55
La Consolacion University Philippines City of Malolos, Bulacan 3000 BARCIE ALTERNATIVE NIGHT COLLEGE Abstract The major objective of the study is to develop an RFID Student's Monitoring System with Web Apps for Colegio de Calumpit. The research focus on the advantages that a Passive RFID can provide for the system. Unlike bar code it does not need a direct line of sight to the printed bar code. An RFID system has three parts. A scanning antenna, transceiver (with a decoder to interpret the data and transponder that has been programmed with information). The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation does two things, (1) it provides a means of communicating with the transponder and (2) provides the RFID tag with the energy to communicate. This is an absolutely key part of the technology; RFID tags do not need to contain batteries, and can therefore remain usable for a long period of time. CCI – RFID Student’s Monitoring System with Web Apps Page

CCI-RFID Student Monitoring System With Web Apps

Embed Size (px)

DESCRIPTION

A thesis work from Alternative Learning System under my research 1 and 2.

Citation preview

La Consolacion University PhilippinesCity of Malolos, Bulacan 3000BARCIE ALTERNATIVE NIGHT COLLEGE

Abstract

The major objective of the study is to develop an RFID Student's Monitoring System with Web Apps for Colegio de Calumpit. The research focus on the advantages that a Passive RFID can provide for the system. Unlike bar code it does not need a direct line of sight to the printed bar code.

An RFID system has three parts. A scanning antenna, transceiver (with a decoder to interpret the data and transponder that has been programmed with information). The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation does two things, (1) it provides a means of communicating with the transponder and (2) provides the RFID tag with the energy to communicate. This is an absolutely key part of the technology; RFID tags do not need to contain batteries, and can therefore remain usable for a long period of time.

The information system was developed using open-source technology and it is also capable of providing weekly log reports to the clients who use Web Apps.

Chapter 1The Problem and its Background

IntroductionNowadays, industry is experiences many technological advancements and changes in methods of learning. With the rise of globalization, it is becoming essential to find an easier and more effective system to help an organization. In spite of this matter, there are still schools and business establishments that use the old-fashioned way. In a certain way, one thing that is still in manual process is the recording of attendance.

Colegio de Calumpit is well known for providing advance computer education for its students. The school focuses on Web Development which is now the trend when it comes to the realm of technology.

On May 1947, Colegio de Calumpit was born to blaze its own trail in the galaxy of educational adventure. More clearly than by destiny or chance, it seems Colegio de Calumpit has a battle to be won by a steadfast, civic-minded group who from solicitations amounting to twenty thousand Pesos (P20, 000.00) as initial capital stock put up an institution, the only one of its kind to survive in the town.

In the same manner, Colegio de Calumpit after having been founded was incorporated on October 17, 1947 by some leading citizens of Calumpit. It started with seven members of the teaching staff including the Director, the late Maj. Francisco Del Rosario and there were only 189 students from first to third year.

During its first year, CCI rented the house of the Makapugay family at the heart of Poblacion and in 1948, Colegio de Calumpit finally had a building of its own. Although constructed on rented land, more than half of it was owned by the Roman Catholic Church.

Today, CCI has transferred to its own spacious lot located along Mc Arthur Highway, Iba O' Este, Calumpit, Bulacan it has its own goal to pursue and as always, is determined to win in favor of thousands of youth who are future teachers, leaders and community builders of a strong and morally upright society.

On the year 2005, CCI adapted the use of Free and Open Source Software (FOSS) or sometimes also called Free/Libre Open Source Software, Free Software, or just Open Source. FOSS is increasingly the go-to standard for operating systems to user applications, for individuals to large enterprises. It helps reduce costs, avoid lock-in, increase productivity, enhance security, and improve standards compliance. With the best long-term investment protection, FOSS is the lowest risk choice for software systems today. All the PCs use in operation and laboratory are running on Ubuntu 13.04 as their operating system.All the systems on Colegio de Calumpit such as Enrollment, Inventory, Record and Debit Card are running on a Free and Open Source Software. Using the FOSS and RFID Technology, a system will be developed for tracking the logs of student using their School ID. These will be the new added system to help Colegio de Calumpit for monitoring and securing its students.

