Tesi Agustin
Tesi Agustin
Tesi Agustin
I do hereby attest that I am the sole author of this Project / Thesis and
that its contents are only the result of the readings
and research I have done.
By
Louie F. Agustin
Supervised by
Prof. Salvatore Fava PhD
A DISSERTATION
BIBLIOGRAPHY. ………………………………………............................ 06
ABSTRACT …………………………………………………………………. 10
ACKNOWLEDGEMENT ……………………………………………………… 15
DEDICATION ………………………………………………………………… 16
1. INTRODUCTION
2. THEORETICAL FRAMEWORKS
1
3.1.3. Data ………………………………………............................ 46
2
LIST OF TABLES
3
Table 22 Weighted Mean Responses in the Reliability Criteria:………………….……… 85
4
LIST OF FIGURES
5
BIBLIOGRAPHY
A. Internet
1. Baguley, Joe (Sept. 24, 2013). How Cloud Computing is changing the World
without you knowing. Retrieved from. https://www.theguardian.com/media-
network/media-network-blog/2013/sep/24
2. Barker, Ian (July 16, 2015). A Short History of Text Messaging. Retrieved from
http://betanews.com/2015/07/16/a-short-history-of-text-messaging/
7. Griffith, Eric ( April 20, 2015). What is Cloud Computing. Retrieved from
http://sea.pcmag.com/networking-communications-software-products/2919
9. Edwards, John (June 1, 2015). Internet of Things Breathes New Life Into RFID
Technology. Retrieved from http://www.zatar.com/ news/internet-of-things-
breathes-new-life-into-rfid-technology
10. Erickson, Christien (Sept. 21, 2012) Text Messaging History. Retrieved from
http://mashable.com/2012/09/21/text-messaging-history
6
11. Lueth, Knud Lasse (Dec. 19, 2014). Why the Internet of Things is Called Internet
of Things. Retrieved from https://iot-analytics.com/internet-of-things-definition/
12. Mearian, Lucas (March 14, 2014). Data Storage Then and Now. Retrieved from
http:// www.computerworld.com/ article/2473980/data-storage-solutions
13. Middleton, Sierra (Feb.17, 2016). Driving While Intexticated. Retrieved from
https://sierramiddleton.wordpress.com/2016/02/17/driving-while-intexticated
15. Nidhiam ( Dec, 2013). RFID Revised Revolution in Future Technology. Retrieved
from http://www.trentdunfee.com /category/future-technology.html
18. Schneider, Stan (Oct. 9, 2013). Understanding the Protocols Behind the Internet
of Things. Retrieve from http://electronicdesign.com/iot/understanding-
protocols-behind-internet-things
19. Thrasher, James Thrasher (April 29, 2013). RFID vs. Barcoded: What are the
Advantages. Retrieved from http://blog.atlasrfidstore.com/rfid-vs-barcodes
B. Journal
1. Kale, Namrata A.Karande, S.M & ,Prof. Natikar, (November 2014). - International
Journal of Advance Research in Computer Science and Management Studies:
Secured Mobile Messaging for Android Application.
http://www.ijarcsms.com/docs/ paper/volume2/issue11/V2I11-0105.pdf
7
Review of Literature and Prospective Adoption to the Greek Market, Volume 15,
Number 1, 2013
3. Mullich, Joe ( 2011). The Wall Street Journal. 16 Ways the Cloud will Change our
Lives. http://online.wsj.com/ad/article/cloudcomputing-changelives
4. Wu, Hongren, Wu, Sugin, Yutian, Brian Bai, and Zhang, Kefei (Dec. 12, 2012)
Overview of RFID - Based Indoor Positioning Technology. Retrieved from
http://ceur-ws.org/Vol-1328/GSR2_Bai.pdf
C. Books
2. Piramuthu, Selwyn & hou, Weibiao ( 2016). RFID and Sensor Network
Automation in the Food Industry: Ensuring Quality. published by John Wiley and
Sons Ltd
3. Chang, Christopher A. and Jones, James C. (April 19, 2016) CRC Press; RFID
and Auto-ID in Planning and Logistics
4. Lin, Yong Tze & Xiang, Tan Yong (May 23, 2015). A Bit History of Internet
/Chapter 8: Internet of Things. Retrieved from https://en.wikibooks.org/wiki/ A Bit
History of Internet/Chapter 8:Internet-of-Things
D. PUBLICATION
8
2. Aurnou, Scott (June 10, 2013). Computer Basics: How is Electronic Data Stored
on a Computer or Mobile Device. Retrieved from
http://www.thesecurityadvocate.com/ 2013/06/10/
9
ABSTRACT
in and time out. With the help of the system RFID and the Internet of Things, the
students monitoring will be easy to access; through the accuracy and reliability of
IOT describes the world where just about anything can be linked and
interconnected intelligently. In other words, with the Internet of Things, the total
worl. Utilizing device that can capture student time-in and time-out through
the SMS technology will be a real help knowing that the child is already inside the
campus. The admin part of the system will manage the RFID registrations,
administer the Parents’ account creation, monitor the Time-in Time-out Data and
generates a time-in time out reports. The registrar of the school will handle the
charge to address the SMS notification of school payments. The project focuses
10
The provided information through SMS applying the internet of things will
brilliant fashion of communication. With the used of the RFID students monitoring
system, the time-in and time out of the students will be quickly sent to parents.
