Download as pdf or txt
Download as pdf or txt
You are on page 1of 81

Motorcycle Rider Helmet Detection using Image Processing

A Design Project
Presented to the
Computer Engineering Faculty
College of Computing Studies
Don Honorio Ventura State University
Villa de Bacolor, Pampanga

In Partial Fulfillment
of the Requirement for the Degree
Bachelor of Science in Computer Engineering

By:
Aldrin C. Broqueza
Jayson N. De Dios
Karl Vince P. Jimenez
Jhon Manuel T. Ocampo
Juan Carlo N. Ocampo
Marck Joshua B. Punzalan
Jambervill D. Valerio

July 2022
DON HONORIO VENTURA STATE UNIVERSITY ii

APPROVAL SHEET

This thesis entitled “Motorcycle Rider Helmet Detection Using Image


Processing”, prepared and submitted by Aldrin C. Broqueza, Jayson N. De Dios, Karl
Vince P. Jimenez, Jhon Manuel T. Ocampo, Juan Carlo N. Ocampo, Marck Joshua B.
Punzalan, Jambertvill D. Valerio in partial fulfillment of the requirements for the Degree
Bachelor of Science in Computer Engineering, has been examined and found in order
and hereby recommended for acceptance and approval for the ORAL EXAMINATION.

ENGR. ASIL KASTLE S. DELA CRUZ


Adviser

THESIS COMMITTEE
JOEL D. CANLAS, MIT, MBA
Chair
JULIETA M. UMALI, MSIT, MAIE
Co-Chair
ASIL KASTLE S. DELA CRUZ, PCpE, MIT MARIA IVY M. GUESE, MIT
Member Member

EDEN D. GARCIA, MIT


Member

PANEL OF EXAMINERS
Approved by the committee on Oral Examination with a remarks of PASSED on
July 4, 2022

ENGR. RANIE B. CANLAS


Chair

ENGR. ARVEE L. DOMINGO ENGR.RUBY ROSA PUNO


Member Member

ENGR. GROSBY A. DELA CRUZ


Member

Accepted and approved in partial fulfillment of the requirements for the Degree of
Bachelor of Science in Computer Engineering.

JOEL D. CANLAS, MIT, MBA


College Dean

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY iii

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY iv

ACKNOWLEDGEMENT

This section aims to give gratitude to all of the individuals and institutions that
helped the researchers financially, emotionally and mentally and spiritually in the course
of the study:
To Asil Kastle Dela Cruz, MIT, PCpE, for being the researchers’ thesis and
academic adviser, for guiding them, giving them feedback on what improve and
supporting them in completing the project;
To Brgy. Captain Richard A. Manalili, for giving the researchers permission to
collect data inside barangay Saguin, City of San Fernando, Pampanga;
To Larry Page & Sergey Brin, for developing google that provided the
researchers guides and information they needed in completing their frameworks, tasks
and module preparations;
To the Traffic authorities, for giving the researchers answers that will help their
research paper to make more validation;
To Ms. Maribel Valerio, for providing the researchers a place to stay when they
need a overnight stay to discuss the study;
To other family and friends, for giving the researchers the emotional, moral and
emotional support they needed in completing the research paper;
Most significantly, to the Almighty God, for His ever-lasting love and grace, for
giving us the inner spiritual strength to stay on the path righteousness, for giving us
wisdom and knowledge to accomplish everything at hand.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY v

Table of Contents

Title Page -------------------------------------------------------------------- i

Approval Sheet -------------------------------------------------------------------- ii

Grammarian’s -------------------------------------------------------------------- iii


Certificate

Acknowledgement -------------------------------------------------------------------- iv

List of Figures -------------------------------------------------------------------- vii

List of Tables -------------------------------------------------------------------- ix

Abstract -------------------------------------------------------------------- x

Introduction -------------------------------------------------------------------- 1

Related Literature ------------------------------------------- 1

Objectives ---------------------------------------------------- 2

Scope and Delimitation ----------------------------------- 3

Conceptual Framework ------------------------------------ 3

Methods -------------------------------------------------------------------- 5

Research Methodology ------------------------------------ 5

Hardware Development ------------------------------------- 5

Software Development ------------------------------------ 6

End User and Professional Evaluation Methods ---- 14

Results and Discussion -------------------------------------------------------------------- 16

Discussion of the system’s performance ------------- 16

Discussion of test results ---------------------------------- 23

Discussion of end user evaluation ---------------------- 28

Discussion of professional evaluation ----------------- 31

Conclusions ---------------------------------------------------- 32

Recommendations ------------------------------------------- 33

References -------------------------------------------------------------------- 34

Appendices -------------------------------------------------------------------- 36

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY vi

APPENDIX A: Gantt Chart -------------------------------- 37

APPENDIX B: Letters -------------------------------------- 39

APPENDIX C Evaluation Questionnaire -------------- 43

APPENDIX D: Evaluation for the Experts ------------- 45

APPENDIX E: Costing -------------------------------------- 47

APPENDIX F: Curricula Vitae ---------------------------- 49

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY vii

List of Figures

Figure 1 Conceptual Framework ------------------------------------------------------- 3

Figure 2 Block Diagram ------------------------------------------------------------------ 5

Figure 3 Flowchart ------------------------------------------------------------------------ 6

Figure 4 Annotation of Positive Images --------------------------------------------- 7

Figure 5 Collected Positive and Negative Images -------------------------------- 7

Figure 6 Vector File Creation ---------------------------------------------------------- 8

Figure 7 Training of Haar Cascade -------------------------------------------------- 8

Figure 8 Converted Haar Cascade to XML File Format ------------------------ 9

Figure 9 Virtual Testing ------------------------------------------------------------------ 9

Figure 10 Actual Testing ------------------------------------------------------------------ 10

Figure 11 Starting of HTML Page ------------------------------------------------------ 10

Figure 12 Backend Processing of Files List------------------------------------------ 11

Figure 13 Raspberry Pi vs Laptop ------------------------------------------------------ 11

Figure 14 Webpage User Interface ---------------------------------------------------- 12

Figure 15 Notification on Mobile Browser -------------------------------------------- 12

Figure 16 SMS Notification -------------------------------------------------------------- 12

Figure 17 Case of the Raspberry Pi --------------------------------------------------- 13

Figure 18 Motorcycle Rider Helmet Detection-------------------------------------- 16

Figure 19 Process of the System ------------------------------------------------------ 17

Figure 20 Raspberry Pi 4 8GB ---------------------------------------------------------- 17

Figure 21 TP-Link IP Camera ---------------------------------------------------------- 18

Figure 22 TP-Link Router --------------------------------------------------------------- 18

Figure 23 Webpage Login Screen ---------------------------------------------------- 19

Figure 24 Website Contents ------------------------------------------------------------- 19

Figure 25 Admin Account ----------------------------------------------------------------- 20

Figure 26 Add and Remove Feature of Regular User ----------------------------- 20

Figure 27 CPU usage problem ---------------------------------------------------------- 21

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY viii

Figure 28 Optimized CPU usage ------------------------------------------------------- 21

Figure 29 Multiple Entities Detection --------------------------------------------------- 22

Figure 30 Correct Detection at 5kph ---------------------------------------------------- 24

Figure 31 Blurred Image at 15kph ----------------------------------------------------- 25

Figure 32 High-Beam Headlights -------------------------------------------------------- 25

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY ix

List of Tables

Table 1 Assessment on the Ease of the Operation ------------------------------ 14

Table 2 Effectiveness and Accuracy of the System ----------------------------- 14

