Final Docu RFID
Final Docu RFID
APPROVAL SHEET
The following Candidates namely: Biboso, Darwin J., Iraga Jay Christian G.,
Mendoza, Allen Christian D., Mequiz, Glaiza A., have successfully completed the
capstone project entitled “Student Log Monitoring System with SMS Notification using
RFID for CDSP”, there by demonstrating knowledge of the skills needed to contribute to
the scientific advancement of their area of study This is in partial requirements for the
Kim P. Salamat.
Capstone Adviser
ENDORSEMENT SHEET
________________
Date
4
ACKNOWLEDGEMENT
The proponents would like to extend their greatest and deepest appreciation to all
the people behind their success and accomplishment in this project. This capstone project
is made possible through the help of our Almighty Creator and support from everyone,
including their parents who keep on encouraging them to finish the research, their
teachers who guide them through, family and friends for their support for making them
realize that at the end of the day after all the hard works, pain, sleepless nights,
misunderstandings, arguments, downfall and failures, there are reasons to laugh and crack
jokes even at the lowest point of their lives. All their tears and hardships are worth it for
they know that someday all their efforts will pay off.
following significant advisor and professor: First and foremost, they would like to thank
Prof. Kim Salamat for being their adviser, mentor, inspiration and the one who shared his
knowledge, patience and attention for the project. They thank him so much. Second, they
would like to thank Prof. Abigael Fider for reading their paper and offered invaluable
detailed advices on grammar. Third, they would like to thank, Dr. Ma. Luisa R. Padlan to
To the friends of the proponents, Ma. Primera Gerez for borrowing her laptop,
Mico Bernard Fajardo and Jonathan Quebral for staying with them for the support while
developing the project and to Fajardo’s Family who accommodated the proponents at
ABSTRACT
The system entitled Student Log Monitoring System with SMS notification
using RFID for Colegio De San Pedro. The existing traditional requires students to be
manually monitored by the guards at the gate every time they arrived and left the campus.
Collecting students log by using the developed system can help the school to monitor the
student’s activity log inside the campus. Student parents will be notified by sending a
Short Message from the school when the students arrived and left the school. Parents or
guardians is one of the beneficiaries of developed system because they can monitor too
their child even they are not around at the campus. The developed system is using the
collecting data or logs of the students. The developed system can issue a printed report if
necessary.
The developed system platform is web based, the coverage of the system is from
Kinder 1 to Senior High School Students. Guards will monitor the ins and outs of every
student, Admin is in charge of the main functionalities of the system, gathering of data
and information from the students. The last chapter of this paper discussed the setting of
the study, its population and environment where we conducted some tests to identify the
TABLE OF CONTENTS
Preliminaries Page
Acknowledgement---------------------------------------------------------- 4
Abstract---------------------------------------------------------------------- 5
List of Tables--------------------------------------------------------------- 11
Chapter I INTRODUCTION
Introduction ------------------------------------------------------------------ 12
Conceptual Framework------------------------------------------------------- 14
Foreign Literature------------------------------------------------------------- 18
Local Literature---------------------------------------------------------------- 19
Foreign Studies----------------------------------------------------------------- 20
Local Studies------------------------------------------------------------------- 21
Systems Review---------------------------------------------------------------- 22
Synthesis------------------------------------------------------------------------- 25
Planning Phase------------------------------------------------------------------ 28
Analysis Phase------------------------------------------------------------------- 27
Design Phase--------------------------------------------------------------------- 31
Development Phase------------------------------------------------------------- 35
Testing Phase-------------------------------------------------------------------- 36
Implementation Phase---------------------------------------------------------- 36
Test Cases------------------------------------------------------------------------ 51
8
Summary--------------------------------------------------------------------- 58
Conclusion------------------------------------------------------------------- 58
Recommendation------------------------------------------------------------- 59
Bibliography----------------------------------------------------------------- 60
List of Figures--------------------------------------------------------------- 9
List of Tables---------------------------------------------------------------- 11
Appendices
A. Letter of Request
C. Curriculum Vitae
9
LIST OF FIGURES
Page
LIST OF TABLES
Page
Chapter I
INTRODUCTION
Introduction
Identification (RFID) technology. The existing student log monitoring system requires
students to be manually monitored by the guards at the gate every time they arrived and
specially when they are leaving the campus. As common as it seems, such system lacks
of automation, where a number of problems may arise, this include the time
unnecessarily consumed by the students as they are being monitored by the guards and
checked their identification cards with printed schedules. Having a system that can
automatically capture student's log by flashing their student card at the RFID reader can
Daily log of students is one approach of the school to know if the student enter or
leave the school premises. In addition, the paper method required a data entry phase in
order to generate reports, which also suffered from similar problems. Therefore, using
pen and paper was ruled out from the beginning. That is why the proponents have come
up to this project based on RFID, which is being displayed every time students time in
The study will provide a RFID card for the students that they will use every time
they time in and time out of the campus. They will need to tap their card to RFID scanner
and that is provided in order to confirm their identity. With this approach, the admin can
monitor the log of the students without the hassle of manually looking to the log books.
