100% found this document useful (1 vote)
354 views

SMART Clock and Watch: An Arduino-Based Security System

Technology is the application of scientific knowledge for practical purposes like in industry and engineering to invent useful thing or to solve problems from the simplest one to the most complex. It is the purposeful utilization, designing and production of goods, tools, techniques and systems in making human life a lot easier and better. It also makes the impossible look possible and in today's dynamic world, the importance of technology in all aspects of the daily lives of mankind is truly tr

Uploaded by

Jake D La Madrid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
354 views

SMART Clock and Watch: An Arduino-Based Security System

Technology is the application of scientific knowledge for practical purposes like in industry and engineering to invent useful thing or to solve problems from the simplest one to the most complex. It is the purposeful utilization, designing and production of goods, tools, techniques and systems in making human life a lot easier and better. It also makes the impossible look possible and in today's dynamic world, the importance of technology in all aspects of the daily lives of mankind is truly tr

Uploaded by

Jake D La Madrid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 87

CHAPTER I

THE PROBLEM AND ITS BACKGROUND

Introduction

Technology is the application of scientific knowledge for practical purposes like in industry

and engineering to invent useful thing or to solve problems from the simplest one to the most

complex. It is the purposeful utilization, designing and production of goods, tools, techniques and

systems in making human life a lot easier and better. It also makes the impossible look possible

and in today's dynamic world, the importance of technology in all aspects of the daily lives of

mankind is truly tremendous and is manifested.

During the past decades, technology has become a tool to rely on for most people and

through all these years, it has been proven that life would become harder, senseless or

meaningless, and even boring without its existence. The results of the fast rise of technologies are

being observed in the present day innovations in its various fields; in the health industry where it

became and is continually becoming a great use through the continuous creation of modern

electronic equipment and also in the communication across the globe where it had been the

foundation of the invention and use of the internet. Indeed, innovations, from pioneering inventions

to bold scientific and medical advancements, changed and are constantly changing the course of

human history.

Furthermore, due to the abrupt change and development of our technology, different

electronic devices have been produced continuously. From the wired telephones, to wireless and

handy ones and now phones that on first glance are just typical fashion watches but when

assessed, are tools that can be used to communicate and more importantly as a monitoring help.

This device is known as Smart Watch. On some innovative countries, smart watches have been

1
used to monitor heart beat rates, epileptic attacks and other health conditions.

Here in the Philippines, one of the fields that was and is affected greatly by technology is

the field of education. The process of teaching and learning has been changed. From that of

manila papered visual aids to the projected ones and from paper and pencil examinations to

computerized tasks. One proof of these changes is the Department of Information and

Communications Technology (DICT) Cabagan, Isabela which was first introduced by the Isabela

State University Cabagan Campus through the help of the ISU-GMAP in the SY 2001-2002. It is a

department that aims to respond to the growing demands of IT education for globalization and

thus, students aspiring to become experts in the field of any computer related courses would

always consider this department. With this fact, computer laboratories were established in order to

fully educate its students in the upgrading world. But despite of this objective and the strict

implementation of rules in these laboratories, complaints of the faculty-in-charge of these

laboratories due to loss of components are still unending through its 13 years of existence.

On the other hand, last February 25, 2005 a fire eliminated the Administration building of

the campus which could have possibly caused by faulty electrical wiring. This fire resulted to the

loss of assets like the computer laboratory of the campus, Conference rooms, Personnel and

Records Office, Executive Officer’s Office and most importantly, the records of students which is

the lifeblood of the registrar’s office were all lost. But all of these could have been stopped or

avoided if there was a tool developed by employees or even students of a specific course offered

in the university that informed the personnel about this fire.

Among the different programs offered in the in the Isabela State University - Cabagan

Campus, specifically on DICT, is the degree Bachelor of Science in Computer Engineering which

2
involves software and hardware aspects of the computation of the design of personal computers,

supercomputers, microprocessor, and microcontrollers to circuit design. One of the aids in

accomplishing this task is the Arduino. Arduino is a software and hardware company, project and

user community that designs and manufactures microcontroller based kits aiming to provide a low

cost, easy way for tyros and professionals to create devices that can interact with the environment

using sensors and actuators.

One of the commonly used sensors by industries, businesses and companies is the Radio

Frequency Identification (RFID) technology. It is the equivalent of using barcodes years ago. It

uses electromagnetic fields to identify and track tags which contain electrically stored information

attached to object automatically. It can be attached to cash, clothing and possessions. Likewise, it

can be affixed to computer equipment, books, mobile phones, etc. and even if tags are covered by

an object or not visible, the tags can still be read if passed near the reader. Withal, thermostats are

sensors used in monitoring temperatures. It is the fundamental device in the fire alarms and other

devices that involve temperature monitoring.

Furthermore, along with these different sensors, many alarm and security systems have

been emerging in markets. One of the most eye capturing inventions is the idea of making different

automations into an SMS based device wherein GSM (Global System for Mobile) are being used to

send notifications to users or for the device to receive commands from the users.

With these facts, the researchers therefore addressed the problems described beforehand

by maximizing the use of these different innovations though interfacing RFID technology, GSM

module and temperature sensor with the Arduino Uno microcontroller in the improvement of the

security of the computer laboratories in the DICT and to lessen or even eliminate the problems of

3
losing lab components and the possible fire.

The study focused on the development of an electronic device, Security System using

Mobile Global System or GSM, Arduino Uno Microcontroller, RFID Technology and Temperature

Sensor (SMART) Clock and Watch which tend to act as a Security System that could elevate the

management of the laboratories through a handy and smart device that could be a source of

protection.

Statement of Objectives

The general objective of the study is to develop a security system that uses the Arduino

Uno microcontroller to address the security-related problem in the computer laboratories of the

DICT.

Specifically, it aimed to:

1. Develop a SMART clock and watch that provides the following:

a. Fire alarm system and indicator which consists of:

 An LM35 temperature sensor

 LED light and

 A piezzo buzzer

b. RFID module for monitoring the DICT computer laboratory’s components

which consists of:

 A 902-925 MHz UHF Desktop RFID reader and

 902-925 MHz Windshield RFID Tags.

c. and an automatic SMS notification systemusing a

 SIM900a GSM Module.

4
2. Determine the perception of the faculty and students regarding the use of the

SMART Clock and Watch according to:

a. Functionality;

b. Usability; and

c. Reliability.

Scope and Limitations

This study entitled “SMART Clock and Watch: An Arduino-Based Security System” is a

security system that provides a monitoring system on one of the five computer laboratories of the

Department of Information and Communications Technology (DICT) Catabayungan, Cabagan,

Isabela. It inhibits a fire alarm system, an RFID-based security system and a SIM900a GSM

module that could send SMS notifications and receive commands, specifically the OFF command.

