Review of Related Literature and Systems
Review of Related Literature and Systems
Review of Related Literature and Systems
Technical Background
MySQL
management systems. SQL is the core of MySQL, and there is 'My' with 'SQL'
some paid editions available with which you can use advanced functionality.
SQL Server and Oracle database. It can be used with every programming
either install it on the local system or even install it on the server. It is a solution
that is flexible, scalable, fast, and reliable. (What is MySQL? Definition, Features,
https://blog.templatetoaster.com/what-is-mysql/)
WAMP
your operating system (Windows in the case of WAMP). Even if you can
separately install them, they are usually bundled up, and for a good reason, too.
What is good to know is that from LAMP, WAMP derives (the L stands for Linux).
The main difference between these two is that WAMP is used for Windows, while
virtual server. Since it is localized on your computer and is not connected to the
internet, it allows you to test all WordPress features without any consequences.
First of all, this means you don't have to wait for files to be uploaded to your site,
For both developers and theme designers alike, WAMP speeds up the
work process. What's more, you also get the benefit of playing around to your
heart's content on your site. However, to make the website go live, you need to
get some hosting service and a Domain. For more information, see our beginner-
friendly article about web hosting. In essence, without actually hosting it online,
WAMP also has a control panel. All of these services mentioned above
(excluding the operating system) will be installed on your local computer once
you install the software package. It's a great way to save time, whether you use
WAMP or software packages for other operating systems. In a secure and care-
free environment, you won't have to upload files to a website and will be able to
learn how to develop. (What is WAMP (Beginners Friendly Guide) by Artūras B.,
Raspberry Pi OS
primary operating system. Mike Thompson and Peter Green created the original
2012.
taking the name Raspbian. The name was changed to Raspberry Pi OS both for
the 64-bit & 32-bit versions because the new 64-bit versions no longer use the
Raspbian core. The 64-bit version is a beta and not appropriate for regular use
on August 1, 2020.
computers with ARM CPUs in the Raspberry Pi line. Raspberry Pi OS, with the
Openbox stacking window manager, a new theme, and a few other changes,
https://en.wikipedia.org/wiki/Raspberry_Pi_OS)
and is licensed under the MIT License, and is presently supported by Adobe and
macOS, Windows, and most Linux. Brackets' main purpose is its live HTML,
4, 2014. New features like custom shortcut key combinations and more accurate
JavaScript hinting were introduced with the update. Brackets have a big focus on
1.0, for the convenience of coding in CSS, Adobe announced a feature that
extracts design information from a PSD file. As of 28 June 2016, due to low
usage, the feature was officially discontinued. However, via Photoshop and
Dreamweaver, Extract is still available, both of which are part of their paid
service, Adobe Creative Cloud. The new version of the Brackets program is
https://www.mitcheveleigh.com/brackets/)
Apache (Web Server)
sends web content across the Internet. It is widely referred to as Apache, and it
quickly became the most popular HTTP client on the web after development. It is
widely believed that, through applied patches and modules, Apache gets its
name from its development history and process of improvement, but that was
corrected back in 2000. It was revealed that the name derived from the respect of
to deliver web content. LAMP, Linux, Apache, MySQL, and PHP are amongst the
most common web application stacks. The operating system that handles the
application's operations is Linux. The web server that serves web assets and
which stores all your data in a format that is easy to query. PHP is the
content on the web (What is Apache? In-Depth Overview of Apache Web Server
https://medium.com/@jovanshernandez/introduction-to-apache-web-server-
2138af643039)
Web pages can be designed using HTML. Code execution on the user's
browser is done with HTML (client-side). On the other hand, it is executed on the
server before it gets to the web browser of the user with the PHP server-side
scripting language. For web development and the construction of interactive web
pages for web apps, e-commerce applications, and database applications, PHP
can be embedded in HTML and is well suited. It's considered a friendly language
to connect with MySQL, Oracle, and other databases easily. (What is PHP Used
https://study.com/academy/lesson/what-is-php-used-for-uses-
advantages.html#:~:text=PHP%20can%20be%20embedded%20in,%2C
%20Oracle%2C%20and%20other%20databases.)
HTML stands for Hypertext Markup Language. It enables the user to build
and organize web pages and applications with sections, paragraphs, headings,
links, and block quotes. In HTML, dynamic functionality can't be created because
we use simple code structures (tags and attributes) when working with HTML.
https://www.hostinger.ph/tutorials/what-is-html)
JavaScript
with the server after a webpage has been loaded. For example, to ensure that all
the necessary fields have been filled out, a JavaScript function may review a web
form before it is submitted. The JavaScript code can generate an error message
much like server-side scripting languages like PHP and ASP. However, only
CSS (Cascading Style Sheets) allows you to specify the visual style and
presentation of your web application. CSS enables you to separate the style from
the structure. It means, when working on your page, you are looking at lesser
displayed on your web pages. The styles described by CSS include a document's
colors, fonts, layout, and other presentation aspects, including display variations
for various devices and screen sizes. A common style applicable to many
(Cascading Style Sheets (CSS) by Wolf D., Henley A.J., December 7, 2017,
https://www.researchgate.net/publication/321629654_Cascading_Style_Sheets_
CSS)
Python
freely, even for commercial applications. Python can operate on Mac, Windows,
and Unix systems and has been ported to virtual machines in Java and .NET as
well.
