Attendance Monitoring System
Attendance is the act or fact of attending (being present at) work. Also, it is used to define the number of persons present on a particular day at work (Heartfield, n. d. ). Currently, the system of getting the attendance is manual the teacher calls the name of a student either raises his/her hand or signifies presence in class. After that, the teacher marks the student as either present or absent. In using the manual system, schools have limited responsibility in providing a security among their students. Moreover, guardians are not updated of their child’s attendance in school.
According to Lucido (2011), an attendance monitoring system serves as a time log that is set up as a computerized database. An attendance monitoring system maintains a daily time record of a person’s arrival and departure from work or school. Due to lack of security in schools, students are not afraid to cut their classes or sometimes go home late as their guardians are not informed of their schedules.
Only $13.90 / page
The researchers developed Attendance Monitoring System using Biometrics and SMS Technology for Private High School to solve problems in the manual system. Furthermore, it can organize and give an accurate attendance of students.
It can also inform guardians about the arrival and departure of their child in school through SMS. Objectives of the study The general objective of the study was to develop the attendance monitoring system using biometrics and SMS technology for private high school. Specifically, it aimed to: 1. design an attendance monitoring system of private high school with the following features: a. biometrics utilization for attendance monitoring system; b. SMS technology for giving information to guardian about the time of arrival and departure from school of their child; c. system could store, retrieve and update information of the students; d. prevent unauthorized entry of students; and e. secure the information of student for safety and confidentiality. 2. create a system using the following materials and programming languages: a. USB modem (Globe Tattoo Broadband) and fingerprint reader (Digital Persona uru 4500) used as the device; b. Visual Basic 6. 0 and Microsoft Access used to program the system; and c. Computer with Window Xp operating system to run the application programs and serve as an interface between the user and the computer.3. test and improve the system based on reliability, accuracy, informativeness consistency and user-friendliness. 4. evaluate the performance of attendance monitoring system using biometrics and SMS technology for private high school using the CvSU Evaluation Instrument. Importance of the study This study can be used by a private high school in monitoring the attendance of their students through biometrics. It can help students in providing valuable information when getting in and out of school through SMS.
Guardians can take appropriate actions as status of their children are updated. The system ensures safety and provides additional security among students. Time and place of the study The initial research was made at Cavite State University Library-Main Campus. Further research was conducted at different libraries. The testing of the system was conducted by fifteen (15) IT experts on October 10, 2013 at Provincial Capitol of Cavite, Trece Martires City, Cavite. Fifty (50) participants evaluated the system on December 5, 2013 at Saint Jude Parish School, Trece Martires City, Cavite.
This was focused on modifying a hardware and software program that can monitor the attendance of students. Scope and limitation of the study Attendance Monitoring System using Biometrics and SMS Technology for Private High School applied the following devices. The computer is a programmable machine that can store and manipulate the data. It can provide output in a useful format and a server for the system. The (Universal Serial Bus) USB modem was used as the medium for forwarding text message towards to the number that registered by students.
The fingerprint reader which is a kind of biometrics was used to detect the identification of an individual. Under the software requirements, the following are the software application that was used. Database is a collection of information that can easily be accessed and managed was used as the storage of all attendance of the students. Visual Basic 6. 0 is a kind of programming language used to compile and run the system. The system was intended for monitoring the attendance of student in school premises. The system cannot determine the student attendance grade. Likewise, it cannot compute student grades.
The time frame of arrival and departure of student in am and pm are: 6:00:00 am to 10:00:00 am is the am arrival, 10:00:01 am to 12:30:00 pm is the am departure, 12:30:01 pm to 3:00:00 pm is the pm arrival and 3:00:01 pm to 9:00:00 pm is the pm departure. The content of the SMS are guardian name, student name, name of school, date of arrival or departure and time of arrival or departure. Conceptual framework Input Process Output Figure1. Conceptual Framework of Attendance Monitoring System using Biometrics and SMS Technology for Private High School Figure 1 shows the conceptual framework of the study. It had input, process and output.
The input had knowledge requirements, software requirements and hardware requirements. Knowledge Requirements consisted of general information about attendance issues, kinds of biometrics, ways of communication and Attendance Monitoring System using Biometrics and SMS Technology. Software Requirements consisted of software applications that were used for creating the project design such as Windows Xp, Visual Basic 6. 0 and Microsoft Access. Hardware Requirements consisted of the devices that were used for creating the project design such as computer, USB modem (Globe Tattoo Broadband), web camera, fingerprint reader (Digital Persona uru 4500), and cellular phone. The process was system requirements, system design, system development and system testing. Lastly, the output was Attendance Monitoring System using Biometrics and SMS Technology for Private High School. Definition of terms In order to have a clear and common understanding of the terms used in this study, various terms were defined and interpreted as used in the project: Attendance. The practice of regularly going to a school, church or other institution. Biometrics. Use the biological characteristics such as fingerprints or iris pattern to identify a person to an electronic system. Computer.
