Thesis Caja 1-3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

AMA COMPUTER COLLEGE

CHAPTER 1

THE PROBLEM AND ITS BACKGROUND

This chapter includes the introduction, theoretical framework, statement of the problem,

hypothesis, scope and limitation, conceptual framework, significance of the study and the definition

of terms used.

Lately we have noticed that some of the residents of the barangay is having troubles

requesting for documents and looking out their basic residential information which is very

troublesome if you really need the document from our barangay hall that day So we came up an idea

to resolve this problem, CAJA INNOVATIONS created a device that can easily access the residents

information through different types of log-in security that can also print the requested documents

faster This device can automatically print documents and store data through a registration system that

will be processed by our IT and BHW (Barangay Health Workers) to ensure that each resident of the

barangay will have an access on our device.

Introduction

Through generations our technology have changed drastically from analog phones to

smartphones, from CRT Televisions into Smart TV, in this state, we are facing a new era of

technology in which almost everything is powered by electrical components, because of technology,

life became easier, and data storing became more efficient. And because of that, the researchers

thought that what if we use our modern technology in our barangay using it as a secure database

system and automatic document printer for every barangay halls to have a faster, effective, easier, and

innovative way of storing data and printing documents.

This study is all about the provision of a secure database and self printing documents device

system that can easily view the resident's information and print what document he/she needs for

1
AMA COMPUTER COLLEGE

every barangay halls using different types of programs, hardware, and software to

automatically store data and print documents that is accessible to the residents who has the

registered informations. The citizen in the barangay will be able to access the personal information

each individual have through the device, as some areas requires the documentations that can

only be access in our barangays, the amount of time and energy to find the rightful document for

each people of the barangay community is a lot, the device such as this focuses on the flexible

and fast access for people to use.

Background of the Study

Barangay facilities are responsible for a lot of aspects in the community, cleanliness, unity,

peace and so on, as for this study the researchers mainly focus on the documentations needed by

each people from the community, documents that can only be accessed from the barangay like

barangay clearance, permits, certificate of indigency and more are important requirements in

getting a job, loans, enrollments and basically any aspects that involves legal records from

barangays.

As the Philippines populations increases, it increases the people in every barangay that are

registered, from infants to elderly each one has a legal records that the government has as a part of

our identity as Filipinos, accessing these said documents gets confusing when there is a entire

community records for each citizens.

The device was created to list personal data and documentation in an organize matter to avoid

confusion and personality theft that may happen, this device also provides an effortless access for the

people to approach and fast transaction that will occur in using this device.

2
AMA COMPUTER COLLEGE

Objective of the Study

The objective of our research is to provide an accurate, database system that can store the data of each

residents and view it anytime they want to and a self-document printing function so that processing

documents in the barangay will be a lot faster and less hassle.

The main objective of this research is to create a device that is functional and active in terms of:

1.1 Printing

1.2 Durability

1.3 Efficiency

1.4 Data gathering

1.5 Security

1.6 Modernity

2. What are the insights of residents when it comes to modernizing the way they process documents

and access their information?

3. What will be the impact of technological modernization in our barangay?

Significance Of The Study

By using this device, it can help ease problem with finding information and in document

processing especially for the:

Elderly – most of the elderly have a hard time walking around so instead of going back and

forth to find their information, they will just have to stand on the device and follow the guidelines in

the device

Barangay staff – as for the barangay staff, the machine is an automatic data and printing

machine similar to ATM Machines which will lessen their work and make the process twice as fast as

the old way

Town Residents – The device is open to use for every person in the community not just it

will help them to save time waiting but it will make their process easier

3
AMA COMPUTER COLLEGE

Job Finders – Most of the people that looks for employment needs to process their

requirements fast like to request a barangay clearance, this device will print it easily

Future Researchers – They can use this as their guide and reference paper to make their

research easier and add more features and innovate the device even more.

Scope And Limitation

The main study of this research is to provide a secure, durable, efficient, and easy database

system and document printer that has the function to be used in every barangay that saves time rather

than waiting on the front desk, It is also safe for the environment and very user friendly so everyone

at any age can use it This study will be held at the different branches of AMA University in the nation

including AMACC Cabanatuan, AMA East Rizal, AMACC Lipa, and AMACC Fairview in the

school year 2022-2023, the parts of the products will be purchased on different locations of the

nation.