RFID tags were attached to several components of one of the five computer laboratories of

the department, specifically those that were usually stolen like the mouse. On the other hand, an

RFID reader, temperature sensor and a GSM modem was embedded in a typical wall clock. The

clock was programmed using the Arduino Uno Microcontroller as the controlling process. It was put

at the top part of the computer laboratory door and will alarm if there is a possible fire or a

component is brought out of the computer laboratory. Once the clock alarmed, the GSM module

sends an SMS notification to the Smart Watch assigned to the scheduled faculty in which the

module can also receive an SMS OFF command to turn off the alarm system which can be sent

through the Smart Watch or any authorized faculty.

The intended respondents or users of the system were five faculty scheduled to use the

5
assessed laboratory, which is the computer engineering computer laboratory on the testing and

implementation period of the study respectively.

The reading range of the RFID reader used in this project is limited to 6m in diameter.

Once the RFID tags were removed from the components in which they were attached to, the

system will no longer be able to monitor them. The developed device can only send SMS

notifications to one specified number as long as it has a SIM load. The device can likewise receive

a message from the user who wants to turn off the device alarm. The approximate number of SMS

the smart watch can receive is 30 messages so deleting previous text messages is needed to be

able to receive messages again. For security reasons, only authorized faculty will have the

privilege to know the SIM contact number of the device. Furthermore, the system will not work if

there is no direct power supply.

6
CHAPTER II

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter discusses different researches of experts and graduate students of the same

field which have a significant relation to the design project. This chapter also presents the research

gaps between the existing security system and the researchers’ design.

Security Devices and Technologies

On the continuous upgrade of technology, different security devices and technologies have

been introduced to humans with the aim of making human life easier and better. Among these

security devices and technologies are the Radio Frequency Identification (RFID) technology,

thermostats, Global System for Mobile (GSM) communication, Arduino Uno Microcontroller and the

latest Smart Watch.

Hamid (2006) stated that Radio Frequency Identification (RFID) is one of today’s

Automatic Identification Data Collection (AIDC) industry segments that are most rapidly growing. It

is a technology that is able to work under harsh environment and reads from long distance.

Mahyidin (2008) added that it is a new technology that is based from barcodes in the early times. It

integrates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the

electromagnetic spectrum to uniquely identify an object, animal, or person. The typical RFID

system consists of three components: an antenna and transceiver (often combined into one

reader) and a transponder (the tag). The antenna uses radio frequency waves to transmit a signal

that activates the transponder. When activated, the tag transmits data back to the antenna. RFID

can read the tag using RF, meaning that the RFID reader can be read from a distance, right

through your clothes, wallet, backpack or purse.

7
Arulogun, et al (2013) mentioned that RFID is not actually a new technology; it only quickly

gained more attention recently because of its current low cost and advances in other computing

fields that open up more application areas. They added that RFID combines radio frequency and

microchip technologies to create a smart system that can be used to identify, monitor, secure and

do object inventory.

Furthermore, according to Borriello (2005), it is an emerging technology that uses wireless

radio to identify objects from a distance without requiring a line of sight or physical contact. MITIP

(2006) supported Borriello’s statement by saying RFID is a technology that gathers and captures

data about a certain item without the need of touching or seeing the data carrier, through the use of

inductive coupling or electromagnetic waves. Domingo, et al (2008) added that RFID Reader

Module, are also called as interrogators. They convert radio waves returned from the RFID tag into

a form that can be passed on to Controllers, which can make use of it. RFID tags and readers have

to be tuned to the same frequency in order to communicate. RFID systems use many different

frequencies, but the most common and widely used Reader frequency is 125 KHz.

All these related statements therefore agree to Want (2006) words that RFID’s potential

benefits are large and can have many novel applications in the future even applications that we

can’t even begin to imagine.

Another device use for security systems specifically in fire alarm systems is the thermostat

sensors. Thermostats are defined by Jackson Systems, LLC (2011) as the key component of any

HVAC system that can maintain the space temperature by cycling the heating or cooling equipment

on and off to maintain a desired temperature or set point. According to Aragon, Meier, Peffer, Perry

and Pritoni(2011), the basic functions of the typical thermostat over the past sixty years is to set a

8
target temperature, see the current temperature, and control the equipment accordingly and the

second-and expanding-role is to save energy. Thermostats play a vital role in both providing

comfort to people in their homes and controlling the most energy intensive systems in the home-

heating and cooling

On the other hand, communication means between human and devices was also

innovated by the use of GSM modem. NevonProjects (2015) and Ramani et al. (2013) agrees

when they define Global System for Mobile Communication (GSM) modem as a specialized type of

system which accepts a SIM card to connect to cell phone networks for data passing. Alcantara,

Lagula, Latina and Te (2013) supported this concept when they said that GSM is a wireless

communication not only between people alone but people to devices also. This system poses a

great advantage and convenience to the public when it is interfaced with different sensors and

functions even if a user is not physically present in the vicinity of the device.

The Arduino Uno Microcontroller is another device that was used in this study. According

to Rozilan (2012), it is an open-source physical computing platform and a development

environment for writing software on the board that can be a tool for making systems that can sense

and control more of the physical world than the desktop alone.

Lastly, the Oxford University Press (2014) gave a definite definition of Smart Watch when

they define it as a mobile device with a touch screen display designed to be worn on the wrist. The

main benefit of a smart watch is to keep the user constantly updated without having a whip on their

smart phones.

9
Impact of Security Systems on Schools and Universities

Generally, technology is constantly changing the course of human history. As the

International Peace Institute (2016) stated, new technology is and truly is driving rapid global

change in which changes created new opportunities for multilateral cooperation in the area of

sustainable development, relations between the state and the society, peace and conflict, global

governance and mostly on the international security. Security technologies had greatly affected the

lives of mankind with its continuous innovation. Among the different fields of our community, one of

the fields that were affected obviously is the field of education, specifically the medium of security

in different schools and universities.

Safe and nurturing environments are the necessary foundation for education specifically

not only on the students but to the educators as well. Unique challenges have been faced by

different schools, universities and educational institutions. Different security providing innovations

have also entered this field.

On the assessment of the National Center for Education Statistics (2014), it was found out

that schools use a variety of practices and procedures to promote the safety of students, faculty,

and staff. Certain practices, such as locking or monitoring doors and gates, are intended to limit or

control access to school campuses, while others, such as the use of metal detectors and security

cameras, are intended to monitor or restrict students' and visitors' behavior on campus. In the

2013–14 school year, 93 percent of public schools reported that they controlled access to school

buildings by locking or monitoring doors during school hours.

