This document is an approval sheet for a thesis titled "Automated Classroom Magnetic Door Lock with Attendance Monitoring System Using Radio Frequency Identification" submitted by four students to fulfill their degree requirements. It includes signatures from their adviser, reader, dean and oral examination panel approving the thesis and recommending the students for graduation.
The 5 Biggest Benefits of Source Code AnalysisCheckmarx
Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities.
Two categories exist in this realm:
Binary – or byte- code analysis (BCA) analyzes the binary/ byte code that is created by the compiler.
Source code analysis (SCA) analyzes the actual source code of the program without the requirement of retrieving all code for a compilation.
Both offerings promise to deliver security and the requirement of incorporating security into the software development lifecycle (SDLC). Faced with the BCA vs SCA dilemma, which should you choose?
I have chosen the word Charivari, among the ten. Since, i thought of giving the project something interesting and Thrilling. I hope so you will consider my slide.
The 5 Biggest Benefits of Source Code AnalysisCheckmarx
Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities.
Two categories exist in this realm:
Binary – or byte- code analysis (BCA) analyzes the binary/ byte code that is created by the compiler.
Source code analysis (SCA) analyzes the actual source code of the program without the requirement of retrieving all code for a compilation.
Both offerings promise to deliver security and the requirement of incorporating security into the software development lifecycle (SDLC). Faced with the BCA vs SCA dilemma, which should you choose?
I have chosen the word Charivari, among the ten. Since, i thought of giving the project something interesting and Thrilling. I hope so you will consider my slide.
Analysis of speech acts for the design of a corpus of phrases used in an inte...Laura Cruz Reyes
Artificial intelligence is a fundamental part of our life today. An example is the simulators integrated by intelligent virtual characters that serve as instructors in interactive environments where no matter the place and time, people can take a class and even train in a video game. These virtual agents require a corpus of phrases to have a dialogue similar to that of a human being. This article describes an investigation of the types of speech acts immersed in an interactive dialogue. They describe the most relevant characteristics for an educational environment, such as the type of phrase, the function it performs, its meaning, etc., thus discarding those that do not belong to this environment. The main objective is to develop a specific corpus of phrases for an intelligent virtual agent belonging to a serious game for learning purposes used as an interactive learning environment.
Analysis of speech acts for the design of a corpus of phrases used in an inte...Laura Cruz Reyes
Artificial intelligence is a fundamental part of our life today. An example is the simulators integrated by intelligent virtual characters that serve as instructors in interactive environments where no matter the place and time, people can take a class and even train in a video game. These virtual agents require a corpus of phrases to have a dialogue similar to that of a human being. This article describes an investigation of the types of speech acts immersed in an interactive dialogue. They describe the most relevant characteristics for an educational environment, such as the type of phrase, the function it performs, its meaning, etc., thus discarding those that do not belong to this environment. The main objective is to develop a specific corpus of phrases for an intelligent virtual agent belonging to a serious game for learning purposes used as an interactive learning environment.
Designing for people, effective innovation and sustainabilityMusstanser Tinauli
Designing for people, effective innovation and sustainability: Introducing experiential factors in an observational framework to evaluate technology assisted systems.
E.Leute: Learning the impact of Learning Analytics with an authentic datasetHendrik Drachsler
Nowadays, data sets of the interactions of users and their corresponding demographic data are becoming more and more valuable for companies and academic institutions like universities
when optimizing their key performance indicators. Whether it is to develop a model to predict the optimal learning path for a student or to sell customers additional products, data sets to
train these models are in high demand. Despite the importance and need for big data sets it still has not become apparent to every decision-maker how crucial data sets like these are for the
future success of their operations.
The objective of this thesis is to demonstrate the use of a data set, gathered from the virtual learning environment of a distance learning university, by answering a selection of questions in
Learning Analytics. Therefore, a real-world data set was analyzed and the selected questions were answered by using state-of-the-art machine learning algorithms.
What is Augmented Reality Image Trackingpavan998932
Augmented Reality (AR) Image Tracking is a technology that enables AR applications to recognize and track images in the real world, overlaying digital content onto them. This enhances the user's interaction with their environment by providing additional information and interactive elements directly tied to physical images.
Launch Your Streaming Platforms in MinutesRoshan Dwivedi
The claim of launching a streaming platform in minutes might be a bit of an exaggeration, but there are services that can significantly streamline the process. Here's a breakdown:
Pros of Speedy Streaming Platform Launch Services:
No coding required: These services often use drag-and-drop interfaces or pre-built templates, eliminating the need for programming knowledge.
