Review of Related Literature and Systems

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

CHAPTER II

REVIEW OF RELATED LITERATURE AND SYSTEMS

Technical Background

MySQL

Originally introduced back in 1995, it is one of the most popular database

management systems. SQL is the core of MySQL, and there is 'My' with 'SQL'

because it is the name of the daughter of its co-founder, Michael Widenius.

MySQL is open-source and is a relational database management system.

MySQL is a freely available database system. However, there are also

some paid editions available with which you can use advanced functionality.

MySQL is easy to use compared to other database software such as Microsoft

SQL Server and Oracle database. It can be used with every programming

language, but PHP is mostly used with it.

MySQL can be used to define and manage your metadata on multiple

platforms, such as Linux, Windows, Unix, and an information schema. You can

either install it on the local system or even install it on the server. It is a solution

that is flexible, scalable, fast, and reliable. (What is MySQL? Definition, Features,

Explanation by Param Chahal, November 30, 2019,

https://blog.templatetoaster.com/what-is-mysql/)
WAMP

WAMP stands for PHP, MySQL, Windows, and Apache. It is a software

stack that means Apache, MySQL, and PHP are installed by installing WAMP on

your operating system (Windows in the case of WAMP). Even if you can

separately install them, they are usually bundled up, and for a good reason, too.

What is good to know is that from LAMP, WAMP derives (the L stands for Linux).

The main difference between these two is that WAMP is used for Windows, while

LAMP is used for operating systems based on Linux.

You can do so on your own computer (localhost) instead of installing and

testing WordPress on your host account. WAMP works on your computer as a

virtual server. Since it is localized on your computer and is not connected to the

internet, it allows you to test all WordPress features without any consequences.

First of all, this means you don't have to wait for files to be uploaded to your site,

and secondly, this makes it much easier to create backups.

For both developers and theme designers alike, WAMP speeds up the

work process. What's more, you also get the benefit of playing around to your

heart's content on your site. However, to make the website go live, you need to

get some hosting service and a Domain. For more information, see our beginner-

friendly article about web hosting. In essence, without actually hosting it online,

WAMP is used as a safe space for working on your website.

WAMP also has a control panel. All of these services mentioned above

(excluding the operating system) will be installed on your local computer once

you install the software package. It's a great way to save time, whether you use
WAMP or software packages for other operating systems. In a secure and care-

free environment, you won't have to upload files to a website and will be able to

learn how to develop. (What is WAMP (Beginners Friendly Guide) by Artūras B.,

January 18, 2019, https://www.hostinger.com/tutorials/what-is-wamp)

Raspberry Pi OS

Raspberry Pi OS (formerly Raspbian) is a Raspberry Pi operating system

based on Debian. Since 2015, the Raspberry Pi Foundation has formally

provided the Raspberry Pi family of compact single-board computers as the

primary operating system. Mike Thompson and Peter Green created the original

Raspbian OS as an independent project. The initial build was finished in June

2012.

Previous versions of Pi OS were 32-bit and based on Raspbian core,

taking the name Raspbian. The name was changed to Raspberry Pi OS both for

the 64-bit & 32-bit versions because the new 64-bit versions no longer use the

Raspbian core. The 64-bit version is a beta and not appropriate for regular use

on August 1, 2020.

The Raspberry Pi OS is highly optimized for the compact single-board

computers with ARM CPUs in the Raspberry Pi line. Raspberry Pi OS, with the

Openbox stacking window manager, a new theme, and a few other changes,

uses a modified LXDE as its desktop environment. The distribution is delivered

with a copy of the Wolfram Mathematica algebra software, a version of Minecraft

called Minecraft Pi and a lightweight version of the new version of Chromium.