Significance of the Study

The study would greatly benefit the whole Colegio de Calumpit and mostly their clients. The school will have their students properly monitored and reinforced security measure. The system can provide student log in report for their proper monitoring as per requested by teachers and personnels.

Aside from the report generated by the system, it is equip of transmitting information through browser's mobile phone. The client will be able to receive weekly student's attendance using the Web Apps provided by the system.

Theoretical Framework

Learners' academic success begins with regular attendance. Proper monitoring of their attendance may lead them to successful life in the future. The lifestyle we have right now is very tedious that sometimes we forget to ask our child about his/her school activities. The following might happen if we neglect to monitor the learners' school attendance:

Students who attend school regularly score higher on achievement tests than their peers who are frequently absent. When your child is absent he or she loses academic instruction that affects learning, grades, and achievement scores. When your child misses even one day of school, it takes two days just to catch up, according to the U.S. Department of Education. Students who are frequently absent have lower grades and are more likely to drop out. Students who drop out often have limited job prospects. When your child is absent, he or she misses the social experiences, lessons, and relationships that help with fitting in and succeeding in school and life.

Monitoring the students may help us fix the arising hindrances. One way is to maximize the use of technology that will help us monitor students' attendance in our busy schedule.

Conceptual Framework

The information system to be develop must have the complete requirements and details in order to have an efficient outcome. The IPO (Input Process Output) is useful for planning, processing and troubleshooting for development of a system. Using IPO model provide visual presentation that help explaining complex process.The IPO are methods used to describe the system by its function. It is made up of three important components: (1) Input The data needed by information system such as the Student's Info, Logs and System Users. These also include the software use in development of the information system. In creating the GUI, the latest Chrome browser and a jQuery Mobile Library are needed. MySQL is the database to be used for the storage of the system data. PHP will be used for data insertion, retrieving and manipulation. The Ubuntu 13.04 for the operating system and Apache for the web server applications. The hardware requirement are PC, RFID Reader, and a Mobile Phone with browser and ID Printer. (2)Process These involve the encoding & validating the data, printing of ID card, report generation and design the system. (3) Output After the processing takes place, these are the following output it will provide: It will generate a hard & soft copy of the Login Report, ID card and a working Information System.All of the gathered data will be processed to produce a useful output needed the by clients and system users.

INPUT PROCESS OUTPUT

Login Report: -Weekly Report (for Web Apps)

-Daily Report per Student Login

-ID Card

-Working System

Encoding & Validating the Data

Printing of ID Card & Reports

Designing the System

Student's Info Logs

System's User

Softwares & Devices

Database

Figure 1. Conceptual Framework of the Study

Statement of the Problem

The research aims to develop a RFID Student's Monitoring System with Web Apps that will help the Colegio de Calumpit and its Client for proper monitoring of student's daily attendance.

After conducting some researches from the articles, through interview and observation, the researchers have gather information needed in order to achieve the desired output.

1. What is the current status of system use for monitoring the student's attendance?2. What are the other ways to inform the client regarding the attendance of the student?3. How efficient is the system when gathering inputs such as student's logs?4. How will the proposed system to be developed?5. How acceptable was the RFID Student Monitoring System with Web Apps for the client in the terms of:A. Accuracy;B. Speed;C. Reliability;D. User-friendliness; andE. Security Scope and Delimitation

The research is about the development of RFID Student's Monitoring System with Web Apps that could help the administrators and client of the school for monitoring the students.

The Graphical User Interface (GUI) were designed using HTML5, CSS, JavaScript and jQuery Mobile. The document or page created with these for five technologies will serve as our front end. The research utilized PHP & MySQL for the back end. All applications used were open source based on the other existing information systems and requirements of Colegio de Calumpit.

The researchers provide the specification of the RFID Card (Read Only) and reader to be used in this research. The RFID Card will be in low frequency, just enough to read in proximate distance.

The Web Apps for mobile is only tested for specific phone. The Web Apps is best viewed using Mozilla Firefox and high-end mobile phones.