Table 3 Four-point Likert Scale ------------------------------------------------------ 14


Table 4 Evaluation Questionnaire For Expert ------------------------------------ 15

Table 5 Five-point Liker Scale --------------------------------------------------------- 15


Table 6 Correct Detection at 15kph -------------------------------------------------- 23
Table 7 Multiple Detection Test ------------------------------------------------------- 23
Table 8 Low-light Condition Accuracy Test -------------------------------------- 24
Table 9 Speed Limit Test Results ---------------------------------------------------- 26
Table 10 Accuracy Test ------------------------------------------------------------------ 26
Table 11 Web Notification Delay Test ------------------------------------------------ 26
Table 12 SMS Notification Delay Test ------------------------------------------------ 27
Table 13 Respondents Assessment of the Ease of Operation of the Camera 28
Installation of the Product ---------------------------------------------------

Table 14 Respondents Assessment of the Ease of Operation of the Device 28


Controller of the Product -----------------------------------------------------

Table 15 Respondents Assessment of the Process of Notification Receiving 29


of the Product --------------------------------------------------------------------

Table 16 Respondents Assessment of Effective ness and Accuracy of the 30


System ----------------------------------------------------------------------------

Table 17 Experts Assessment for the Motorcycle Rider Helmet Detection 31


Using Image Processing ----------------------------------------------------------

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY x

ABSTRACT

Wearing a helmet is a significant part of driving a motorcycle, and most countries


have strict helmet regulations. Despite laws on helmet usage, there are still two-wheeler
riders who do not follow these policies. This study intends to aid authorities by producing
a system that assists the users in capturing no-helmet riders by sending notifications
through webpage and text messages. The researchers utilized Raspberry Pi as the
microcontroller, accompanied by a GSM module for sending text messages, a web socket,
a database, and an IP Camera for the visual input. In this study, Python programming
language, HTML, CSS, JavaScript, and PHP were essential in developing the system.
The model was trained using collected images as sample datasets through OpenCV. The
system detects and captures riders with a rate of 76.09% on accuracy tests conducted in
three different barangays. The system provides notifications through a webpage via the
internet and sends text messages with an average response time of 5.4 seconds and
12.18 seconds respectively. The researchers employed the descriptive method. The
purposive sampling technique was practiced selecting 10 participants as end-user
respondents to evaluate the system and three professionals to assess the system through
survey questionnaires using ISO/IEC 25010 standards. The system was evaluated by its
ease of use and effectiveness regarding the installation complexity of the device and
functionality of the helmet detection and notification. The end-users considered the device
as “Good”, with a calculated mean of 3.1 and the evaluation by the experts weighted an
average mean of 4.18, implying that the professional respondents are “Satisfied”. These
show that the system can serve the intended purpose and that the overall function of the
helmet detection system is effective.

Keywords: Motorcycle, Helmet, Detection, Notification, Raspberry Pi, GSM, IP Camera,


Python, JavaScript, PHP, HTML, CSS, OpenCV, datasets

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 1

INTRODUCTION

Helmet laws are administered to lessen head injuries and avoid fatalities.
According to Liu et al., 2008, helmet-wearing riders that got involved in accidents had
decreased the risk of head injury by 69% along with a 42% decreased risk of death. This
suggests that the majority of fatal head injuries sustained in motorcycle collisions can be
mitigated or even prevented through helmet usage. However, despite the traffic laws and
years of helmets being subject to continuous improvements in terms of safety and
lifesaving qualities, as the use of helmets among riders keeps declining, the numbers of
motorcyclist fatalities keep rising.
Although there is an act in the Philippines, the Republic Act No. 10054, that
requires motorcycle riders to use standard protective motorcycle helmets while driving,
the usage of motorcycle helmets is still low due to a lack of police manpower. Moreover,
despite the penalties being provided to violators, there still are people who do not wear
helmets as even though police officials tried to regulate this problem manually through
checkpoint operations, not all of the violators can be monitored, caught, and punished by
the law. (LAWPHIL, 2010)
This study focused on this problem and proposed a system that will help law
enforcers in improving the monitoring system of checkpoint operations through the aid of
developing a device that will detect and recognize non-helmet-wearing motorcycle riders
and then notify its user using Image Processing as the main technology to be used and
the Raspberry Pi as the Microcontroller Unit.
According to Pabaharan (2020), image processing refers to a variety of operations
that examine pictures or transform one image representation into another. Although some
analog processing was used in the past, image processing is now done entirely in the
digital realm. Surveillance, medical imaging, machine vision, robotics, and computer-
generated images (CGI) are just a few of the applications. Image processing is a
technology that may be used to process pictures, 3D models, prints, and extract data from
them. While using analog visual methods, researchers employ a wide range of
fundamental picture interpretation procedures.
The researchers then opted to run the system on a Raspberry Pi as the main
processing unit, a credit-card-sized computer that connects to a computer monitor or TV
and works on a standard keyboard and mouse. It is a powerful small-sized device that
allows users to communicate with computers and learn to write in languages like Scratch
and Python. All versions include a connector for attaching a specialized camera, as well
as an array of general-purpose input/output (GPIO) pins for communicating with a broad
range of electronics, including LEDs and buttons, servos, and motors, power relays, and
a plethora of sensors. (Jolles, 2021
A similar study entitled “Machine vision techniques for motorcycle safety helmet
detection” presented a system that detects motorcycle riders and determines if they are
wearing safety helmets or not. The researchers of this study utilized K-Nearest Neighbor
(KNN) classifier. By using this classifier, the device categorized motorcycles and other

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 2

moving entities based on the features extracted from their region properties. Using KNN,
the system determines whether the rider is wearing a helmet or not based on attributes
extracted from four sections of the segmented head area. The results of the experiments
demonstrate that the average correct detection rate for the near lane, distant lane, and
both lanes is 84%, 68%, and 74%, respectively. (Waranusast, Bundon, Timtong, Tangnoi,
Pattanathaburt, 2013)
Correspondingly, Siebert and Lin (2019) created an algorithm for the automatic
registration of motorcycle helmet wear using video data. The system was trained to
recognize active motorbikes, the number and location of riders on the motorcycle, and
helmet usage using 91,000 annotated frames of video footage gathered at several
observation sites around Myanmar. An examination of the performance of the algorithm
on an annotated test data set, as well as a comparison to accessible human-registered
helmet use data, demonstrates that said technique is highly accurate. With a small amount
of training for individual observation locations, the system detects motorcycle helmet
usage with rates of 4.4% accuracy and a +2.1% accuracy when compared to a human
observer.
Moreover, a CNN-based multi-task learning (MTL) system for recognizing and
monitoring particular motorbikes, as well as registering rider-specific helmet wear was
presented in a recent study by Lin, Deng, Albers, and Siebert (2019). The study also
released the HELMET dataset, which contains 91,000 annotated frames from 10,006
unique motorbikes from 12 observation locations in Myanmar. Along with the dataset, the
researchers presented an assessment measure for helmet wear and rider detection
accuracy, that may be used as a standard for assessing future detection algorithms. The
study shows that using MTL for concurrent visual similarity learning and helmet use
classification improves the efficiency of the approach compared to previous studies,
allowing a processing speed of more than 8 FPS on consumer hardware and a weighted
average F-measure of 67.3 percent for detecting the number of riders and helmet usage
of tracked motorcycles.