The implementation of RFID and GSM technology will enhance the manipulation
The reason in pushing this study was to prove that RFID and Internet of
Things can go along with each other and that it can benefit different individual
gesture pertaining to language, the unique ability which has made possible that
distance - within a room or place of meeting, or across a short open space. The
message reads only within reading range; its recipients must travel to accept it.
11
The structure is completely more well-organized and effective if it is the
functionality to mobile devices began. Also it was in December 1982 when the
first action plan of the CEPT Group GSM was approved. It was then that the
difficulties as stated by Ace Adrain (2011). The school use data scheme or
procedure in the way to make the enrolment system in the school easier to the
has faced. To achieve and improve the process a solution must be discovered
and should have a solution on it. Based on the study conducted by Mentonen
(2010), she found out that making a data base on enrollment process will ease
12
the problem. This will give the management and school admin on how to manage
The research results and expectations will provide easier task in the part
parents; the easiest way that in just seconds’ information will be disseminated via
SMS. The modernization of the messages brought the generation into the
the world with just a short period, unlike before that the travel of messages took
time before it reaches the destinations. The use of RFID today is mainly used to
improve internal efficiencies. The radar systems have evolved and today’s
hottest supply chains use RFID technology. Vasilia P. Peppa & Socrates J.
have different ways and forms to detect and identify the whereabouts of the
general term for experts and technologies that use radio waves to repeatedly
13
It is expected that the results of the study will be useful to the benifitted
tracking the students attendance and progress the easiest and quick way.
other school to use and adopt. It will evaluate the five characteristics that
(1) Functionality- The software features will be checked if they are all working
correctly.
(2) Reliability- The software’s fault tolerance and recoverability are high; it will
not crash.
(3) Usability- The application can easily be understood and navigated by the
commands. It uses resources such as memory, the CPU, and the network.
(6) Portability- The software can be used and run in different web browsers’
versions and screen resolutions. It does not require vital programs that are hard
to install.
14
ACKNOWLEDMENT
this endeavor; and to my family who supported me all the way, thank you for the
15
DEDICATION
and on His wings only have I glided high. I also bestow this work to my wife;
Liberty Agustin who has cheered and motivated me all the way and whose
encouragement have made sure that I give it all it takes to finish that which I
have started. To my children Liberlois, Lois Teasdale and Lois Jane who have
been affected in every way possible by this journey; my source of inspiration and
joy. Thank you. My love for you all is immeasurable. God bless.
16
CHAPTER 1
1.1 INTRODUCTION
The welfare and interest of all the students is the number one concern of
the school management. Once the students have entered in the school premises,
the school has all the responsibilities and liabilities on the student’s safety and
parents as stakeholders have all the rights to question the school administration
regarding the progress, status and safety of their children. Nowadays, every
performance, school billings and other school records. The use of Radio
records and information which can be accessed directly to inform parents. The
information being sent to parents are secured and private, no information can be
leaked to other users. According to Choi, Sung Hee (2015), RFID, Radio
person or an object without uninterrupted contact using radio waves and keeps
track of the data on the object with an RFID tag in real-time. It provides and
enables a more accurate data and information the easiest way. The monitoring
17
emails, short message service (SMS) and through the web application, it will be
done through the application of Internet of Things (IoT), this can be defined as a
way of joining and linking everyday objects like smart-phones, Internet TVs,
sensors and actuators to the World Wide Web where the devices are cleverly
animals or people that have unique identifiers and the capacity to convey data
This concept is in consonance to the IOT which describes the world where
just about anything can be linked and coupled logically. In other words, with the
Internet of Things, the total physical environment is becoming one great and vast
where physical objects are to be found every day will be attached and associated
to the Internet and be able to recognize themselves to other devices. The word is
Today, teachers as the foot soldiers in the four corners of the classroom
are facing a very crucial teaching-learning process because of the huge number
18
arranged heterogenous; checking them one by one consumed too much time
and less time are being left for the teaching learning process. The traditional way
of calling names will prevent the teacher from beginning the lesson;
announcements and reminders will also eat the time for class discussion, so the
left time for learning will not be enough for the learners to catch the lesson
proper. It will cause disruption of classes. Many of the school management have
classes, and even payments details due to its traditional way of putting records of
and smarter way of communication is through the internet of things. In order for
the teachers and school management effectively track the learners, each school
needs to develop a project that will utilize the technology of RFID and SMS that
devices on demand. Thus, the researcher has come up with this study.