Definition of Terms

The following terms are operationally defined by the researchers for better understand and clarity:

RFID (Radio Frequency Identification) The acronym refers to small electronic devices that consist of a small chip and an antenna.

RFID Card It refers to card that has or embedded with RFID.

Passive RFID it refers to an RFID tag that does not contain a battery; the power is supplied by the reader. When radio waves from the reader are encountered by a passive RFID tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tag's memory.

Web Apps - it refers to a customized document for mobile phone that do certain task. It display the weekly report of student' attendance.

FOSS (Free and Open Source Software) the licenses require that the software remain available to use, modify, and distribute at no cost.

Ubuntu 13.04 - a Linux based operating system distributed by Debian. Used by Colegio de Calumpit as of 2005 for laboratories and offices.

Logs The students use their card for the system to captured the date and time of arrival and departure.

GUI - (Graphical User Interface) is a type of user interface that allows users to interact with system or devices using images rather than text commands.

HTML - (Hypertext Markup Language) it refers to a computer language that create a document or page.

Linux - it refers to an operating system that was built in open-source technology.

Apache it is generally recognized as the world's most popular Web server.

MySQL (My Structured Query Language) it is (as of 2008) the world's most used open source relational database management system that runs as a server providing multi-user access to a number of databases.

PHP (PHP: Hypertext Preprocessor) is a server-side scripting language designed for Web development but also used as a general-purpose programming language.

Chapter 2Review of Related Studies

People of today are now in the state where almost everything is converted from manual to computerized. Automation is technically became one of the most essential need of all the companies to provide quality and accurate information and in order to minimized bugs and errors.

Several studies and literacy review was already conducted both locally and international using different approach and methodologies, it provides necessary additional knowledge and information to help prove that successful logic and automation are really now beyond peoples reach.

Monitoring system was already evolve from the manual to automation plus the external hardware that is used to complete the system such as barcode readers, thumb mark scanners and now the radio frequency identification.

Related Studies

This section of the study has become a big help to the researchers to understand and analyse its topic deeper. It was a big help for the researchers to be guided accordingly and compare its findings and conclusions to the other study finding results. This also reviews how other professionals relate to this kind of problems and studies.At the first glance, it appears that the RFID technology is keeping its wheels turning without any difficulty since it might be a simple technology, but in reality it is not true. It is a technology that spans across diverse areas like CMOS design, data management, encryption, radio propagation, sensor design and integration, network engineering to mention a few . RFID technology makes use of components like tags and readers (normally connected to a host computer or network). The RFID tags are built using silicon chips and antennas.

Based on being categorized as active or passive, RFID tags can be powered by a battery or illuminated by the radio waves emitted by a specialized reader respectively. The information gathered by an RFID interrogator or reader from an RFID tag is stored using a database system. A capacitor located in the circuit of the passive tag is responsible for storing power from the RFID reader. This collected energy is used to transmit the RFID tag information to the RFID reader.

Selection amongst active and passive tags for use is a crucial component of the architectural design strategy. Architectural design of the RFID network is quite essential when it comes to development of an RFID system. Irrespective of the types of components used in an RFID system, the RFID system performance is evaluated based on how well it tracks objects [111]. As per Solanas and Dominngo-Ferrer, it is crucial to craft a network that has the ability to scale in size.

In the literature, a paper entitled Developing a low cost RFID (Radio Frequency Identification) Middleware for Small Business Applications, it was concluded that With RFID clearly emerging as the new supply chain standard, the opportunity is immense in this market. The paper also stated that If any business is going to win the game of tag, they must first understand how RFID can help their business and select RFID hardware and middleware that is not only applicable to their business but scalable for future growth.

Cherry A. Felipe (2012), a former student of La Consolacion University of the Philippines once said that the manual data processing requires a lot of effort and time. That inaccuracy of data is also a problem in a manual system though changes and corrections can be easily made in manual processing, assurance of the benefits of the user is limited especially when the volume of the data increases. For this reason she decided to conduct a study Attendance Monitoring System for Holy Child School Faculty which is expected to lessen the manual handling of attendance monitor system with include guarantee of safety, secured and confidentiality of all the single files of the system.