Goals
The main goals of the study will be used to maintain a daily record of a student’s
entering and leaving the campus by automating the recording of date and time of their
entry and exit. The study will greatly contribute in implementing security for the
Objectives
The proponents set the main goal of the study to identify the record of time in and
time out of each student in the campus and provide a notification for their parent/guardian
for complacency purpose and also to provide a fast and effective way of monitoring
student’s presence through RFID Technology and provide a reliable source of students
Student log monitoring system helps to monitor the arrival and departure of each
student in school, it would also help to identify the activity log of each student once they
entering or leaving in the campus and by these it would be a great contribution in terms
14
Student - The RFID Tags in their School ID will help the students to record their daily
Short messaging Service is made for them to know whether their children were entering
Admin - The principal can easily monitor the students log and if there is an incident
report of a missing student, they can easily track and print a report.
Future Researcher – To future researcher this will be serve as basis or reference to the
Conceptual Framework
In this study Figure 1 shows the process of the proposed system “Student Log
Monitoring System with Short Message Service using Radio Frequency Identification for
Colegio De San Pedro”. First, the person-in-charge needs to enter the student information
such as name, student ID, and grade level. The student information will be recorded or
updated with the current records if there is a sudden change in the existing information
for the reliability of the records. Then the system will gather the logs of the students once
they tap their id to the RFID reader when they arrived or exit the campus and the system
will send a short message notification to their perspective parents or guardians to give
15
them track of their pupil. The principal can easily monitor the log of students who entered
Scope
The study provides a student log monitoring with short message using a
technology such as radio frequency identification for the automated log of students in
Colegio de San Pedro and generate a printed report. The study helps guardians/parents to
give them track of their child when they have already arrived and left the campus.
Limitation
In this study, college students, faculty, employee and visitors are not part of the
user and it is limited for elementary to senior high school students, it cannot be used as a
student’s attendance for each subject; it is used only for monitoring the students who
entered and left the school premises. The system is not responsible for the security once
the student’s left the school. The users mentioned above are exempted because they can
free to roam inside and out of the campus. Employees of the school are using a biometric
Definition of Terminologies
For further understanding of the study, the proponents include the technical
terminology and operational terminology that would help the future researchers to fully
Technical Terminology
HTML – (Hyper Text Markup Language) a standardized system for tagging text files to
achieve font, color, graphic, and hyperlink effects on World Wide pages.
automatically identify and track tags attached to objects. The tags contain electronically
stored information.
RS 232A – is a serial port that personal computers used them for connections not only to
modems, but also to printers, mice, data storage, uninterruptible power supplies, and
TTL converter- are a range of USB to serial converter cables which provide
Operational Terminology
Moderator – a person in the first-line who monitors and maintained the system
functionality.
institution.
Admin – a person who is allowed to access the system database and records.