10
Existing Security Systems

Different security systems have emerged the community and are continuously dominating

the processes in different fields of human life. Among these security systems is the study by RFID

based Security System at Cagayan State University by Harry Domingo, et.al (2008) which is a

system that was based on Radio Frequency Identification (RFID) technology and consists of a

passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic

field generated by the base station, gathers information about the Tag ID and sends this

information to the base station. The base station receives, decodes and checks the information

available in its Database and Manchester code was used to send that information. The system

performed as desired with a 10cm diameter antenna attached to the transponder. The base station

is built by using the popular 8051 family microcontroller. It gets the tag ID and if the tag ID is stored

in its memory then the microcontroller will allow the person inside.

This security system presents the idea of using RFID technology in gathering and sending

Tag ID information which the researchers incorporated in the design project. On the other hand, it

was identified that the above stated system possesses the weakness of a minimum range of

coverage area. Meaning, the system gathers and sends data only in the specified locale of the

system, nothing more.

Among the related studies also are the CKSM Student Attendance Monitoring System with

RFID Technology by Espiritu, Oro, and Pura (2016), the PUP Student Monitoring Using RFID with

SMS Advisory by Rommel Del Rosario and the RFID Based Automatic Attendance System in

Educational Institutions of Nigeria by Boyinbode and Olanipekun(2015). These studies used

Arduino Uno Microcontroller interfaced with the RFID technology and the GSM modem to monitor

the arrival and departure of students who holds the RFID tags/cards which was detected by the

11
RFID reader and then registers the information in a database which eradicates the deficiencies or

difficulties in the manual attendance monitoring system. The information registered was sent

through GSM modem to the students’ parents as the additional features of these studies.

The similarity of these studies to the design project is the use of the Arduino

Microcontroller, the RFID technology and the GSM modem in the monitoring system and the

providing of detailed references on the functionality of the different devices used. The researchers

adapted the use of these security devices in reading tags through the RFID readers and sending

and receiving notifications and commands through the GSM modem. Yet, the researchers have

seen that the weakness of these related literatures is that the cards/tags of each student can be

swiped or used by another student.

On the other hand, the study of Mbaka (2009) entitled RFID Based Electronic Equipment

Anti-Theft System is a system which checks and verifies the ownership of such devices when the

person enters or leaves a given premises. An RFID chip is embedded both on the intended devices

and the owners Identification Card. A database is created for storing the details of ownership and

used in the verification process. The RFID reader polls both tags and verifies such information as

per the database and activates a buzzer when a conflict occurs.

The researchers adapted the equipment anti-theft system because it was related to the

prime objective of the proposed design project which was to lessen or eliminate the loss of DICT

computer laboratory’s components. But the observed weakness of this study is one’s Identification

Card can be swapped with another person’s ID making it still possible for a thief to steal devices.

The studies entitled RFID Based Library Management System of AMA Computer College

Santiago Campus by Alejo et al. (2012), the Book Monitoring System with Real-Time Inventory

12
Using RFID Technology by Barbieto et al (2007) and the Library Management System Using RFID

by Viernes, Pasinos and Ventura (2012) are other type of developed systems which are RFID-

based library management system. These studies aimed to provide automated library system by

the use of RFID technology. Also, the aim to help librarians solve the problem in the time

consuming search, inventory, monitoring and supervising of books in libraries by applying program

that incorporates RFID reader with high-frequency tags attached in books. The books and other

reading materials were tagged in which all the information is stored in database with unique

identification.

These studies were identified by the researchers as one of the most related studies due to

the fact that it used RFID technology for the library management system which the researchers

adapted and implemented as a computer laboratory system. The weakness of these studies was

the instance wherein the librarian is physically absent in the vicinity or doing some other stuffs

outside the library or at a far distant from the library. In this scenario, if a student will bring out a

library material even if detected by the system, it will still require human effort to bring back or get

back the material. And so even if the system alarmed if the librarian is not notified, the project’s

objective to manage the library would become ineffective.

Lagula, C. (2013) and the SMS Based Device/Home Controlling System by Talamayan,

Sid, et al (2009) are developed system that used GSM and SMS technology to control household

appliances from remote places with or without the presence of the user in his/her home. The GSM

modem was used for receiving SMS from user’s mobile phone that automatically enables the

controller to take any further action such as to switch ON and OFF the home appliances like lights,

television and fans. The system was integrated with microcontroller and GSM network interface

using assembly language. Furthermore, Potts (2009) and Sabawi (2009) developed a system that

13
interfaces with an Android mobile device by the integration of a GPS receiver, a microcontroller

and a GSM module. The mobile application can be loaded in any compatible device, and once

loaded, interfacing the security system can already be done. Commands that will lock, unlock, or

check the status of the door to which the security system is installed were sent quickly from the

mobile device. The GSM module was used as a command interface for transmitter and receiver of

data.

These studies have been additional proofs that GSM modem is a functional tool that can

be used to receive and transmit data that could support the proposed security system but due to

the consideration of the difficulty of the entire system developed by these researchers, the design

project integrated also the use of the GSM modem to send notifications to the users and allow the

users to send commands to the security system.

Furthermore, the above cited works focused mainly on the use of the RFID technology,

Arduino Uno Microcontroller and the GSM modem disregarding the fact that on several schools

and universities, use of cellular phones is prohibited and since all the existing security systems

require direct AC source, the researchers established the fact that there is a possibility that the

system would overheat.

14
CHAPTER III

METHODOLOGY

This chapter presents the methodology to achieve the researchers’ prime objectives. More

specifically, it discusses the population and locale of the study, design and data gathering

procedures and lastly the data analysis and statistical tools.

Population and Locale of the Study

This design project entitled “SMART Clock and Watch: An Arduino-based Security

System”was used as a mode of security system of the Department of Information and

Communications Technology (DICT), Isabela State University Cabagan Campus.

The questionnaires were distributed to 79 respondents which composed of five faculty and

74 students who generally came from the 3rd year and 4th year BSCpE levels during the

implementation and evaluation period of the design project.

Data Gathering Procedures

The researchers observed the Department of Information and Communications

Technology (DICT) computer laboratory to determine the problem and initial data. The data

gathered gave the researchers the idea of designing the proposed project.

Library and internet research were undertaken that significantly helped the researchers in

the entire process. Through the use of these methods, informationand activities in journals, thesis

and dissertationsweregathered.

Lastly, the researchers provided questionnaires to determine the respondent’s perception

regarding the use of the device. Likert Scale was used as an approach to scaling the responses in

15
the questionnaire. The questionnaires consisted of 15 questions wherein the questions generally

focused on the evaluation of the design project. The first five questions ask the users whether the

system meets the required functionality of the system. The second five questions were about the

usability of the system while the remaining five were about the reliability of the system.

Design Procedures

This section discusses the different phases the researchers have undergone in the

development of the design project including the specific set of activities done. Likewise, the block

diagram of the system is presented and discussed.