Faster setup: Compared to building from scratch, these platforms can get you up and running much quicker.
All-in-one solutions: Many services offer features like content management systems (CMS), video players, and monetization tools, reducing the need for multiple integrations.
Things to Consider:
Limited customization: These platforms may offer less flexibility in design and functionality compared to custom-built solutions.
Scalability: As your audience grows, you might need to upgrade to a more robust platform or encounter limitations with the "quick launch" option.
Features: Carefully evaluate which features are included and if they meet your specific needs (e.g., live streaming, subscription options).
Examples of Services for Launching Streaming Platforms:
Muvi [muvi com]
Uscreen [usencreen tv]
Alternatives to Consider:
Existing Streaming platforms: Platforms like YouTube or Twitch might be suitable for basic streaming needs, though monetization options might be limited.
Custom Development: While more time-consuming, custom development offers the most control and flexibility for your platform.
Overall, launching a streaming platform in minutes might not be entirely realistic, but these services can significantly speed up the process compared to building from scratch. Carefully consider your needs and budget when choosing the best option for you.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppGoogle
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-fusion-buddy-review
AI Fusion Buddy Review: Key Features
✅Create Stunning AI App Suite Fully Powered By Google's Latest AI technology, Gemini
✅Use Gemini to Build high-converting Converting Sales Video Scripts, ad copies, Trending Articles, blogs, etc.100% unique!
✅Create Ultra-HD graphics with a single keyword or phrase that commands 10x eyeballs!
✅Fully automated AI articles bulk generation!
✅Auto-post or schedule stunning AI content across all your accounts at once—WordPress, Facebook, LinkedIn, Blogger, and more.
✅With one keyword or URL, generate complete websites, landing pages, and more…
✅Automatically create & sell AI content, graphics, websites, landing pages, & all that gets you paid non-stop 24*7.
✅Pre-built High-Converting 100+ website Templates and 2000+ graphic templates logos, banners, and thumbnail images in Trending Niches.
✅Say goodbye to wasting time logging into multiple Chat GPT & AI Apps once & for all!
✅Save over $5000 per year and kick out dependency on third parties completely!
✅Brand New App: Not available anywhere else!
✅ Beginner-friendly!
✅ZERO upfront cost or any extra expenses
✅Risk-Free: 30-Day Money-Back Guarantee!
✅Commercial License included!
See My Other Reviews Article:
(1) AI Genie Review: https://sumonreview.com/ai-genie-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
#AIFusionBuddyReview,
#AIFusionBuddyFeatures,
#AIFusionBuddyPricing,
#AIFusionBuddyProsandCons,
#AIFusionBuddyTutorial,
#AIFusionBuddyUserExperience
#AIFusionBuddyforBeginners,
#AIFusionBuddyBenefits,
#AIFusionBuddyComparison,
#AIFusionBuddyInstallation,
#AIFusionBuddyRefundPolicy,
#AIFusionBuddyDemo,
#AIFusionBuddyMaintenanceFees,
#AIFusionBuddyNewbieFriendly,
#WhatIsAIFusionBuddy?,
#HowDoesAIFusionBuddyWorks
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
1. ii
APPROVAL SHEET
IN PARTIAL FULFILLMENT of the requirements for the Degree of Bachelor
of Science in Computer Science, this thesis entitled:
“AUTOMATED CLASSROOM MAGNETIC DOOR LOCK WITH
ATTENDANCE MONITORING SYSTEM USING RADIO FREQUENCY
IDENTIFICATION”
has been presented and submitted by JAMES PAUL S. BERNARDO,
CHRISTOPHER KING D. GARCIA, FEDERICO J. PAGMANOJA III,
MICHAEL F. ROQUE who are hereby recommended for Oral Examination.
ENGR. LOUIE ANGELO G. VILLEGAS MARY JANE B. TUBALADO
Adviser Reader
ACCEPTED as PARTIAL FULFILLMENT of the requirements for the Degree
of Bachelor of Science in Computer Science.
ANGELIE FIEL C. BALLENA, Ed.D
Dean, College of Arts and Sciences and Education
APPROVED, April 19, 2016, by the Panel at the Oral Examination with a grade
of PASSED.
ENGR. ACEL S. MONARES, MSIT
Chairman
MR. JEZRELL L. FULGENCIO, MIT ENGR. KATHRYN N. PURAZO, MSIT
Member Member
2. iii
ABSTRACT
The study was entitled Automated Classroom Magnetic Door Lock with
Attendance Monitoring System Using Radio Frequency Identification was developed to
automate mainly the attendance montoring system of teachers and students of the Notre
Dame of Tacurong College and to provide classroom security and maintenance access.