(Raspberry Pi OS by en.wikipedia.org, January 4, 2021,

https://en.wikipedia.org/wiki/Raspberry_Pi_OS)

Brackets (text editor)

Brackets is an editor of source code with a primary focus on web

development. It is free and open-source software developed by Adobe Systems,

and is licensed under the MIT License, and is presently supported by Adobe and

other open-source developers on GitHub. It is written in HTML, JavaScript, and

Cascading Style Sheets. Brackets is cross-platform, available for distributions of

macOS, Windows, and most Linux. Brackets' main purpose is its live HTML,

CSS, and JavaScript editing functionality.

The first (1.0) release of Brackets was announced by Adobe on November

4, 2014. New features like custom shortcut key combinations and more accurate

JavaScript hinting were introduced with the update. Brackets have a big focus on

development in JavaScript-enabled, CSS, and HTML. With the release of version

1.0, for the convenience of coding in CSS, Adobe announced a feature that

extracts design information from a PSD file. As of 28 June 2016, due to low

usage, the feature was officially discontinued. However, via Photoshop and

Dreamweaver, Extract is still available, both of which are part of their paid

service, Adobe Creative Cloud. The new version of the Brackets program is

1.14.2. (Brackets (text editor) by Mitch Eveleigh, Jul 30, 2017,

https://www.mitcheveleigh.com/brackets/)
Apache (Web Server)

Apache HTTP Server is a web server, which is free and open-source,

sends web content across the Internet. It is widely referred to as Apache, and it

quickly became the most popular HTTP client on the web after development. It is

widely believed that, through applied patches and modules, Apache gets its

name from its development history and process of improvement, but that was

corrected back in 2000. It was revealed that the name derived from the respect of

the Native American tribe for its strength and durability.

Apache is just one component that is required in a web application stack

to deliver web content. LAMP, Linux, Apache, MySQL, and PHP are amongst the

most common web application stacks. The operating system that handles the

application's operations is Linux. The web server that serves web assets and

content through HTTP and processes requests is Apache. MySQL is a database,

which stores all your data in a format that is easy to query. PHP is the

programming language that performs with Apache to help create dynamic

content on the web (What is Apache? In-Depth Overview of Apache Web Server

by Jovan Hernandez, May 8, 2019,

https://medium.com/@jovanshernandez/introduction-to-apache-web-server-

2138af643039)

PHP: Hypertext Preprocessor


PHP stands for Hypertext Preprocessor. It's an open-source, server-side

scripting language used for web application development. We mean a script-

based program written for automation tasks by the scripting language.

Web pages can be designed using HTML. Code execution on the user's

browser is done with HTML (client-side). On the other hand, it is executed on the

server before it gets to the web browser of the user with the PHP server-side

scripting language. For web development and the construction of interactive web

pages for web apps, e-commerce applications, and database applications, PHP

can be embedded in HTML and is well suited. It's considered a friendly language

to connect with MySQL, Oracle, and other databases easily. (What is PHP Used

For? - Uses & Advantages by study.com, October 25, 2018,

https://study.com/academy/lesson/what-is-php-used-for-uses-

advantages.html#:~:text=PHP%20can%20be%20embedded%20in,%2C

%20Oracle%2C%20and%20other%20databases.)

HTML (Hypertext Markup Language)

HTML stands for Hypertext Markup Language. It enables the user to build

and organize web pages and applications with sections, paragraphs, headings,

links, and block quotes. In HTML, dynamic functionality can't be created because

HTML is not a programming language. Instead, similarly to Microsoft Word, it

makes it possible to organize and format documents. To mark a website page,

we use simple code structures (tags and attributes) when working with HTML.

Overall, even for complete beginners in website building, HTML is a markup


language that is straightforward and easy to learn. (What is HTML? The Basics

of Hypertext Markup Language Explained by Domantas G., November 25, 2019,

https://www.hostinger.ph/tutorials/what-is-html)

JavaScript

JavaScript is widely used in web development as a programming

language. Javascript was initially created by Netscape as a way of adding

dynamic and interactive elements to websites. The syntax is more similar to C,

although Java influences JavaScript, and is based on ECMAScript, a scripting

language developed by Sun Microsystems.

