Thesis Caja 1-3
Thesis Caja 1-3
Thesis Caja 1-3
CHAPTER 1
This chapter includes the introduction, theoretical framework, statement of the problem,
hypothesis, scope and limitation, conceptual framework, significance of the study and the definition
of terms used.
Lately we have noticed that some of the residents of the barangay is having troubles
requesting for documents and looking out their basic residential information which is very
troublesome if you really need the document from our barangay hall that day So we came up an idea
to resolve this problem, CAJA INNOVATIONS created a device that can easily access the residents
information through different types of log-in security that can also print the requested documents
faster This device can automatically print documents and store data through a registration system that
will be processed by our IT and BHW (Barangay Health Workers) to ensure that each resident of the
Introduction
Through generations our technology have changed drastically from analog phones to
smartphones, from CRT Televisions into Smart TV, in this state, we are facing a new era of
life became easier, and data storing became more efficient. And because of that, the researchers
thought that what if we use our modern technology in our barangay using it as a secure database
system and automatic document printer for every barangay halls to have a faster, effective, easier, and
This study is all about the provision of a secure database and self printing documents device
system that can easily view the resident's information and print what document he/she needs for
1
AMA COMPUTER COLLEGE
every barangay halls using different types of programs, hardware, and software to
automatically store data and print documents that is accessible to the residents who has the
registered informations. The citizen in the barangay will be able to access the personal information
each individual have through the device, as some areas requires the documentations that can
only be access in our barangays, the amount of time and energy to find the rightful document for
each people of the barangay community is a lot, the device such as this focuses on the flexible
Barangay facilities are responsible for a lot of aspects in the community, cleanliness, unity,
peace and so on, as for this study the researchers mainly focus on the documentations needed by
each people from the community, documents that can only be accessed from the barangay like
barangay clearance, permits, certificate of indigency and more are important requirements in
getting a job, loans, enrollments and basically any aspects that involves legal records from
barangays.
As the Philippines populations increases, it increases the people in every barangay that are
registered, from infants to elderly each one has a legal records that the government has as a part of
our identity as Filipinos, accessing these said documents gets confusing when there is a entire
The device was created to list personal data and documentation in an organize matter to avoid
confusion and personality theft that may happen, this device also provides an effortless access for the
people to approach and fast transaction that will occur in using this device.
2
AMA COMPUTER COLLEGE
The objective of our research is to provide an accurate, database system that can store the data of each
residents and view it anytime they want to and a self-document printing function so that processing
The main objective of this research is to create a device that is functional and active in terms of:
1.1 Printing
1.2 Durability
1.3 Efficiency
1.5 Security
1.6 Modernity
2. What are the insights of residents when it comes to modernizing the way they process documents
By using this device, it can help ease problem with finding information and in document
Elderly – most of the elderly have a hard time walking around so instead of going back and
forth to find their information, they will just have to stand on the device and follow the guidelines in
the device
Barangay staff – as for the barangay staff, the machine is an automatic data and printing
machine similar to ATM Machines which will lessen their work and make the process twice as fast as
Town Residents – The device is open to use for every person in the community not just it
will help them to save time waiting but it will make their process easier
3
AMA COMPUTER COLLEGE
Job Finders – Most of the people that looks for employment needs to process their
requirements fast like to request a barangay clearance, this device will print it easily
Future Researchers – They can use this as their guide and reference paper to make their
research easier and add more features and innovate the device even more.
The main study of this research is to provide a secure, durable, efficient, and easy database
system and document printer that has the function to be used in every barangay that saves time rather
than waiting on the front desk, It is also safe for the environment and very user friendly so everyone
at any age can use it This study will be held at the different branches of AMA University in the nation
including AMACC Cabanatuan, AMA East Rizal, AMACC Lipa, and AMACC Fairview in the
school year 2022-2023, the parts of the products will be purchased on different locations of the
nation.