Phase I. Conceptualization of the Design Project

The design project was all about a security system for the computer laboratory of the DICT

that embedded the use of the RFID technology and the temperature sensor. The study was

conceptualized based from the observation that computer laboratories of the department are

unsecured. It was believed that the idea of the project will lessen the loss of laboratory

components.

Due to the complexity of the concept, the researchers’ first step was the gathering of the

data necessary for the completion of the proposed project. The proponents collected information

through books, internet and from the previous design projects related to the study.

Phase II. Designing the Project

After the conceptualization phase, the researchers started designing the proposed project.

The data gathered on the previous phase were filtered and the useful information were compiled

and edited.

16
This phase focused on the technical aspect of the design project. The researchers arrived

first with the block diagram of the project which is discussed and presented hereafter.

With the concept transformed into a block diagram, the researchers started working out on

combining, filtering, evaluating and testing the different circuit diagrams collected in the previous

phase for them to arrive with the correct diagram that helped in the success of the design project

including the wiring diagram.

Phase III. Implementation and Testing of the Project

This was the final phase of the design project where the prototype or the device was

implemented and subjected for functional verification testing.

The security system used RFID technology and GSM modem which consisted of both

hardware and software implementation. After the construction of the wiring diagram, the

researchers gathered the materials needed to start with the development of the SMART Clock and

Watch through online or direct purchasing. When the materials were ready for the device

construction step, the researchers started on developing the design project. The materials were

assembled manually and through the use of the Arduino software, the coding or programming

along with the functional verification testing of the device were done accordingly together with the

RFID reader, GSM module and the temperature sensor that were put in the SMART clock including

the. RFID tags were attached to the computer laboratory components and when passed or read by

the RFID reader, can cause the SMART clock to alarm. Likewise, when the temperature sensor

sensed a 36.50-degree Celsius temperature or higher, the alarm will also be triggered. The aim of

the GSM modem in the system was to send notifications to the scheduled faculty regarding the

possible fire and stealing of computer laboratory components. Considering the fact that it is

17
prohibited to use cellular phones during class hours, the researchers used a Smart Watch as the

receiver and sender means of the SMS to and from the GSM module.

The entire prototype was carefully tested for possible errors and the DICT computer

laboratories were assessed considering its sizes and the budget before it was implemented and

used by the chosen area and respondents for evaluation. When the device was ready and the

laboratories were already assessed, the researchers used Purposive Nonprobability Sampling in

deciding which among the laboratories was used for the scope of the study and with the result, the

system was then implemented and tested in the CPE laboratory. The testing stage was done to

eliminate error which was very important in making sure that the design project was working

accurately according to its designed functions.

After the implementation and testing period, the researchers distributed questionnaires to

79 respondents using Purposive Nonprobability Sampling. The questionnaires were used to

determine the performance efficiency and notions of the respondents to the security system. The

results were evaluated using several statistical tools and the other necessary corrections needed

for the maintenance of the system were done accordingly.

18
Data Analysis and Statistical Tools

A questionnaire was designed and prepared to gather the necessary data from the

respondents. The data gathered were tabulated and analyzed using weighted mean. A five-point

Likert scale as shown in Table 1 was used to interpret the computed data.

The Likert rating scales were as follows:

Table 1.Likert Scale Conversion


Numerical Value Conversion Descriptive Equivalent
5 4.20 - 5.00 Strongly Agree
4 3.40 - 4.19 Agree
3 2.60 - 3.39 Undecided
2 1.80 - 2.59 Disagree
1 1.00 - 1.79 Strongly Disagree

19
CHAPTER IV

RESULTS AND DISCUSSION

Project Design

The flowchart and the block diagram of the system have been used as a guide in the

design of the system. Figure1 presents the block diagram of the design project. The RFID tags

were sticker type tags that were attached to 10 laboratory components wherein when these tags

pass through the 902-928 MHz UHF RFID reader, the Arduino Uno microcontroller will trigger the

SMART clock to alarm and light up a red-colored LED. On the other hand, an LM35 temperature

sensor was used to monitor the temperature of the computer laboratory. If the monitored

temperature increased to 36.50-degree Celsius, the SMART clock alarm will also be triggered and

a yellow-colored LED light will turn on. At the same time, when either or both of these cases

happen, the microcontroller will cause the SIM900A GSM module to send an SMS notification to

the SMART Watch. The SMART Watch can then reply to the GSM module an SMS OFF message

to deactivate or turn off the alarm system.

Figure 1. The Block Diagram of the SMART Clock and Watch: An Arduino-Based Security System

20
Figure 2 shows the flowchart of the SMART Clock and Watch: An Arduino-Based Security

System which signifies the different inputs, outputs, decision and decision flows that the

researchers used in the entire process of the design project. At the start of the process, the

sensors were considered as the input to the system namely the RFID reader and the temperature

sensor. When either or both of these sensors gave a YES decision, the alarm will be triggered and

the GSM module will be enabled to send SMS notification. The authorized personnel can then

reply an SMS OFF command to the GSM module to turn off the alarm system or directly press the

switch on the SMART clock.

Figure 2.The Flowchart of SMART Clock and Watch: An Arduino-Based Security System

21
Project Development

Figure 3 presents the wiring diagram of the system which was based from the block

diagram and flowchart.

Figure 3. The Wiring Diagram of the SMART Clock and Watch: An Ardino-Based Security System
22
The wiring diagram was a representation of all the wire connections used and done to

construct the design project. The red line was the connection to a +5V source, the black line to the

GROUND and the gray line to a 220V power source. The blue line was connected to pin A0 of the

Arduino Uno, green to pin13, yellow to pin12, violet to pin7, orange to pin8, brown to pin10 and

pink to the RESET pin respectively.

During the development of the design project, the researchers originally designed a wiring

diagram that do not have connected LED lights but due to the recommendations taken, red and

yellow LED were added to match exactly to the block diagram of the design project. The wiring of

the prototype was extremely sensitive thus, careful connectivity was required. Apart from this, the

researchers made use of the block diagram, flowchart and wiring diagram to construct correctly the

coding of the system through the Arduino software.

Project Evaluation

Questionnaires were distributed to the respondents to evaluate the functionality, usability,

and reliability of SMART Clock and Watch: An Arduino-Based Security System.

Table 2 shows the mean perception of the faculty and students towards the functionality of

the system. Results show that the overall weighted mean of the respondents is 4.84. It implies that

the respondents strongly agree on the functionality of the project in terms of convenience in

monitoring the computer laboratory and its operation.