JavaScript is a scripting language on the client-side, indicating that the

source code is processed instead of on the webserver by the client's web

browser. It means that JavaScript functions can be run without communicating

with the server after a webpage has been loaded. For example, to ensure that all

the necessary fields have been filled out, a JavaScript function may review a web

form before it is submitted. The JavaScript code can generate an error message

before any information is transmitted to the server.

JavaScript code can be inserted anywhere inside the HTML of a webpage,

much like server-side scripting languages like PHP and ASP. However, only

server-side code output is shown in HTML, while JavaScript code remains

completely visible in the webpage source. It also can be referenced in a separate

JS file that can be viewed in a browser as well. (JavaScript Definition by Per

Christensson, August 8, 2014, https://techterms.com/definition/javascript)


CSS (Cascading Style Sheet)

CSS (Cascading Style Sheets) allows you to specify the visual style and

presentation of your web application. CSS enables you to separate the style from

the structure. It means, when working on your page, you are looking at lesser

code. Maintainability is also increased by the separation of style from structure

and content. CSS is a set of programmable rules defining how content is

displayed on your web pages. The styles described by CSS include a document's

colors, fonts, layout, and other presentation aspects, including display variations

for various devices and screen sizes. A common style applicable to many

documents can be described by a single CSS file.

(Cascading Style Sheets (CSS) by Wolf D., Henley A.J., December 7, 2017,

https://www.researchgate.net/publication/321629654_Cascading_Style_Sheets_

CSS)

Python

A high-level programming language, Python is designed to be easy to

read and easy to implement. It is open-source, meaning that it can be used

freely, even for commercial applications. Python can operate on Mac, Windows,

and Unix systems and has been ported to virtual machines in Java and .NET as

well.

Python, like Ruby or Perl, is considered a scripting language and is

frequently used for Web applications and dynamic Web content. It is also
supported by several 2D and 3D imaging programs, enabling users to create

custom plug-ins and extensions with Python. All examples of applications that

support a Python API include GIMP, Inkscape, Blender, and Autodesk Maya.

It is possible to parse and run scripts written in Python (.PY files)

immediately. Frequently used as programming modules that can be referenced

by other Python programs, they can also be saved as a compiled program (.PYC

files). (Python Definition by Per Christensson, June 15, 2010,

https://techterms.com/definition/python

GSM/GPRS Module

One of the widely used communication modules in embedded systems is

the GSM GPRS Modules. A GSM GPRS Module is then used to allow

communication between a microcontroller (or a microprocessor) and the

GSM/GPRS Network. GSM stands for Global System for Mobile Communication.

GPRS stands for General Packet Radio Service.

A GSM GPRS MODEM contains a GSM GPRS module and some other

components, such as a communication interface (such as RS-232 serial

communication), a power supply, and some indicators. It can connect the GSM

GPRS module on the GSM GPRS modem to an external computer (or a

microcontroller) with the aid of the said communication interface.

GSM / GPRS Modules allow wireless communication between

microcontrollers and other devices and instruments. A broad range of

applications like home automation, home security systems, disaster


management, medical assistance, vehicle tracking, online banking, e-commerce

is available to such wireless microcontroller connectivity. (GSM/GPRS Module by

electronicshub.org, September 11, 2017, https://www.electronicshub.org/gsm-

gprs-module/)

RFID (Radio Frequency Identification)

Radio Frequency Identification (RFID) is a technology, which passively

identifies a tagged object using radio waves. It is used in many industrial and

commercial applications, from tracking items along a supply chain to keeping

track of the items that have been checked out of a library. RFID is a kind of

passive wireless technology that enables an object or person to be tracked or

matched.