An electronic device that accepts, processes, stores and output data at high speeds according to programmed instructions. Cellular phone. An electronic device that used to send out data message and receives request message. Database. A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. Monitoring. Supervising activities in progress to ensure they are on-course and on-schedule in a meeting. Systems Management Server (SMS). Set of tools from Microsoft that assists in managing computer that connected to a local-area network (LAN). (Universal Serial Bus) USB Modem.
Device that modulates an analog carrier signals to encode digital information and demodulates a carrier signals to decode the transmitted information. Visual Basic 6. 0. Automated conversion tool exists, but fully automated conversion for most projects is impossible. REVIEW OF RELATED LITERATURE This chapter consists of gathered information related to current study. It gives the readers a better understanding about attendance monitoring and discusses how new technology helps in monitoring the attendance. The chapter starts with the attendance issues, followed by the recognition devices that can be used in monitoring the attendance.
Attendance Issues Attendance is the act or fact of attending (being present at) work. Also, it is used to define the number of persons present on a particular day at work (Heartfield, n. d. ). The most common attendance issue is the use of a manual system for recording student’s attendance. While guardians know that their children are in school, student may cut classes and they will know about it when the school sends letter to them. In an organization, employees may not come on time or may have ghost employee that receive monthly salary. A 16-year-old student from an exclusive girls’ school escaped unharmed by two men.
The two men tried to kidnap the student while she was waiting for a ride along Taft Avenue in Ermita, Manila (Etolle, 2011). Valenzuela City Mayor Sherwin Gatchalian said that City Hall applies a computerized system for the attendance of employees and the days of ghost employees are over. The old method which is manual recording, for the longest time, was seen as an opportunity to cheat on work time (Botial, 2005). To avoid that particular scenario the attendance monitoring system was introduced. According to Lucido (2011), an attendance monitoring system serves as a time log that is set up as a computerized database.
An attendance monitoring system maintains a daily time record of a person’s arrival and departure from work or school. The attendance monitoring system was a program that uses different kinds of hardware devices such as Rfid, barcode and biometrics. For giving the status information of student to their guardian, the SMS technology was incorporated to attendance monitoring system. By using the Attendance Monitoring System using Biometrics and SMS Technology for Private High School, the records of students were more accurate and systematic. Furthermore, guardian is more trustworthy to school about the safety of their child.
The attendance issues start to the definition of attendance then shows the problems about getting an attendance by using manual system. It also discussed the advantage and definition of attendance monitoring system. Biometrics Biometrics is the science of establishing the identity of an individual based on the physical, chemical or behavioral attributes of the person. The relevance of biometrics in modern society has been reinforced by the need for large-scale identity management systems whose functionality relies on the accurate determination of an individual’s identity in the context of
several different applications. By using biometrics, it is possible to establish an identity based on who the person is, his possessions such as ID card (Flynn, Jain, & Ross, 2008). According to Kiran (2008), the word biometrics comes from the Greek words “bios” and “metric”, meaning ”life measurement”. By measuring something unique about an individual and using that to identify them, a dramatic improvement in security of the key store are achieved.
Gregory and Simon (2008) stated that the benefits that biometrics brings to an organization are (1) more reliable identification (2) elimination of password sharing and (3) more convenient identification. Every type of biometric measurement can be classified with a number of characteristics that should be considered in a selection process. First, universality which refers to whether each person has the characteristic belong measured. Second, uniqueness which how well the particular biometric distinguishes people. Third, permanence that a good system should measure something that changes.
Fourth, collectability refers to how easily the biometric can be measured. Fifth, performance refers to the overall technology burden: how much equipment, time, and calculation go into performing a comparison. Sixth, accuracy refers to how well a biometric system distinguishes between subjects, and what are the false acceptance and false rejection rates. Seventh, acceptability that user is willing to use the biometric technology. Eight, circumvention refers to how easily a forgery can be made that will fool the biometric system.
According to Flynn, Jain and Ross (2008), the need for reliable user authentication techniques has increased in the wake of heightened concerns about security, rapid advancements in networking, communication and mobility. Thus, biometrics is being increasingly incorporated in several different applications. These applications can be categorized into three main groups. (1) Commercial applications such as computer network login, electronic data security, e-commerce, Internet access, ATM or credit card use, physical access control, mobile phone, PDA, medical records management, distance learning, etc.(2) Government applications such as national ID card, managing inmates in a Correctional facility, driver’s license, social security, welfare-disbursement, border control, passport control, etc. (3) Forensic applications such as corpse identification, criminal investigation, parenthood determination, etc. Operation Modes of Biometrics. According to Kiran (2008), the operation modes of biometrics are the identification and verification with the enrollment as the start. The process of enrollment is shown in Figure 2.