Anda di halaman 1dari 9

CHAPTER 1

A barcode reader or (bar code scanner) is an electronic device for reading


printed barcodes. It consists of a light source, a lens and a light sensor translating
optical impulses into electrical once. A barcode reader merely captures and translates
the barcode into numbers and or letters, the data must be sent to a computer so that a
software application can make sense of the data.
St. Peter's High School department (SP-HSD) is located inside the School
campus of St. Peters College, Sabayle St. Iligan City. St. Peters College was found by
Escolastica Punong bayan- Paguio in year (1915-1969). High School department was
under by the school principal Mrs. Nida O. Branzuela.In high school department they
are not allowed to go outside the campus except during class dismissal. Upon entering
the campus, school guard only checked their ID and bag. Most of the time, if they are
inside the campus some of them were cutting classes others were escaping at the back
of deans office back yard during classes hour, while others exit go out with the college
students through the gate. Because of these parents don't know if their child is Going to
school or not.
Thus, these studies focus on High school department only. An Electronic Logbook (Elog) will be a great aid of loosing things up. The researcher proposed to develop a
system that will record the coming in and out of students in the campus. This system
provides the information of recorded time and date of students logging in and out using
their bar coded identification card.
Statement of the problem
High School Students go to school where school guard manually monitors the entrance
and exit of students that lead to poor security of the school. The following problems
encountered are:
1. Students who undergo cutting classes were not identified.
2. Un-recorded list of student coming in and out of the campus.
3. Parents inquiry regarding their child coming in and out of the campus.
Objective of the study

The aim of this study is to develop a system that is fully automated and can provide fast
inquiry in logging in and out of the students. The following are the objectives of this
research are:
1. To generate a result that can identify those student who are cutting classes.
2. To electronically logbook the students coming in and out of the campus.
3. To send SMS alert notification for parents and principal purposes.

Significance of the project


The system will be benefited by the following:
(1)Student whereabouts in their school attendance will be recorded.
(2)Parents/Guardians will know the attendance of their child.(3)School Administration
will know the students attendance. (4)Future Researcher can enhance the system using
different input device These will also serve a record keeper for students whether they
come to school on time or not and exit from campus early or come in late.
The school campus will greatly benefit from this design using bar code reader it will
serve as a source of identification whether the person is authorized to enter the
campus, to protect the school against harm people and to avoid robbery.

Scope and limitation of the study


the design and development of St. Peters Students Electronic Logbook System is
limited only to the St. Peter's high school department. Thisstandalone system which
specifically focuses on the students gate daily time record, where students ID, name,
date and time registered.
Definition of Terms

Bar code reader A barcode reader (or barcode scanner) is an electronic device
for reading printed barcodes. Like a flatbed scanner, it consists of a light source, a lens
and a light sensor translating optical impulses into electrical ones.
.

SMS Short Message Service (SMS) is a text messaging service component of


phone, Web, or mobile communication systems. It uses standardized
communications to allow fixed line or mobile phone devices to exchange short text
messages.
Barcode A bar code (often seen as a single word, barcode) is the small image of lines
(bars) and spaces that is affixed to retail store items, identification cards, and postal
mail to identify a particular product number, person, or location.
Hardware the mechanical equipment necessary in conducting an activity, usually
distinguished from the theory which the design can make the activity possible.
Printer Port is also known as the parallel port. It is a type of interface found on the
computer for connecting various peripherals. With the bi-directional version of the port,
this allows the transmission and reception of data bits at the same time.
Software the programs used to direct the operation of a computer as well as a
documentation which give instruction on how to use these.