The current population of the Philippines is 112,954,85. There are 42,036 barangays in the

country (as of year 2020). The largest barangay in terms of population size is Barangay 176 in

Caloocan City with 247 thousand persons. It was followed by Commonwealth in Quezon City

(198,285) and Batasan Hills in Quezon City (161,409).

Conceptual Framework

Modernity theory relies on the key notion of rationalization to explain the uniqueness of

modern societies. Rationalization refers to the generalization of technical rationality as a cultural

form, specifically, the introduction of calculation and control into social processes with a consequent

increase in efficiency. But rationalization also reduces the normative and qualitative richness of the

traditional social world, exposing social reality to technical manipulation. Modernity theories often

claim that this reduction impoverishes our relation to the world. But, the theorists argue,

impoverished though it may be, technical rationality gives power over nature, supports large scale

4
AMA COMPUTER COLLEGE

organization, and eliminates many spatial constraints on social interaction. This view of modernity is

characteristic of a normative style of cultural critique that is anathema to contemporary technology

studies. Albert Borgmann’s theory of the “device paradigm” is a well known example of this

approach (Borgmann, 1984).

For a successful outcome to be achieved for this study, specific process were discussed to

produce the project’s design and development

INPUT PROCESS
- Office hours of the
- Data collection
barangay hall.
- Lack of residential - Surveys
information and
security. - Physical Observation
- Slow processing of - Interviews
documents.
- Lack of computer
literate staffs.

OUTPUT
- Efficiency
- Better data
management
- Faster process
- Better security
- Extended working
hours

5
AMA COMPUTER COLLEGE

Hypothesis

How about the maintenance of the machine?

Machine is like people. People go to their doctor when they are sick. Machines need to be checked by

the technical support.

How about a resident missing an information?

They can forward to their barangay staff to file a missing information, as they can assist you in your

problem regarding the machine

How about the elderly people who struggles with modern technology?

The machine is like a children's toy, it has specific colors for different commands, and the user

interface is very friendly

What is the main target?

Like any other devices, our main target on this machine is to modernize the way of data collection

and document processing making it even more faster.

How does it work?

6
AMA COMPUTER COLLEGE

This machine is like a human body, it consists of different types of hardware, programming, and

software that needs to work together to function properly

Definition Of Terms

Accessible -  able to be reached or entered.

Automatically - reference to a device or process by itself with little or no direct human control.

Database - an organized collection of structured information, or data, typically stored electronically

in a computer system

Drastically -  a way that is likely to have a strong or far-reaching effect.

Durability - the ability to withstand wear, pressure, or damage

Efficiency - the ability to achieve an end goal with little to no waste, effort, or energy

Elderly – An old person

Ensure - make certain that something shall occur or be the case

Hardware - the computer's tangible components or delivery systems that store and run the written

instructions provided by the software

Held - grasp, carry, or support with one's hands

Innovative - featuring new methods; advanced and original

Maintenance - the process of maintaining or preserving someone or something, or the state of being
maintained

Modernity - the quality or condition of being modern.

Modernize - adapt something to modern needs or habits, typically by installing modern equipment or
adopting modern ideas or methods.

Rather - used to indicate one's preference in a particular matter.

Secure - fixed or fastened so as not to give way, become loose, or be lost.

Software - the programs and other operating information used by a computer.

Troublesome - causing difficulty or annoyance.

7
AMA COMPUTER COLLEGE

Machine - an apparatus using or applying mechanical power and having several parts, each with a
definite function and together performing a particular task.

Programming - the process of writing code to facilitate specific actions in a computer, application or
software program, and instructs them on how to perform.

CHAPTER II
Review of Related Literature and Studies

Based on our team’s research, we have concluded that there is no actual product and contexts in existence related to this
research but rather a multiple ideas of the product. This product may be considered as a novelty, it is a separate individuals
of research ideas and technological innovations combined into a single innovative device.

Fig. 1: V1 Version prototype of the device


Fig. 1 illustrates the first proposed 3D design of the product which the monitor can be large as 17” for
a perfect wide view angle and button system in which this was considered as a V1 version prototype
and needs more adjustments

Fig. 2 First security method


Fig. 2 shows the first security method which is the fingerprint scanner connected onto an
Arduino micro controller.