It is with these insights and concepts that the researcher would like to
enhance the Students’ Monitoring System Using RFID through Internet of Things
(IoT) in the selected private schools in the Schools Division of Binan City, Laguna
19
order to contribute to a quicker and easier way of tracking student’s progress and
industrialization movement.
spearheaded the operations of Ms. Rachel C. Cruz with the passion to reach out
and make a difference through education. Operation consists of five (5) separate
monthly basis and offered the following courses: two-year hardware technology;
academic year 2019-2020, specializes in providing education not only in the field
20
of technical vocational education but also in the Bachelor's degree programs and
21
Figures 1.0 Trimex Colleges
22
Parents, as one big stakeholders are counting on the teachers’ perpective in
providing them the best and easy information of their children’s whereabouts. But
due to its huge number of population, the administration neglected to inform the
parents directly, as a result, parents got disappointed since they were also busy
on their works and cannot go and visit the school administration or teachers
personnaly.
It is with great passion and positive intention of the researcher to fulfill his
study in order to lessen the work load of the teachers and the school admin.
Tracking the students attendance (in and out) and other information through the
manipulation of the modern technologies will directly inform the parents regarding
their children attendance and other information with regards to their school
The researcher is certain and expecting that the results will be benifitted
to the school, to the students, teachers, parents and even other researchers who
will conduct the same study. The usability of the project will be the best practice
of the school.
The main purpose of this study is to inform the parents through SMS,
emails and web application regarding monitoring of the students time-in and
23
1. To utilize a device that can capture student’s time-in and time-out through
2. To design an application that will notify users via Short Message Service
a. Class cancellation,
Students: The students will be issued an RFID card to be used upon entrance
on the school premise, once tap on the RFID device which is installed at the gate
entrance, their record of time in will be sent to their parents’ mobile phone. This
will help the students to be more aware on their school records of attendance,
and they will be more equipped with the use of modern technology.
24
School Administration: School records will be more intact, a quicker and easy
Parents: The parents will not need to travel to school to know the records of their
children’s attendance since notification will be sent on their smart phone once the
and hardware will serve as an effective tool and reference who would intend to
make any further relevant study particularly the RFID or the internet of things.
The researcher involves the broad range of the use of RFID and SMS
system implementing the internet of things from which devices are intertwined,
messages that access to inform and notify the things, incidences, and issues.
The researcher was responsible for making the program for the institution.
following modules:
RFID Module
SMS Module
25
Parent Web Module
System Boundary
Administrator
Web Module Accnting
GSM Time in / Module Parent Web
SMS Time out Reports Module
RFID
Module Module Registrar
Module Payment Module
Notifications
Figure 1 shows the system boundary of the RFID application that contains
four modules which are the RFID Module, the SMS Module, Time in Time out
Module and Administrator Web Module. The RFID Module is intended for the
management of RFID card tapping. The SMS Module handle the sending of
SMS to the parents, the Time in Time out Module records the time in and time
out of the students upon entry on the school campus and the Administrator Web
26
CHAPTER 2
with words, text and vocabulary; the special skill that has made in the
open space. The message or information can be read only within reading range;
its receivers must travel to have it. The process or model is altogether more
organized if it is the message which travels. SMS stands for Short Message
Service.
between mobile phones. In early 98 ’s mobile devices began thru adding text
messaging functionality and it was in December 1982 when the first action plan
of the CEPT Group GSM was approved. The SMS idea was technologically
27
Texting or SMS (short message service) is a process or procedure of
or handheld. The shortened part is from the standard text response size: 160
letters (texts, figures, or logos in the Latin alphabet) Christine Erickson (Sept. 21,
2012).
message faster than his foes. In the approximation of the earliest time, the most
efficient postal service is that of the Persians. In about 540 BC, to control his new
empire, Cyrus put the the largest yet known kind of communication among the
community. As time passed by, the communication process was then improved
by Darius on his generation. The kind of messages during those times travels the
full distance of the road in a maximum of ten days, at a speed of about 200 miles
a day. Until transformation and innovation arrived in early 98 ’s, the adding of
text messaging functionality to mobile devices began. The first action plan which
accessible to the public and was conducted by the CEPT Group GSM, it
system and to convey messages on the signaling routes desirable to control the
28
telephone traffic during periods when no indicating traffic existed. In this way,
cost.
In 1992, the first text message was sent although it had to be from a PC
because it was the following year before Nokia presented the first SMS-enabled
phone. In 1997 the Finnish company produced the 9000i Communicator, the first
mobile phone to feature a full keyboard. Ian Barker (July 16, 2015).
It was engineer Neil Papworth who sent the first SMS communication to
Richard Jarvis of Vodafone. It simply read "Merry Christmas," and Jarvis had no
idea or way of replying. The first ever commercial SMS was launched in Sweden
through Telia. In 1993, the impression of sending short messages via mobile
phone only became a focus for telecoms companies in UK. Chris Gayomali.