Parents / Guardian- a person who received a SMS Notification from the school.
18
Chapter II
Related Literatures
Foreign
According to Barwuah & Ley (1997), that one of the other participating colleges
gave complete commitment to a swipe card registration system, only to later discontinue
it. In summer 10 the entire college site was wired with readers and through 1990-1991 a
pilot scheme ran on six courses. This was reasonably effective, mainly because everyone
knew it was a pilot and so staff and students were vigilant about rooking it. Full
implementation was introduced in 1999. However, since this was a response to a need for
careful monitoring following financial difficulty it was not a strategically panned process.
The swipe system was relatively primitive: ‘dumb’ readers which simply displayed a red
light when a swipe was done. Cards were very basic Lectures had to swipe two cards to
identify themselves and the module or class they were teaching. Students were required
Nainan & Parekh (2013), found that the implementation of RFID technology has
definitely quickened the entire of process or recording attendance. The traditional method
consuming process. On average, based on experiment the total time taken to record the
19
minutes.
Shinghai (2012), found that a RFID tag type of ID Card make the process of
taking the attendance easier, faster and secure as compared to conventional method.
Students or workers only need to place their ID card on the reader and their attendance
will be taken immediately. With real time clock capability of the system, attendance
taken will be more accurate since the time for the attendance taken will be recorded.
Local
Dellosa & Hemedes (2014), stated that the RFID system involves an RFID tag, an
RFID reader and a database. A reader scans the tag with the use of computer program and
transmits the information to the computer. The captured information will be processed for
transcription increases the quality and speed of data transmission and reception. Presently
the library of Lyceum of the Philippines, Laguna is using a traditional system wherein
students and employees will have to write their names in the log sheet for their
good solution
between parents and school is very challenging and important one. It needs to full effort
20
to understand one another. One of the worries of the parents is that if their children are
Alvarez (2015), found that the project was designed using RFID reader for the
scanning of RFID tags, RS 232 to TTL converter to convert the data coming from the
reader. A visual basic programming software was used for the program and Microsoft
Access for the database. All the readers were connected by a local area network.
Related Studies
Foreign
Patel (2012), stated that recording and monitoring of class attendance is an area of
get the necessary information. This paper presents the integration of ubiquitous
computing systems into classroom for managing the students’ attendance using RFID
attendance throughout the working school day and also enhance classroom security.
RFID technology has been applied to solve problems where it is necessary to take
school/university environment.
21
Olaleye & Olaniyan (2013), found in this study has successfully designed and
developed an enterprise class mass SMS mailing system that support multiple users as
well as multiple SMS gateways, providing a unified interface and common set of features
across many SMS gateways which prevent vendor lock-in as users can choose among
Ahmad & Abbas (2015), found that in this study, they have proposed a push-
attendance of student based on RFID. It is much faster and it has two components i.e.
Local
Morallo (2015), found that this study was developed to create an electronic
attendance and logging system using Radio Frequency Identification (RFID) and Short
Messaging Service (SMS) with a Web-based management system portal that allows user
to access real time data to ensure campus security and smart information management.
The students will use RFID card system to check in and out of the main entrance, to both
track attendance and log time and prevent unauthorized entrance therefore utilize the
RFID technology.
Claro & Libron (2013), found that at this case, they are having problem of
sending their reports on time due to this. It took them two months to submit their reports
to Manila branch. Due to these problems, the proponents were challenged to develop
Galicia & Co (2011), this study aimed to develop a system that would monitor the
vehicle entry to Letran Calamba campus using a Radio Frequency Identification (RFID)
Technology. This project uses a gate barrier that would hinder the entering of vehicles in
the colegio’s vehicle main gate for inspection and verification of RFID card. It opens if
the vehicle owner has a valid RFID card to be read within the reader zone and displays
the vehicle and owner information on the monitor as well as the date and time of the
current log-in.