frequently used for Web applications and dynamic Web content. It is also
supported by several 2D and 3D imaging programs, enabling users to create
custom plug-ins and extensions with Python. All examples of applications that
support a Python API include GIMP, Inkscape, Blender, and Autodesk Maya.
by other Python programs, they can also be saved as a compiled program (.PYC
https://techterms.com/definition/python
GSM/GPRS Module
the GSM GPRS Modules. A GSM GPRS Module is then used to allow
GSM/GPRS Network. GSM stands for Global System for Mobile Communication.
A GSM GPRS MODEM contains a GSM GPRS module and some other
communication), a power supply, and some indicators. It can connect the GSM
gprs-module/)
identifies a tagged object using radio waves. It is used in many industrial and
track of the items that have been checked out of a library. RFID is a kind of
matched.
There are two basic parts to the system: tags and readers. The RFID
reader releases radio waves and receives signals from the RFID tag, whereas
the RFID tag uses radio waves to transmit its identity and other data. The
technology was approved before the 1970s, but due to its usage in things such
as global supply chain management and pet microchipping, it has become much
commercial uses were first introduced in the 1970s, in recent years it has
to read and store information, purchasing and adapting is now more affordable.
Radio Frequency Identification works through a tiny electronic device,
which has information stored on it, typically a microchip. Generally, these devices
are very small, sometimes the size of a rice grain, and can hold a large amount
of data. Although they don't always emit electricity, some can contain batteries or
a stored power source. The scanners used to read these devices will also
provide the microchip with sufficient electricity to read. The technology has many
different uses, but it is widely used in tracking products, animals, and currency.
https://www.investopedia.com/terms/r/radio-frequency-identification-rfid.asp)
Touchscreen
cash registers, and information kiosks, touch screens are used. A grid of infrared
All PCs today support the ability to have a touch screen, and most laptop
10. A lot of all-in-one computers are now capable of using a touch screen. Acer,
https://www.computerhope.com/jargon/t/toucscre.htm)
Raspberry Pi
a small, cheap computer used to teach children science in schools. Nearly four
The 700 MHz ARM processor is used on these machines, and the models
can be built in either 256 MB or 512 MB of RAM. Up to five USB2.0 ports can
support them. Flash memory or MicroSD Card (up to 4 GB) will be used by
Raspberry Pis for non-volatile storage, and HDMI will be used by Raspberry Pi
for digital audio and video outputs. There is no on-board network interface
https://www.computerhope.com/jargon/r/raspberry-pi.htm#:~:text=First
%20released%20in%202012%2C%20the,million%20Raspberry%20Pis%20were
%20sold.)
Review of Related Literature
and knowledge relevant to the study. It includes pieces of literature related to the
study that will extend the researchers' knowledge. Those included here help to
familiarize information relevant and similar to the current study, which was used
Foreign Literature
system mandates visitors to log in and out as they enter and exit your premises.
Knowing that their identity can be traced easily will discourage someone with
malicious intent from attempting to access your premises. It's easy for visitors to
sneak in and out of the premises undetected when there are multiple entrances
and exits. A system able to monitor all entry and exit points are needed.
Based on the article entitled Safe Entry, Easy Exit, an article written by
Mike Kennedy last September 1, 2008, doors are among the most critical points
of concern for school personnel responsible for keeping buildings safe. Security
experts suggest that, especially after classes are in session, schools limit entry to
one main entrance. It is important to lock other doors so that outsiders cannot
enter. Having doors that are not difficult to open from the inside of a school
makes it effortless for students to defeat carefully designed exterior door security
on a whim, or in a moment of inattention, they may allow entering someone who
doesn't belong. Many schools and universities choose to enhance their exterior
doors' security features by installing the latest technology and equipment and
Based on the article written last March 3, 2017, entitled "Effective Building
Entrance and Exit Security Measures for Any Organization" written by Peace of
cameras, and motion sensors you might have, it isn't safe at all if you can't
monitor and regulate who comes and goes from your building. However, you can
transform your building's entrances and exits from your building's most
vulnerable part to the most secure with an intelligent plan, a well-trained staff,
According to Bill Hoogland (2017) in his article entitled RFID: A Fast Track
for Improved Security, he said that RFID, in combination with other technologies,
is becoming a very effective tool for smart authentication and identification not
only of products and goods but also of individuals. The technology can be
provides an entirely new security layer that allows for very strict authentication
linked to a unique identity where such an identity is available. RFID can also be
used in conjunction with IoT, similar to its interaction with biometric technology. It
is possible to detect and monitor the intelligence of an RFID tag or chip through
the Internet. This opens up many new opportunities for technology, as it will allow
the monitoring and control of so many different assets from anywhere in the
make changes, they can be reversed if any damage occurs. Lastly, availability is
the ability to access the data when needed. The RFID, like other technologies, is
reader and a tag. In real life, most risks are a combination of security and privacy
RFID: Issues and Current Countermeasures, an article written by Xiao Nie, and
the basis of these, we are addressing the latest security counter-measures for
RFID. Corresponding technologies such as tag killing, tag sleeping, and tag
blocking are praised in the RFID system for privacy protection and anti-
main method.