(December 2012).
interest for texts, which did not involve the intermediary of an operator, meant a
change of tack from the mid-1990s onwards. As the modern world of technology
arises, the medium increased prompt admiration among students, who soon
began shortening words into "texts speak." Mobile phones now had number pads
29
with letters on them as part of digital GSM product qualifications so that people
when people began to use SMS. A different linkage system element required
framework for rising SMS traffic. The text message has become such an
important part of our up-to-date lives that it is hard to consider that the perception
behind dates back 31 years. Email to SMS doorway service Neon SMS has
created an info graphic tracking how SMS has developed and grown rapidly that
Today, SMS is the most widely-used data application in the world, with
81% of mobile phone subscribers using it. Moreover, SMS has become more
than just a way to text with friends — it also lets us receive updates and alerts,
keep track of our finances, send email, and much more. Sierra Middleton,
(Feb.17, 2016)
30
RFID - Radio-Frequency Identification
It all started decades ago. In 93 ’s during the World War II, when radars
or locators were established, it was the military aviation who organized the
technology in larger scale. They used this in tracking the signals and
through this method or technology which was first used to monitor cows that
were on medication, but the usage soon expanded. These applications utilized
low frequencies at around 125 kHz that suitably allowed small tag size. On the
commercial side, Texas Instruments launched the TIRIS system that is still in use
During the World War II, between the years of 1935, a Scottish physicist
Sir Robert Alexander Watson-Wat learned that the messages were observed
technology that can be drawn back to warn of approaching planes while they
were still miles away. It was also in 1935 that radar have been discovered by
Germans, Japanese, Americans, and British people. Germans found that it would
modify the radio signal echoed back if pilots rotated their aircraft when they went
back to base. This logical approach warned the tracker crew on the surface that
31
they were German aircraft rather than Allied aircraft (the first passive RFID
device, essentially).
obtained the first U.S. copyright for an active RFID tag with flash drives memory.
during the past time even without the modern technology; as a matter of fact, the
U.S. government was also working on RFID systems. It was in the mid 98 ’s
when the system was commercialized through the effort of the Los Alamos
scientists who driven on the project and left it to form a company to improve
automated toll payment systems. And these have become widely used on roads,
bridges, and tunnels around the world. James C. Jones and Christopher A.
32
RFID technology has been applied for many years in transport, access
control cards, event ticketing and logistics for goods distribution. More recently, it
positioning. RFID applications today are expanding to include wider and wider
research institutes and consumers are all involved in the diverse RFID
Yuntian Brian Bai, Suqin Wu, Hongren Wu, Kefei Zhang (Dec. 12, 2012).
of a RFID reader, tags (chips), and at least one antenna. The RFID system can
periodically transfer information with much greater range than passive tags. Once
electromagnetic induction via the RFID reader. James Thrasher, (April 29, 2013)
SMS have different ways and forms to detect and identify the whereabouts of the
33
individual, it is now associated with RFID as what is stated, is. There are various
ways or measures to identify, but the most common is to store a serial number
connected to an antenna (the chip and the antenna together are called antenna).
(the chip and the antenna together are called a RFID transponder or a RFID tag).
The antenna helps the chip to forward a reader with the identity content. The
reader translates the radio waves and mirrored back from the RFID tag into
the world with just a short period, unlike before that the travel of messages took
time before it reaches the destinations. The use of RFID today is mainly used to
improve internal efficiencies. The radar systems have evolved and today’s
hottest supply chains use RFID technology. Vasilia P. Peppa & Socrates J.
RFID is indeed a high technology to track products and people. They are
very beneficial These RFID tags have the information on the products that can be
accessed and read easily. These devices also help in reducing man-force,
human errors and saves time spent in checking products. By using this
34
technology for communication and transportation, the Army can fix the problem in
frequency identification (RFID) would soon change the world because of the
useful tool in retail, logistics, healthcare and a handful of other enterprise sectors,
the technology largely prowled in the mistiness of darkness while other truly
such as social media and streaming entertainment, seized the spotlight. Today,
with RFID in second period of adoption, the technology's advocates are busily
prepping for a second act. Like an aging actor who no longer finds himself in
demand for leading man roles, RFID is now changing itself into a supporting
However, it was in 97 ’s that the idea of connecting to other devices had been
practiced. It was Kevin Ashton in 1999 created the idea called ―embedded
internet‖ or ―pervasive computing‖ during his service in Procter and Gamble. His
35
idea of attracting the management to an exciting technology of RFID worked in
the optimization in supply chain. During that time internet was already boomed
and made sense in the public he named his presentation Internet of Things.
Technology created an IOT using RFID and Wireless Sensor Networks from
which the IoT served as the basis for connecting things, sensors, actuators and
other intelligent technologies allowed contact between people and objects. The
connections have multiplied and created a whole dynamic link of networks. Yong
As the technology went by and evolved from the complex world of internet,
have been embraced by the whole world in easing works and communication
through the Fitbit internet connections activity that monitors home lightning
systems to industrial machines and aircraft which continously grow bigger and
wider. It was the Cisco Systems that estimates an approximately 12.1 billion
increase to above 50 billion by 2020. The networking firm also records that about
100 things presently link to the Internet every second, and the number is
36
projected to reach 250 per second by 2020. The development of the technology
will likely be faster than the Internet. Samuel Greenguard (Sept. 24, 2014)
The IoT is a forceful and vital needs in the whole world, and the
technology is likely to improve quicker than the parameter of the in a real sense
that is moving forward and working it out as it goes. This means that the growing
There are approximately billion sites on the Internet connect web sites
and workstations resulted to a large denomination that has delivered from which
Internet have transformed into how people converse and work together. It also
accompanied in a new era of free information for everyone, changing life in any
means that were hard to visualize in its early stages. However, the next wave of
the Internet is not about people, it is about intelligent and connected devices.
would be replaced, repaired or recalled whether they are different from the past.