Systems Review
In figure 2 shows the same process of the study which is the students once tap
their RFID Card into RFID Reader the system will process to displayed their time in/time
out then system will send a message to the guardian of the students to know if their
Link:.http://jmisenet.com/journals/jmise/Vol_5_No_1_June_2018/2.pdf?fbclid=IwAR2_
g4b2xuK5JIu6FXOPuCnBXx78xWvZm6YB2VqkjuzHCfQNsacH37IGgjE
23
In figure 3 shows the output of the study, the system is achieving two aims, the
first objective is to register, record, and manage a student attendance using RFID tag, and
the second aim is to provide student information service such as name, grade level, time-
Link:https://www.researchgate.net/publication/322862382_Attendance_and_Information
_System_Using_RFID_and_Web-Based_Application_for_Academic_Secto
24
Figure 3. Attendance and Information System using RFID and Web-Based Application
In figure 4 shows the process how to input the information of student and to
provide a reliable, secure, and efficient method of tracking the students’ arrival and
departure from school, Through SMS (Short Message Service) it can be easy to notify
their parents or guardians whenever they arrived or left the school premises. This idea
when implemented would also innovate the school in terms of modern technology; the
management can easily access the student’s individual information through their
identification cards, and can monitor their time in and out, to be saved in their individual
records.
Link: - http://docshare01.docshare.tips/files/31412/314128975.pdf?fbclid
25
Synthesis
As stated in the foreign and local literature about in web-based system, the
gathered literary works and studies were carefully checked by the proponents to see its
relevance to the study. The related literature acquired by the proponents aided them in
gaining more information and ideas with relevance to the ongoing development of the
Local and foreign studies helped the proponents to see and proved that the study
was vital to the client’s needs. All the studies gathered shows the probable and possible
benefits and advantages of the proposed system. The proponents learned that automating
the process will greatly enhance record management that will reduce the difficulty of
manual computing, with the use of the RFID technology, monitoring the time-in and
26
time-out of the students will be easy. With the help of an automated system with a
database, achieving the said goals will be easy. Similarly, making the overload
computation in the proposed system automatic will greatly reduce the time it takes to
produce an output. The study also gives great importance to retrieval of records. While
the main focus of the proposed system of the proponents is the attendance monitoring that
will total the number of hours every day or week, other previous studies focused only on
other aspects of the system like record management and monitoring. Other system
provides only information system that will serve as a storage of data for the institution
just to monitor the data. Some system used notification like SMS that helps to
disseminate information. Also, in the system, it will handle the basic information.
27
Chapter III
METHODOLOGY
The proponents will use the System Development Life Cycle (SDLC) such as
produce a high-quality web based that meets or exceeds user expectations, reaches
completion within times. The planning phase is a set of plans to help guide your team
through the execution and closure phases of the project. The analysis phase is part of the
project where you identify the overall direction that the project will take through the
creation of the project strategy documents. The design phase seeks to develop detailed
specifications that emphasize the physical solution to the user’s information technology
needs. The development phase elaborates and builds on the learning objectives and
performance steps that were produces in the design phase by fleshing out all the previous
content that was created in the prior two phases, analysis and design, into a complete
learning environment. The testing phase is where you focus on investigation and
discovery. During the testing phase, developers find out whether their code and
status to production status. The maintenance phase involves making changes to hardware,
Planning Phase
The proponents produced a web-based system using RFID card for students and
conduct a consultation meeting to the advisor for the documentation and development of
the system and from all this information, better understanding of the existing system’s
Analysis Phase
After collecting all the needed requirements from the organization and the hard
time for planning what the system would be. The proponents will spend time for
brainstorming session to get idea on how to start, to create the proposed system.
In this study shows the general overview and interactions of functionalities and
the users, for the Attendance Monitoring System with Short Message Service using Radio
It showcases the different use cases representing the process and their roles which
represent the intended users and system dependency of the web based study.
29
Architectural Design
This figure illustrates the architectural design of the study; this includes
the database model and the modules that are needed in the study.
