METHODOLOGY

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

FOR INFORMATION TECHNOLOGY:

METHODOLOGY
Research Design

This study will use the developmental research design since it proposed an

Attendance Monitoring System using RFID Reader with Short Messaging Service. The

CAMS: CVCITC Attendance Monitoring System is firmly analyzed to provide a good

quality service for the students. The system was created using the method and

procedures of Rapid Application Development. This is shown in the Flow Chart given

in Figure 2.

Demo

Prototype Analysis &


Cycles Deployment Quick
Design
Develop Refine

Figure2. Rapid Application Development (RAD)

Analysis and Quick Design. The researchers gathered the data needed to fulfill the

requirements for the system; they decided on the quick design of the system.

Prototype Cycle. The Prototype Cycle has three components, namely: 1) the Develop

Phase where the system was developed, 2) the Demo Phase, where the researchers

demonstrated the developed system, and 3) the Refine Phase where the researchers

defined and decided for the refinements and improvements of the system for better

performance.
Testing. The developed system is now ready to be tested in its environment. And the

final and last phase is the Deployment which is not part of this study.

Respondents. The developed system was used and tested within the locality of

Cagayan Valley Computer and Information Technology College, Inc., in Santiago City.

The primary respondents are the enrolled Senior High School Students with a

population of 370 people.

Instruments. A questionnaire is not required in this study, however, the researchers

conducted interviews with students and professors about the CAMS: CVCITC

Attendance Monitoring System.

Data Analysis. The following are the Data Analysis tools used by the researchers in

preparing and solving the problem encountered in the study.

Figure3. Data Flow Diagram

Figure 3 shows the data flow diagram of the system. It shows the graphical

representation of the flow of the data. Every time the student will Log in and Log

out, the system will process the log details. Once the process is completed, the

system sends an SMS notification to the parents about their child’s arrival and the

system will provide student logs for principal.


Figure 4. Entity Relationship Diagram

Figure 4 shows the Entity Relationship Diagram of the system. It demonstrates the

relationship among entities. Before the student uses the system, the administration

must enable the system and needs to log-in which requires username and password.

After Logging in, the students are now allowed to use the system. The Log process

contains Date, Time in and Time Out. After the system finishes the Log process, it

automatically sends a text message to the parents. The parent Entity has two

components which are Mobile Number and Parent Name.


Figure 5. Hierarchical Input Process Output Diagram

This Figure illustrates the Hierarchical Input Process Output of the system. It shows

how the system works and the components of each of the processes as well as the

overall design of the system being implemented and its specific requirements. The

Setup module contains one sub module, the student profile while the Process

module contains two sub modules: the Time in/Time out and SMS Notification to the

parents. The Report module on the other hand, contains one sub module, the

Attendance Report. Finally, the Tools module contains one sub module, the

Database Backup.
Figure 6. Technical Framework of the System

This figure illustrates the Technical framework of the system. Students must log in

and log out before they enter in and exit from school. Using the RFID reader, when

the student’s ID is verified, the system processes the log in and log out details and

will be directly stored in the database. After the verification, the system will send an

Prototype
Data Gathering Implementation Evaluation
Development

SMS notification to the parents which includes the child’s name and time of arrival.

Figure 7: Prototype-Feedback-Improved Prototype

Data Gathering. Data needed in designing and

crafting of the system was gathered. The


3. Improve
1. Feedback
2. Prototype
Prototype
gathering of data was done through meetings with

the Administration, Students and Parents.

Moreover, the internet was used for conceptualization of the system and overview.
Prototype Development. The prototype system that is intended for presenting the

design and how the system works was crafted and presented to the administration

of the school to identify and collect additional requirements needed for the

improvement of the system. In addition, the construction of the system includes the

creation of databases, application programs, and user and system interface.

System Implementation. Before the implementation stage, the following were

completed:

1. System Testing, to make sure that the system is working properly.

2. Device Testing, to make sure that the device works properly.

3. Installed the Application needed for the system.

4. Provides a User manual and installation manual for the users/clients.

The Personnel-in-charge and the authorized personnel to operate the system is the

computer laboratory officer who is responsible in maintaining the system including

the annual system reviews in order to make sure that the system is working properly

and also conducting a regular data back-up.

Evaluation. The clients or respondents evaluated the system for improvements and

adjustments. The standard evaluation form by the ISO 9126 was used since this is a

developmental research. ISO 9126 is as international standard for the evaluation of

software. The ISO 9126 software quality model identifies 6 main quality

characteristics, namely: Functionality, Reliability, Usability, Efficiency, Maintainability

and Portability.
Present System Workflow. First is the Data Entry where the students log in/log out

in the system to record the attendance with their name, strand, grade level and time

of arrival. Second step is the Data Process where the system classifies whether the

ID number is matched with the system. The last step is the Output where the Log

details are displayed on the screen and the information are stored in the database.

The system then sends an SMS notification to the parents. Figure 8 below shows the

Present System Workflow.

Text Message

System

Figure 8: Present System Workflow in the Conduct of Attendance

Technical Workflow of the System.

The technical workflow shows how the students use the system. Students will tap

their ID into the reader and the details will be processed by the system. After

confirming the log details of the student, such will be directly saved in the database
and the system will send an SMS notification to the parents with child’s name and

time of arrival.