With these supporting studies in mind, the researchers intend to help the
authorities by developing a system that captures images and sends notifications to the
user and that allows them to improve the strategies for capturing disobedient motorcycle
riders. By amplifying the methods of implementing the strict helmet law on two-wheeler
riders, the system helps the authorities by providing alertness and assistance to intercept
violators due to driving a motorcycle without head protection is dangerous. The
proponents want to help mitigate fatal head injuries as 90 percent of deaths caused by
motorcycle accidents were riders that are not wearing helmets (WHO Philippines 2018).
The researchers also want to learn how image processing can contribute to making the
community safer while trying to minimize the injury sustained because of accidents.
The study aims to produce a detection system for motorcycle helmets using image
processing with notifications. The system may help notify its user after it captures images
of riders who are not wearing a helmet. The captured images are stored locally and in a
database as backup data to provide evidence for traffic law violations during checkpoint

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 3

operations. The collected images are accessible by authorized personnel only through a
user-friendly webpage.
With regard to the limitation of the study, the system relies on electricity as a self-
sufficient energy source is not part of the study and the detection of ICC-certified stickers
on helmets is not included in the system due to hardware restraints. Detection of plate
numbers is not included.
The product of this study would be beneficial to motorcycle riders, checkpoint
personnel, Local Government Units, and Future Researchers. This will allow motorcycle
riders to be wary of not wearing a helmet violation when driving, for their own safety. The
system will enable the checkpoint personnel to keep track and be more aware of the
violators that drove past them. The device intends to help the Local Government Units to
impose the law in a more efficient way with regard to wearing helmets when driving a
motorcycle. Upon the completion of the study, it will serve as a supporting study for future
researchers who are looking for ideas or topics related to this study or for those who intend
to further develop, enhance, and innovate the product.

Figure 1. Conceptual Framework of the Study

Figure 1 contains the knowledge requirements of the system such as


Programming, Networking, Circuits, and Electronics. The hardware needed for the

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 4

development of the system are Raspberry Pi 4, IP Camera, SIM 800L module, Internet
Cable, router, and Chassis. The Software requisite of the system are Python, PHP,
database, JavaScript, and HTML. The software development consists of software
designing, coding, training of the model, and web page development. The establishment
of the connection of components is held in the hardware development phase and the
assembly of the helmet detection and notifications functions produce the Motorcycle Rider
Helmet Detection System with conducted different tests and evaluations.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 5

METHODS
The researchers employed a descriptive method as the methodology of this study.
The goal of descriptive research is to describe a population, situation, or phenomenon
accurately and thoroughly. To explore one or more variables, a descriptive research
design might employ a wide range of research methodologies. The researchers decided
to use this method as it fits in the collection of the needed information for this study
(McCombes, 2020).
The first stage of development is the planning phase. The researchers discussed
the design of the system to achieve its intended purpose effectively. The proponents
determined the components to acquire for the development of the system. The
researchers utilized Raspberry Pi 4 model which is the main controller unit. The Raspberry
Pi is also responsible for running the program. IP camera serves as the visual sensor of
the system that captures target entities. The proponents decided to use the internet as a
medium for notification and a GSM module to enable the device for sending a text
message as a secondary notification method.

Power Supply

IP Camera Microcontroller

Webpage
GSM module

Figure 2. Block Diagram


Figure 2 shows the block diagram of the study. The researchers utilized the use
of Raspberry Pi 4 as the Microcontroller. The power supply will power the Raspberry
Pi and the IP camera, the microcontroller then will supply the GSM module. The IP
Camera will be used to detect violations and the Raspberry Pi will send notifications to
the webpage and store images in the webserver, another notification will be sent by a
text message that includes a link to the image capture through the GSM module. The
captured data is saved locally in the Raspberry Pi and to the database for backup
purposes.
Figure 3 shows the flow of the process of the system. The process starts with
the execution of the helmet detection function, then the camera is in waiting state to
detect a motorcycle. If the camera has detected a motorcycle, then the action will
proceed to the decision stage, the differentiation between a positive and negative
entity. If the detected rider is wearing a helmet, the task will return to the motorcycle
detection state, however, if the detected rider is not wearing a helmet, the activity will

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 6

proceed to the capturing of image. Right after the caption of the subject, the system will
save the image in the local storage of the raspberry pi and to the database. Then the
process will proceed to the sending of notifications through the GSM module and
through the web.

Figure 3. Flowchart

After the complete concept of the system was finalized, the software development
for the helmet detection was started by initializing the training phase of the model. The
researchers gathered sample data through capturing images of both positive and negative
entities on roadways. The images that are classified positive are the images that contain
motorcycle riders who do not wear a helmet and as for the negative, these are images

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 7

containing motorcycle riders who wear helmet. Positive images are annotated which is
going to be used on detecting the object desired to be captured.

Figure 4. Annotation of positive images

The proponents utilized 1000 positive images and 2000 negative images for the
training of the model as shown in figure 3. The manually collected images are composed
of images that were captured by the proponents of themselves while riding a motorcycle
with and without a helmet and captured images of passing motorcycles through roadways.
The images collected from the internet came from websites such as Unsplash,
Stockimages, Shuttershock, and pixabay which contain photos of motorcycle riders
wearing and not wearing helmets. The images are separated in two folders: negative and
positive.

Figure 5. Collected positive and negative images

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 8

With the collection of datasets, the researchers used OpenCV to create Haar
cascades and train the program. The Haar Cascade is an object identification technique
that can recognize customized items in images or real-time video. It requires both positive
and negative pictures to function. Positive photos are those custom items the AI should
recognize. Negative pictures are those the A.I. should ignore. The Raspberry Pi was used
to run the trained model and program.

Figure 6. Vector File Creation

Figure 6 shows the training of the Haar cascade was initialized after the annotation
and the creation of the vector file.

Figure 7. Training of Haar Cascade

Figure 7 shows the process of the training of the AI layer by layer and the duration of the
training.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 9

Figure 8. Converted Haar Cascades to XML file format.

Figure 8 shows the Haar Cascades that were trained and are converted to XML
file format. The files are the output model that differentiates motorcycle riders with no
helmets from motorcycle riders wearing helmets.
Following the completion of the training phase, the researchers tested the model
virtually. The virtual testing used prerecorded videos to check if the detection model is
working.

Figure 9. Virtual testing


Figure 9 shows the initial testing of the model as it was tested internally using a
laptop and a premade video.
The proponents determined that the detection model is working as intended, the
researchers imported the code to the raspberry pi and the hardware development phase
was started by the assembly of the connection between the IP camera and Raspberry Pi
through the router. The device was implemented on a post and checked the detection
capability of motorcycle riders. After the actual testing, the proponents determined that the
processor of a laptop or larger computer can handle the processes of the helmet detection
system with more efficiency than the raspberry pi.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 10

Figure 10. Actual Testing at Barangay Saguin

Figure 10 shows the actual testing of the Helmet detection program. It was tested
on an intersection inside Barangay Saguin, City of San Fernando, Pampanga.
As for the notification function of the system, the researchers then developed a
webpage where notifications can be received and viewed when a violator is detected and
the use of a web database as the storage of the collected images of the violators online.
HTML, PHP, and JavaScript are used to complete the web-based system.

Figure 11. Starting of HTML Page

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 11

Figure 12. Backend Processing of Files List and API for file count

Figure 13. Raspberry vs Laptop


The researchers ran the program on both devices: Raspberry Pi and a Laptop.
Figure 13 shows that the FPS (Frame Per Second) on the Raspberry Pi is only 0.24 and
the FPS on the Laptop is 1.96. This implies that better hardware can run the program
faster and more efficiently.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 12

Figure 14. Webpage notification user interface on desktop browser.

Figure 15. Notification Webpage on mobile browser.

The proponents conducted trial testing of the notification through the webpage on
a mobile browser and the sample notification is shown in figure 15.