23
Table 2.Respondents’ Rating on the Functionality of the System
Descriptive
Criteria Respondents’ Weighted Mean
Equivalent
1. The design project is convenient in
4.83 Strongly Agree
monitoring the DICT computer laboratory.
2. The design project alarms when a
component is about to be brought out of the 4.89 Strongly Agree
laboratory.
3. The design project alarms when there is
4.81 Strongly Agree
possible fire.
4. The design project provides automatic
SMS notification when the alarm system is 4.89 Strongly Agree
turned on.
5. The design project alarm system stops
4.79 Strongly Agree
when an OFF command is received.
Overall Weighted Mean 4.84 Strongly Agree

Table 3shows the mean perception of the faculty and students towards the usability of the

system. Results show that the overall weighted mean of the respondents is 4.60. It implies that the

respondents strongly agree on the usability of the project as an effective security measure, is/was

easy to install, has easy process of operation, provides/provided accurate processing and can be

easily operated by anyone without difficulty.

Table 3. Respondents’ Rating on the Usability of the System

Respondents’ Weighted Descriptive


Criteria
Mean Equivalent
6. The design project is an effective
4.45 Strongly Agree
security measure.
7. The design project is easy to install. 4.57 Strongly Agree
8. The design project has easy process
4.73 Strongly Agree
of operation.
9. The design project provides accurate
4.64 Strongly Agree
processing.
10. The design project can be easily
4.63 Strongly Agree
operated by anyone without difficulty.
Overall Weighted Mean 4.60 Strongly Agree

24
Table 4 presents the mean perception of the faculty and students towards the reliability of

the system. Results show that the overall weighted mean of the respondents is 4.84. It implies that

the respondents strongly agree on the reliability of the design project as to its dependability and

ability to detect components immediately, providing an accurate measured temperature and

precise alarm results and sending and receiving commands promptly.

Table 4.Respondents’ Rating on the Reliability of the system

Respondents’ Descriptive
Criteria
Weighted Mean Equivalent
11. The design project is dependable. 4.75 Strongly Agree
12. The design project detects components
4.87 Strongly Agree
immediately.
13. The design project measured
4.80 Strongly Agree
temperature is accurate.
14. The design project produces precise
4.80 Strongly Agree
alarm result.
15. The design project sends SMS
notification and receives commands 4.97 Strongly Agree
promptly.
Overall Weighted Mean 4.84 Strongly Agree

25
CHAPTER VI

CONCLUSIONS AND RECOMMENDATIONS

Conclusions

With all the steps and procedures undertaken in this study, the researchers conclude the

following:

1. The SMART Clock and Watch: An Arduino-Based Security System achieved its objective

wherein an RFID reader, GSM module, temperature sensor and an alarm system were

interfaced to an Arduino Uno microcontroller as its main connection and

2. With the evaluation done in relation to the requirements, the respondents’ perceptions

revealed that the system is functional, reliable and usable.

Recommendations

Withal, the system can still be developed and enhanced by future researchers. The

following are recommended for the improvement of the system:

1. Consideration of the type of RFID reader to be used in the study is a great concern that

should be given attention using long range reader.

2. Researchers should further study and practice the use of the GSM module

3. The designers may integrate more security features and ideas like having a database of all

the components in the laboratory so that when the stolen laboratory component passed

through the reader, the authorized personnel will be notified immediately what specific

component was stolen.

4. Consideration of proper installation of the system in the laboratory.

26
REFERENCES

Alcantara, Lagula, Latina and Te. 2013. Mobile Phone Graphical User Interface (GUI) for Appliance
Remote Control: An SMS-based Electronic Appliance Monitoring and Control System.
Retrieved from http://www.dlsu.edu.ph/academics/colleges/coe/research/_files/2013/esg-
01-1213-20.asp

Alejo, et.al. 2012. RFID-Based Library Management System of AMA Computer College Santiago
Campus. Undergraduate Thesis. AMA Computer College, Malvar, Santiago City.

Aragon, Meier, Peffer, Perry and Pritoni. 2011. Facilitating energy savings with programmable
thermostats: Evaluation and guidelines for the thermostat user interface. Retrieved from
https://www.researchgate.net/publication/263522533_Facilitating_energy_savings_with_pr
ogrammable_thermostats_Evaluation_and_guidelines_for_the_thermostat_user_interface

Arulogun, et.al. 2013. RFID- Based Students Management System. Retrieved from
http://www.academia.edu/5419129/RFIDBased_Students_Attendance_Management_Syst
em

Barbieto, et al. 2007. Book Monitoring System with Real-Time Inventory Using RFID Technology.
Retrieved fromhttp://www.dlsu.edu.ph/academics/colleges/coe/research/_files/2007/21.asp

Boriello. 2005. Uses of Radio Frequency Identification(RFID). Retrieved from


https://www.researchgate.net/publication/278128053_RFID_tagging_the_world

Boyinbode and Olanipekun. 2015. RFID Based Automatic Attendance System in Educational
Instituions of Nigeria. Retrieved from
http://www.sersc.org/journals/IJSH/vol9_no12_2015/7.pdf

Del Rosario, Romel. 2012. Student Monitoring Attendance Using RFID with SMS Advisory at the
Polytechnic University of the Philippines.

Domingo, Harry et.al. 2008. RFID based Security System at Cagayan State University,
Tuguegarao City, Cagayan.

Espiritu, Oro, and Pura. 2016. CKSM Student Attendance Monitoring System with RFID
Technology. Retrieved from http://docshare01.docshare.tips/files/31412/314128975.pdf

Hamid, H.A. 2006. Introduction to Radio Frequency Identification (RFID) and it’s uses. Retrieved
from http://www.freepatentsonline.com/article/Review-Business-Research/177983905.html

Jackson Systems, LLC. 2011. A definition of Thesmostats. Retrieved from


https://jacksonsystems.com/category/thermostats.html

Mahyidin. 2008. Student Attendance Using RFID System. Retrieved from


http://umpir.ump.edu.my/345/1/3275Firdaus.pdf

27
Mbaka. 2009. RFID Based Election Equipment Anti-Theft System. Retrieved from
http://www.jkuat.ac.ke/departments/eee/wp-content/uploads/2014/09/EEE-
UNDERGRADUATE-PROJECT-ABSTRACTS-2.pdf

MITIP. 2006. Radio Frequency Identification(RFID) and its basic application. Retrieved from
http://ropardo.ro/fileadmin/prezentari_pdf/RFID_MITIP2006.pdf

National Center for Education Statistics. 2014. Assessment of the impact of security systems on
schools and universities. Retrieved from https://nces.ed.gov/

NevonProjects. 2015. A definition of Global System for Mobile Communication (GSM). Retrieved
from http://nevonprojects.com/gsm-home-security/

Oxford University Press. 2014. A definition of Smart Watch. Retrieved from


https://www.kohls.com/catalog/apple-
electronics.jsp?CN=Brand:Apple+Department:Electronics&kwid=p15416914794&utm_sour
ce=bing&utm_medium=cpc&utm_term=smart%20watch&utm_campaign=Electronics%20
%26%20Games_Brands&UTM_Adgroupid=58700001836931254&pfx=pfx_msn_roi&cid=a
agelcgamesbrand2&gclid=CMm_j5K-gtQCFY-Vjgodqm0ArA&gclsrc=ds&dclid=CJG38pK-
gtQCFUIklgod6iwKmg