There are two basic parts to the system: tags and readers. The RFID

reader releases radio waves and receives signals from the RFID tag, whereas

the RFID tag uses radio waves to transmit its identity and other data. The

technology was approved before the 1970s, but due to its usage in things such

as global supply chain management and pet microchipping, it has become much

more prevalent in recent years. In combination with a microchip, a powered

antenna, and a scanner, radio frequency identification is used. Although

commercial uses were first introduced in the 1970s, in recent years it has

become more universally available. With advancements in the technologies used

to read and store information, purchasing and adapting is now more affordable.
Radio Frequency Identification works through a tiny electronic device,

which has information stored on it, typically a microchip. Generally, these devices

are very small, sometimes the size of a rice grain, and can hold a large amount

of data. Although they don't always emit electricity, some can contain batteries or

a stored power source. The scanners used to read these devices will also

provide the microchip with sufficient electricity to read. The technology has many

different uses, but it is widely used in tracking products, animals, and currency.

(Radio Frequency Identification (RFID) by Adam Hayes, December 6, 2020,

https://www.investopedia.com/terms/r/radio-frequency-identification-rfid.asp)

Touchscreen

A touchscreen is a display device that enables a person to interact with a

device or computer by using their finger or stylus. They're a suitable alternative to

a mouse or keyboard for navigating a GUI (graphical user interface). On

various devices, such as computer and laptop displays, smartphones, tablets,

cash registers, and information kiosks, touch screens are used. A grid of infrared

beams is used by certain touch screens to sense a finger's presence instead of

using touch-sensitive input.

All PCs today support the ability to have a touch screen, and most laptop

computers allow a touch screen to be used by users running Microsoft Windows

10. A lot of all-in-one computers are now capable of using a touch screen. Acer,

Dell, HP, Lenovo, Microsoft, as well as other PC manufacturers are computer

manufacturers with products that have touch screens. (Touch screen by


Computer Hope, April 30, 2020,

https://www.computerhope.com/jargon/t/toucscre.htm)

Raspberry Pi

The Raspberry Pi, first released in 2012, is a single-board computer

created in the United Kingdom by the Raspberry Pi foundation. It was built to be

a small, cheap computer used to teach children science in schools. Nearly four

million Raspberry Pis have been sold since its introduction.

The 700 MHz ARM processor is used on these machines, and the models

can be built in either 256 MB or 512 MB of RAM. Up to five USB2.0 ports can

support them. Flash memory or MicroSD Card (up to 4 GB) will be used by

Raspberry Pis for non-volatile storage, and HDMI will be used by Raspberry Pi

for digital audio and video outputs. There is no on-board network interface

available, but they do support USB Wi-Fi and Ethernet networking.

In general, Raspberry Pis runs Linux as its operating system. Pi is

supported by Arch Linux, Fedora, Puppy Linux, Slackware, FreeBSD, NetBSD,

OpenSUSE, and RISC OS. Also available is Raspbmc, an operating system

specifically created to use the Pi as a digital media center or HTPC. (Raspberry

Pi by Computer Hope, November 16, 2019,

https://www.computerhope.com/jargon/r/raspberry-pi.htm#:~:text=First

%20released%20in%202012%2C%20the,million%20Raspberry%20Pis%20were

%20sold.)
Review of Related Literature

The literature review includes the concepts, significant studies, principles,

and knowledge relevant to the study. It includes pieces of literature related to the

study that will extend the researchers' knowledge. Those included here help to

familiarize information relevant and similar to the current study, which was used

as a guide to system development.

Foreign Literature

According to Chris Lawry in his article entitled How A Visitor Management

System Can Improve Business Security and Safety, a visitor management

system mandates visitors to log in and out as they enter and exit your premises.

Knowing that their identity can be traced easily will discourage someone with

malicious intent from attempting to access your premises. It's easy for visitors to

sneak in and out of the premises undetected when there are multiple entrances

and exits. A system able to monitor all entry and exit points are needed.

Based on the article entitled Safe Entry, Easy Exit, an article written by

Mike Kennedy last September 1, 2008, doors are among the most critical points

of concern for school personnel responsible for keeping buildings safe. Security

experts suggest that, especially after classes are in session, schools limit entry to

one main entrance. It is important to lock other doors so that outsiders cannot

enter. Having doors that are not difficult to open from the inside of a school

makes it effortless for students to defeat carefully designed exterior door security
on a whim, or in a moment of inattention, they may allow entering someone who

doesn't belong. Many schools and universities choose to enhance their exterior

doors' security features by installing the latest technology and equipment and

incorporating crime-prevention strategies to help prevent such security breaches.

