Attendance Monitoring System Thesis Documentation |Chapter 2
As a continuation of the previous chapter, Chapter 2 will discuss the background of the study and review literatures related of Attendance Monitoring System.
In this Attendance Monitoring System Thesis Chapter 2, you will discuss critical studies and systems citing similarities and differences which you aim to improve.
Steps in creating Chapter 2
How to write Attendance Monitoring System Thesis Chapter 2
- Background of the Study
You will discuss the problem of your target client and their background. In this part, you can state the difficulties of using a manual system.
- Related System
You will cite different SYSTEMS that is similar to your study and state significant parts of it that can be applied to your thesis.
Background of the Study
Raymundo T. Tongson National High School Suay Extension (formerly known as Vicente B. Figueroa National High School, in honor of the lot donor) is an annex school of Raymundo T. Tongson National High School, Talaban, Himamaylan City. It is located in Purok RD, Barangay Su-ay, Himamaylan City, Negros Occidental with lot area of more or less 3,000 square meters with a total enrolment of 350 students from Grade 7 to Grade 10. The school has 12 teaching staff including the Teacher-In charge as the school head. It is a secondary school under the Department of Education Funded by the National Government.
The RTTNHS Su-ay Extension uses a manual transaction such as enrollment, attendance and library management. This problem is very common to some schools especially in some areas that are far located in the city. Nowadays, the students’ population is rapidly increasing and this is a big problem for the schools to have a manual transaction and operation.
Activity Diagram for Course Registration System | UML
In order to give a solution to this problem, developing a computerized and automated transaction is a great solution for the schools. This will benefit not only the school but also the students, teachers, and staff that will make the work more reliable and economical.
Fingerprint-based Attendance Monitoring System
Monitoring student attendance in the UK has become a verdure concern for Universities in recent months, due to a perceived lack of accuracy in reports submitted to the UK Borders Agency and political burden about broad immigration issues. This project proposes a biometric-based solution to that interest which also adapt to legislative pressures on data governance and information security, but which can grant precise, decent data for the institution to use in future reports to UKBA All biometric techniques obviate to need to carry a token or card, or to remember several passwords, and reduce the risk of lost, forgotten or copied passwords, robbed tokens or over the shoulder intrusion, This project shall focus on using fingerprint recognition, mainly due to the low-cost of devices for deployment and high user compliance.
Fingerprint recognition has commonly used for data access amongst a mobile community with increasingly portable devices, but it can also be employed for observation purposes, and this project characterized by how it could be used in this context to provide a fingerprint-based student attendance register. (C.O, Akinduyite, et al, 2013)
Daily Time Record System
Modern technology is a part of our daily life. It helps individuals and industries perform their tasks and daily routines, including their transactions. Modern technology gives an advantage in attaining our work. This technology consists of devices and information systems that help us attain faster and reliable transactions. Each system lessens the load in personnel and paperwork of the management.
Today, organizations and other establishments rely on computers as the basis of their Database Management System. Computer technology brought significant and various effects in all forms of human life such as helping people do their job faster, accurate and efficient. But the fact is, in today’s modern age where computer has become a way of life, it is obvious that a bulk of country institutions still do not accommodate the high technology. Some of them prefer a manual because not all companies are computer literate in terms of programming software for the Time-In and Time-Out Records of their employees. What they did not know is that being manually operated leads to inaccurate information. The EASTERN Tanay Supermarket in Tanay, Rizal is a company wherein they do execute manual for keeping the daily time record of their employees. When it comes to paper works, the establishment works in manual operation like writing the employees’ information and the Time-In, Time-Out operation in a blue record book and then put it in file cabinets along with other forms such as planning records, events, leave assistance and more. The punctuality Employees of EASTERN Supermarket recorded in a Daily Time Record that is being confirmed at the end of the day. These are the few things that EASTERN confronted in their daily work. In addition, depending on the manual procedure is not an easy work for them. Because of having a lot of information, at times it points to incorrect input of employee records, unreliable and most especially, not secures confidential files. (Sharina Joy, Daily Time Record System, 2013)
Attendance Monitoring System
The computerized Students monitoring system that researchers developed is definitely for ID and Student’s verification only. The main objective of our system is to check whether the student has an authorized ID or a falsified one and to verify whether the student is properly enrolled in the school. The application of the RFID Matrix card system as a boarding student monitoring system was suggested to improve the management system and to monitor the activity group movement. The unique RFID tags enable management to path the student’s movement in and out of the campus. A particular without RFID card will generate the alarm and this will notify school administration about the availability of using an online monitoring system. This system used the main component of the RFID system, database management system, and wireless networking.
RFID tag passes through the RFID reader in a read range zone, the system recorded data from the RFID tag to the database. Data sent online to the management for the supervision of the students. At some point, we noticed that the registration must be covered as well. The main reason why is that there are some records to be considered with regards to the student’s important records in the registration files like the situation of a student in their school. All in all, we can say that this system is more efficient and less time consuming for the school to identify whether the student is officially enrolled and has an authorized school ID. (Joyce Erika Salud, Attendance Monitoring, 2013)
Barcode Attendance Monitoring System
Monitoring is one of the great responsibilities of a teacher. This includes teaching lessons to his/her students, writing lesson plans, and recording the achievement of the students. Teachers have a lot of things to do in their daily routine, due to this daily task, they consume much time in doing paper works and preparing some devices as they are required to perform because they operate these tasks manually. The researchers will build an automated attendance monitoring system for students using a barcode reader. Using the barcode reader, the teacher will have a connection to the profile of each student, which will be identified by reading his or her identification card. At the same time, this system will send a message to the parents to notify them that their child is within the school-bound. Since the students will just put their ID’s direct to the barcode reader, the teacher will have no more rush in monitoring the attendance of his/her students. Furthermore, the school can assure the security of their students because it will recognize the attendance of each student. The parents are also guaranteed the presence of their children in school. There is a need to develop a new system because of the grievance of most of the teachers about their daily tasks. The new system will provide a simple process for the teachers in monitoring the students and in alerting the parents through SMS. Therefore, the number of tasks to be done by teachers will be lessened. (Alvin Johnson, 2015)
A computer security risk is any event or action that could cause loss of or damage to computer hardware, software, data, information, or processing capability. Some breaches to computer security are accidental, others are planned imposition. Some infiltrators do no damage; they merely access data, information or programs on the computer before logging off. Other infiltrators indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data. Computer systems are vulnerable to many threats which can expose various types of damage resulting in significant losses. Damage can range from minor errors that SAP database integrity to fires which destroy entire computer centers. Losses can stem from the actions of supposedly trusted employees deceive the system to outside hackers roaming freely through the Internet. The exact amount of computer-related losses is impenetrable; many losses are never discovered and others are covered up to avoid adverse publicity. (Rachelle Lucaña, 2012)
Now that you have read through the sample review of related literature of attendance monitoring system documentation, you are now ready to take the next Attendance Monitoring System Documentation chapter!
This attendance monitoring system documentation chapter 2 is free to modify. Surely, this guide will help you finish your own attendance monitoring system documentation.
Related Articles that you may like:
- Sales and Inventory System Documentation Chapter 1
- Attendance System Using RFID
- Attendance Monitoring System in VB.NET
- Thesis Title Proposal Students 2019
- Chapter 2 in Thesis Writing
Click here for Chapter 1 and click here for more thesis project ideas.