Tuesday, March 12, 2019

Id System with Sms

Don Honorio Ventura Technological State University Computer nurture Program Bacolor Pampanga ID ashes with SMS A Thesis Presented to the faculty of Computer facts of life Program In Partial Fulfillment of the requirements for the degree of Bachelor of scholarship in Information Technology Presented by Julie Ann Alvarado Paula Pamela Candole Georgette Nicole Cunanan Shiela Mae Gamboa September 2012 Chapter 1 Problems and its Settings 1. submission Nowadays, in modern society, human productiveness was make efficient by the development of electronic gadgets.Now, with the advent of modern education, one way to globalize the summons of recordings is to realize that the technology is incredibly fast. Computers were not confined for amusement but made for education. And quit us to gather selective information in a quick and accurate manner. A School I. D organisation with SMS is apply to verify the identity of a student in a campus. The information is stored in a database. An I. D outline is mobile identifying the somebodys full name, address, course and section and often containing a photograph. slightly checks fall in been using I.D System but many are nonetheless using manual organization like in MACCIM ROYAL honorary society in SAN JUAN LUBAO. This Manual System is time consuming and lost of records. This process is burden for the student and especially for their t to each oneers. The proponents aim to improve the existing remains and provide a better way of dealing with the closely with the most common line of haves in instills. The proposed I. D SYSTEM use SMS TECHNOLOGY. 2. Background of the write up Students I. Ds are a good way to amplification the campus surety. The project gate entry used I.D carcass has provided benefits to the events have made security system for educational institutions. From the smallest charter school to the largest university, all concerned nigh running an efficient, low cost security solution that p rovides safety for its students. 3. disputation of the Problem The proponents of the use up have investigated the topic I. D SYSTEM USING SMS TECHNOLOGY. In order to seek the solution and answer to the difficuilties encountered by the teachers and parents too. The MACCIM ROYAL ACCADEMY is using a manual system.Teachers used a recording book that serves as the records for their attending of their student and it may cause a hard time because of one by one checking and writing the attention of their students that eject likewise cause of waste of time. Listed below are the hassles that the proponents have encountered in using Manual System. 1. 3. 1 GENERAL PROBLEMS The general problem of MACCIM ROYAL ACCADEMY is that all school and teachers encountered is loosing their records of their students attending that causes problem to the grades of their students.And most of all is the time extra they do because of their manual system checking. 1. 3. 3 Specific Problem Large bite of students and increase yearly. The wasted time in writing or checking attendance of their students. Less security for the students and records of the school. 4. Objectives of the Study Today parents expect and demand a lot more(prenominal) from their kidrens schools. They want to be informed everything going on in the school so that they can make their own judgment close to what is best for their children.Naturally, there is ambivalence on the part of the school officials some what kind of communication is necessary or appropriate. School officials want unresolved and positive communication lines with their childrens parents, but they want parental deliver for their policies and educational philosophy. Very often principals and teachers feel that parents demands are excessive and unreason equal, and that the parents do not fully appreciate the difficulties with which the school officials are struggling. Research shows that children do better in school when parents talk often with teachers and become knobbed in the school.There are number of ways that parents and teachers can communicate with each other, rather than relying on the scheduled parent-teacher conferences. Close communications betwixt parents and teachers can help the student. The proposed system leave alone help the MACCIM ROYAL ACCADEMY to make their work faster and accurate. The proposed system will use Biometric scanner and Bar coded I. D to prevent unauthorized use of the system. The system will also used SMS Technology to emit due notification to remind their parents or guardians that their child surely went to school.Because of this system parents are updated about their child or children in school. It serves more security for the school and students. 1. General Objectives To developed an I. D system using SMS Technology for MACCIM ROYAL ACCADEMY and also for the parents whos concerned. 2. Specific Objectives In order to achieve the general objective, this study would seek the foll owing ad hoc objectives More security for the students and schools documents. Checking of attendance is easier. Classes start early. Parents are updated about their children. 5. SCOPES AND LIMITATIONSAs with any studies, there are scopes and limitations that cover the proposed system. This chapter gives detailed information on the scopes and limitations of the proposed system. 1. SCOPES The scopes of the proposed system are to create a I. D System Using Short Message Service (SMS). With these, it helps the teachers lessens their work in checking the attendance of their student for parents, it help them to know whether their child is truly went to school or not with the help of the system that be open to sent them a defraud mental object saying that their child really went to school.The system is able to check the students attendance whenever they enter the gate of the school with the help of their Bar Coded I. D and the system will automatically send a short pass on to the g uardians contact number that will be seeing in the students I. D that will be registered in the main server. 