37
manipulation that will see, ear or smell what it wanted to convey to others as long
as it benefits people. RFID and sensor technology allow computers to detect and
Enrollment Process
To achieve and improve the process a solution must be discovered and should
have a solution on it. Based on the study conducted by Mentonen (2010), she
found out that making a data base on enrollment process will ease the problem.
This will give the management and school admin on how to manage the
enrollment process.
dilemmas as stated by Ace Adrain (2011). The school use data scheme or
procedure in the way to make the enrollment system in the school easier to the
students; not only to the students but also to the management itself. Enrollment
2013)
38
The use of technology has been an effective tool in improving such kind of
are determined by the management from attendance to grades and from the
The existing rules and policies of the school that has been established and
implemented will provide a firm foundation for a more inclusive school safety
The back door is to be used for entry to the school by students only during
after school. The parent supervisors are the only individuals who can use the
back door during noninstructional hours to set up/removing the cones in the
parking lot.
39
Upon entering the school premises, volunteering parents and guests are
required to report to the Administration Office to ―Sign In‖. This system was
devised for the welfare of the students at every school. It is also a requirement
that upon leaving the school grounds that all visitors ―Sign Out‖. In the case of an
Conceptual Framework
Software
Requirements
Windows 7
Dot net
Frameworks System Evaluation Feedback
Web Server
Figure 3.0 - Input Process Output
40
The Input Process Output of the diagram of the e-Notify: Student Service
this project, the researcher makes use of the related studies and literature for
further knowledge, reliability, consistency and proper functioning about the study.
Administrator is the one that can modify and enhance the learning and
assessment module.
working environment.
modification.
41
Deployment This means that the product is capable to be used and
GSM.
Learn ability It enable the user to learn the software product application.
a program.
Operability a structure that enables the user to operate and control the
system.
42
Portability A collection of attributes that bear on the ability of software
several miles, and must not be within the reader's direct line
of sight.
conditions..
premises.
43
Time-out a period of time recorded when you exit the school premises.
use.
44
PHP PHP Today stands for PHP: Hypertext Preprocessor(PHP) A
45
CHAPTER 3
OPERATIONAL FRAMEWORK
3.1 Materials
3.1.1 Software
Operating System. Mysql is used as the storage of all the data, browser
such as Chrome, Mozilla and Internet Explorer is a tool used to see the
output of the program, and for the Web Server, the Apache is more
3.1.2 Hardware
of RAM. A GSM is needed also for sending SMS the same with the RFID
3.1.3 Data
46
USB. Size: 10.5cm x 7cm x 1.5cm (4.13inch x 2.76inch x 0.59inch)
3.2 Methods
The researcher followed the System Development Life Cycles which has
six (6) phases that play dynamic roles which define the task to be completed at
Figure 2 illustrates the steps carried out in the SDLC model. These steps
47
3.2.2 Procedure for the different phases
the requirements such as: Who will be the users of the system? How will they
use the system? What are the data to be used as an input into the
system? What will be the output by the system? These are general queries that
48
students’ time in time out and payment scheme?
Why?
Design Phase
In the second stage, when requirements are already known, design for the
system is created. It's not a comprehensive design it included just the system's
important features, which gives the user an idea of the framework. The design
proposed project.
Memory 2GB
49
Table 3 - Software Specifications
Browser Chrome/Mozilla/IE
Database
e-Notify Program Server
Time in Time out Module
Administrator
RFID Module Web Module
The figure above shows the different components of the RFID via IoT.
There will be users like the Administrator, who administer users account and
reports, accounting who will manage the sending of SMS for payment advisories,
Registrar who will administer the cancellation of classes, the parent module will
50
handle the inquiries of their children time-in time-out records. SMS module
handles all the SMS notifications, and the RFID modules handle the validity of
There is only one server that caters all the system of the school such as
enrollment system and grading system. This server will also cater the RFID
device system which will be used for monitoring the time-in and time-out of the
students. Most of the employees of the TRIMEX Colleges in Biñan use Google
51
Chrome and Mozilla Firefox as their Windows 7, Windows XP and Windows 8
internet browsers. Dual Core System Units and I5 versions are most hardware
components used.
Database Schema
This figure shows the database design of the proposed system. The
52
RFID MODULE
Tap RFID
STUDENT
<<include>>
Validate
RFID
Upon tapping the student’s RFID, the machine will process and validate
the tapped ID for confirmation whether the ID is registered or not on the RFID
computer. The guard on duty should monitor and check the ID to be tapped by
the student and see to it that the monitor displays the same picture on the ID and
the bearer. The guard will also be responsible whenever possible if the student
administration. He will also be held liable for the wrong information declared in
the RFID.