The current population of the Philippines is 112,954,85. There are 42,036 barangays in the
country (as of year 2020). The largest barangay in terms of population size is Barangay 176 in
Caloocan City with 247 thousand persons. It was followed by Commonwealth in Quezon City
Conceptual Framework
Modernity theory relies on the key notion of rationalization to explain the uniqueness of
form, specifically, the introduction of calculation and control into social processes with a consequent
increase in efficiency. But rationalization also reduces the normative and qualitative richness of the
traditional social world, exposing social reality to technical manipulation. Modernity theories often
claim that this reduction impoverishes our relation to the world. But, the theorists argue,
impoverished though it may be, technical rationality gives power over nature, supports large scale
4
AMA COMPUTER COLLEGE
organization, and eliminates many spatial constraints on social interaction. This view of modernity is
studies. Albert Borgmann’s theory of the “device paradigm” is a well known example of this
For a successful outcome to be achieved for this study, specific process were discussed to
INPUT PROCESS
- Office hours of the
- Data collection
barangay hall.
- Lack of residential - Surveys
information and
security. - Physical Observation
- Slow processing of - Interviews
documents.
- Lack of computer
literate staffs.
OUTPUT
- Efficiency
- Better data
management
- Faster process
- Better security
- Extended working
hours
5
AMA COMPUTER COLLEGE
Hypothesis
Machine is like people. People go to their doctor when they are sick. Machines need to be checked by
They can forward to their barangay staff to file a missing information, as they can assist you in your
How about the elderly people who struggles with modern technology?
The machine is like a children's toy, it has specific colors for different commands, and the user
Like any other devices, our main target on this machine is to modernize the way of data collection
6
AMA COMPUTER COLLEGE
This machine is like a human body, it consists of different types of hardware, programming, and
Definition Of Terms
Automatically - reference to a device or process by itself with little or no direct human control.
in a computer system
Efficiency - the ability to achieve an end goal with little to no waste, effort, or energy
Hardware - the computer's tangible components or delivery systems that store and run the written
Maintenance - the process of maintaining or preserving someone or something, or the state of being
maintained
Modernize - adapt something to modern needs or habits, typically by installing modern equipment or
adopting modern ideas or methods.
7
AMA COMPUTER COLLEGE
Machine - an apparatus using or applying mechanical power and having several parts, each with a
definite function and together performing a particular task.
Programming - the process of writing code to facilitate specific actions in a computer, application or
software program, and instructs them on how to perform.
CHAPTER II
Review of Related Literature and Studies
Based on our team’s research, we have concluded that there is no actual product and contexts in existence related to this
research but rather a multiple ideas of the product. This product may be considered as a novelty, it is a separate individuals
of research ideas and technological innovations combined into a single innovative device.
8
AMA COMPUTER COLLEGE
Foreign Literature
According to Pooja K M, Multi-level Security using QR Code, Biometrics and Password for
Security Systems (2018), the security level of such systems proves that there is major chance of
being victimized to cyber threats. Nowadays, Stealing PIN or password is easier, moreover
advancement in System hacking can steal anyone of our PIN or Passwords.
According to Alok Aswal, Impact of Automation in The Market (2018), combining automated
processes of survey design, interactive dashboards and visualizations can help us to deliver faster
and real-time updates to clients. Automation also enhances efficiency and reduces costs, which
gains we pass on to clients.
9
AMA COMPUTER COLLEGE
10
AMA COMPUTER COLLEGE
Local Literature
Storage of Information
The information that QR codes can hold is a lot bigger than what barcodes can contain. It overcomes
the print limitations on product packaging. It can contain all the vital information even with minimal
space occupied on the package thus preserving your product’s design.
11
AMA COMPUTER COLLEGE
Customer Feedback
With one scan, your customers can submit product feedback or share their experience with your
product. Customer feedback is crucial in the improvement of your systems. It is also one way to build
a good reputation as you are able to relay to your target market that you value their input.
https://www.elixirphil.com/key-uses-of-qr-codes/
The obvious advantage of biometric security system compared to more conventional or traditional
authentication methods, such as personal ID cards, magnetic cards, keys or passwords, is that it is
intrinsically linked to an individual person and therefore not easily compromised through theft,
collusion or loss.