Notification
Design Phase
Data Dictionary
In this figure 7 described the class table which contains the row_id, u_id, user,
password, role
In this figure 8 described the class table which contains the row_id, rf_id,
In this figure 9 described the class table which contains the row_id, stud_id, rf_id,
fname, mname, lname, bdate, gender, cnum, eadd, addrs, strand, grd_level, section,
In this figure 10 described the class table which contains the row_id, uniq_id,
Database Schema
In this study design phase, the proponents designed the model of the database and
the user-interface that will be used on the study, this phase includes Database schema,
This figure illustrates the attributes of the tables that are going to be used into the
database.
34
Development Phase
In this study, the proponents should be used a MySQL (PhpmyAdmin) for front-
end to back-end.
Programming Languages:
Front-end:
Javascript is used by the proponents to create interactive effects within web browsers.
Ajax is used by the proponents as a technique for creating fast and dynamic web pages.
Back-end:
Ajax is used by the proponents as a technique for creating fast and dynamic web pages.
MySQL application is used by the proponents for a wide-ranging purpose, including data
PHP is a html-embedded web scripting language that is used by the proponents to create
Testing Phase
In this study the proponents have three strategies of testing. First is unit testing,
the proponents will examine on how the system work and they will also observe if there
will be also some possible errors may occur. Second is system testing, if the performance
of the system will be tested based on its objectives and functionalities will distributes as a
system usability. And the last is acceptance testing, the proponents will distribute a
usability survey from the client as well as possible users from them to test the system’s
performance.
Implementation Phase
The system developed from December 2018 to February 2019 and will be
implemented on May 2019 and clarified out where in the user will exercise the system.
Installation of the system to its actual working environment will be done in this phase.
Maintenance Phase
The maintenance of this study will be every 10 months and update and fixed bugs
of the system then conduct tests development in which the proponents can determine
what to development and create a manual process of the application then will update
Chapter IV
The chapter provided the conducted and evaluative result of the corresponding
questionnaires conducted for the application testing evaluation from thirty (30)
respondents, which are administered to fifteen IT Experts and to fifteen Users. The
questionnaires are based on the ISO 9126 standards using the five Software Quality
The proponents used a numerical scale as a tool for the system evaluation as
shown in Table 1. The Scale represents the numerical value while the Interpretation
represents the assessment of the numerical value. 5.00 is the highest rate while 1.00 is the
lowest rate.
Suitability
3.07 Good
Accurateness
3.13 Good
Compliance
2.87 Good
Interoperability
2.87 Good
Security
3.27 Good
Overall weighted
mean 3.04
Good
The Table 2a shows that in terms of Functionality Characteristics (IT Experts) got
From the different criteria, Security got the highest WM of 3.27, next
Suitability
3.27 Good
Accurateness
3.33 Good
Compliance
3.40 Good
Interoperability
3.13 Good
Security
3.47 Good
Overall
From the different criteria, Security got the highest WM of 3.47 next Compliance
Maturity
Good
2.67
Fault Tolerance
Good
2.73
Recoverability
Good
3.20
Overall
The Table 3b shows that in terms of Reliability Characteristics (IT Experts) got an
From the different criteria, Recoverability got the highest WM of 3.20 next Fault
Tolerance with WM of 2.73, Maturity with WM of 2.67 and all with verbal interpretation
as ‘good’.
41
Maturity
Good
2.53
Fault Tolerance
Good
3.40
Recoverability
Very Good
3.53
Overall
From the different criteria, Recoverability got the highest WM of 3.53 next Fault
Tolerance with WM of 3.40, Maturity with WM of 2.53 and all with verbal interpretation
as ‘good’.
42
Understandability
Very Good
3.67
Learnability
Very Good
3.73
Operability
Very Good
3.53
Overall Weighted
Very Good
Mean 3.64
From the different criteria, Learnability got the highest WM of 3.73 next
Understandability with WM of 3.67, Operability with WM of 3.53 and all with verbal
Understandability
3.40
Good
Learnability
Good
3.40
Operability
Very Good
3.60
Overall Weighted
Mean Good
3.47
From the different criteria, Operability got the highest WM of 3.60 next
Understandability and Learnability with WM of 3.40 and all with verbal interpretation as
‘good’.