Figure 16. SMS Notification

Figure 16 shows the testing of webpage notification was conducted successfully,


the proponents integrated the GSM module to the Raspberry Pi and procured a SIM card
that uses 2G connectivity to function. The researchers utilized an E-load plan for the
module to be able to send messages to the desired recipient. The GSM module was tested
by letting a motorcycle rider with no helmet pass through the camera. A text message will

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 13

be sent after a few seconds to the registered number. The message content says that a
violator has been detected which serves as an alert.

Figure 17. Case of the Raspberry Pi


Figure 17 shows the visual design of the casing for the microcontroller and SIM
800L GSM module, it is made of acrylic glass painted with black quick-drying lacquer
spray. The dimensions of the chassis are: 8.2cm (3.23in) width, 11.5cm (4.53in) length,
and 6.6cm (2.60in) height
Following the trial testing of the web page and the text message notifications
completed, the prototyping phase started with the assembly of the software and the
hardware of the system. The proponents added a script that allows the program of the
system to run on boot up of the raspberry pi, creating the Motorcycle Helmet Detection
System. Then the proponents conducted several tests for the functionality of the detection
with regards to multiple detection capabilities, low-light condition capability, accuracy, and
delay speed of notification from the GSM module.
Over the succeeding functionality assessments, the system evaluation
phase was conducted. The study aims to get descriptive information from the end-users
of the device: the authorities at road checkpoints. The end-user and respondents of this
study are 10 officers who are involved in road checkpoints. Moreover, three professionals
from the same field of study are chosen to evaluate the product based on the International
Organization for Standardization (ISO) and the International Electrotechnical Commission
(IEC) 25010.
The selection of respondents is done through the purposive sampling technique.
The data collection method applied in this study was the questionnaires. Three
professionals validated the questionnaire after they examined the reliability of the
questions and their content. The questionnaire used is composed of tables that
specifically intend to answer how the system is assessed as regards to the ease of
operation of its camera installation and device controller, the process of notification
receiving, and how the respondents described and assessed the effectiveness and
accuracy of the system in terms of its notification delay, ability to detect multiple entities,
low – light conditions, and accessibility of the captured images.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 14

Table 1 and Table 2 are the tables for the questionnaire of End users.
Table 1. Assessment on the Ease of Operation of the Product
Indicators 4 3 2 1
A. Camera Installation
1. The camera is easy to install to desired location.
2. The camera is easy to focus and aim on desired area.
3. The lock of the camera is easy to utilize.
B. Device Controller
1. The microcontroller was easy to turn on.
2. Upon turning on the microcontroller, it was able to run the program.
3. The microcontroller runs the program/system fast.
4. The microcontroller is easy to install to desired location
C. Process of Notification Receiving
5. The user was able to receive notification.
6. The user can easily access the images on the notification.
7. The phone of the user was able to gain access to the webpage.

Table 2. Effectiveness and Accuracy of the System


Indicators 4 3 2 1
1. The system captures images of riders with no helmet accurately.
2. The system does not send notifications if riders with helmets are detected.
3. The system sends notifications to the user after capturing images of
violators.
4. The system sends notifications to the users without much delay.
5. The captured images on the notifications relayed are not blurred.
6. The system can detect multiple entities.
7. The results of multiple detected entities are accurate.

The 4-point Likert Scale is administered to determine the assessment of the survey
questionnaire for the end users using the following range conversion shown in Table 3.

Table 3. Likert Scale for questionnaire of End users.


Range Verbal Description
3.51-4.00 Excellent
2.51-3.50 Good
1.51-2.50 Average
1.00-1.50 Poor

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 15

Table 4. Evaluation questionnaire for experts.


System Functionality and Standard
Indicators 5 4 3 2 1
Functional 1. Detects motorcycle riders with no-
suitability helmet accurately.
2. Sends notification and provide
captured images to the user.
Performance 3. Detection speed of the system.
4. Detection of multiple entities.
5. Response time of the system to
send notification.
Usability 6. Ease of operating the system.
7. Webpage user-interface aesthetics.
8. Ease of navigation of the user-
interface.
Reliability 9. Detection in low-light condition.
10. Accuracy of multiple entities
detection.
11. Back-up system of captured data is
sufficient.
Portability 12. Simplicity of installation in different
environments.
Security 13. The confidentiality of data access.

Furthermore, three Computer Engineers, as respondents, virtually evaluated the


product based on ISO/IEC 25010 evaluation questionnaire. To get the overall rating of
the quality of the product, the conversion used for determining functional suitability,
performance, usability, reliability, portability, and security categories in the ISO/IEC 25010
to determine their satisfaction with the product is as follows:
Table 5. 5-point Likert scale of the Questionnaire for Experts.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 16

RESULTS AND DISCUSSIONS

Figure 18. Motorcycle Riders Helmet Detection System

Figure 18 shows the whole system of Motorcycle Rider Helmet Detection. This
system is designed to detect motorcycle riders who violate the R.A. 10054. The device
detects riders who do not wear helmets. It will save the image of the violator on the
webpage for remote access and it is stored in the database and locally in the raspberry pi
for protection against accidental loss of data. It will also send a notification on the webpage
and through text message indicating that a no-helmet motorcycle rider is detected. The

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 17

notification in the text message also provides a link to view the image. The hardware used
are the following:

Figure 19. Process of the system

Figure 20. Raspberry Pi 4 8GB

Figure 20 shows the Raspberry Pi that was used as the main controller of the
system. It runs the detection program and sends the notifications to both SMS and Web
channels. The proponents opted for the version 4 8GB variant for wider usage capabilities
than the lower variants.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 18

Figure 21. TP-Link IP Camera


Figure 21 shows the camera that was used for the detection process is the TP-
Link Tapo C320WS. It has a 4MP definition with a 1080P HD Resolution. It is wirelessly
connected to the Raspberry Pi through the router.

Figure 22. TP-Link Router

Figure 22 shows that router that was used to connect two or more packet-switched
networks or subnetworks. In this study, a router was used as an access point for both the
Raspberry Pi and the IP Camera while also providing them with an internet connection.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 19

Figure 23. Webpage Login Screen


Figure 23 shows the webpage of the system contains the saved images of the
violators during an operation. It can only be accessed by the admin account and the
registered users’ credentials.

Figure 24. Website Contents

Figure 24 shows the content of the website includes the images saved during an
operation. The pictures are labeled with the time and date of detection for better
documentation purposes. There are functions that can be used: “Delete All” and “Export

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 20

Images”. The “Delete All” function deletes all the current images collected. The “Export
Images” function lets the user download a compressed file of all the images.

Figure 25. Admin Account


Figure 25 shows the admin account is used to carry out tasks that require special
permissions like adding and deleting users that will be able to access the contents of the
website. When a registered account is logged in, the adding and deleting of accounts
feature is disabled and only accessible if the main admin is logged on.

Figure 26. Add and remove feature of regular user accounts.