Given an very high average score of 4.4 out 5.0 possible score, which is converted to characterized score GOOD and with additional recommendation from the panellists, the system contributes to the society of proving that the automation is essential and really helpful on the improvement of the available businesses.

In December 2010, a group of student from Emmanuel College of Plaridel developed their campus student monitoring system. It is developed by the used of Visual Basic 6.0 for the front end and MICROSOFT ACCESS database for the back end, its main purpose is to check the students general campus attendance and produce weekly reports.

By the used of Barcode reader, the system scan the students id when they enter and exit the campus premises. It was successfully been use for a year but totally junked after that, due to security reasons.

Since the system interconnect some administrative computers of the school that is involved to the complete system, it does brings the campus closer to unsecured files taken by the outside hackers or information stealers. Including students information and reports.

Another review of the related Applied study was the very promising and successful METRO NOL CARD of the Dubai, United Arab Emirates which is a centralized single taping radio frequency like card that is used by all the people on the country as their sort of payment on their all major transportation vehicles such as the Dubai Bus and Dubai Metro train. On their very technically improved system they are established to have not only two of the best known building in the world but the best transportation scheme.

Chapter 3Methodology of the Study

This chapter presents the research methods and techniques, target clientele, design features of RFID Student's Monitoring System with Web Apps and the development process of the said studies.

Methods and Techniques

In any endeavor in life, success must be planned carefully. Anyone who has the desire to be the best should make preparation before he acts. This must be the standard operating procedures for those who are willing to trek the path of great accomplishment. One should apply the techniques and proper methods to ensure the best result of what he/she undertakes. In the same manner, the researchers find it necessary to use certain methods in their work.

The study utilized the descriptive developmental method of research. The study was descriptive in nature because it tried to describe the characteristics of the phenomenon as it exists in the school environment. This research method allows researchers to understand situation and its necessities. It shows that the quality observation is indispensable in all descriptive research.

Another notable technique that the study employed was library research and browsing the web to determine the advantages of RFID, Open Source Technology and Web Apps Development. Data were also gathered by using informal conversations and interviews who may have acquired knowledge regarding the development of RFID Student's Monitoring System

Target Clientele.

The development of the RFID Student's Monitoring System with Web Apps was designed for Colegio de Calumpit. The Parents/Guardian and Teachers will be benefited by the system. It will transform the accustomed way of monitoring their students. The students will feel secured knowing that no one can infiltrate the campus unless they have permission with the Administrator. Administrator and Staff will be able to do their monitoring comfortably and efficiently.

Data Gathering Instruments

To describe the nature of the problem with regards to the existing information system and to obtain the information necessary for its solution the researchers used the following techniques in gathering data.

Interview: This involves the collection of data through direct verbal interaction between the interviewer and the respondents. It seeks an understanding of the examination process and problems faced by the users before designing the system. It permits the researchers to adapt to the situation therefore obtaining data with more clarity and understanding.

Questionnaire. The questionnaire was used to gather information about the system. The technique was implemented through the sets of question given to students, parents, teacher, administrators and staffs.

Through this method the researchers obtained an insight of what the respondent want in the information system. The answers were examined and used in the development of the proposed information system.

Methods used in developing the software

A system development methodology refers to the framework that is used to structure, plan, and control the process of developing an information system. Each of the existing methodologies is best suited to specific kinds of projects, based on various technical, organizational, project and team considerations.Developing such as an information system requires a System Development Life Cycles (SDLC). An SDLC should result in a high quality system that meets or exceeds client expectations, within time and cost estimates, work effectively and efficiently in current and planned information technology infrastructure, and is cheap to maintain and cost-effective to enhance. SDLC is a system approach to problem solving and is made up of several phases, each comprised of multiple steps.

SDLC adheres to important phases that are essential for developers, such as planning, analysis, design and implementation.PLANNING

ANALYSIS

ANALYSIS

CODING

TESTING

IMPLEMENTATION

SUPPORT

Figure 2 The Waterfall ModelThe oldest model, that was originally regarded as the SDLC is the waterfall model: a sequence of stages in which the output of each stage becomes the input for the next. These stages generally follow the same basic steps but many different waterfall methodologies give different names and number of steps.