8
AMA COMPUTER COLLEGE

Fig. 3 Second security method


Fig. 3 shows a 4x4 keypad module that has a purpose to log in your account onto the machine

Fig. 4 Last security method


Fig. 4 shows the last security method which is the QR code scanner, in case the 2 other
security methods fails this can be an option

Foreign Literature
 According to Pooja K M, Multi-level Security using QR Code, Biometrics and Password for
Security Systems (2018), the security level of such systems proves that there is major chance of
being victimized to cyber threats. Nowadays, Stealing PIN or password is easier, moreover
advancement in System hacking can steal anyone of our PIN or Passwords.
 According to Alok Aswal, Impact of Automation in The Market (2018), combining automated
processes of survey design, interactive dashboards and visualizations can help us to deliver faster
and real-time updates to clients. Automation also enhances efficiency and reduces costs, which
gains we pass on to clients.

9
AMA COMPUTER COLLEGE

Impact of Automation on Market Research | Acuity Knowledge Partners (acuitykp.com)


 According to Mario Coccia, Technological innovation (2021), Technological innovation is
underpinned in technology, which can be defined as a complex system composed of more than
one entity or sub system of technologies and a relationship that holds between each entity and at
least one other entity in the system for achieving specific goals
(PDF) Technological Innovation | Mario Coccia - Academia.edu
 According to Simone Casiraghi, Biometrics and personal identity (2018) Delving into definitions
and types of biometrics has helped to grasp the main characteristics and possible advantages of
these technologies. A brief historical overview of identity management practices and identity
documents allowed me to introduce the rationale behind the current use of biometrics in the EU
and India.
[PDF] Biometrics and personal identity : an alternative philosophical approach to the
mainstream debate | Semantic Scholar
 According to Arrow Electronics, Digital Kiosk: The future of retail signage. The digitization of
signage aligns with the technology trend of digital transformation – using digital technologies to
create better customer experiences. With the advent of the internet and mobile devices, consumers
are more accustomed to interacting with content on screens
Digital Kiosks: The Future of Retail Signage - TouchSource
 According to Recfaces, What Is Biometric Security And Why Does It Matter Today? (2021),
More and more companies benefits from the biometric security systems due to being crucial for
an unauthorized people gained access on the company’s sensitive information, passwords are not
enough for those sensitive information that’s why using biometrics as a security system can
benefit small or large companies
Biometric Security: Importance and Future | Biometric Security System Overview | RecFaces
 According to Okta, Fingerprint Biometrics, (2022) Overall, fingerprint biometrics is considered
to be highly secure and a common method of protection. For the highest level of security, they
can be used as part of a dual or multi-factor authentication (MFA) model that includes the use of
at least one other method as well, such as a password or token.
Fingerprint Biometrics: Definition & How Secure It Is | Okta
 According to IFSEC Global, Biometric Security Systems: A guide to devices, fingerprint
scanners, and facial recognition access control (2022), Organizations have adopted biometrics
security system most commonly in the access control systems. Fingerprint scanner software is
being utilized time by time to ensure the security of the organizations.
Biometric security systems: a guide to devices, fingerprint scanners and facial recognition
access control (ifsecglobal.com)
 According to Mike Elgan, QR Code Security: What you need to know today (2021), The largest
tech companies are embracing QR codes in a big way. Silicon Valley companies (and others) are
finding QR codes useful for self-service information in retail stores, transactions and other uses.
Most interestingly, they’ll also become useful for augmented reality.
QR Code Security: What You Need to Know Today (securityintelligence.com)
 According to Priya Pedakmar (Educba), Database Management System (DBMS) (2022),
Database management systems are crucial links in the creation and management of data. They
are needed for the effective running and management of data. It also helps companies to transfer
the said data through the entire system.
Database Management System - 4 Important Roles of Explained (educba.com)

10
AMA COMPUTER COLLEGE

Local Literature

 According to Jake Maggay, Biometric Attendance Monitoring System of Cagayan State


