Every academic institution aims outstanding scholastic performance of each and every student enrolled. Not only the schools but also the parents of these students hope to see their sons and daughters to excel in school with flying colors. In order to achieve so, students must attend their classes regularly so that they will be given the utmost standard learning experience. Class takes it to another level, an automated, secured and efficient attendance checking system. There are certain reasons why schools are encouraged to apply this kind of technology. Teachers nowadays are having problems in taking daily attendance of the students, sometimes they forget to take it or they will just simply give the class a blank paper to let them write their names and sign so it will serve their attendance and then later on who knows if that paper will be misplaced. This system will replace the obsolete swipe card system with finger authentication technology that is more reliable and accurate. With this technology, attendance will be recorded faster to the database with just a touch of the thumb.
____________________ is an automated system located on every classroom, equipped with biometric technology and automated SMS software, interfaced with a computer server where the database is then saved.
Statement of the Problem
School instructors have responsibilities inside the classroom towards the students. It is their duty to ensure all the students enrolled in that subject must benefit the lesson that the class is taking up at the moment. But sometimes teachers forgot to take class attendance or misplaced them. That’s why parents can not be guaranteed that the students are inside the school premises because the teachers do not have the data that will support the situation. The main objective of conducting this design is to improve the automated attendance monitoring system in academic institutions and to help the parents of the students to be able to monitor their child whether he/she attended school or has been cutting classes.
The Term Paper on School Management System
... working methods by replacing the existing manual system with the computer-based system. Automation: The School Management System automates each and every activity of the ... details of any particular students, courses, subjects. * Attendance This module is suppose to hold the total number of classes held and the total ...
Hypothesis of the Study
1. Ensures that the daily attendance of the class will be taken and a soft copy will be saved on a database and print a hard copy for the instructor’s documentation. 2. To limit the students from loitering in hallways during class hours. 3. Minimize the tardiness of students in attending classes. 4. Avoid altering school documents that are accessible only by the instructor in authority. 5. Provides parents the chance to monitor the attendance of students. 6. Enables the instructor to inform students if he/she is not going to be able to come in class on time or will be absent. 7. To replace the obsolete and inefficient swipe card technology with the finger print authentication biometric technology. 8. Saves class time for discussion instead of the traditional roll-call of the names of each student.
Theoretical framework of the study
This research is stimulated for the development of the school’s attendance monitoring system, provided with the biometrics technology and automated system. This will help the school authorities to have a permanent and more secured database management in attendance monitoring. A study from Teleron 2000 “Data Acquisition on Class Hour Attendance of the Faculty in Southwestern University” features the same concept as ____________, but his study is focusing only on school staff. Teleron used Barcodes on the staff’s ID that contains the data and the Bar code reader on the other hand reads the bar codes as the staff swipes the IDs. He recommends the use of biometric technology and further enhancement of his study, which convinced the researchers to push through to work with _______________________.
The Research paper on Culture Technology A Case Study
Culture & Technology: A Case Study We live in a time where information is only a mouse-click away for a large portion of the country and the world. Up until ten years ago, people had to go to their local library or purchase an expensive encyclopedia set for their home just to obtain information. Now, information is free and easily accessible from the home. Why pay five hundred dollars for an ...
Biometric devices nowadays are preferable than other authentication technologies such as barcodes and magnetic stripe scanners. This kind of technology is difficult to alter or tampered because it needs a unique pattern for authentication. Amazingly, human finger possesses unique ridges and valleys that differ from one human being from another, even identical twins.
The first advantage of using this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With uniqueness of biometrics technology, each individual’s identification will be single most effective identification for that user. A chance of two users having the same identification in the biometrics security technology system is nearly zero (Tistarelli, 2009).
Significance of the Study
People who will be benefited by this project design favor those in:
TEACHERS
This innovated technology will be able to help the teachers to mark and update student class attendance quickly. He/She can easily print hard copies of the attendance in case of necessity. It will lessen wasted time on roll-calls and teacher can immediately proceed into his/her lecture.
STUDENTS
Our design will be mostly be benefited by the students.
PARENTS/GUARDIANS
The parents will easily track their sons and daughters’ attendance by simply sending the right keyword to the ____________ through Short Message Service (SMS).
They will know at once when the students are really attending the class or cutting classes when the system will reply after they sent the SMS. They can also ask for a hard copy of the attendance, for example: they want the record for the whole month of January; the teacher will look up on the records of that particular student and then print it right away.
The Essay on Information System and Technology Assignment
Furthermore, I also recommend systems that will be appropriate fir the Quickshop. II. Abstract The phrase “technology revolution” has become a bit of a cliche. Everyone agrees that technology has impacted the lives of 21st century people dramatically. Ways of communicating and processing information thought to be impossible a few short year ago commoplace today. No company can long survive in ...
Scope and Delimitation
This design project aims to help the faculty and the entire student body of this institution to promote secure monitoring of the students’ attendance during class hours, and that parents will also be given the chance to know the student’s status first hand with just an SMS away.
Researchers designed the biometric device to be located on every classroom only. Since the device is powered by electricity, a sudden loss of power will interrupt the whole system if there is an on-going entry, where it will take a few minutes for the generator to supply electricity temporarily for the system to resume.
SMS feature of the system is limited only to the parent’s cellular number given to the administration encoded on the database. Other cellular numbers unknown to the database or not recorded can not be entertained by the system. Incase parents want to add or change phone numbers for the system; they have to submit a new form to the administration for approval and re-entry of data.
Definition of Terms
Listed below are the terminologies and the conceptual meaning used in the study.
BIOMETRICS
It is the measurement and analysis of unique physical or behavioral characteristics (as fingerprint or voice patterns) especially as a means of verifying personal identity. (http://www.merriam-webster.com/dictionary/biometrics).
FINGERPRINT SCANNER
Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint. The actual fingerprint identification process will change slightly between products and systems. The basis of identification, however, is nearly the same. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a person’s name or account.
(http://www.webopedia.com/DidYouKnow/Computer_Science/2004/fingerprint.asp
The Essay on Reading College System Management Database
Computer has always been the first choice for my career. I am interested in the systems analysis and design. I want to learn the prevailing concepts as well as enhance them to cop with the changing programming paradigm. I am very much interested in CASE tools, its construction and deployment to provide the software solution to end user as well the intermediate developers in easier and cost ...