Planning. The first step is to identify the need for information system. This includes determining whether a business problem or opportunity exists. Conducting a feasibility study to determine if the solution is cost effective for developing a project plan. These involves end users who come up with idea for improving their work. Ideally the process occurs in tandem with a review of the organizations strategic plan to ensure that it is being used to help company achieve its objective.

Analysis. The goal of the systems analysis is to find out where the problem is in attempt to fix the system. This step involves breaking down the system in pieces and drawing diagrams to analyze the situation. Analyses project goals, breaking down functions that need to be created and attempts to engage users so that definite requirements can be defined.

Design. Functions and Operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The output of the stage will be to describe the new system as collection of modules or subsystems.

Coding. This is the process of translating the analyzed data and system design to a language where in computer can easily understand. Coding uses a programming language in order to convert the traditional procedures into a systematic computerized system. In this particular research, the information system is develop using HTML, CSS, DOM, JavaScript and PHP. MySQL is use for database storage. A LAMP server was created in order to run the codes/documents created.

Testing. The system is tested in this stage. At this phase testers are looking for possible error whether logical, incomplete process or improper data storing/retrieval. This is the stage where adjustment must be done before the implementation.

Implementation. The final stage of the project or the initial deployment, where the software is put into production and its used to by the actual business. The early stage of implementation could get messy because the user is adapting the new system and leaving his/her comport zone. The last stage will help the user to get on with changes and problem to be encountered. Support. System performance is monitored; tuning and synchronization are performed. Users and help desk call are observed. Procedures are changed and supplementary training is conducted as needed. Changes are recommended via the Change Control Authority.Status of the Current System

Like most of the school, Colegio de Calumpit monitor its student in an old fashion way. It was effective though it consume a lot of time and work force. All the data must be consolidated before you can have the daily monitoring report. There are no easy means for parents/clients to know the status of their child. They have to go or call the adviser to verify whether the child/student was in the school or not.

Feature Design of the RFID Monitoring System with Web Apps

Aside from the fact that it is computerized, the use of Passive RFID Card added to the security of the system. No one can enter without the School ID Card or else you have to talk to the Administrator and grant you the permission.The system is capable of creating a report based on the specification given. Like for example: You need a particular person's attendance covering the date from January 1 to February 13. This can be provided by the system.Web Apps primarily design for mobile phone with browser can verify or monitor the weekly login of their child's attendance. The system has a procedure and manual verification before we install it to your mobile phone.

Determining the Acceptability of the RFID Monitoring System with Web AppsSystems Evaluation

The rating given by the respondents on the different criteria of acceptability were tabulated using an electronic spreadsheet (Calc). The mean score was used in the determining the acceptability of the system. The following scales were utilized.RatingDescriptive Rating4.50 - 5.00Very Good

3.50 - 4.49Good2.50 - 3.49Fair

1.50 - 2.49Poor

1.00 - 1.49Very Poor

Chapter 4Presentation, Analysis and Interpretation of Data

This chapter presents, analyzes, and interprets the data gathered in the study. The presentation covers the presentation of the answer to the specific questions raised in the first chapter.

What is the current status of system use for monitoring the student's attendance?

The Colegio de Calumpit is using manual process of monitoring students attendance. The class monitor is responsible for checking student's attendance and report it to the adviser. What are the other ways to inform the client regarding the attendance of the student?

The parents/guardians are inform regarding student attendance during releasing of card (Form 138 every Grading Period). Teacher informs the parents/guardians if the student commit consecutive absences.The system is capable of generating a report per Section or even per Student to easily manage the attendance monitoring of every client. The parents/guardians that has no time to go to school and need to get the monitoring report, with their cellphone that has capability to connect to the NET they can monitor the student by logging in with this URL. How efficient is the system when gathering inputs such as student's logs?

The RFID is embedded inside the School ID Card, every RFID contains a unique code that will represent the card of the student. The duplication of log in will not happen and the card user's picture will be displayed on the monitor once the student use it. An RFID reader connected to the PC is the responsible for gathering inputs.

How will the proposed system to be developed?