Peace Institute. 2016. The impact of security systems on schools. Retrieved from
https://www.usip.org/

Potts. 2009. GSM module interfaced to Android Devices. Retrieved from


http://web.stanford.edu/~cgpotts/papers.html

Sabawi. 2009. Interfacing GSM module with Android Devices. Retrieved from
http://eprints.utem.edu.my/3770/1/Vehicle_Tracking_System_Using_Gps_And_Gsm_Tech
nology_Mohamad_Faizul_Bin_Sabawi_G109.5.M42_2009_-_24_Pages.pdf

Rozilan. 2012. An Introduction to Arduino Uno Microcontroller. Retrieved from


http://www.studymode.com/essays/Arduino-Uno-1680589.html

Talamayan, Sid, et al. 2009. SMS Based Device/Home Controlling System.

Viernes, Pasinos and Ventura. 2012. Library Management System Using RFID.

Want, R. 2006. An Introduction to RFID Technology. Retrieved from


http://www.scirp.org/reference/ReferencesPapers.aspx?ReferenceID=110659

28
APPENDICES

29
APPENDIX A
Relevant Source Codes

30
RELEVANT SOURCE CODES

#include <SoftwareSerial.h>

SoftwareSerialTM(7, 8);

charmsg=0;

float temp;

inttempPin=0;

intsoundDetectedPin = 10;

intsoundDetectedVal = HIGH; intrled =13;

intyled =12;

booleanbAlarm = false;

unsigned long lastSoundDetectTime;

intsoundAlarmTime = 500;

void setup ()

pinMode(rled,OUTPUT);

pinMode(yled,OUTPUT);

Serial.begin(9600);

pinMode (soundDetectedPin, INPUT) ;

TM.begin(19200);
31
delay(100);

TM.println("AT+CNMI=2,2,0,0,0\r");

delay(100);

Serial.println("AT+CMGD=1,4"); //Message deletion

void loop ()

off();

sound();

tempe();

void sound()

soundDetectedVal = digitalRead (soundDetectedPin) ;

if (soundDetectedVal == LOW) // If we hear a sound

if (!bAlarm){

bAlarm = true;

TM.println("AT+CMGF=1");

delay(100);

32
TM.println("AT+CMGS=\"+639553974165\"\r");

delay(100);

TM.println("Warning! Please Check the Laboratory Computer Components.");

delay(100);

TM.println((char)26);

delay(100);

digitalWrite(rled,HIGH);

voidoff()

if(TM.available() >0)

msg=TM.read();

if (msg=='O')

msg=TM.read();

if (msg=='F')

33
if (msg=='F')

digitalWrite(yled, LOW);

digitalWrite(rled, LOW);

bAlarm=false;

}}

voidtempe()

temp = analogRead(tempPin);

temp = temp * 0.29828125;

if( temp == 36.50 || temp>36.50)

// convert the analog volt to its temperature equivalent

Serial.print("TEMPERATURE = ");

Serial.print(temp); // display temperature value

Serial.print("*C");

Serial.println();

delay(300);

34
TM.println("AT + CMGS = \"+639553974165\"");

delay(1000);

TM.println("Temperature Alert!!! *C = ");

delay(1000);

TM.print(temp);//the content of the message

delay(1000);

TM.println((char)26);//the ASCII code of the ctrl+z is 26

delay(1000);

digitalWrite(yled, HIGH);

delay(100);

35
APPENDIX B
Evaluation Tool

36
Questionnaire for SMART Clock and Watch: An Arduino-Based Security System

Introduction: This design project entitled “SMART Clock and Watch: An Arduino-Based Security

System” is intended to monitor the temperature of the computer laboratory and detect

componenets for securing DICT computer laboratories. Likewise, the project is programmed to

alarm, send SMS notifications and receive commands using the Arduino software.

Name:______________________ Section/Course: ________________ Date: ______________

Objective: This questionnaire is intended to evaluate the performance of the system given the

rating score below.

Legend: 5- Strongly Agree, 4- Agree, 3- Undecided,2- Disagree, 1- Strongly Disagree

Direction: Please check the corresponding box of your choice. Answer honestly.

Functionality 5 4 3 2 1

1. The design project is convenient in monitoring the DICT computer


laboratory.

2. The design project alarms when a component is about to be


brought out of the laboratory.

3. The design project alarms when there is possible fire.

4. The design project provides automatic SMS notification when the


alarm system’s turned on.

5. The design project’s alarm system stops when an OFF command


is received.

37
Usability 5 4 3 2 1

1. The design project is an effective security measure.

2. The design project is easy to install.

3. The design project has easy process of operation.

4. The design project provides accurate processing.

5. The design project can be easily operated by anyone without


difficulty.

Reliability 5 4 3 2 1

1. The design project is dependable.

2. The design project detects components immediately.

3. The design project measured temperature is accurate.

4. The design project produces precise alarm result.

5. The design project sends SMS notification and receives


commands promptly.

Comments/ Suggestions:_________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

_______________________________

Signature

38
APPENDIX C
Gantt Chart

39
Gantt Chart

40
APPENDIX D
Working Title Form

41
42
APPENDIX E
Photos

43
CODING AND TESTING

The picture shows Romeo Tuazon and Aubrey Cabalza the coding and testing of the design project.

The picture shows Romeo Tuazon and Dhonna Gangan doing the coding and testing of the design
project.

The picture shows Romeo Tuazon and Hazel Lopez the coding and testing of the design project.

44
COMPONENTS

The picture shows the casing of the design project and the RFID reader.

The picture above shows the SMART clock and WATCH.

The different components used in the design project.

45
EXHIBIT PHOTOS

The researchers and the design project prototype during the BS Computer Engineering Exhibit.

The design project prototype.

46
The researchers’ presentation of the design project to the BSCpE-2 students during the BS
Computer Engineering Exhibit day.

The picture shows the researchers’ interaction with the respondents during the BS Computer
Engineering Exhibit day.

47
The picture shows the respondents’ evaluation of the system while answering the evaluation form.

The picture shows the researchers and the prototype of the design project.

48
The picture shows the researchers at the conclusion part of the BS Computer Engineering Exhibit
Day.

The picture shows the BSCpE5 students with the department Chair, Dr. Allen M. Paz on the Exhibit
day.

49
FINAL DEFENSE

The researchers together with the thesis Adviser, panelist and other CPE faculty.

The researchers during the demonstrations of the final prototype.

50
Romeo Tuazon, one of the researchers, demonstrating the process of the prototype.

Photo1 of the researchers during the presentation of the final prototype .