Only the admin account can add and delete user accounts as shown in Figure 26.
In creating an account, a name, an email, and a password are needed. After all the fields
are filled, there is a save button to finalize the user account creation. When deleting an
account, the admin can browse through the “View All” button and look for the account you
want to delete. Click the trashcan icon and click “Yes!” on the pop-up to delete the selected
user.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 21

In the product development process, the structuring of the project was initiated by
conceptualizing the device and the system. After the design was finalized, the software
development was initialized. The researchers collected datasets and then trained a model
with 2000 negative images and 1000 positive images. Next, the model created was used
for the development of the program for the detection of helmets of motorcycle riders.
After finalizing the design and training of the model, the program for the detection
of motorcycle helmet is completed, the researchers proceeded in testing it virtually. The
code was tested using a laptop and a pre-made video. The researchers had a problem
with the program crashing on the first try. The process was monitored and as shown in
Figure 27, Raspberry Pi is having difficulties in running the program because of algorithm
problems. The researchers optimize the program's flow to avoid extra unnecessary steps.
After optimizing the algorithm of the program, the researchers were able fix this problem
and successfully reduced the processing power need to run the system shown in Figure
28. The researchers made changes like: isolating the image from the feed then process it
as a cropped image; processing first if the vehicle is indeed a motorcycle and using
multithreading to be able to distribute the tasks and give the Raspberry Pi easier
processing work. After these changes, the CPU usage became lower than the constant
100% from before and the program doesn’t freeze anymore.

Figure 27. The CPU usage of the Raspberry Pi is always on 100%.

Figure 28. The CPU usage of the program was optimized.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 22

Next, the hardware needed for the system were canvassed then procured. The
program was imported to Raspberry Pi and the actual testing begun. Tests for the
accuracy of the system in terms of ability to detect multiple entities, low –light conditions,
speed limit, SMS notification delay, and response time from capture point to the web page
notification were conducted for effectiveness and accuracy. The researchers also had
problems with the functionality of the SMS notification function. The GSM module have
power problems and burst messages. The 5V pin should not be connected by the time
Raspberry pi boot up. 5V will be reconnected once Raspberry pi has booted up. With
regard to the burst messages, the main problem was with the detection of the frames.
When the system detects a violation, it sends multiple messages if the same violator is
detected which is not supposed to happen. The problem was solved by making the system
detect a violator once and if it is still in the field of view of the camera, the GSM module
will not send any extra messages because it is considered as the same motorcycle. The
webpage is developed after the GSM was fully developed. The frontend side of the
development of the website includes HTML (Hypertext Markup Language), CSS
(Cascading Style Sheets) and JavaScript. The basic structure of the website like the head
and the title was developed using HTML. The formatting, layout and the overall
presentation of the website was managed using CSS. The backend side of the
development of the website includes PHP and the database development is done with the
use of MySQL for the storage of inputs. The researchers then added a login feature where
only the main admin have the control to add and remove user accounts for security
measures. After the total assembly of the software and hardware of the system, multiple
tests and evaluations were conducted.

Figure 29. Multiple Entities Detection

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 23

The first part of the multiple detection test is to determine if the device can detect
multiple entities at once, as shown in Figure 29. A series of tests was conducted to assess
the ability of the system to detect multiple riders in a single frame. The researchers initially
determined the maximum number of motorcycles that can be detected at the same time
with consecutive tests by incrementing the number of entities visible in the same frame
by one.

Table 6. Multiple Entities Detection Test


Number of Entities Detection Rate
(10 attempts)

1 10
2 10
3 8
4 1

The proponents conducted the second part of the multiple detection test, to identify
the accuracy of the detection with multiple entities as shown in Table 6. The first scenario
was to detect entities in the same frame with three riders not wearing helmets. The second
test was two riders with helmets and one with no helmet. Third experiment was one rider
with a helmet and the other two were not wearing helmets. The next test was three riders
were all wearing helmets. The last test conducted was to detect two riders with helmets
and two with no helmets, however as stated in the previous test, the device is having
difficulty in detecting four entities in a single frame.

Table 7. Multiple Detection Test


Detection
Scenarios
(10 attempts)

3 no-helmet 8

2 with helmet,
8
1 no-helmet
1 with helmet,
9
2 no-helmet

3 with helmet 7

2 with helmet
1
2 no-helmet

As shown in Table 7, the maximum number of motorcycles that can be detected


at the same time is 3 motorcycles. If the number of motorcycles passing through the
camera at the same time is more than 3, the system will have difficulty detecting all of the
entities.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 24

Table 6 and 7 illustrate the results of the capability of the system in detecting
multiple motorcycle riders. The device can detect at most 3 motorcycle riders in the same
frame. It can also detect violations in different scenarios of three motorcycle riders passing
through the camera at the same time.

Table 8. Low-light Conditions Accuracy Test


Speed (kph) Accuracy (10 Attempts)

5 5

10 3

15 1

20 0

The researchers organized tests to determine if the system is capable of operating


at night by operating at low-light conditions. The detection of the system was tested at
different speeds incrementing after each test.

Table 8 shows the results of the accuracy-test in low-light conditions. In


comparison, the detection rate in daylight is significantly higher. Motorcycle riders running
at the speed of 10 kph or more will have a blurred image interpretation by the camera.

Figure 30. Correct detection at 5 kph

Figure 30 illustrates that the camera can detect a moving motorcycle with a very
low speed (5 kph).

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 25

Figure 31. Blurred Image at 15 kph

As shown in figure 31, a motorcycle rider moving at 15 kph and faster was visible
but it was not a clear vision for detection.

Figure 32. High Beam Headlights

Figure 30 shows that the system cannot detect a motorcycle rider on a high beam
because the light obstructs the vision of the camera.
In conclusion in this test, the system can detect violations in low-light conditions with
motorcycles running at a very low speed. The image of the motorcycle rider is blurred
when the speed of the motorcycle is 15kph and higher. The light from the headlights
motorcycle can obstruct the vision of the camera resulting in a failed detection.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 26

Table 9. Speed Limit Test Results


Detection
Speed (kph)
(10 attempts)
10 10
20 10
30 6
40 5
50 3

The proponents conducted trials to determine the maximum speed of a motorcycle


the device can detect as shown in Table 9. The device was tested through the process of
a motorcycle passing through the camera at various speed.
The researchers determined that 20kph is the maximum speed of motorcycles that
can be detected with the highest possibility of detection. The device will have less
detection rate if the motorcycle rider that passes through the camera exceeds 20kph.

Table 10. Accuracy Test

Barangays Correct Detection


Saguin 259
San Roque Dau 1st 274
Ascomo 266

The proponents conducted accuracy tests by the installation of the device in


three different barangays: Brgy. Ascomo, Brgy. San Roque Dau 1st and Brgy. Saguin.
The proponents collected data from the 350 detections in each location and counted the
number of correct detections of both single entity detection and multiple entities detection.
The accuracy of these tests was calculated using the formula:

Table 10 shows the different correct detection results of the system in each
location. Using the formula, the percentage of accuracy on Barangay Saguin, Barangay
San Roque Dau 1st, and Barangay Ascomo was 74%, 78.29%, and 76% respectively.
The proponents determined that the current accuracy of helmet detection is 76.09 percent
according to the three accuracy results in different locations.

Table 11. Web Notification Delay Tests


Test Time (Seconds)
1 5.30
2 6.27
3 5.15

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 27

4 4.56
5 6.26
6 4.10
7 5.06
8 6.36
9 4.40
10 5.53
11 6.13
12 4.96
13 5.45
14 5.89
15 4.86
16 6.20
17 4.98
18 5.15
19 5.54
20 5.86

Table 11 shows the results of the delay of the notification through the web server.
It was calculated as the time from the motorcycle rider entering the frame of the camera
until the time the notification is shown on the server. The computed average web
notification delay is 5.4 seconds.

Table 12. SMS notification delay


Test Time (Seconds)
1 15.03
2 17.23
3 12.32
4 11.27
5 12.28
6 9.30
7 14.22
8 14.03
9 9.56
10 10.36
11 12.23
12 13.68
13 14.69
14 15.15
15 11.75
16 12.52

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 28

17 12.59
18 11.12
19 12.79
20 14.15

As shown in Table 12, the delay of text messages is recorded in different instances.
There are 20 tests in total and the time is calculated from the time that the motorcycle rider
enters the frame until the time that the text message is received by the desired recipient.
The computed average delay of the text message notification is 12.18 seconds.