Most biometric systems are easy to use and this simplifies user management resulting in cost
savings to the relevant supplier or industry. Users do not need to remember passwords or PIN
numbers and user accounts cannot be shared. If improved reliability or security is needed, it is
possible to use a combination of one or more biometric technologies such as fingerprint
recognition, facial recognition and speaker recognition.
However it needs to be remembered that not all biometric technologies will suit all users, which
could be a hurdle in some sectors because user co-operation is usually required. The cost of setting
12
AMA COMPUTER COLLEGE
But biometric systems, while offering some compelling advantages over older technologies, are
far from infallible. At the Mobile world Congress in February 2016, President of Chinese mobile
security firm Vkansee, Jason Chaikin, fooled the iPhone’s fingerprint scanner, Touch ID, with
play-doh, the children’s modelling clay . And, in 2017, the BBC demonstrated how one of its
reporters and his twin was able to fool HSBC’s voice recognition software , which allowed the
access of balances and recent transactions.
Privacy concerns will also need to be addressed and no system, however technologically
advanced, will be 100% foolproof. David Balaban, founder of Privacy PC, recently highlighted to
IFSEC Global four major drawbacks of biometric authentication:
According to Biometrics in the Philippines: Here’s Everything You Need to Know (2022), Unlike
using other authentication techniques, such as passwords, the use of biometrics in the Philippines for
your company or workplace gives you a clear connection between the person and the identity they
say.It is becoming more difficult today to secure sensitive documents. Especially amid the pandemic,
the benefits gained from using biometric security systems can provide, for example, the safety of
servers, server rooms, and other properties of your company. Biometrics is an essential way of
stopping unauthorized people from entering protected networks and systems in business
environments in the Philippines.
Biometrics Philippines | Face Recognition Supplier - IOT Philippines Inc. IOT Philippines Inc.
(iotphils.com)
According to ELID Technology Intl., Inc: A Brief Overview of Biometrics in the Philippines (2018),
Without a doubt, biometrics technology is the most efficient way of authentication compared to the
more common methods such as using smart cards, passwords, or any combination of the two. The
user would potentially not have to remember a password or series of passwords just to access
information, especially if they have a hard time remembering.
Biometrics Philippines (elid.com.ph)
13
AMA COMPUTER COLLEGE
CHAPTER 3
METHODOLOGY
This section of the research indicates the methodology and procedures that are being use in
the process of making this machine possible, the phase of certain steps are able to talked in this
section as to how, when, and why it is possible for the researchers came up with a machine that can
The research used a descriptive method that primarily focuses on describing the nature of a
demographic segment, without focusing on “why” a particular phenomenon occurs. The researcher
were able to use the descriptive method kind of research because of the opinions gathered by the
people who are involved in the said topic who wholeheartedly helped us in answering the question we
have generated to be able to clarify and further evaluate the matter that is talked about. As the said
research focuses on the barangay officials and the barangay community itself we have asked some of
the citizens and the barangay officials of Nueva Ecija about the certain topics related to the generating
paperworks and information of each citizen of the said barangay and its inconvenience.
The researchers use a standard questionnaire in the struggles that are encountered in the
barangays, 10 questions was generated by the researchers in gathering data, as the questionnaires was
asked to the participants the process of summarizing and evaluating the said data is implemented, the
14
AMA COMPUTER COLLEGE
1) Requirements Specification
2) Design
METHODS
The participants of this study are the barangay treasurer and the barangay record keeper that
is well aware of the happenings in the information department of the barangay facility.
The data was gathered in the first semester of school year 2022-2023. The 10 item
questionnaires was generated by Ashley Nicole Ramos and the questioning process was implemented
After the permission to interview was legalize by our professor, the participants was able to
be interviewed by the researchers in an orderly and legal manner, 1 week was spended by the
researchers in generating questionnaires and communicating with the said participants in line with the
research topic.
15
AMA COMPUTER COLLEGE
16