Based on the article written last March 3, 2017, entitled "Effective Building

Entrance and Exit Security Measures for Any Organization" written by Peace of

Mind Technologies, entrances and exits can be the weakest points of an

otherwise successful security strategy. No matter how many security guards,

cameras, and motion sensors you might have, it isn't safe at all if you can't

monitor and regulate who comes and goes from your building. However, you can

transform your building's entrances and exits from your building's most

vulnerable part to the most secure with an intelligent plan, a well-trained staff,

and some smart technology choices.

According to Bill Hoogland (2017) in his article entitled RFID: A Fast Track

for Improved Security, he said that RFID, in combination with other technologies,

is becoming a very effective tool for smart authentication and identification not

only of products and goods but also of individuals. The technology can be

combined with other technologies such as cloud computing, mobile technology,

biometrics, and IoT for considerable impact. Other technologies include

biometrics, where facial recognition, thumbprints, and other recognition

technologies can be used for maximum security in combination with RFID. It

provides an entirely new security layer that allows for very strict authentication

linked to a unique identity where such an identity is available. RFID can also be
used in conjunction with IoT, similar to its interaction with biometric technology. It

is possible to detect and monitor the intelligence of an RFID tag or chip through

the Internet. This opens up many new opportunities for technology, as it will allow

the monitoring and control of so many different assets from anywhere in the

world, from anywhere else in the world.

According to Tiago M. Fernández-Caramés, Paula Fraga-Lamas, Manuel

Suárez- Albela and Luis Castedo (2017) in their open-access peer-reviewed

chapter entitled A Methodology for Evaluating Security in Commercial RFID

Systems, information security has traditionally been governed by what is known

as the CIA Triad: confidentiality, integrity, and availability. Confidentiality has to

do with the importance of protecting the most sensitive information from

unauthorized access. Integrity consists of protecting data from alteration or

deletion by unauthorized parties and ensuring that when authorized persons

make changes, they can be reversed if any damage occurs. Lastly, availability is

the ability to access the data when needed. The RFID, like other technologies, is

vulnerable to security threats and, in particular, to attacks on the confidentiality,

integrity, and availability of the information stored on tags or shared between a

reader and a tag. In real life, most risks are a combination of security and privacy

risks: they compromise RFID security in order to gain access to information

stored or data related to a transaction.

Based on the article entitled Security In the Internet of Things Based on

RFID: Issues and Current Countermeasures, an article written by Xiao Nie, and

Xiong Zhong, 2013, RFID (Radio Frequency Identification) as the core


technology of IoT has also drawn the attention of industry and academia.

Security is an important concern for emerging RFID-based IoT applications. On

the basis of these, we are addressing the latest security counter-measures for

RFID. Corresponding technologies such as tag killing, tag sleeping, and tag

blocking are praised in the RFID system for privacy protection and anti-

interference; in the communication process, HASH-based authentication is the

main method.

According to Young B. ChoiTae, Hwan Oh, and Rajath Chouta (2017) in

their conference paper entitled RFID Implementation and Security Issues, Radio

Frequency Identification (RFID) is a technology that uses electronic tags to store

data that can be accessed wirelessly in real-time. In our society, there's really

great potential for RFID technology. Standards in the RFID industry are

examined with a focus on global standardization bodies. Security has become a

major concern with many recently exposed threats to RFID technology. Several

solutions are presented to businesses seeking to introduce RFID technology and

minimize the risk to sensitive information and company systems.