Following the development phase and system testing, the proponents conducted
the system evaluation and the results are discussed as follows:

Table 13. Respondents Assessment of the Ease of Operation of the Camera Installation
of the Product.
Weighted
Indicator Verbal Description
Mean
1. The camera is easy to install to desired location 2.8 Good
2. The camera is easy to focus on desired area. 3.7 Excellent
3. The lock of the camera is easy to utilize. 2.8 Good
Grand Mean 3.1 Good

Table 13 represents the assessment of the respondents with regard to the ease of
operation of the Camera Installation of the Motorcycle Rider Helmet Detection System.
The “camera is easy to focus and aim at desired area” got the highest weighted
mean on Camera Installation, evaluated as “Excellent” with a weighted mean of 3.7. This
implies that the camera can be easily set up in order to get the optimal angle for detection.
The “The lock of the camera is easy to utilize” and the “The camera is easy to install to
desired location” got the lowest weighted mean, evaluated as “Good” with a weighted
mean of 2.8. Stronger brackets like metal ones can be used for a stronger grip and for an
easier lock. The assessed quality of the ease of operation of Camera Installation is “Good”
as it obtained the grand mean of 3.1 and it is within the range of 2.51 – 3.50 based on the
Likert Scale. This suggests that the overall camera installation is working effectively but it
can still be improved with hardware changes.

Table 14. Respondents Assessment of the Ease of Operation of the Device


Controller of the Product.
Weighted
Indicator Verbal Description
Mean
1. The microcontroller was easy to turn on. 3.0 Good

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 29

2. Upon turning on the microcontroller, it was able to


2.9 Good
run the program.
3. The microcontroller runs the program/system fast. 2.1 Average
4. The microcontroller is easy to install to desired
3.2 Good
location.
Grand Mean 2.8 Good

Table 14 represents the assessment of the respondents with regard to the ease
of operation of the Device Controller of the Motorcycle Rider Helmet Detection System.

The “The microcontroller is easy to install to desired location” got the highest
weighted mean on Device Controller, evaluated as “Good” with a weighted mean of 3.2.
This indicates that the Raspberry Pi is easy to install in a specific location like a place near
a checkpoint operation. The “The microcontroller runs the program/system fast” got the
lowest weighted mean, evaluated as “Good” with a weighted mean of 2.1. This implies
that the microcontroller does not have the capability of running the program fast and better
hardware is recommended. The assessed quality of the ease of operation of the Device
Controller is “Good” as it obtained the grand mean of 2.8 and it is within the range of 2.51
– 3.50 based on the Likert Scale. This suggests that the installation and the operation of
the device controller are good but the hardware is still upgradable.

Table 15. Respondents Assessment of the Process of Notification Receiving of the


Product.

Weighted
Indicator Verbal Description
Mean
1. The user was able to receive notification. 3.7 Excellent
2. The user can easily access the images on the
3.4 Good
notification.
3. The phone of the user was able to get access to the
3.1 Good
webpage.
Grand Mean 3.4 Good

Table 15 represents the assessment of the respondents with regard to the process
of Notification Receiving of the Motorcycle Rider Helmet Detection System.

The “user was able to receive notifications” got the highest weighted mean on
Notification Receiving, evaluated as “Excellent” with a weighted mean of 3.7. This
suggests that the notification of the system is working effectively and the users are able
to receive the notifications in every detection. The “The phone of the user was able to get
access to the webpage” got the lowest weight mean, evaluated as “Good” with a weighted
mean of 3.1. This implies that the links to the images are working properly but an external

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 30

factor like the absence of internet connection can affect the viewing of images saved on
the webpage. The assessed quality of the process of Notification Receiving is “Good” as
it obtained a grand mean of 3.4 and it is within the range of 2.51 – 3.50 based on the Likert
Scale. This indicates that the notification of the system is working well and effectively meet
its objectives.
Overall, the respondents assessed the Ease of Operation of the Product as “Good”
for it obtained the overall grand mean of 3.1, and based on the Likert Scale, it is within the
range of 2.51 – 3.50. This suggests that the device is user-friendly with a simple point of
operation and the system sends notifications capably. The Raspberry Pi runs the program
with relatively low speed but it is upgradable with higher specs of a microcontroller.

Table 16. Respondents Assessment of the Effectiveness and Accuracy of the System.

Weighted
Indicator Verbal Description
Mean
1. The system captures images of riders with no
2.9 Good
helmet accurately.
2. The system does not send notifications if riders with
3.1 Good
helmets are detected.
3. The system sends notification to the user after
3.6 Excellent
capturing images of the violators.
4. The system sends notification to the users without
3.0 Good
much delay.
5. The captured images on the notifications relayed are
3.3 Good
not blurred.
6. The system can detect multiple entities. 3.1 Good
7. The results of multiple detected entities are
2.6 Good
accurate.
Grand Mean 3.09 Good

Table 16 represents the assessment of the respondents with regard to the


Effectiveness and Accuracy of the System in Terms of its Ability to Detect Multiple Entities,
Low – light Conditions, and Notifications on the Motorcycle Rider Helmet Detection
System.
The “system sends notifications to the user after capturing images of violators” got
the highest weighted mean, evaluated as “Excellent” with a weighted mean of 3.6. This
also implies that the system sends notifications with relative effectiveness and it is working
in line with the objectives of the study. The “result of multiple detected entities are
accurate” had the lowest mean of 2.6 and this suggests that the system is having
difficulties in detecting multiple entities but it can still detect three motorcycles in the same
frame.
Overall, the respondents assessed the Effectiveness and Accuracy of the System
in Terms of its Ability to Detect Multiple Entities, Low – light Conditions, and Notifications

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 31

as “Good” for it obtained the grand mean of 3.09, and based on the Likert Scale, it is within
the range of 2.51 – 3.50. The system sends notifications with effectiveness and the images
sent were not blurred and are labeled with date and time.
Table 17. Experts Assessment for Motorcycle Rider Helmet Detection Using Image
Processing.
Motorcycle Rider Helmet Detection System Using Image Processing
Weighted Average Descriptive
Characteristics
Mean Rating
Functional Suitability 4.5 Satisfied
Performance 4 Satisfied
Usability 4.67 Very Satisfied
Reliability 3.56 Satisfied
Portability 4.33 Satisfied
Security 4 Satisfied
Grand Average 4.18 Satisfied

Table 17 shows the assessment results of the professionals who participated in


assessing the Motorcycle Helmet Rider Helmet Detection Using Image Processing based
on ISO/IEC 25010 evaluation questionnaire.
Functional Suitability represents the degree to which a product or system
provides functions that meet stated and implied needs when used under specified
conditions. The weighted mean on this characteristic is 4.5. The professional respondents
are Satisfied with how the system detects motorcycle riders accurately and how the
notification provides proper images to the user.
Performance Efficiency represents the performance relative to the number of
resources used under stated conditions. The weighted mean of this characteristic is 4.11.
The professional respondents are Satisfied with the detection rate of the device, the
capability to detect multiple motorcycle at the same time and the response time of the
system in terms of sending notifications.
Usability is the degree to which a product or system can be used by specified
users to achieve specified goals with effectiveness, efficiency and satisfaction in a
specified context of use. The weighted mean of this characteristic is 4.67. The professional
respondents are Very Satisfied with the ease of use of both the system and the webpage
and with the ease of navigation of the webpage.
Reliability is the degree to which a system, product or component performs
specified functions under specified conditions for a specified period of time. The weighted
mean of this characteristic is 3.56. The professional respondents are Satisfied with the
capability of the device in low-light conditions, the accuracy of the device on detecting
multiple motorcycle riders and with the data storage management of the system.
Portability is the degree of effectiveness and efficiency with which a system,
product or component can be transferred from one hardware, software or other operational