53
Time in Time Out Module
Time In
<<include>> Display
Student Info
<<extend>>
Record
Time
STUDENT
<<include>>
Time Out
After the RFID machine validated the students’ ID, the system will record
the time in and time out being recognized then displays the information of the ID
owner. Upon the student's entry and tapped the RFID the time-in will be recorded
to the database then it will send the SMS to the parents. To register the timeout,
the student will again tap the RFID then the system will record the time-out then it
will send SMS notification to the parents. So, in this figure, it showed and stated
the records of students time-in and time- out stored in the database.
54
GSM MODULE
Record Time In
<<extend>>
Send SMS
Record Time
STUDENT
Out
<<extend>>
Send SMS
The figure 11 is the SMS Module responsible for sending SMS and
notification. This module is held liable for sending time-in and time-out of the
students, payment notification and class cancellation. So, when the student
tapped his ID on the RFID reader, the machine will validate and record the time
in and time out; it will then send a text message to the parents of the ID holder
55
Administrator Web Module
Account
Settings
Student RFID
LOGIN Registration
Administrator
Parent Web
Registration
The figure shows how the administrator can accept and register RFID,
parent web account registrations and generate reports based on the time in and
time out of the students and SMS History reports. Upon enrollment the student
will go to the MIS department to get the RFID and fill out registration forms, the
parent also is advice to accompany with the student for the parent account
registrations. The admin can monitor the real time-in and time-out of the
students. The admin can also add an account for the Registrar and accounting
personnel who are responsible for sending SMS Payment notifications and
cancellation of classes.
56
Parent Web Module
LOGIN
<<include>>
Time in Time
out Reports
Parent
This parent web module will help the parent to monitor their children’s
daily school time-in and time-out without going to the school, and it generates
reports of the time-in and time-out of the students by weekly, daily and monthly.
57
Registrar Module
LOGIN
<<include>>
Registrar Send SMS
The figure shows how the registrar can send SMS to all parents for any
Accounting Module
LOGIN
<<include>>
Accounting
Send SMS
The figure shows upon login with their accounts the accounting personnel
can send SMS payment notifications to all parents Senior High School.
58
Coding Phase
The proponent will start the development of the system. For the coding
paradigm, the proponent will use structured programming where Programs are
The proponent will use VB.Net for the capturing of RFID of the student
and validate the if the card is still valid including sending of SMS. Mysql is used
as the medium for retrieving and storing data. For the admin side and parent,
PHP programming is used to develop the web interface of the e-notify system.
Testing Phase
In this phase, the researcher will present the testing plan and the
There are four major testing phases that need to be completed before
acceptance testing.
Unit Testing
each one is fully functional. The main goal of this endeavor is to determine
59
whether the application functions as designed. A unit may refer to a task,
Testing approach is used to get the job done. One of the greatest advantages of
this testing process is that it can be executed any time a piece of code is
Integration Testing
Integration testing provides the ability for individuals to integrate all units
within a system and test them as a group. This level of testing is designed for
advantageous as it defines the efficiency with which the units work together. Bear
in mind that no matter how well each device operates, if not properly
implemented, this will affect the software program's functionality. Individuals may
use various test methods to perform these types of tests, but the particular
method used to perform the job would rely greatly on how the units are
described.
System Testing
60
whether the system has met all of the criteria outlined and to ensure whether it
meets the quality standards. System testing is carried out by independent testers
who haven't played a part in the program development. This research is carried
out in environment.
Acceptance Testing
can often be misunderstood in a way that does not meet the users ' intended
needs. During this final step, the customer must check the program to see
whether the application meets the needs of their organization. Once the phase is
now complete and the software has passed, the program will then be delivered to
production.
61
Test Specification a specification of inputs, expected results, and a set of
execution steps associated with the testing of modules. This section contains
subsections for each of the modules to be tested and each sub module is
specifies the cases to be tested. Different types of software testing are performed
depending on the size of the project, the current project phase, and the amount
of progress made in the coding process. The types of testing include Unit testing
which can also be called application testing and is used for evaluating specific
pieces of code like functions and modules. Programmers will check each module
to ensure that it performs as needed. Integration testing that will test the
system needs to interface with other or third party systems. The testing tests
acceptable. In test code, you will be in a position to see what module is needed
to fix or revise after the execution and to review those test results.
62
Table 4 Test Matrix
In test plan, the devices such as the RFID and GSM will go on testing and
trial to know whether the machine is working and the system can integrate with
the instrument.
Test ID 1
Test Name RFID
Description Ensure that components pass unit and integration
testing, and perform basic operations as expected.
Pre-requisite None
Test Environment Acceptance Server
Test Strategy Unit Testing
63
To check for the RFID integrations, the testing condition will be conducted
in the morning between 7:00 AM to 9:00 AM where the student is passing
through the main entrance of the school.
Test ID 1
Test Name SMS
Description Ensure that components pass unit and integration
testing, and perform basic operations as expected.