Foreign Studies

According to the study of Mohamed El Beqqal and Mostafa Azizi,

December 2017, entitled Review on security issues in RFID systems, Radio

Frequency Identification (RFID) is generally considered to be one of the most

commonly used technologies for the automatic identification of objects or


individuals. However, despite its numerous advantages, technology still poses

many challenges and concerns that are not attracting more and more

researchers, especially in the areas of security and privacy. Finally, the

researchers briefly present a solution that combines RFID and smartcard-based

biometrics to enhance security, particularly in access control scenarios.

Therefore, the outcome of our study aims to provide a strong view of the

solutions and techniques available to avoid and secure the RFID system from

specific threats and attacks.

According to the study of Muhammad Benny Chaniago and Apri Junaidi

(2019), entitled Student Presence Using RFID and Telegram Messenger

Application: A Study in SMK Unggulan Terpadu Pgii Bandung, Indonesia, it

states that the students leave their home toward their educational institutions,

either school or college, but in reality, they go somewhere else. The issue was

supported by the lack of communication between the schools and parents related

to student attendance if they came to school. It is required to create an

application for determining student presence dealing with the problems

mentioned above. When the RFID card is tapped on the RFID scanner, the

system will automatically record the data and save it to the database. The data

will be automatically stored every day and then sent personally to their parents

who have registered their mobile phones to receive information regarding their

children's presence at school on a specific date and time.

In Neelu Sengar's (2015) study entitled Server Operated Advanced Entry-

Exit Monitoring System Based on RFID, a student entry-exit control and


monitoring system for secure and reliable applications is the primary objective of

the project. The main aim of the project is to authenticate the entry-exit of each

student. The system enables students to check-in and check-out under fast,

protected, and reliable conditions. The software module also includes a capability

to update, edit or delete any record for future use so that if any students want to

exit earlier for urgent work, then the administrator updates their record by this

function.

According to the study of Kim J., Yang C., Jeon J. (2007), entitled A

Research on Issues Related to RFID Security and Privacy, Radio Frequency

Identification (RFID) is a technology for automated identification of objects and

people. RFID systems have become more popular in areas such as supply chain

management and automated identification systems. However, there are many

current and potential issues in RFID systems that could threaten the future of

technology. In order to successfully adopt RFID technology in various

applications, solutions need to be developed to protect the data information of

the RFID system. This study investigates important issues related to the privacy

and security of RFID based on recent literature and proposes solutions to the

problem.

In Kwangho Jung and Sabinne Lee's (2015) study entitled A systematic

review of RFID applications and diffusion: key areas and public policy issues, the

applicants for RFID called e-IDs, smart tags, and contactless smart cards are

used in a variety of areas of our everyday lives, including tracking of

manufactured goods, currency, and patients on payment systems. To review


these different RFID applications, it is important to explore not only on-going

issues of e-governance such as digital identification, distribution, and governance

but also business-oriented application areas such as the supply chain. Through a

systematic review approach from 111 previous studies on RFID technology for

the public sector, the researchers have identified six main areas for RFID

applications: defense and security, identification, environmental applications,

transport, health and welfare, and livestock farming. Further research on the

effects of RFID includes not only numerous theoretical problems but also legal

and managerial issues. Thorough research is needed to examine the essential

factors for the adoption and deployment of new RFID applications in terms of

technology management and digital literacy. Massive data-driven research is

also anticipated to identify RFID performance in government agencies and

industry sectors.

Local Literature

According to the article entitled "Ateneo de Manila University explores

data security in the use of RFID" by Teresa Umali in 2018, as stated by the

announcement made by the Ateneo de Manila University, the popularity that

RFID has earned is because it has made life more convenient. But alongside its

benefits is the potential issue of the data privacy breach, given that an RFID

comprises an identifier that is uniquely assigned to the individual. Organizations

use RFID to keep track of employee attendance and facilitate employee access

to certain areas, systems, applications, and other company resources. Ever since
RFID was first introduced, privacy-related concerns were raised. Concerns on

how the government and private sector use the data stored are unavoidable

since an RFID tag can record unique identifiers assigned to an individual.