The system enhance the existing procedures and eliminate the manual part of gathering the data. Using RFID Technology to intensify the security of data gathered. The report is accurately generated in minimal time. It is also capable of monitoring student's log using cellphone browser when connect to the Internet.

The hardware requirements and specifications to be use in the system are as follow:

Hardware RequirementsCategoryMinimum RequirementsProcessor1.8 GHz Dual CoreMemory2 GB of RAMHard Disk80 GB HDD Space (Minimum)Monitor 1366x768 resolutionRFID ReaderUSB

Software RequirementsCategory Minimum RequirementsOperating SystemUbuntu 13.04Web ServerApache HTTP Version 2.2DatabasemySQL 5.5Scripting LanguagePHP 5PHP FrameworkCodeIgniter 2.1.3Web BrowserChrome 28Content Delivery NetworkjQuery Mobile

Other FacilityInternet Connectionat least 1 mbpswith Static IP Address

How acceptable was the RFID Student Monitoring System with Web Apps for the client in the terms of:

The RFID Student's Monitoring System is acceptable based on the evaluation that was answered by five (5) IT Professionals (A-E) and ten (10) system users (F-J) including parent, teacher , guidance, EDP (encoder), system admin from Colegio de Calumpit who tested the Web Apps for monitoring the student. A. Accuracy

1. Properly filtered user's input on Data Entry for student's information.

1. Validate and prompt errors for incorrect data to be submitted by the user.

2. Provide unique RFID code for every School ID Card.

B. Speed

3. The interface is manually design that do not need extra Library or unnecessary code provided by other Web Editor.

4. Uses lightweight design for system aesthetics.

5. Uses object oriented approach in dealing with the procedures.

C. Reliability

6. Information undergo a rigid validation.

7. Permission is granted by the Admin before the user's modification

8. Uses open source technology.

D. User Friendliness

9. Adapt the traditional system flow to familiarize easily.

10. User can navigate through programs without difficulties.

11. System flow is well design to specific users.

E. Security

12. Authentication using the user's RFID Card and protected by verification code.

13. Use ext4 file system that cannot be penetrated by common computer viruses.

14. Build using Framework that can prevent database intrusion.

Accuracy. It is the most important criteria of this system. The content of the system shows how the system is accurate in presenting and showing all the needed information of clients and users. The use of RFID technology minimize the errors for in and out log activity of the students. The Data Entry form filter and validate the data before submitting it to the database. In case problem occurs in the Data Entry level, an error will be prompt before the user submit the data to the server.

Table 1.Accuracy of the RFID Student's Monitoring System with Web Apps

The table above illustrates the results of evaluation of the proposed system. Based on the 3 indicators under the Accuracy criteria the evaluation of the IT Professionals and system users are 4.7, 4.6 and 4.8. The table shows that the overall assessment of the systems weighted mean results to 4.7 that corresponds to Very Good rating with regards to the system's accuracy.

Speed. Traditional approach lack speed and it consume time for report preparation. The computerized system is well known when it deals with speed. Aside from report generation and other search functionality, speed is also test how the system loads. The system interface may cause the delay of system loading. Too much design and heavy images are some reason why system gets sluggish. The most important thing to speed up the system is the proper approach dealing with programming procedures. Reusing of objects are one of the great way to lessen the code and eliminate redundancy.

Table 2.Speed of the RFID Student's Monitoring System with Web Apps.

The table seen above illustrates the result of evaluation of the proposed system. Based on the 3 indicators under the design criteria the evaluation of the IT Professionals and system users are 4.6, 4.9 and 4.8. Table 2 shows that the overall assessment of the system has weighted mean result of 4.8 that corresponds to Very Good rating with regard to the systems speed.

Reliability. The data gathered undergo rigid validation in order to produce a reliable information. All modification done in the database must seek permission form the System Admin. The system is design using open source technology that enable us to check not only the system but also the software used in building the system.

Table 3.Reliability of the RFID Student's Monitoring System with Web Apps

The table seen above illustrates the result of evaluation of the proposed system. Based on the 3 indicators under the design criteria the evaluation of the IT Professionals and system users are 4.7, 4.6 and 4.7. Table 3 shows that the overall assessment of the system has weighted mean result of 4.7 that corresponds to Very Good rating with regard to the systems reliability.