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 32

or usage environment to another. The weighted average mean of this characteristic is


4.33. The professional respondents are Satisfied with the efficiency of the device
installation.
Security is the degree to which a product or system protects information and data
so that persons or other products or systems have the degree of data access appropriate
to their types and levels of authorization. The weighted mean of this characteristic is 4.
The professional respondents are Satisfied with the security of the data stored and the
degree to which the system is only accessible by the created user using the admin
account.
The weighted average of all the characteristics is 4.18 which implies that the
professional respondents are Satisfied with the overall functionality of the system.
Through a variety of specific tests and evaluations, the findings of the study were
that the system can provide assistance to the authorities as the results show that the
overall function of the helmet detection system is effective and can serve its intended
purpose of providing aid in capturing motorcycle riders who do not wear a helmet. The
results, through evaluation, suggest that the system is functional and is working based on
the objectives, yet it is upgradable with hardware and software advancements. Moreover,
the findings on the evaluation of professional respondents on the system show satisfaction
with the overall function of the system with recommendations in improving the low-light
detection capability, detection rate optimization, and webpage security enhancement. The
system can only detect the most effective within the speed limit of 20kph and the detection
rate of the system is inversely proportional to the speed of the motorcycle due to processor
limitations. In accordance with the hardware restraints, the device can only detect a
maximum of three motorcycles with optimal detection. Detection in low-light conditions
was less effective compared with the detection rate in optimal conditions. The proponents
conducted a comparison testing between raspberry pi and a laptop, the efficiency of the
detection rate of the laptop is significantly more effective. The calculated average delay of
the notifications of the webpage and the text messages are 5.4 seconds and 12.18
seconds, respectively. The average accuracy of the device from tests with a total of 1050
motorcycles is 76.09%.

Conclusions
The researchers concluded that Motorcycle Rider Helmet Detection Using Image
Processing achieved its objectives in terms of functionality. The officers who are involved
in checkpoint operations have assessed that the system is easy to use, efficient, and able
to help keep evidence of violators. The system was able to detect no-helmet motorcycle
riders and sends a notification through a website and text message. In accordance with
the tests results and evaluations, the end-user respondents assessed the system as
“Good” and the experts were “Satisfied” with the overall function of the system with
recommended improvements in terms of optimization of the detection rate of the raspberry
pi, improvement on low-light detection capability, and webpage security.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 33

Recommendations
The product of the study was able to meet the requirements in terms of its purpose
and features. The system can still be improved by upgrading hardware components. A
more powerful microprocessor can enhance the speed of the system. Subsequently, a
better camera will also improve the resolution of the captured photo, so other details can
be clearer, and the captured image will not be blurred. The webpage can still be improved
by further development like adding a filter function where the user can filter the date and
time of the saved images for faster navigation. The security of the website can still be
upgraded to prevent internet breaches and avoid loss or theft of data.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 34

REFERENCES

Brain, M., & Pollette, C. (2021). How Microprocessors Work. Howstuffworks.


https://computer.howstuffworks.com/microprocessor.html
Hirst, K. K. (2020, August 26). The Invention of the Wheel and Wheeled Vehicles. Thought
Cohttps://www.thoughtco.com/wheeled-vehicles-history-
practicalhttps://www.thoughtco.com/wheeled-vehicles-history-practical-human-
use-171870human-use-171870
Hu et al. (2020). A Study on Correlation of Traffic Accident Tendency with Driver
Characters Using In-Depth Traffic Accident Data. Journal of Advanced
IOP Science. https://iopscience.iop.org/article/10.1088/1757-
IStock. (2022). Man motorcycle. Retrieved from:
https://www.istockphoto.com/en/search/2/image?mediatype=photography&phras
e=man+motorcycle&utm_source=pixabay&utm_medium=affiliate&utm_campaign
=ADP_photo_sponsored&utm_content=http%3A%2F%2Fpixabay.com%2Fphoto
s%2Fman-motorcycle-rider-helmet-7028819%2F&utm_term=man+motorcycle\
Joewona, T., & Kubota H. (2016). Safety and Security Improvement in Public.
https://www.sciencedirect.com/science/article/pii/S038611121460159X

Jolles, J. (2021). Broad-scale applications of the Raspberry Pi: A review and guide for
biologists. Methods in Ecology and Evolution. https://doi.org/10.1111/2041-
210X.13652
Lin et al. (2019). Helmet Use Detection of Tracked Motorcycles Using CNN-Based Multi-
Task Learning. https://d-nb.info/1218971762/34899X/961/1/012006/pdf
Lutkevich, B. (2019). Microcontroller. IOTAgenda.
https://internetofthingsagenda.techtarget.com/definition/microcontroller

McCombes, Shona, (2020). Descriptive Research Design | Definition, Methods and


Examples. Transportation Based on Public Perception in Developing Countries.
Science https://www.hindawi.com/journals/jat/2020/9084245/
Pabaharan. T. (2020). Studies on application of image processing in various fields: An
overview.
Pixabay. (2022). Motorcycle rider with helmet. Retrieved from:
https://pixabay.com/images/search/motorcycle%20rider%20with%20helmet/
Raspberrypi Foundation. (2021). What is Raspberry
Scribbr.https://www.scribbr.com/methodology/descriptiveresearch/#:~:text=Descr
iptive%20research%20aims%20to%20accurately,investigate%20one%20or%20
more%20variables.
Shutterstock. (2022). Motorcycle rider with helmet royalty-free images. Retrieved from:
https://www.shutterstock.com/search/motorcycle-rider-with-
helmet?kw=stock%20image&c3apidt=p69380673812&gclid=CjwKCAjwk_WVBh
BZEiwAUHQCmRCyrNLQg7N-5JEceDlRFblU6GjMkP32m0LpFC8ANQoIUo-
wUrhY9hoCNdoQAvD_BwE&gclsrc=aw.ds

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 35

Siebert, F., & Lin, H. (2019). Detecting motorcycle helmet use with deep learning.
https://www.researchgate.net/publication/340941340_Detecting_motorcycle_hel
met_use_with_deep_learning
Unsplash. (2022). Motorcycle rider with helmet. Retrieved from:
https://unsplash.com/s/photos/motorcycle-rider-with-helmet
Waranusast et al. (2013). Machine vision techniques for motorcycle safety helmet
detection. IEEE.
https://ieeexplore.ieee.org/abstract/document/6726989/authors#authors

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 36

APPENDICES

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 37

APPENDIX A
(GANTT CHART)

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 38

The Gantt Chart represents the schedule that the researchers followed to
complete the study.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 39

APPENDIX B
(LETTERS)

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 40

The sample letters were used to acquire permission to test the device on these
barangays and to gather information from the respondents.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 41

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 42

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 43

APPENDIX C
(EVALUATION
QUESTIONNAIRES)

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 44

The questionnaire was used to collect ratings as evaluation of the system, this
questionnaire answered by the end-user responders who are the officers that are involved
in checkpoint operations.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 45

APPENDIX D
(EVALUATION FOR THE
EXPERTS)

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 46

The questionnaire was used to collect ratings as evaluation of the system, this
questionnaire answered by the experts who are in the same field of study.