Hardware and Software Requirements


Software Requirement

Operating System Microsoft Windows 8 of Higher


Apache Server XAMPP
Database Server MySQL
Microsoft Visual Studio Ultimate Version 11.0.50727.1 RTMREL
Hardware Requirement

DESKTOP
Processor Intel core i3 or higher recommended
Motherboard GIGABYTE GA-H110-DS2 1151, DDR3,
HDMI
Memory RAM 4GB DDR3 PC10600/1333 or Higher
Hard Disk Drive (HDD) SP550 120GB SSD
Keyboard/Mouse USB mouse/ PS2 keyboard
LCD Monitor AOC/HKC 18.5 LCD Monitor
Automatic Voltage Regulator (AVR) 500VA AVR
RFID Reader USB 2.0

Cost
Category Item Quantity Price Total
Laptop Computer 1 P 14,500 P 14,500
Equipment RFID Reader 1 P 3,000 P 3,000
Broadband Dangle 1 P 999 P 999
Total Cost P 18, 499
BSECE
METHODOLOGY
Research Design

This study used the developmental research design since it proposed an Attendance

Monitoring System using RFID Reader with Short Messaging Service. The CAMS:

CVCITC Attendance Monitoring System is firmly analyzed to provide a good quality

service for the students. The system was created using the method and procedures

of Rapid Application Development. This is shown in the Flow Chart given in Figure 2.

Demo

Prototype Analysis &


Cycles Deployment Quick
Design
Develop Refine

Figure2. Rapid Application Development (RAD)

Analysis and Quick Design. The researchers gathered the data needed to fulfill the

requirements for the system; they decided on the quick design of the system.

Prototype Cycle. The Prototype Cycle has three components, namely: 1) the Develop

Phase where the system was developed, 2) the Demo Phase, where the researchers

demonstrated the developed system, and 3) the Refine Phase where the researchers
defined and decided for the refinements and improvements of the system for better

performance.

Testing. The developed system is now ready to be tested in its environment. And the

final and last phase is the Deployment which is not part of this study.

A. SCHEMATIC DIAGRAM

B. Technical Framework

This technical framework of this system is illustrated in Figure 4. The system has a

data base for the account and to connect the prototype device to the owner of the

house. When the prototype device sense that there is a fire the fire sensor will notify

the prototype device and the prototype device will ring the buzzer to alert the

people around and the prototype device will send an Short message to notify the

owner that there house is something in fire and the same with the smoke sensor if

there is a smoke the sensor will send a warning to the prototype device that there is

a smoke around the area and the prototype device will send a short message to the
owner that there is something on fire in their house. Smoke sensor is indicating of

fire.

Prototype Design

This diagram was showing how the prototype device flow on how it works from the

start until to the end. From the start the prototype system was checking first the

sensor reading and when the sensor detects some fire, smoke and gas the program

will turn to yes and next will enable the buzzer to alarm the nearly around the house

or the people who lives in the house and also the prototype system will send an SMS

to the household owner and if the sensor didn’t detect any gas, fire or smoke the

prototype system will continue sensing around.


Sim 900. A complete Quad-band GSM/GPRS solution in a SMT module which can be

embedded in the customer applications. Featuring an industry-standard interface,

the SIM900 delivers GSM/GPRS 850/900/1800/1900MHz performance for voice,

SMS, Data, and Fax in a small form factor and with low power consumption.

Arduino Mega. A microcontroller board based on the ATmega2560. It has 54 digital

input/output pins (of which 14 can be used as PWM outputs), 16 analog inputs, 4

UARTs (hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a

power jack, an ICSP header, and a reset button.

Smoke Sensor. Grove - Gas Sensor (MQ2) The Grove - Gas Sensor (MQ2) module is

useful for gas leakage detection (home and industry). It is suitable for detecting H2,

LPG, CH4, CO, Alcohol, Smoke or Propane. Due to its high sensitivity and fast

response time, measurement can be taken as soon as possible.


Buzzer. Electrical device, similar to a bell, that makes a buzzing noise and is used for

signaling.

Flame sensor. Sensor designed to detect and respond to the presence of a flame or

fire, allowing flame detection. Responses to a detected flame depend on the

installation, but can include sounding an alarm, deactivating a fuel line, and

activating a fire suppression system.

Wire. Metal drawn out into the form of a thin flexible thread or rod. That can

connect to the other parts.

COST OF PERIPHERALS/DEVICES
Cost
Arduino Mega 2560 1 P 2858 P 2858
Equipment complete set
Smoke sensor (MQ-2) 1 P 567 P 567
and Fire sensor
Sim 900 GSM module 1 P 880 P 880
Total Cost P 4305

Research Environment. The study was conducted in Santiago City.

Research Respondents. The output of this study was tested in a single household in

Santiago city and the respondent was the owner of the house where the system was

implemented.

Research Instrument. The study used an adapted questionnaire (CVCITC BSIT’s

Instrument) on the evaluation of technical performance of the proposed system on

SMSecurity: security system and SMS notification cum face recognition. The

questionnaire used by CVCITC’s BSIT program in evaluating systems and

infrastructures in information technology.

You might also like