new system, the proponent uses a process. By means of observation, the
proponent has the power to distinguish things, their differences, advantages and
disadvantages. By doing observation, the proponent will see the problems of the current
system so that enhancement with the proposed system will be implemented.
Information gathered from books and thesis, dissertations, projects helped and
played a significant role for the proponent. The proponent gained knowledge in
accumulating data from related research projects and literatures that were found in
different school libraries. Furthermore, resources from the Internet made the research a
better innovation by providing related information concerning the proposed study.
Context Diagram is a data flow diagram that illustrates the entire system as one
generated element. This tool will present the flow in a graphical form of the proposed
system.
The proponent used Context Diagram to show the environment of the system by
stating all the elements that scopes the project by providing a visual model between the
system and outside entities.
Figure 2.0 presents the Context Diagram of the proposed system.
These diagrams helped the proponent in visualizing the proposed study as whole. It
determined the important levels included in the system that described the transformation
of inputs and outputs. It provided a convenient idea of the major functional components
of the system.
The proponent used Data Flow Diagram to show what kind of data will be input to
and output from the system. It does not show information about the timing of the process
or information about whether processes will operate in sequence or in parallel. Figure 3.0
shows the Data Flow Diagram of the proposed system.
Technology to be used
RFID: Technology and Applications
RFID is known as Radio Frequency Identification an ADC (Automated Data
Collection) technology that uses radiofrequency waves to transfer data between a reader
and a movable item to identify, categorize, track. Moreover,
operation using low cost components and attempts to provide unique identification and
backend integration that allows for wide range of applications. Figure 5.0 shows the
System Components that will be included for the completion of the system
The algorithm that RFID use is Tree Algorithm wherein reader queries for tags,
reader informs in case of collision and tags, generates 0 or 1 randomly. Conditions are
followed wherein if 0 then tag retransmits on next query, if 1 then tag becomes silent and
starts incrementing its counter (which is initially zero). Counter incremented every time
collision reported and decremented every time identification reported. Also, in this
algorithm tag remains silent till its counter becomes zero. Reader informs tags in case of
collision and tags generate 0 or 1. If 0 then tag retransmits on next query, else tag
becomes silent and starts a counter. Counter incremented every time collision reported
and decremented otherwise.
adopted to the native Android environment. Basic4android is an object oriented and event
driven language.
PHP SQLLITE
SQLite is a C library that implements an embeddable SQL database engine.
Programs that link with the SQLite library can have SQL database access without
running a separate RDBMS process.
SQLite is not a client library used to connect to a big database server. SQLite is
the server. The SQLite library reads and writes directly to and from the database files on
disk.
COST ANALYSIS
Developing an IT application is an investment. Since after developing that
application, it provides the organization with profits. Profits or benefits can be monetary
or in the form of an improved working environment. However, it carries risks, because in
some cases an estimate can be wrong. And the project might not actually turn out to be
beneficial.
COST
Development costs
Hardware costs:
1 Computer unit (INTEL CORE i5 4430 3.00GHz)
P 24,000.00
P 5,500.00
P 1,440.00
1 gizDuino v3.0
700.00
785.00
680.00
P 33,105.00
Software costs:
WIN 8 OS
3,010.00
B4ANDROID
4,257.00
SYSTEM COST
P 20,000.00
P 27,267.00
Operating costs:
Operating costs are the expenses required for the day to day running of the
system. (for running or maintaining the system)
Example:
Utilities (anti-virus, etc.)
P 3,000.00
P 3,000.00
Supply costs:
Example: ink, paper, folders etc.
Total Cost
-------------------------------------
P 3,000.00
P 69,372.00