51
Photo2 of the researchers during the presentation of the final prototype.

The researchers’ photo1 during the final defense presentation.

52
The researchers’ photo2 during the final defense presentation.

The researchers’ photo3 during the final defense presentation.

53
Photo1 of the BSCpE 5 students together with the CPE faculty, after the final defense.

Photo 2 of the BSCpE 5 students together with the CPE faculty, after the final defense.

54
APPENDIX F
Grammarian’s
Certification

55
CERTIFICATION

This is to certify that the undersigned had examined the documentation of the design ““SMART

Clock and Watch: An Arduino-Based Security System” of Aubrey Micah A. Cabalza, Dhonna D.

Gangan, Hazel P. Lopez and Romeo T. Tuazon Jr., Bachelor of Science in Computer Engineering, as

to the content, organization and format.

Signed this _____ day of May, 2017.

JENNIE-D D. GANGAN
English Critic

56
APPENDIX G
Bill of Materials

57
Breakdown

ITEM PRICE
Adapter PHP 250.00
Arduino Mega PHP 745.00
Breadboard PHP 125.00
Header (40 pcs.) PHP 32.00
Led PHP 50.00
LM35 PHP 84.00
Male to Female connector (20 pcs.) PHP 100.00
Male to Male Connector (20 pcs.) PHP 100.00
PCB PHP 50.00
RFID Reader PHP 6,630.00
RFID Tags (12 stickers, 1 card) PHP 658.00
RS232 (2 pcs.) PHP 630.00
SIM Card (2pcs.) PHP 40.00
Sim900A GSM Module PHP 1,100.00
Smart Watch PHP 799.00
Soldering Iron PHP 250.00
USB Female Type A (2pcs.) PHP 20.00
Wall clock PHP 250.00
Other Expenses PHP 1,000.00
SUBTOTAL PHP 12,913.00

58
COPY OF OFFCIAL RECEIPTS

59
60
61
62
63
64
65
66
67
68
69
70
71
72
APPENDIX H
Specifications of the
Different Modules

73
Arduino UNO

 Processor : ATmega328 (8-bit CPU, 16MHz clock speed, 2KB SRAM,


32KB flash storage )
 Features: 14 digital I/O pins, 6 analog input pins, removable
microcontroller
 Analog Input pins: 6
 Form Factor: 2.7” × 2.1” rectangle
 Operating Voltage: 5V
 DC Current per I/O Pin:40mA
 DC Current for 3.3V Pin: 50mA
 USB connection, a power jack, an ICSP header, and a reset button.

74
SIM 900A GSM GPRS Module

Introduction

This is an ultra compact and reliable wireless module. The SIM900A is a complete Dual-band

GSM/GPRS solution in a SMT module which can be embedded in the customer

applications.Featuring an industry-standard interface, the SIM900A delivers GSM/GPRS

900/1800MHz performance for voice, SMS, Data, and Fax in a small form factor and with low

power consumption. With a tiny configuration of 24mmx24mmx3mm, SIM900A can fit in almost all

the space requirements in user applications, especially for slim and compact demand of design.

Features

75
 Dual-Band 900/ 1800 MHz
 GPRS multi-slot class 10/8GPRS mobile station class B
 Compliant to GSM phase 2/2+Class 4 (2 W @850/ 900 MHz)
 Class 1 (1 W @ 1800/1900MHz)
 Control via AT commands (GSM 07.07 ,07.05 and SIMCOM enhanced AT Commands)
 Low power consumption: 1.5mA(sleep mode)'
 Operation temperature: -40°C to +85 °C
 Status indicator(D5):It will flashes continuously whenever the call arrives otherwise it is left
ON.
 Network LED(D6):This led will blink every second which indicates that the GSM module is
not connected to the mobile network. Once the connection is established successfully, the
LED will blink continuously every 3 seconds.

How to connect SIM 900A Module with Arduino UNO?

Hardware and Software Required

 SIM 900A Module


 Arduino UNO
 Arduino IDE(1.0.6V)

Hardware connections

The SIM900A module has 6pins in which two pins for Vcc and Gnd and the rest are
3VR&3VT(3volt Rx &Tx) and 5VR,5VT(5volt Rx &Tx) and the connections are made as follows:

 Vcc to 5V
 Gnd to Gnd
 5VR digital pin 9
 5VT digital pin 10

Before getting into the program part,we need to look into the AT commands which are discussed in
the following used by this module.With the help of these AT commands,the user can send or
receive messages,make a call and so on.

76
77
78
79
80
81
APPENDIX I
Curriculum Vitae

82
EDUCATIONAL BACKGROUND

BACHELOR OF SCIENCE IN COMPUTER


ENGINEERING
Isabela State University – Cabagan Campus, Cabagan, Isabela
June 2012 – May 2017
REGIONAL SCIENCE HIGH SCHOOL – CV
Tumauini, Isabela June 2008 – March 2012
CASIBARAG ELEMENTARY SCHOOL
Casibarag Sur, Cabagan,Isabela June 2005 – March 2008

AUBREY MICAH LUQUILU PRIMARY SCHOOL


Luquilu, Cabagan, Isabela June 2002 – March 2005
APOSTOL
CABALZA SKILLS AND QUALIFICATIONS
#266 Luquilu, Cabagan,
Isabela I am good in using Microsoft 2010, Turbo C, after
effects and other computer applications, PCB and
E-mail Address: circuit designing, basic electrical wiring, have proven
[email protected]
leadership skills, willing to learn new skills, flexible,
Contact Number excellent in oral and written communication, service
09055891713 oriented, and can work independently or with a team.

PERSONAL INFORMATION: ELIGIBILITY

Nickname: Bree Civil Service Sub-professional, 2015


Birth Date: 03/25/1997
Age: 20 years old SEMINARS ATTENDED
Height : 5’0 ft. 1st I-Lead and ECHO Seminar 2017 April 28-30, 2017
Weight:60kgs. Bulwaganng Sierra Madre CCVPED, ISU Cabagan, Isabela
Religion:LatterDay Saint Leadership Training December 6-8,2016
Civil Status: Single Isabela State University Echague Campus, Echague, Isabela
Dialect: Ybanag, Itawes Seminar on Arduino 2016
DICT, Catabayungan, Cabagan, Isabela
Learning Express Philippines March 2-15, 2016
Bulwaganng Sierra Madre CCVPED, ISU Cabagan, Isabela
ADDITIONAL INFORMATION: Campus Student Leaders Seminar-WorkshopSept. 25-26, 2015
Bulwaganng Sierra Madre CCVPED, ISU Cabagan, Isabela
Parents: Alfredo S. ICT Faculty and Student Congress 1.0 June 25, 2014
Cabalza & Mary Jane A. Josefina T. Albano Gymnasium
Cabalza CHARACTER REFERENCE
No. of Siblings: 2 Dr.Allen M.Paz
Program Chair- BS Computer Engineering
Motivational Statement: Department Chair, DICT
“Plan your work and work Isabela State University - Cabagan, Isabela
your plan.”
I hereby certify that the above information is true to the best of
Dream: To be a successful my knowledge and belief.
Computer Engineer and
Psychologist
AUBREY MICAH APOSTOL CABALZA
Cabagan, Isabela
83
EDUCATIONAL BACKGROUND