44
Time Behavior
Good
2.73
Resources
Behavior Good
2.80
Overall
Table 5a: Efficiency Characteristics (IT Experts) got an Overall weighted mean of
From the different criteria, Resources Behavior got the highest WM of 2.80 next
Verbal
Criteria Weighted Mean
Interpretation
Time Behavior
3.60 Very Good
Resources
Behavior Good
3.20
Overall
Table 5a: Efficiency Characteristics (Users) got an Overall weighted mean of 3.40
From the different criteria, Time Behavior got the highest WM of 3.60 or verbal
interpretation as ‘good’.
46
Analyzability
Good
2.93
Changeability
Good
2.93
Stability
Good
3.00
Testability
Good
2.93
Overall
From the different criteria, Stability got the highest WM of 3.00 next
Analyzability, Testability and Changeability with WM of 2.93 and all with verbal
interpretation as ‘good’.
.
47
Analyzability
Good
3.33
Changeability
Good
3.40
Testability
Good
3.24
Stability
Good
3.13
Overall
From the different criteria, Changeability got the highest WM of 3.40 next
Analyzability with WM of 3.33, Testability with WM of 3.24, Stability with 3.13 and all
Adaptability
Good
3.33
Installability
Good
3.40
Conformance
Good
2.80
Replace Ability
Good
2.93
Overall
Table 7a: Portability Characteristics (IT Experts) got an Overall weighted mean of
From the different criteria, Installability got the highest WM of 3.40 next
Adaptability
Very Good
3.53
Installability
3.27 Good
Conformance
3.53 Very Good
Replace Ability
Good
3.30
Overall
Good
Weighted Mean 3.44
From the different criteria, Adaptability and Conformance got the highest WM of
3.53 next Replace Ability with WM of 3.30, Installability with WM of 3.27, and all with
The Table 8 shows the overall total result of the system testing and evaluation
conducted to the fifteen IT Experts and to fifteen User respondents. The IT Expert got an
Overall weighted mean of 3.44 or verbal interpretation as “good”. The User got an
From the different criteria. In the IT Expert Usability got the highest WM of 3.64
with verbal interpretation as “very good” next Portability with WM of 3.18, Functionality
2.87 next Efficiency with WM of 2.77 and all with verbal interpretation as ‘good’.
From the different criteria. In the use Usability got the highest WM of 3.64 with
verbal interpretation as “very good” next Portability with WM of 3.18, Functionality with
51
next Efficiency with WM of 2.77 and all with verbal interpretation as ‘good’.
52
Test Cases
Figure 13 shows the students time-in/time-out when the RFID cards tap on the
RFID reader
Figure 14 shows the log in interface for the moderator and registrar
Figure 15 shows that the field text must be filled in order to log in the system.
Figure 17 shows the overall count of the basic education students, the moderator
can print the current total of the students.
Figure 18 shows where the registrar can add a new student or search for specific
students information.
Figure 19 shows where the registrar can input the information of the student
Figure 20 shows the information of the current information, logs of the student.
The moderator can print the activity log of the student.
Figure 21 shows where the moderator can update or change the SMS notification
Chapter V
SUMMARY, CONCLUSION AND RECOMMENDATION
Summary
After the survey conducted, the proponents got the results on how the IT experts
and User able to access the system based on the different criteria of the survey. The
functionality characteristics Overall weighted mean (WM) 3.04 “good” for IT Experts
while the Overall Weighted Mean (WM) 3.32 “good” for Users. The Reliability
Characteristics Overall Weighted Mean (WM) 2.87 “good” for IT Experts and while the
Users of Reliability Characteristics got Overall Weighted Mean (WM) 3.16 “good”. The
Usability Characteristics got the Overall Weighted Mean (WM) 3.64 “very good” for IT
Experts. While the Overall Weighted Mean (WM) of Users got 3.47 “good “. The
Efficiency Characteristics Overall weighted (WM) 2.77 “good” for the IT Experts while
the Overall Weighted Mean (WM) 3.40 “good” for the Users. The Maintainability
Characteristics Overall Weighted Mean (WM) of IT Experts got 2.95 “good” while the
Users Overall Weighted Mean (WM) got 3.29 “good”. The Portability Characteristics
Overall Weighted Mean (WM) got 3.18 “good “for the IT Experts while the Overall
Weighted Mean (WM) got 3.44 “good” for the Users. The proponents got the total
Weighted Mean of IT Experts and Users, for the IT Experts 3.07 “good” for the Users
3.35 “good”.