Pre-requisite None
Test Environment Acceptance Server
Test Strategy Unit Testing
To check for the GSM SMS integrations and the sending of SMS the
testing condition will be conducted in the morning between 7:00 AM to 9:00 AM
where the student is passing through the main entrance of the school, and it will
be attended by at least 2 to 3 parents who have a mobile phone.
Test ID 1
Test Name Time in Time out
Description Ensure that components pass unit and integration
testing, and perform basic operations as expected.
Pre-requisite None
Test Environment Acceptance Server
64
Test Strategy System and Database Testing
The testing condition for a time in and time out of the student will be
conducted in the morning between 7:00 AM to 9:00 AM. The testing will be
particularly of the testing accuracy of database section.
Test ID 1
Test Name Administrator Web
Description Ensure that components pass unit and integration
testing, and perform basic operations as expected.
Pre-requisite None
Test Environment Acceptance Server
Test Strategy Unit and Web Testing
Administrator Webpage
Step Descriptions Expected Results
1 It should display the The Web Login Page displays correctly
Administrator Login Page
2 It should attempt to search the Search results are associated with the
student data (all results found search query, and the method to save
in DB path) the query to the database is called.
3 Enter a search student name" A search query with the entered
input. student name and displayed the
student information including time in
and time out history
65
4 Register Student RFID and A search result will be base in the
Student information Student RFID if no record the data will
be saved and RFID Card is ready to
use.
Test ID 1
2 It should accept input. The text box will accept text input.
3 It should respond by sending The SMS class cancellation
SMS to the mobile phone of notifications send to the parents.
the parents.
To check for the sending of SMS class cancellation, the testing condition
will be conducted in the morning between 7:00 AM to 9:00 AM and it will be
attended by MIS personnel and at least two parents who have a mobile phone.
66
Table 10 Accounting Web Module
Test ID 1
Test Name Accounting Web
Description Ensure that components pass unit and integration
testing, and perform basic operations as expected.
Pre-requisite None
Test Environment Acceptance Server
Test Strategy Unit Testing
Operating Procedures
operating procedure of RFID. It aims to aid the parents, faculty and the school
management through SMS regarding monitoring of the students time-in and time-
67
out. Below are the different operating procedures of each RFID Module that
MODULE: RFID
Start
For a student be able to go on
the school campus.
68
Table 12 SMS Module
MODULE: SMS
Start
After the student Tapped the
RFID the e-notify will:
Time in Time out
From RFID Record the time-in of the
student.
End
69
Table 13 Time in Time out Module
Start
RFID Data
Process RFID data from
tapping.
N Y
VALID
ID Check RFID Validity.
Record Time-in
Time Out It will record the Time-in and
Time Out of the students to the
database.
Send SMS to the
Parent Send SMS Time in Time out
notifications.
End
70
Table 14 Administrator Module
MODULE: ADMINISTRATOR
Start
N Y Display Menu
Login Valid
Get Selections If you go to the Student and
parent section, the RFID card can
be registered, and creation
parents account also included
N is Selection Y
Check Value
>= 4 At the Account settings, you can
create Registrars account and
Y
accounting accounts.
1 2 3
Student Time in Time The Time in time out reports can
Account
/Parent RFID
Settings Menu
Out Reports also be generated base on your
Registration Menu selected student account.
Menu
End
71
Table 15 Registrar Module
MODULE: REGISTRAR
Start
Type and
Send SMS
End
72
Table 16 Accounting Module
MODULE: ACCOUNTING
Start
End
Deployment Phase
For the deployment of the system, the researcher will be using a parallel
device and data in the database that will last for one month. The system is now
ready to use and installed in school premises training may be required for end
73
Maintenance Phase
includes revisions and updating done to correct or fix problems, which are either
discovered by the user or concluded by user error reports. There will also be a
students are using it. Database backup is also a part of the maintenance.
3.2.3 Evaluation
After the testing strategies have been conducted, the proponent will create
questionnaires will be based on the ISO 9126, which is the software product
namely:
(1) Functionality- The software features will be checked if they are all working
correctly.
(2) Reliability- The software’s fault tolerance and recoverability are high; it
(3) Usability- The application can easily be understood and navigated by the
74
(4) Efficiency- The system responds precisely and efficiently to the
network.
(6) Portability- The software can be used and run in different web browsers’
versions and screen resolutions. It does not require vital programs that are
hard to install.
On the other hand, the statistical treatments for this study were frequency
determine the results of the software evaluation. Below is the evaluation criteria
75
Software Evaluation Criteria
Direction:
Check the box that corresponds to your answer. Use the legend as your guide.
Ratings
Criteria Indicators
5 4 3 2 1
The software performs the tasks
Functionality
required.
The software shows the result as
expected.
The software interacts with another
system.
The software prevents unauthorized
access.
Most of the faults in the software
Reliability
been eliminated over time.
The software capable of handling
errors.
The software resumes working and
restores lost data after a failure.
The user comprehends the use of the
Usability
system easily.
The user learns to use the system
easily.
The user uses the system without
much effort.
The interface looks good.
Efficiency The system responds quickly.
The system efficiently utilizes
resources.