User Friendliness. One factor that makes a system successful is to have a presentable design that can provide the user to navigate and learn the system easily. Adapting the traditional flow of the system makes the user comfortable right away. The system is well design to accomplish the task given to a particular user.

Table 4.User Friendliness of the RFID Student's Monitoring System with Web Apps

The table above illustrates the results of evaluation of the proposed system. Based on the 3 indicators under the User Friendly criteria the evaluation of the administrator and users are 4.9, 4.7 and 4.8. Table 4 shows that the overall assessment of the systems weighted mean results to 4.6 that corresponds to Very Good rating with regards to User Friendliness of the system.

Security. This is not the most popular aspect of building a program but without security this may cause failure, inaccuracy and damages the entire system. Authentication using the user's RFID Card and verification code protected are added features of the system. The person that passes this authentication and verification enables him to use the system based on the designated role. Common virus that destroy files and system malfunctioning cannot penetrate ext4 file system. The system is build using CodeIgniter that will prevent intrusion to the database.

Table 5.Security of the RFID Student's Monitoring System with Web Apps

The table seen above illustrates the result of evaluation of the proposed system. Based on the 3 indicators under the design criteria the evaluation of the administrator and users are 4.6, 4.7 and 4.5. Table 5 shows that the overall assessment of the system has weighted mean result of 4.6 that corresponds to Very Good rating with regard to the systems security.

Table 6.RFID Student's Monitoring System with Web Apps Criteria Summary

Based on the collective results of the well represented evaluation of the Colegio de Calumpit, the System's Accuracy provides 4.7 that corresponds with a Very Good rating. System's Speed provides 4.8 that corresponds with a Very Good rating. System's Reliability provides 4.7 that corresponds a Very Good rating. System's User Friendliness provides 4.8 that corresponds a Very Good rating and Security providing 4.6 which also has a Very Good rating. The rating illustrated in Table 6 above. It can be posited that the RFID Student's Monitoring System in Colegio de Calumpit is acceptable and has Very Good rating with 4.7 General weighted mean.

Chapter 5Summary, Conclusions and Recommendation

This chapter contains the summary of the study and the generalization in the form of conclusions. The study's solution to the problem is appended in the form of recommendation.

Summary

The Student's Monitoring in Colegio de Calumpit uses the traditional way in managing its record and transactions. The proposed RFID Student's Monitoring System with Web Apps will efficiently manage the student's log. The teachers and guidance counselors will lessen their burden in doing necessary records and report. The guardian can monitor their students on the time they want to check with the help of Web Apps provided by the system. The proponents used jQuery Mobile, PHP and MySQL in developing the proposed system. The acceptability of the system is determined by evaluation. The proposed system was evaluated with five acceptability issues: Accuracy 4.7, Speed 4.8, Reliability 4.7, User-Friendliness 4.8 and Security 4.6.

Conclusion

Based on the finding of the study and after the proposed system has been evaluated, the proponents conclude that the SDLC or Waterfall Model is appropriate development model to use. The proposed RFID Student's Monitoring System with Web Apps will benefit the Colegio de Calumpits teacher, guidance counselor and even students guardians/parents with efficient and innovative way of monitoring.

Recommendations

Based on the conclusion, the following recommendations are hereby presented:

Implementation of RFID Student's Monitoring System with Web Apps. The Administrator of the system must be well-knowledgeable in order to handle the system successfully. Student information should be encoded carefully and accurately by the Administrator to ensure accurate output of information. The school should have a stable internet connection to have a proper transmission of information.

Bibliographies

How to Select the Right RFID Taghttps://www.rfidjournal.com/purchase-access?type=Article&id=3622&r=%2Farticles%2Fview%3F3622

What is RFID?http://www.technovelgy.com/ct/technology-article.asp

How RFID Workshttp://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=2

History Background of Colegio de Calumpithttp://cci.edu.ph/

Free Open Source Software (FOSS)http://freeopensourcesoftware.org/index.php?title=Main_Page

CCI RFID Students Monitoring System with Web AppsPage | 1