The main onjective of the study was to developed an Arduino and Visual Studio
2015-based attendance monitoring system which accepts Radio Frequency Identification
Tag data and set of numeric codes for room security password. The Radio Frequency
Identification or RFID enabled the system to capture and record the Lates and Absences
of both teachers and students while the set of numeric codes gave the school personel
access to classrooms to perform security and maintennace without using the RFID tag
and RFID reader. The proposed system provided the following benefits such as fast and
accurate systematic data recording, eliminated attendance roll calls, data security and
maintenace, saved money, time and effort and paper works, eliminated large amount of
papers used, convenience, organised data for reports and printing, as well as it minimized
electric consumption on every classrooms during class breaks. The technologies used in
the proposed system were Microsoft Visual Studio 2015, MsSql 2015 Local Database,
Arduino Uno R3 and Gizduino v.5.0 microporcessors, 16x2 Liquid Crystal Display or
LCD, 600 and 300 - LED Fail Safe Electro-Magnetic Locks, RFID Tag or Card, RFID
Readers and a Desktop Computer. The methodology of the proposed study included the
operational diagram of the proposed system, context and physical data flow diagram,
entity relationship diagram, developmental approach, schedule and timeline, and the
budgetary outlay.
3. iv
After the research project was developed, the result showed that the Automated
Classroom Magnetic Door Lock with Attendance Monitoring System Using Radio
Frequency Identification satisfied the objectives of the study. When it was tested, it
showed that through the attendance monitoring, the accuracy, reliability, convenience and
security satisfied the needs of the teachers and studnents. It was highly recommended that
the system should have a centralized monitoring system control capable to network all
Automated Classroom Magnetic Door Lock with Attendance Monitoring System. should
not be limited to Microsoft Operating System (O.S.) and Visual Studio.net platforms but
should also in other platforms (i.e. Linux, Mac O.S., iOS, Java programming software).
should also provide access to students in viewing their attendance records in aweb
browser or in a mobile application using the Internet. should use two database platforms
to back up all files. should have a power backup generator or device such as
Uninterruptible Power Supply or (UPS) in case of power failure.
4. v
ACKNOWLEDGEMENT
First and foremost, the researchers would like to thank the Almighty Father for
giving then knowledge and wisdom in fulfilling this study. The presence of God really
helped them and never them down despite all the trials, sacrifices and hardships that
encountered. They would also like to extend their gratitude to their Alma Mater, Notre
Dame of Tacurong College for giving us quality education and training.
The researchers would like to thank the following people who helped them and
shared their knowledge for the success of this study. To their Thesis Adviser, Engr. Loiue
Angelo Villegas, MSIT, They would like to express their sincere gratitude for hes support
patience they, motivation, enthusiasm, and immense knowledge shared to them. They
would also like to acknowledge their Thesis Writing Instructress, Mrs. Analiza S.
Henodia, MIT, for imparting her support, guidance, patience and trust during the whole
semester’s. To their grammarian, Mrs. Mary Jane B. Tubalado, for accepting the
responsibility of being the thesis reader and for the worthy suggestion and constructive
criticism that greatly improve this research. To their panelists, we would like to thank our
dear panelists, Engr. Acel S. Monares, MSIT, Engr. Kathryn N. Purazo , MSIT and Mr.
JEZRELL L. FULGENCIO, MIT, for their time and effort, insightful comments and in
checking our work for improvements despite of their busy schedules.
Lastly, They would like to thank dearly their parents, brothers, sisters, relatives
and friends, especially to Mr. Jessie L. Fulgar, Mr. Francis Jason V. Tugade and Mr.
Danilo R. Aquino III, for helping them and sharing them his expertise and great ideas to
finish the Thesis.
The Researchers
5. vi
DEDICATION
This research study is heartily and lovingly dedicated to our beloved parents, Mr.
and Mrs. Pilgriminda S. Bernardo and family, Mrs. Winefreda D. Garcia, Mrs. Jocelyn J.
Pagmanoja and family, Col. Peter F. Roque and Marlyn G. Ferolino who have been the
source of our financial assistance and inspiration. They gave us a lot of patience and
helped us motivate ourselves to research more and dedicate more time in pursuing our
study.
Above all, to our loving and forgiving God who has been the source of all our
strength, knowledge and wisdom in doing this research. Without Him, this study will not
be possible.