Attention should also be given to mechanisms that guarantee the security of

RFID systems. On the one hand, users must take into account all possible risks

posed by the technology, particularly those related to a person's privacy.

Based on the article of Rey Garcia (2011) entitled "Olongapo launches

own unified ID system at government-run school," he said that Gordon College, a

city government-run school here, has begun using a multi-functional Radio

Frequency Identification (RFID) system to test the benefits of the national

government's proposed unified ID system. The card will serve as a personal ID

card of the students and employees in transacting business with the school, the

city government offices, and other entities since it will contain information

compliant with the controversial unified ID system of the national government. It

can be used as a gate pass to the school campus by using an automated

electronic turnstile equipped with card readers. The RFID card will also act as a

Bundy clock or time recorder to track the school attendance of students and

faculty members. The high technology system being used was donated by a

Subic-based entrepreneur. Dr. Jay, Son of Wow Cards, has donated a complete

RFID system package that includes a database management system, automated

electronic turnstiles equipped with card readers, Close-Circuit TV cameras, and

the RFID card itself to be provided to Gordon College students.


Local Studies

In the study of Analyn R. Mendoza, Mheiane M. Velasco, Epiphany V.

Rosco, Elthone John Tiongco, and Louie F. Agustin (2015) entitled Student

Monitoring System With RFID & SMS Notification For Student of Enhanced

Curriculum in the Arts Program, the foremost goal of the project is the students

should wear RFID tags. They will tap it on the RFID reader to become aware of

their information and saved the file of their time in and time out to the database.

SMS notification is used to send SMS to their parents for complacency purposes.

It helps parents of students monitor the entrance and exit of their child without

problems.

Based on the study entitled "Development of Student Monitoring System

with the use of Low-Frequency Radio Frequency Identification (RFID) and Short

Messaging Service (SMS)" conducted by Dellosa in 2011 July, the task of the

student monitoring system is to keep track of the students within the school

premises. The developed software can capture the name, entry, and exit time of

the student and record it. Moreover, software developed can monitor the entry

and exit time through the Short Messaging Service (SMS).

Based on the study entitled "iNotified: An SMS and RFID-Based

Notification System of Lipa City Colleges, Lipa City, Batangas, Philippines"

conducted by Mr. Philip Villamin Mojares in 2013, the school has no way of

providing immediate information to the parents if their children are in or out of the

school premises in a particular time. The researcher, therefore, performed this

system development study, which is considered a modern technology that helped


the school solve the issue of monitoring the whereabouts of the students. In

specific, it aimed to design a system to maximize the use of the SMS module and

RFID technology; to develop a system to ensure the privacy and protection of the

information stored in the database; to identify the advantages of using the SMS

module and RFID technology as a means of communication between parents

and the school; to test and evaluate the efficiency of the system.

Synthesis

The technical background provided the researcher with an in-depth

understanding of the technologies required to develop the system. All the

information of the technologies needed is essential in developing the system,

specifically, the information in Raspberry Pi, which will be used as a portable

computer of the developed system, and the Raspberry Pi is integrated with

technologies like GSM Module and RFID System. Also, the technical background

presents the different programming languages that the researchers will use in

system development. This technical information supported the researchers' claim

that the research is technically feasible.

Related literature played a part in the researcher's understanding that the

study is operationally feasible. This was proven by the numerous examples cited

in the literature. The literature written in this chapter by foreign and local authors

discusses the concepts and narrative details of relevant information to the study.

The foreign and local literature will help the researchers to know the importance
and benefits of having a monitoring system in the entrance and exit to enhance

security and safety in a university. Also, the literatures will help the researchers

to know how an RFID system will improve the security in a university. The

literature provides important information that will help the researchers in

developing and creating the system.

The researchers gathered information from the foreign and local studies

that are related to the system of the researchers. The different related studies,

both local and foreign, give the researcher additional information on how the

system will be developed, ideas of the process, and the technologies needed to

develop the system. The foreign and local systems will serve as a reference for

the researchers in creating the system.

You might also like