university (2018), biometric technologies capitalize upon unique, permanent, and scannable
human characteristics that is unique and no other person shares. This characteristic should also
remain the same overtimes.
(PDF) BIOMETRIC ATTENDANCE MONITORING SYSTEM OF CAGAYAN STATE
UNIVERSITY – LASAM CAMPUS, PHILIPPINES (researchgate.net)
 According to NSMGS Technologies: Barangay Information and Management System (BIMS),
2022, Using something that can give and store database, it can be environmentally including,
reducing paper consumption and reduce the time to wait, it is also a good way to find your
information on our barangay.
Barangay Information Management System – NSMGS Technologies
 According to Samuel Vargas, QR Code Attendance Systems with SMS Notification (2021), the
implementation of QR code-based system will ease up student attendance record and monitoring.
The record of attendance will be efficient, timely, convenient, and accurate.
QR Code Attendance System with SMS Notification - Free Sample 2022 (inettutor.com)
 According to “The Use of Biometric Attendance Recording System (BARS) and Its Impact on
the Work Performance of Cabanatuan City Government Employees” 2018 Biometric technology
as a means of identifying and verifying an individual’s characteristic is widely used in many
aspects of peoples’ lives nowadays. In this regard, Local Government Unit (LGU) uses this
technology to provide a more comprehensive system in monitoring employee attendance and
how it may affect their performance. But the problems of the study aren’t completely
done…..there are certain bugs that can employees manipulate their attendance the time in and out
cause their access aren’t limited.
https://www.scirp.org/journal/paperinformation.aspx?paperid=82095
 With the onset of the COVID-19 pandemic, the need for digitalization has become more
apparent and necessary. Government agencies are increasingly adopting innovative schemes to
boost transactions and at the same time, prevent the further spread of the virus. This scenario is
seen particularly in the healthcare sector where authorities continue to innovate in an attempt to
contribute to safety and health protocols. The release and adoption of QR Codes was a digital
concept, the Task Force Officer mentioned that initial registration was done manually as not all
have access to the internet or own mobile phones and computers. He stated that “this way, even
those in the hinterlands will be served.” During the first batch of registration, barangay workers
collected pertinent and personal details of residents. 
https://opengovasia.com/philippine-province-set-to-use-qr-code-system-for-covid-19-contact-
tracing/
Key Uses of QR Codes that You Shouldn’t Ignore Efficient Inventory
With the large amount of data that QR codes can store plus its quick scanning capability, you can
effectively take charge of your product inventory. QR codes can help ensure accuracy while
consuming less time as compared to manual data entry.

Storage of Information
The information that QR codes can hold is a lot bigger than what barcodes can contain. It overcomes
the print limitations on product packaging. It can contain all the vital information even with minimal
space occupied on the package thus preserving your product’s design.

11
AMA COMPUTER COLLEGE

Granular and Real-Time Data Tracking


Real-time tracking is essential even for large scale inventories. With QR codes in place, you will not
just be able to track data real-time, you will also be able to retrieve granular data about your
manufactured goods including their GPS locations, when they were last scanned, and other important
information that will help in your inventory.

Marketing and Promotions


Since the information that can be stored in QR codes is huge, you can add contents like videos and
audios to it for better audience engagement. Rich content can help market your products and speak to
your target market in a way that print promotions can’t.

Customer Feedback
With one scan, your customers can submit product feedback or share their experience with your
product. Customer feedback is crucial in the improvement of your systems. It is also one way to build
a good reputation as you are able to relay to your target market that you value their input. 
https://www.elixirphil.com/key-uses-of-qr-codes/

Design and Implementation of aHybrid Barangay InformationManagement System (2021) The


Study generally aims to develop a Hybrid Barangay Information Management System to support andaugment the day
to day operations of the barangay. It specifically aims to Developed as follows:The Barangay Poblacion
Document Request System which implements the procedure of issuing document
request that satisfies client‟s requirements and is based on the Barangay Citizen‟s Charter. This gives
priority tothe client‟s request. The Barangay Poblacion Incident Recording System is where the
complaints of the client is kept record in alocal computer.The Barangay Poblacion Project Monitoring
System is where the effective monitoring of projects are taken intoconsideration. It plays a role on
preventing overspending or underspending in implementing barangay projects.This system promotes
transparency and accountability in the barangay.The Barangay Poblacion Profiling System is where
the collecting, analysing and documenting necessaryinformation that defines the current barangay
profile. It covers the census, organizational chart, vision and mission and barangay status. This
proposal doesn’t mention about closing an incident case (hearing), payroll and healthcare.
https://www.academia.edu/48982666/Design_and_Implementation_of_a_Hybrid_Barangay_Informat
ion_Management_System

The obvious advantage of biometric security system compared to more conventional or traditional
authentication methods, such as personal ID cards, magnetic cards, keys or passwords, is that it is
intrinsically linked to an individual person and therefore not easily compromised through theft,
collusion or loss.
Most biometric systems are easy to use and this simplifies user management resulting in cost
savings to the relevant supplier or industry.  Users do not need to remember passwords or PIN
numbers and user accounts cannot be shared. If improved reliability or security is needed, it is
possible to use a combination of one or more biometric technologies such as fingerprint
recognition, facial recognition and speaker recognition.

