Professional Documents
Culture Documents
Chapter 1 Unfinished 2
Chapter 1 Unfinished 2
In Partial Fulfillment
By
Valderrama, Joshua M.
Carlos Hilado Memorial State College
Alijis Campus | Binalbagan Campus | Fortune Towne Campus | Talisay Campus
January 2023
ii
APPROVAL SHEET
iii
iv
ACKNOWLEDGEMENT
v
ABSTRACT
vi
TABLE OF CONTENTS
Page
TITLE PAGE............................................. i
APPROVAL SHEET......................................... ii
ACKNOWLEDGEMENT........................................ iii
ABSTRACT............................................... iv
TABLE OF CONTENTS...................................... v
LIST OF TABLES......................................... vii
LIST OF FIGURES........................................viii
Chapter I – INTRODUCTION
Objectives of the Study........................... 3
Significance of the Study......................... 4
Scope and Limitation.............................. 6
Definition of Terms............................... 7
Chapter II – REVIEW OF RELATED LITERATURE
Foreign Literature................................ 12
Local Literature.................................. 14
Foreign Studies................................... 17
Local Studies..................................... 19
Synthesis......................................... 22
Chapter III – DESIGN AND METHODOLOGY
System Development Life Cycle..................... 25
Operational Framework.............................30
Context Data Flow Diagram.........................32
Data Flow Diagram (Level 1).......................33
Entity Relationship Diagram.......................34
Use Case Diagram..................................35
Data Dictionary...................................37
Hardware Requirements.............................50
Software Requirements.............................51
Time Table (Gantt Chart) .........................51
System Usability and Reliability..................53
Chapter IV – RESULTS AND DISCUSSION
Results and Discussion............................55
Chapter V – SUMMARY OF FINDINGS, CONCLUSIONS AND
RECOMMENDATIONS
Summary of Findings................................82
vii
Conclusions........................................85
Recommendations....................................86
REFERENCES............................................. 87
APPENDICES
Appendix A – Transmittal Letter................... 91
Appendix B – Survey Form.......................... 99
Appendix C – User’s Manual ….................... 104
Appendix D – Grammarian Certificate...............126
Appendix E – Curriculum Vitae.....................127
viii
LIST OF TABLES
Table Page
1.Users............................................ 38
2.Designation...................................... 39
3.User Designation................................. 39
4.Department....................................... 39
5.User Department.................................. 40
6.Announcements.................................... 40
7.Task List........................................ 41
8.Tasks list files................................. 41
9.Task Assign...................................... 42
10.Task Notifications.............................. 42
11.Task notification users......................... 43
12.Task Submission................................. 43
13.Task files...................................... 44
14.Task Submission Notification.................... 44
15.Task feedback................................... 45
16.Task activity logs.............................. 45
17.QOM Month....................................... 46
18.QOM year........................................ 46
19.QOM submission.................................. 46
20.QOM submission notification..................... 47
21.QOAP submission................................. 47
22.QOAP Support Document........................... 48
( Add more tables here, you can use a table to align the
page
ix
LIST OF FIGURES
Figure Page
1. Iterative Model................................26
2. Operational Framework..........................32
3. Context Data Flow Diagram......................33
4. Data Flow Diagram (Level 1)....................34
5. Entity Relationship Diagram....................35
( Add more figures here, you can use a table to align the
pages)
x
Chapter 1
INTRODUCTION
12
attendees in training, seminars, and workshops. A Facial
time.
in the database.
workload.
a workshop leader is defined as someone who plans and leads
13
more efficient since it's going to be easy for him/her to
events.
14
results arising from the sampling population. Software
the system.
Definition of Terms
15
Prototype - a first full-scale and usually functional form
of a new type or design of a construction.(Merriam Webster
Dictionary, 2022) - This term is used in the study
explaining that the system is the first form of complicated
set of functions. Stimuli - an agent (such as an
environmental change) that directly influences the activity
of a living organism or one of its parts. (Merriam Webster
Dictionary, 2022) - In this study. this term is used to
describe the challenges in developing a facial recognition
based program.
16
Chapter 2
Foreign Literatures
economically. The wide 1-D pixel vector made of the 2-D face
images.
18
A Comprehensive Review on Face Recognition Methods
and Factors Affecting Facial Recognition Accuracy
on.
19
Local Literatures
clustering.
20
A Review on Facial Recognition for Online Learning
Authentication
authentication anomalies.
21
of research. In the Philippines, the adaption of this
safer community.
Foreign Studies
22
alert the system when a person in search has been found at a
23
transaction because it is associated with controlling the
learning.
24
trusted people. An alarm goes off if the user is not
recognized.
Local Studies
CCTV-Based Surveillance
System with Face Recognition Feature
25
was performed to assess compliance with ISO 25010-2015
26
fields such as law enforcement, security applications or
video indexing.
administration or renewal.
27
REFERENCES
Andrejevic, M., & Selwyn, N. (2020). Facial recognition technology
in schools: critical questions and concerns. Learning, Media and
Technology, 45(2), 115-128.
Alimuin, R., Dadios, E., Dayao, J., & Arenas, S. (2020). Deep
hypersphere embedding for real-time face recognition. TELKOMNIKA
(Telecommunication Computing Electronics and Control), 18(3), 1671-1677.
Owayjan, M., Dergham, A., Haber, G., Fakih, N., Hamoush, A., &
Abdo, E. (2015). Face recognition security system. In New trends in
networking, computing, E-learning, systems sciences, and
engineering (pp. 343-348). Springer, Cham.
28
Rodavia, M. R. D., Bernaldez, O., & Ballita, M. (2016, December).
Web and mobile based facial recognition security system using Eigenfaces
algorithm. In 2016 IEEE International Conference on Teaching,
Assessment, and Learning for Engineering (TALE) (pp. 86-92). IEEE.
29