BACHELOR OF SCIENCE IN COMPUTER


ENGINEERING
Isabela State University – Cabagan Campus, Cabagan, Isabela
June 2012 – May 2017
DELFIN ALBANO HIGH SCHOOL
Cabagan, Isabela June 2008 – March 2012
CABAGAN SCIENCE ELEMENTARY SCHOOL
Catabayungan, Cabagan, Isabela June 2005 – March 2008

DHONNA LUQUILU PRIMARY SCHOOL


Luquilu, Cabagan, Isabela June 2002 – March 2005
DAQUIOAG
GANGAN SKILLS AND QUALIFICATIONS
Luquilu, Cabagan,
Isabela  Knowledgeable in AuthoCAD (Two
Dimensional and Three Dimensional)
E-mail Address:  Knowledgeable in Computer Programming
[email protected] (Turbo C)
 Knowledgeable in MicrosoftExcel
Contact Number  Knowledgeable in Basic wiring diagram
09553974322
SEMINARS ATTENDED
PERSONAL INFORMATION:
Nickname: Dhonsky Seminar on Arduino
Birth Date: 12/03/1995 2016
Age: 21 years old DICT, Catabayungan, Cabagan, Isabela
Height : 5’3 ft.
Weight: 55 kgs.
Religion: B.A.C.
ICT Faculty and Student Congress 1.0June 25,
Civil Status: Single
2014
Dialect: Ybanag
Josefina T. Albano Gymnasium
ADDITIONAL INFORMATION:
CHARACTER REFERENCE
Parents: Dominador
Gangan&Minerva Gangan Dr.Allen M.Paz
Program Chair- BS Computer Engineering
No. of Siblings: 6 Department Chair, DICT
Isabela State University - Cabagan, Isabela
Motivational Statement:
“God first, before you I hereby certify that the above information is true
proceed” to the best of my knowledge and belief.

Dream: To be a successful
Computer Engineer
Cabagan, Isabela
DHONNA DAQUIOAG GANGAN

84
EDUCATIONAL BACKGROUND

BACHELOR OF SCIENCE IN COMPUTER


ENGINEERING
Isabela State University – Cabagan Campus, Cabagan, Isabela
June 2012 – May 2017
STO. TOMAS NATIONAL HIGH SCHOOL (STNHS)
Sto. Tomas, Isabela June 2006 – March 2010
BAGUTARI ELEMENTARY SCHOOL
Bagutari, Sto. Tomas, Isabela June 2000 – March 2006

HAZEL BAGUTARI DAYCARE CENTER


Bagutari, Sto. Tomas, Isabela June 1999 – March 2000
PAGUIGAN
LOPEZ SKILLS AND QUALIFICATIONS
Bagutari, Sto. Tomas,
 Knowledgeable in AuthoCAD (Two
Isabela
Dimensional and Three Dimensional)
E-mail Address  Knowledgeable in Computer Programming
[email protected] (Turbo C)
 Knowledgeable in MicrosoftExcel
Contact Number
 Knowledgeable in Basic wiring diagram
09352056646
SEMINARS ATTENDED
PERSONAL INFORMATION:

Nickname: Zhel Seminar on Arduino


Birth Date: 08/16/1993 2016
Age: 23years old DICT, Catabayungan, Cabagan, Isabela
Height : 5’1 ft.
Weight: 50kgs.
Religion:RomanCatholic ICT Faculty and Student Congress 1.0June 25,
Civil Status: Single 2014
Dialect:Ybanag Josefina T. Albano Gymnasium
ADDITIONAL INFORMATION:
CHARACTER REFERENCE
Parents: Jerry M. Lopez
&Remedios P. Lopez Dr.Allen M.Paz
Program Chair- BS Computer Engineering
No. of Siblings: 3 Department Chair, DICT
Isabela State University - Cabagan, Isabela
Motivational Statement:
“Don’t do unto others what I hereby certify that the above information is true
you don’t want others do to the best of my knowledge and belief.
unto you”

Dream: To be a successful
Computer Engineer and Cabagan, Isabela HAZEL PAGUIGAN LOPEZ
Business Woman

85
EDUCATIONAL BACKGROUND

BACHELOR OF SCIENCE IN COMPUTER


ENGINEERING
Isabela State University – Cabagan Campus, Cabagan, Isabela
June 2012 – May 2017
STO. TOMAS NATIONAL HIGH SCHOOL (STNHS)
Centro, Sto.Tomas, Isabela June 2008 – March 2012
STO. TOMAS CENTRAL ELEMENTARY SCHOOL
Centro, Sto .Tomas, Isabela June 2005 – March 2008
Uauang Daycare Center
Uauang, Tuliao Sto.Tomas, Isabela June 2002 – March 2005
ROMEO SKILLS AND QUALIFICATIONS
TAGAPAN
 Knowledgeable in AuthoCAD (Two
TUAZON JR.
Dimensional and Three Dimensional)
UauangTuliao,
Sto.Tomas, Isabela  Knowledgeable in Computer Programming
(Turbo C)
E-mail Address  Knowledgeable in MicrosoftExcel
[email protected]  Knowledgeable in Basic wiring diagram

Contact Number SEMINARS ATTENDED


09354556808
Seminar on Arduino 2016
PERSONAL INFORMATION: DICT, Catabayungan, Cabagan, Isabela
Campus Student Leaders Seminar-
Nickname: R-Jay
Birth Date: 12/14/1995 Workshop Sept. 25-26, 2015
Age: 21 years old Bulwaganng Sierra Madre CCVPED, ISU Cabagan,
Height : 5’6 ft. Isabela
Weight: 58 kgs. ICT Faculty and Student Congress 1.0June 25,
Religion: Roman Catholic 2014
Civil Status: Single Josefina T. Albano Gymnasium
Dialect: Ybanag
CHARACTER REFERENCE
ADDITIONAL INFORMATION:
Dr.Allen M.Paz
Parents:Romeo. Program Chair- BS Computer Engineering
TuazonSr. &Nancy T. Department Chair, DICT
Tuazon Isabela State University - Cabagan, Isabela

No. of Siblings: 5 I hereby certify that the above information is true


to the best of my knowledge and belief.
Motivational Statement:
“Look before you leap.”

Dream: To be a successful Cabagan, Isabela


ROMEO TAGAPAN TUAZON JR.
Computer Engineer

86
87

You might also like