However it needs to be remembered that not all biometric technologies will suit all users, which
could be a hurdle in some sectors because user co-operation is usually required. The cost of setting

12
AMA COMPUTER COLLEGE

up new biometric systems can be significant, particularly where sophisticated software is


introduced.

But biometric systems, while offering some compelling advantages over older technologies, are
far from infallible. At the Mobile world Congress in February 2016, President of Chinese mobile
security firm Vkansee, Jason Chaikin, fooled the iPhone’s fingerprint scanner, Touch ID, with
play-doh, the children’s modelling clay . And, in 2017, the BBC demonstrated how one of its
reporters and his twin was able to fool HSBC’s voice recognition software , which allowed the
access of balances and recent transactions.

Privacy concerns will also need to be addressed and no system, however technologically
advanced, will be 100% foolproof. David Balaban, founder of Privacy PC, recently highlighted to
IFSEC Global four major drawbacks of biometric authentication:

1. Biometric authentication details cannot be invalidated remotely if something goes wrong


2. The scourge of master fingerprints fooling popular smart devices
3. Biometrics are unchangeable, making any replicas extremely easy to use
4. Software flaws
https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices-fingerprint-
scanners-facial-recognition/

 According to Biometrics in the Philippines: Here’s Everything You Need to Know (2022), Unlike
using other authentication techniques, such as passwords, the use of biometrics in the Philippines for
your company or workplace gives you a clear connection between the person and the identity they
say.It is becoming more difficult today to secure sensitive documents. Especially amid the pandemic,
the benefits gained from using biometric security systems can provide, for example, the safety of
servers, server rooms, and other properties of your company. Biometrics is an essential way of
stopping unauthorized people from entering protected networks and systems in business
environments in the Philippines.
Biometrics Philippines | Face Recognition Supplier - IOT Philippines Inc. IOT Philippines Inc.
(iotphils.com)

According to ELID Technology Intl., Inc: A Brief Overview of Biometrics in the Philippines (2018),
Without a doubt, biometrics technology is the most efficient way of authentication compared to the
more common methods such as using smart cards, passwords, or any combination of the two. The
user would potentially not have to remember a password or series of passwords just to access
information, especially if they have a hard time remembering.
Biometrics Philippines (elid.com.ph)

13
AMA COMPUTER COLLEGE

CHAPTER 3

METHODOLOGY

This section of the research indicates the methodology and procedures that are being use in

the process of making this machine possible, the phase of certain steps are able to talked in this

section as to how, when, and why it is possible for the researchers came up with a machine that can

be helpful in the community.

A. General Method Used

The research used a descriptive method that primarily focuses on describing the nature of a

demographic segment, without focusing on “why” a particular phenomenon occurs. The researcher

were able to use the descriptive method kind of research because of the opinions gathered by the

people who are involved in the said topic who wholeheartedly helped us in answering the question we

have generated to be able to clarify and further evaluate the matter that is talked about. As the said

research focuses on the barangay officials and the barangay community itself we have asked some of

the citizens and the barangay officials of Nueva Ecija about the certain topics related to the generating

paperworks and information of each citizen of the said barangay and its inconvenience.

The researchers use a standard questionnaire in the struggles that are encountered in the

barangays, 10 questions was generated by the researchers in gathering data, as the questionnaires was

asked to the participants the process of summarizing and evaluating the said data is implemented, the

questionnaire consist of the questions regarding

(1) struggles of the community in gathering the data they needed

(2) The benefits of newer technology in the fields of information

(3) The misinformation as an effect on the barangay community

(4) The efficiency of distributing personal information using technology.

14
AMA COMPUTER COLLEGE

B. Procedure (needed objectives)

1) Requirements Specification

NEEDED THE TOOLS AND PLAN

2) Design

NEEDED REQUIREMENT SPECIFICATION

3) Verification and Testing

NEEDED BOTH DESIGN AND REQUIREMENT

METHODS

PARTICIPANT (currently only two person)

The participants of this study are the barangay treasurer and the barangay record keeper that

is well aware of the happenings in the information department of the barangay facility.

DATA GATHERING PROCEDURE

The data was gathered in the first semester of school year 2022-2023. The 10 item

questionnaires was generated by Ashley Nicole Ramos and the questioning process was implemented

by Clarren Kylle Delos Santos.

After the permission to interview was legalize by our professor, the participants was able to

be interviewed by the researchers in an orderly and legal manner, 1 week was spended by the

researchers in generating questionnaires and communicating with the said participants in line with the

research topic.

15
AMA COMPUTER COLLEGE

16

You might also like