6. vii
TABLE OF CONTENTS
Page
APPROVAL SHEET………………………………………………………… ii
ABSTRACT……….………………………………………………….……… iii
ACKNOWLEDGEMENT…………………………………….……………… v
DEDICATION………………………………………………………..……… vi
TABLE OF CONTENTS………………………………………………..…… vii
LIST OF TABLES……………………………………………………………. ix
LIST OF FIGURES…………………………………………………...……… x
APPENDICES………………………………………………………..………. xii
CHAPTER
I. INTRODUCTION……………………………………………. 1
Background of the Study………………………………..……. 1
Objectives of the Study………………………………………. 5
Significance of the Study………………………………….…. 6
Scope and Limitation……………..……………………….…. 8
Definition of Terms………………………………………..…. 10
II. REVIEW OF RELATED LITERATURE…………………… 12
III. TECHNICAL BACKGROUND……………………………... 15
IV. METHODOLOGY….….….….….….….….….….….….…… 30
Operational Diagram…………………………………………. 30
System Analysis……………………………………………… 36
Developmental Approach……………………………….……. 39
7. viii
Schedule and Timeline……………………………….………. 44
Budgetary Outlay…………………………………………….. 45
V. RESULTS AND DISCUSSION…………………………...… 47
VI. CONCLUSION AND RECOMMENDATIONS………….…. 55
Conclusion…………………………………………………… 61
Recommendation…………………………………………..…. 55
REFERENCES…………………………………………………………….… 57
APPENDICES……………………………………………………………..… 58
8. ix
LIST OF TABLES
Table Page
1 Hardware and Software Requirements…………………..…… 40
2 Schedule and Timeline……………………………………….. 44
3 Budgetary Outlay…………………………………………….. 45
4 List of Hardware and Software Tools and Equipment……..… 45
9. x
LIST OF FIGURES
Figure Page
1. Network and System Architecture................................................................ 15
2. Passive RFID Tag (125 KHzMango)............................................................ 17
3. GizDuino 5.0 RFID Reader.......................................................................... 18
4. GizDuino Version 5 w/ATmega328P........................................................... 19
5. 4x4 Universal Keypad.................................................................................. 20
6. Arduino Uno Microcontroller R3................................................................. 20
7. 16x2 Liquid Crystal Display 1602A............................................................. 21
8. Centralized Computer Server (PC).............................................................. 22
9. Visual Studio.net 2015.................................................................................. 22
10. MsSql Local Database 2015....................................................................... 23
11. Ebelco 300/600 – LED Electro Magnetic Lock (Fail-Safe)....................... 24
12. Customized Printed Circuit Board (PCB)................................................... 25
13. Self-Lock Channel 12 volts Relay.............................................................. 26
14. Potentiometer 10kOhm............................................................................... 27
15. Gizduino v.5 and Arduino Uno microcontroller programming languages.. 28
16. Printer.......................................................................................................... 29
17. Operational Diagram of Automated Classroom Magnetic Door Lock with
Attendance Monitoring Systemusing Radio Frequency Identification............. 30
18. Accessing Classroom and Attendance Monitoring using Radio Frequency
Identification..................................................................................................... 32
19. Using Push Button inside the Classroom.................................................... 33
10. xi
20. Overriding the System 4x4 Using Universal Keypad................................. 34
21. Context Data Flow Diagram (Level 0)....................................................... 36
22. Data Flow Diagram (Level 1)..................................................................... 37
23. Entity Relationship Diagram (ERD)........................................................... 38
24. Automated Classroom Magnetic Door Lock with Attendance Monitoring System
using Radio Frequency Identification frequency….….….….….….….….….. 47
25. Algorithm flowchart for teacher attendance monitoring and classroom security access
and entry........................................................................................................... 48
26. Algorithm flowchart for student attendance monitoring............................ 50
27. Algorithm flowchart for security and maintenance personnel
classroom access............................................................................................... 51
28. Database Structure of Automated Classroom Magnetic Door Lock with Attendance
Monitoring System using Radio Frequency Identification............................... 52
29. Miniature prototype simulation model....................................................... 53
11. xii
APPENDICES
Appendix Page
A User’s Manual………………………………………………... 58
B Application Letter for Thesis Adviser……………………….. 75
C Application Letter for Grammarian/Reader………………….. 76
D Application Letter for Preliminary Defense………………….. 77
E Application Letter for Chapters Defense…………………….. 78
F Application Letter for Final Defense………………………… 79
G Proponents’ Profile…………………………………………... 80
H Source Code………………………………………………….. 84