CHAPTER II
REVIEW OF RELATED LITERATURE & STUDY
This chapter contains a list of related literature in relation to the present study.
Indoor Biometric Security with SMS alert System and Electronic Logbook

Biometric comes from the Greek words bios and metron which
means life and measurement. It refers to the technology of identifying and/or
authenticating a person using distinct human body characteristics such as face,
fingerprint, DNA, palm print, iris, retina, and voice. This biological identification
technology provide higher sense of security compared to the traditional ones for the
reason that these unique marks or features in the body cannot be given to someone
else to use and these cannot be lost or misplaced for it is something that people have
all the time. To consider a biometric trait as a reliable and secured option for
authentication, it should possess universality, distinctiveness, permanence, and
collectability. Other criteria for assessment are performance, acceptability, and

circumvention. There are two types of biometric characteristics - physiological and


behavioral. Physiological identifiers refer to the physical biometric traits of an individual.
Physiological biometrics includes DNA, fingerprint, facial recognition, hand geometry,
ear recognition, iris, and retinal scan. On the other hand keystroke, signature, and voice
recognition are behavioral biometrics. This type of biometric measures the traits
acquired naturally by an individual over time.
Among all the biometric traits, fingerprint is one of the oldest methods
used for various practices. Back in the 14th century, China used fingerprints to
distinguish one individual to another. Fingerprint identification is the most widely used of
all the biometric devices because of its uniqueness and consistency over time.
Applications of biometrics include computer login, access to office buildings and homes,
protect personal property, (John Michael J. Bernabe March 2012)
Boarding School Students Monitoring Systems (E-ID) Using Radio Frequency
Identification

Using Radio frequency technology, students movement is quick and easy. The
application of RFID Matrix card system is to improved school management to track the
students movements in and out of the campus. An individual without RFID card will
trigger the alarm and this will inform school management. When RFID tag pass through
the RFID reader in read range zone, system recorded data from the RFID tag to the
database system. Data send online to the management for the supervision of
students .This ease management to monitor availability of boarding school students
and access the students personal records. The id have been used to reduce the time
and manpower to input data manually .Some auto -id technologies require someone to
manually scan the tag to capture the data such as in bar-coding technology .In contrast,
using Radio frequency Identification (RFID) is a technology which does not require
anyone to do any manual scanning, but it uses radio waves to detect man, animals,
data or any other materials plugged with RFID tag automatically.
The RFID tag combines a type of microchip and an antenna, to detect the
subjects and transmit the data. The subjects are detected by the microchip and the
information is transmitted by an antenna. Data storage and retrieval purpose are

performed using a special device the RFID tag. The tag is very small and can be placed
anywhere on anything or inserted in human body. Literatures show that RFID has been
applied in various fields such as supply chain, construction, library, health and
monitoring, this study attempts to apply the technology in Monitoring students of
Boarding Schools (BS). Currently, the BS management has to record students in and
out of the school manually. From an initial study involving three BS in Malaysia, the
management found that maintaining students in/out records are difficult. In current
system, misinformation always happens because students tend to provide untrue
information.
These results in difficulties to locate students if necessary. This study proposes a
system named Boarding School Students Monitoring Systems (E-ID) to
Solve the above-described limitation, with the aims to outline (Herdawatie BT Abdul
Kadir, 2009)

ILP Bukit Katil Check-in-system (Cis)


The attendance system or the check in system is used in many institutions in
order to record the employees, students and etc. attendance or check in record. The
system is developed to overcome the weaknesses of the manual system. ILP Bukat
katil check in system (CiS) is developed and used in the ILP Bukit Katil. The ILP Bukit
Kati which stands for the institute Latham Preindustrial, Bukit Kati is one of the
engineering skills institutions in in Malacca Malaysia. The checked in system is used in
many institutions in order to record the employees, students and etc. Attendance or
check in record. The system is developed to overcome the weaknesses of the manual
system. The main problems of this system are the off: (1) late students are not being
punished accordingly. (2) Security guard need to write down each students name
during the check-in and (3) long list of names in the logbook.
With the use of barcode reader the check in records will no longer stored
manually. The barcode reader will be used in scanning their Id. The system will able to
get the correct number of students who came late to the institute by using the analysis
module. The module will provide the complete details about the students who came
late. Also the system will able check in simultaneously, the stability of the system will be

strengthened to allow more than a student to check simultaneously. The institute's


administrator will be responsible for the data of the system to send online memos. The
head of department s will be the one to view the students check in record. The ILP bukit
katil check- in system is developed using barcode reader in recording the check in
information. (Mohan Raj A/L Subramanian, 2007)