their conference paper entitled RFID Implementation and Security Issues, Radio
data that can be accessed wirelessly in real-time. In our society, there's really
great potential for RFID technology. Standards in the RFID industry are
major concern with many recently exposed threats to RFID technology. Several
Foreign Studies
many challenges and concerns that are not attracting more and more
Therefore, the outcome of our study aims to provide a strong view of the
solutions and techniques available to avoid and secure the RFID system from
states that the students leave their home toward their educational institutions,
either school or college, but in reality, they go somewhere else. The issue was
supported by the lack of communication between the schools and parents related
mentioned above. When the RFID card is tapped on the RFID scanner, the
system will automatically record the data and save it to the database. The data
will be automatically stored every day and then sent personally to their parents
who have registered their mobile phones to receive information regarding their
the project. The main aim of the project is to authenticate the entry-exit of each
student. The system enables students to check-in and check-out under fast,
protected, and reliable conditions. The software module also includes a capability
to update, edit or delete any record for future use so that if any students want to
exit earlier for urgent work, then the administrator updates their record by this
function.
According to the study of Kim J., Yang C., Jeon J. (2007), entitled A
people. RFID systems have become more popular in areas such as supply chain
current and potential issues in RFID systems that could threaten the future of
the RFID system. This study investigates important issues related to the privacy
and security of RFID based on recent literature and proposes solutions to the
problem.
review of RFID applications and diffusion: key areas and public policy issues, the
applicants for RFID called e-IDs, smart tags, and contactless smart cards are
but also business-oriented application areas such as the supply chain. Through a
systematic review approach from 111 previous studies on RFID technology for
the public sector, the researchers have identified six main areas for RFID
transport, health and welfare, and livestock farming. Further research on the
effects of RFID includes not only numerous theoretical problems but also legal
factors for the adoption and deployment of new RFID applications in terms of
industry sectors.
Local Literature
data security in the use of RFID" by Teresa Umali in 2018, as stated by the
RFID has earned is because it has made life more convenient. But alongside its
benefits is the potential issue of the data privacy breach, given that an RFID
use RFID to keep track of employee attendance and facilitate employee access
to certain areas, systems, applications, and other company resources. Ever since
RFID was first introduced, privacy-related concerns were raised. Concerns on
how the government and private sector use the data stored are unavoidable
RFID systems. On the one hand, users must take into account all possible risks
card of the students and employees in transacting business with the school, the
city government offices, and other entities since it will contain information
electronic turnstile equipped with card readers. The RFID card will also act as a
Bundy clock or time recorder to track the school attendance of students and
faculty members. The high technology system being used was donated by a
Subic-based entrepreneur. Dr. Jay, Son of Wow Cards, has donated a complete
Rosco, Elthone John Tiongco, and Louie F. Agustin (2015) entitled Student
Monitoring System With RFID & SMS Notification For Student of Enhanced
Curriculum in the Arts Program, the foremost goal of the project is the students
should wear RFID tags. They will tap it on the RFID reader to become aware of
their information and saved the file of their time in and time out to the database.
SMS notification is used to send SMS to their parents for complacency purposes.
It helps parents of students monitor the entrance and exit of their child without
problems.
with the use of Low-Frequency Radio Frequency Identification (RFID) and Short
Messaging Service (SMS)" conducted by Dellosa in 2011 July, the task of the
student monitoring system is to keep track of the students within the school
premises. The developed software can capture the name, entry, and exit time of
the student and record it. Moreover, software developed can monitor the entry
conducted by Mr. Philip Villamin Mojares in 2013, the school has no way of
providing immediate information to the parents if their children are in or out of the
specific, it aimed to design a system to maximize the use of the SMS module and
RFID technology; to develop a system to ensure the privacy and protection of the
information stored in the database; to identify the advantages of using the SMS
and the school; to test and evaluate the efficiency of the system.
Synthesis
technologies like GSM Module and RFID System. Also, the technical background
presents the different programming languages that the researchers will use in
in the literature. The literature written in this chapter by foreign and local authors
discusses the concepts and narrative details of relevant information to the study.
The foreign and local literature will help the researchers to know the importance
and benefits of having a monitoring system in the entrance and exit to enhance
security and safety in a university. Also, the literatures will help the researchers
to know how an RFID system will improve the security in a university. The
The researchers gathered information from the foreign and local studies
that are related to the system of the researchers. The different related studies,
both local and foreign, give the researcher additional information on how the
system will be developed, ideas of the process, and the technologies needed to
develop the system. The foreign and local systems will serve as a reference for