Conclusion
The reliability and the maintainability of the system got the lowest mean from the
IT experts based on the results of the survey. The reliability characteristics of the system
got 3.16 (Good) and the maintainability characteristics got 3.29 (Good). The results
showed that the system occur problems and can’t access functionally. The result also
showed that the system can’t easily update can’t easily allow modification and expansion
of the system.
60
Recommendation
For future researchers, the proponents recommend to the study how to include all
the college students to the current system and study how to upgrade the current system to
a future attendance monitoring system because the system is focusing only in student’s
activity log inside the campus. Commented [N1]: This should be based on the conclusion. You
can make 2 for IT and 2 for Users
61
BIBLIOGRAPHY
Adjei Barwuah & Phil Walk ley (1997) Monitoring Students Attendance
Link: https://files.eric.ed.gov/fulltext/ED406548.pdf
Alberto D. Galicia & Auralyn Graciella A. Co (2011), Vehicle Id System Using Radio
Link:https://ejournals.ph/article.php?id=382&fbclid=IwAR2X3i50Z0gGS_qjd2KmTQwEW3q_u
RNA0r7D3uHxrcDNeK2RPyxpDW6q2dE
Dennies Claro & Karen Keith Libron (2013), Records Management Information System
with SMS Notification System
Link:https://ejournals.ph/article.php?id=6114&fbclid=IwAR2uEPfq1SuHEqArCvzWZJuAQ6Bm
aLPdN
F0oMCNTMbXdGItUTNmd6u-Y3uo
Farhan Ahmad & Syed Wasi Abbas (2015),Students Attendance Monitoring System
Base
on RFID and GSM Network
Link:https://mail.google.com/mail/u/0/#inbox/FMfcgxwBVqTdJClrnCLSxtsfVBfpjSnC?projector
=1&messagePartId=0.1
Isaac M. Morallo (2015), Laguna Student Electronic Attendance and Logging System
(LPU-LAGUNA SEALS)
Link: https:/ww.researchgate.net/publication/
Manuel Luis R. Alvarez (2015), RFID Based Employee Attendance Monitoring System
for LSPU SPCC
62
Link:https://mail.google.com/mail/u/0/#inbox/FMfcgxwBVqTdJDtHWSTpWqHDGFMTZMJM?p
rojector=1&messagePartId=0.1
Mojares, Philip Villamin (n.d) Notified: An SMS and RFID- Based iNotification System
of Lipa City Colleges
Link:https://mail.google.com/mail/u/0/#inbox/RdDgqcJHpWcvcDjPmkrjgSdhVZsKQrGCbBcZcJ
GVXMmG?projector=1&messagePartId=0.1
Link: https://studylib.net/doc/8791495/inotified--an-sms-and-rfid-based-notification-system-of-l
Link: http://iosrjen.org/Papers/vol4_issue6%20(part-2)/A04620109.pdf
Rhowel M. Dellosaa & Elino Hemedes (2014) Developing a User Monitoring System for
the LPU-Laguna Library
Link: https://arxiv.org/abs/1306.5381
SumitaNainan & Romin Parekh (2013) RFID Technology based Attendance Management
System
Link:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.3846&rep=rep1&type=pdf+
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.3846&rep=rep1&type=pdf+