Biometric Security Punch Card System


Biometric Security Punch Card System that was developed by Alias, I.A. et
al. (2005), provides biometric security features in recording the employee's attendance.
The System was developed for the usage in the factories and firms that are managing
hundreds of employees. The combination between the barcode and thumbprint is the
key point in this system and it is referred as the main security concern for the system.
The modules that are provided are the attendance management, salary calculation and
performance Graph. The attendance details are recorded using the thumbprint device
and the barcode Scanner. The user will scan their employee card which has the
barcode printed on it to verify their ID before confirming the identity of the employee
through the thumbprint scanning. On completing both processes, the employee's name
will be placed on the available list of the system. To check out from the system, the
employee will go through the same processes.
The "attendance management" module allows the employer to view the Employees'
attendance records and search details of the employee salary. The "salary Calculation"
module enables the admin to compute the salary of a staff. The overtime Payment will
be carried out in the same module. The "performance graph" module allows the
employer to analyze the attendance records through the graphs that were generated by
the system. According to Alias, I.A. et a/. (2005), a new employee must be registered as
the company employee before enabling the employee to use the system. Important
details of the new employee will be recorded during this registration process. Figure 2.5
shows the new employee registration interface of the Biometric Security Punch Card
System. According to Alias, I.A. et al. (2005), Biometric Security Punch Card System
Also adapts the usage of the barcode in recording the attendance. The system uses the
Barcode from the employee's employee card to register before the employee will be
able to use the system. The Biometric Security Punch Card System was developed
using the VB.Net platform and the SQL Server 2005 as the database platform. (Alias,
I.A. ET a/. (2005))

CHAPTER III
Research Methodology

Software Development Activities:


A.
B.
C.
D.

Requirement Analysis
System Design
Implementation
Testing

A. Requirement Analysis
In developing software project, alternate solutions should be considered. This
stage investigates the problem statement and learns the problem domain to
discover and understand system requirements. The steps were the researchers
conduct the following activities:

1.
2.
3.
4.

Understand the system - vast understanding about the system.


Conduct Interview - interview school personnel to identify desired requirements.
Collect - collect information related to the study.
Identify - Identify and analyse other requirements.

B. System Design
This stage is focused on the development of the system. These are things
needed to design the system:
1.
2.
3.
4.

Database Design
GUI Design
Architectural Design
Program Design

B. Implementation

The implementation of E-ID is elaborated in this paragraph and the remaining.


First, the RFID set should be turn ON and the tag must be placed in a reading range.
Antenna will generated the radio frequency field to the tag. Then, RFID will be detected
after the reader receive signal from the tag. There are two inspections, either the RFID
tag has been registered or RFID tag has not been registered. E-ID provides an option to
register the tag which has not yet been registered in which the flow is illustrated in Fig.
3. Meanwhile, Fig. 4 shows the interaction flow if the tag has been registered. The
functions above are combined in E-ID and the model for combined functions is
illustrated in Fig. 5. The model above has been experimented, to investigate whether it
functions well as intended in different environment.
D. Testing
It is the step involved in the development of system software. Testing will be
applied wherein it is running successfully or it is to operate.
Hardware and software Requirements
The following are the software and hardware requirement to be used for the
design and development of the proposed system:
A. Hardware Requirements:
1)
2)
3)
4)
5)
6)
7)
8)

Processor: Pentium 4
Memory: 128 MB
Hard disk: 40GB
Mouse: PS/2 compatible mouse port with pad
Keyboard: 101/102 keys
Power Supply : watts to 250 watts
Printer : EPSON LX-300
Bar Code Reader
B. Software Requirements

1)
2)
3)
4)
5)
6)

Heidi SQL 8.1


Windows 7
PHP
VB.NET
I.S.S. Server

St. Peters College


COLLEGE OF COMPUTER STUDIES
High School Students Electronic Logbook System
In St. Peters College
By:
Tonido, Juvelle
Tan,Jeremiah
Lagumbay,Ma. Gineza
Macaombao,Shalman

Anda mungkin juga menyukai