Maintainability Faults are easily diagnosed.
The software can be easily modified.
The software continues functioning if
changes are made.
The software is tested easily.
76
CHAPTER 4
RESULTS AND DISCUSSION
Technical Description
IOT world where you can interact and communicate intelligently just about
everything. In other words, the physical world is becoming one big knowledge
with the Internet of Things. Utilizing device that can capture student time-in and
messages through the SMS technology will be a real help knowing that the child
is already inside the campus. The admin part of the system will manage the RFID
registrations, administer the Parents’ account creation, monitor the Time-in Time-
out Data and generates a time-in time out reports. The registrar of the school will
handle the SMS notifications of cancellation of classes while the Accounting will
The first objective of the study is to utilize a device that can capture
student time in and time out through passive Radio Frequency Identification
Technology.
77
Figure 5 RFID Time-in Time-out Interface
The figure above shows the RFID is being tapped and check for RFID
validity from the database server and displays the picture of the student who
tapped the RFID. It will add the record of the time-in or time-out of the student,
The second objective of the study is to design an application that will notify
users via short message service technology of the following:
a. Class cancellation
78
The above figure shows the flow of the SMS Format on how the parents
will be notified whenever there are cancellations of classes. The Registrar who is
the authorized person to send notifications to the parents is the one who is
responsible for sending class cancellation.
The above Student’s Time-in and Time-out figure shows the record of
79
Figure 8 Payment Notifications
notification of the students to send to the authorized person from the accounting
department.
80
The third objective is to generate reports such as:
The Figure above regarding the students’ time-in time-out report shows
the date of the students’ entry and exit. The reports generate daily, weekly,
81
b. SMS Message History
The above figure shows the sent and unsent reports SMS. Through this
SMS History Reports the Admin as the responsible person can select or search
ISO9126. The software was assessed using the set of quality metrics/criteria
stated to validate the effectiveness of the software being developed. Criteria rank
82
according to the opinion of respondents after evaluating the software, five being
Criterion Weighted
Mean
Functionality
identifying, and displaying the student's picture for proper identification as well as
the easy receiving and sending SMS to the parents. As such, only 4 of the
respondents were in the Agreed level, and no respondents answered for the last
83
three categories on the scale. The total weighted mean for the Parents
Criterion Weighted
Mean
Functionality
Average 4.88
The total weighted mean of 4.88 for the school admin respondents was
is truly functional and visible. However, 6 of the respondents cast their Agreed
84
Table 21 Weighted Mean Responses in the Reliability Criteria
Parents Respondents
Criterion Weighted
Mean
Reliability
Average 5.0
The total weighted mean of 5.0 was justified through the reliability of the
system software; all the parent's respondents were Strongly Agreed that the
reliability of the system can easily generate reports and shows accurate data of
the students.
Criterion Weighted
Mean
Reliability
85
Produce correct student data using Identification 5.0
cards.
Average 5.0
reliability test of the software is HIGHLY ACCEPTABLE. The weighted mean, 5.0
HIGHLYACCEPTABLE scale.
Parents Respondents
Criterion Weighted
Mean
Usability
usable and user-friendly. On the other hand, only one respondent was
86
evidently seen in the weighted mean, 4.75 of the Usability criteria under
Criterion Weighted
Mean
Usability
AGREED in the usability of the system. The weighted mean, 4.75 of Usability
criteria in the respondent's group still falls on the Highly Acceptable scale to the
87
Table 25 Weighted Mean Responses in the Efficiency Criteria
Parents Respondents
Criterion Weighted
Mean
Efficiency
The software respond time is appropriate 4.6
The software execution time is appropriate 4.9
The resources used are appropriate. 4.7
End users respond accurately and actively to the 4.6
commands.
Average 4.7
response while performing its function. On the other hand, there were six parents
who AGREED that the system uses appropriate storage resource of the
Efficiency criteria under the Barangay health workers respondents group, falls on
Criterion Weighted
Mean
Efficiency
The software respond time is appropriate 4.9
The software execution time is appropriate 4.7
88
The resources used are appropriate. 4.6
End users respond accurately and actively to the 4.8
commands.
Average 4.75
Efficiency criteria. Also, six replies were AGREED in the capability of the
software regarding resource utilization and time behavior, and two replies were
among the Moderately Agreed. The weighted mean, 4.75 of Efficiency criteria in
the school admin’ respondents, is closely related to the responses of the parent's
89
In general, the software yielded a total weighted mean of 4.85, from both
difference among the response of the compared means of the two categories of
respondents.
90
CHAPTER 5
SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS
5.1 SUMMARY
in and time out. With the help of the system RFID and the Internet of Things, the
students monitoring is easy to access and the accuracy and reliability of the data,
5.2 Conclusions
Based on the aims of the study and the results of the evaluation the
1. With the used of the RFID students monitoring system, the time-in and time
out of the students will be easily sent to parents via SMS since RFID
91
2. With the help of the RFID, the designed application that notifies users via
The cancellation of classes, students time-in and time-out and the payment
5.3 Recommendations
92