2. LIMITATIONS The limitations of the proposed system are as follows The system relies on electricity not unless there is a generator at hand. The system cannot send a message to a single person. Simple txt message only. There is no scope for any graphics or audio. The message that they will receive will only have the information about the attendance of the student and nothing more. 6. SIGNIFICANCE OF THE STUDY The proposed study will summate implication to divergent people and with the academy in these categories economical, educational, social, and technological. 1. 6. 1 EDUCATIONAL SIGNIFICANCE The study is considerable to the research because they will clear some noesis about developing SMS based system. The result of the study could also benefit the school as the system contributes to the accumulation of knowledge about the use of technology.The system will be a deduction as one of the goals of the school and that is the quality education innovation. 1. 6. 2 technological SIGNIFICANCE This system will be momentous milestone for the school as this pioneering undertaking. With the researchers, the study is important because it will extend their knowledge on the rapid rising of technology. In addition, in finishing this study, they will be able to develop possible enhancement in SMS based system on the users needs. 1. 6. 3 SOCIAL SIGNIFICANCE In creating the system, the proponents were able to build up communication skills.They learned to deal with different people to achieve the desired information needed for the completion of the study. family was increased between the proponents, to give forth-good results and success to the study. The system will allow the parents and the school administrator to communicate with one another through short message service (SMS). Getting parents involved about their childrens attendance in school is one way of ensuring the proper guidance is extend and given. 1. 6. 4 ECONOMICAL SIGNIFICANCE With the system to be implemented, It shall greatly contribute to uplift the school image as a prime junior-grade school.It can be a good marketing tool to imbibe more parents to enroll their children in MACCIM ROYAL ACADEMY. Researchers will be able to maximize their time, resources and efforts in developing the said study. 7. Definition of Terms accession Control Facility A set of computer programs from Computer Associates that enable security on mainframes, with ACF prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral contagion of files. With ACF, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged.Barcode An opticalmachine-readablerepresentation of data relating to the object to which it is attached Originally barcodes represented data by change the widths and spacings of parallel lin es, and may be referred to as linear or one-dimensional (1D). Barcodes originally were scanned by specialoptical scannerscalled barcode readers later, scanners and instructive parcel became available on devices includingdesktop printersandsmart phones. Wireless profit Refers to any type ofcomputer networkthat is not connected by cables of any kind.It is a method by which homes, telecoms networksand enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Electronics Deals withelectrical circuitsthat involveactive electrical componentssuch asvacuum tubes,transistors,diodesandintegrated circuits, and associated passive interconnection technologies. Thenonlinearbehavior of active components and their ability to control electron flows makes amplification of weak signals possible and is usually applied toinformationandsignal processing. find Administrator A person who manages a local battlefield communications network (LAN) or wide area network (WAN) for an organization. Responsibilities include network security, installing new hardware and applications, supervise software upgrades and daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups, not to mention ensuring that it is up and running all the time. Biometric Comprises methods for unambiguously recognizing humans based upon one or more intrinsic carnal or behavioral traits.In computer science, in particular, biometric is used as a form of identity access management based and access control. It is also used to identify individuals in groups that are under surveillance. Level of Access Users can view and edit any part of your account or a system. Whats unique about levels of access users is that they can enable and disable access for other users. Computer Software A general stipulation used to describe a collection of computer programs, p rocedure and certificate that perform some task on a computer system. This terminus includes application software such as word processor which performs productivity tasks for users.Database A collection of data or file of information in a form accessible by computer or indexed in machine readable form. In a sense, a database is a computerized depository library in which individual records can be retrieved. Hardware It is the bodily components of a computer system, in the form of computer hardware. Computer hardware is the physical part of a computer, including the digital circuitry, as distinguished from the computer software that executes within the hardware. Registered Jack (RJ45) It is a standardized physical interface for connecting telecommunication equipment (commonly, a telephone jack) or computer network equipment.

No comments:

Post a Comment