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 47

APPENDIX E
(COSTING)

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 48

The costing and budgeting serve as the basis for the financial performance of the
study. Shown in the table are the quantity, unit price, and the total of the materials.

QUANTITY MATERIALS UNIT PRICE TOTAL


1 Raspberry Pi 4 8382 8382
1 SIM800l Module 1000 1000
1 TP-Link Tapo C320WS IP Camera 2110 2110
1 Router 695 695
1 Modem 999 999
4 Jumper Wire (Male-Female) 0 0
Camera Module
1 PVC utility box lead 12 12
1 Lamp holder 10 10
1 Straw strap 0 0
CASING
1 Fiber Glass 475 475
1 Cyanoacrylate 50 50
1 Spray Paint 120 120
TOOLS
8 Screw 3.5 28
1 Pentel Pen 20 20
1 Cutter 20 20
SOFTWARE
1 Digital Ocean (Server) 250 250
PLAN
1 Telecom Plan 300 300
1 Internet Plan 299 299
Total 14770

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 49

APPENDIX F
CURRICULA VITAE

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 50

The resumes serve as a proponents’ profile who contributed to the study and
worked hard to accomplish and finish the study.

Jambertvill D. Valerio
Address: Ascomo, Guagua Pampanga
Email Address: jvvalerio3066@gmail.com
Contact No: 09307558380

OBJECTIVE: Attentive, analytical, hard-working professional looking for an opportunity to


deliver exceptional customer service in a retail environment. Focused on putting myself in
the shoes of prospective customers and working to ensure they come back to the company
as repeat customers.

Technical Skills

• Software MS Office, C++, Python, Arduino


• Hardware Computer Troubleshoot

Certificates
Certificate of Participation
About: Machine Learning
Date: March 7,2020

About: Gear Up: An Online Tour for Virtual Classroom


Date: October 9,2020

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 5, 2021

About: LEAP: Rising Together in this Pandemic


Date: January 22,2021

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 51

About: Webinar Serye 3.0: Genderless Life Skills for Honorians’


Holistic Development
Date: November 9,2021

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

JUNIOR HIGH SCHOOL: Don Honorio Ventura Technological State


University
Villa de Bacolor, Pampanga
June 2011 – March 2015

PRIMARY: Floridablanca Elementary School


San Antonio,Floridablanca, Pampanga
June 2005 – March 2011

PERSONAL INFORMATION
Age: 23
Date of Birth: November 30, 1998
Place of Birth: Floridablanca, Pampanga
Sex: Male
Name of Father: Joel Y. Valerio
Occupation: Cargo Representative
Name of Mother: Maribel D. Valerio
Occupation: None
Nationality: Filipino

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 52

Religion: Roman Catholic


Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 53

Aldrin C. Broqueza
Address: Del Pilar, City of San Fernando, Pampanga
Email Address: aldrinbroqueza809@gmail.com
Contact No: 09777994489

OBJECTIVE: To secure a challenging position in a reputable organization to expand my


learnings, knowledge and skills.

Technical Skills

• Software MS Office, C++, Arduino, Java


• Hardware Computer Troubleshoot

Certificates
Certificate of Participation
About: Unmask Potentials Decrypting Future Professionals
Date: January 16, 2021

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic
Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 54

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

SENIOR HIGH SCHOOL: Information and Communications Technology


Systems Plus Computer College
Lourdes, San Fernando, Pampanga
June 2016 – March 2018

JUNIOR HIGH SCHOOL: Nuestra Señora Del Pilar Integrated School


Del Pilar, San Fernando, Pampanga
June 2012 – March 2016

PRIMARY: San Fernando Elementary School


Lourdes, San Fernando, Pampanga
June 2006 – March 2012

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 55

PERSONAL INFORMATION
Age: 23
Date of Birth: March 22, 1999
Place of Birth: San Fernando, Pampanga
Sex: Male
Name of Father: Edgar Broqueza
Occupation: Driver
Name of Mother: Lea Broqueza
Occupation: Housewife
Nationality: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 56

Jayson N. De Dios
Address: Quebiawan City of San Fernando, Pampanga
Email Address: dediosjayson7@gmail.com
Contact No: 0965600092

OBJECTIVE: To be able to utilize the skills I have collected through my years of study.
To be able to improve my interpersonal skills and have a better way of interacting with the
people around me.

Technical Skills

• Software MS Office, C++, Python, Arduino


• Hardware Computer Troubleshoot

Certificates
Certificate of Participation
About: Unmask Potentials Decrypting Future Professionals
Date: January 16, 2021

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic
Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 57

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

EDUCATIONAL ATTAINMENT
TERTIARY: Bachelor of Science in Computer Engineering
Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

SENIOR HIGH SCHOOL: GENERAL ACADEMIC STRAND


Dolores Stand Alone Senior high School
Dolores, San Fernando, Pampanga
June 2017 – March 2018

GENERAL ACADEMIC STRAND


City College of San Fernando, Pampanga
Heroes Hall, Magdalena St., San Juan, City of San
Fernando, Pampanga
June 2016 – March 2017

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 58

JUNIOR HIGH SCHOOL: Saint Vincent of Quebiawan Integrated School


Quebiawan, San Fernando, Pampanga
June 2012 – March 2016

PRIMARY: San Agustin integrated School


San Agustin, San Fernando, Pampanga
June 2006 – March 2012

PERSONAL INFORMATION
Age: 22
Date of Birth: July 02, 1999
Place of Birth: San Fernando, Pampanga
Sex: Male
Name of Father: Ceferino De Dios
Occupation: Construction Worker
Name of Mother: Crisanta De Dios
Occupation: Manicurist
Nationality: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 59

Jhon Manuel T. Ocampo


Address: Sta. Lucia Resettlement Magalang, Pampanga
Email Address: ocampojhonmanuel@gmail.com
Contact No: 09510534100

OBJECTIVE: To obtain a position that will enable myself to use my computer-related


skills, educational background, experience real working environment, and ability to work
well with groups of people.

Technical Skills

• Software Web Development, Python, Java, C++, Computer


Networking

• Hardware Computer Troubleshoot and Testing

Certificates
Certificate of Participation
About: EVOLVERE: Transforming the World Through the Evolution of
Technological Innovations
Date: January 27, 2020

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic
Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

About: Webinar on Data Analysis Using Python


Date: January 19, 2022

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 60

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

SENIOR HIGH SCHOOL: Information and Communications Technology


Bestow Emmanuel College Foundation
Dapdap Mabalacat City, Pampanga
June 2016 – March 2018

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 61

JUNIOR HIGH SCHOOL: Tinajero High School (Annex)


Sta. Lucia Resettlement, San Isidro, Magalang
Pampanga
June 2012 – March 2016

PRIMARY: Cabalantian Elementary School


Sta. Lucia Resettlement, San Isidro, Magalang
Pampanga
June 2006 – March 2012

PERSONAL INFORMATION
Age: 23
Date of Birth: February 23, 1999
Place of Birth: San Fernando, Pampanga
Sex: Male
Name of Father: Manuel Medina
Occupation: None
Name of Mother: Marietta Ocampo
Occupation: Housewife
Nationality: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 62

Juan Carlo N. Ocampo


Address: Magsaysay, Guagua, Pampanga
Email Address: juancarlonaluzocampo@gmail.com
Contact No: 09564407794

OBJECTIVE: Secure a responsible career opportunity to fully utilize my training and skills,
while making a significant contribution to the success of the company.

Technical Skills

• Software MS Office, C++, Python, Arduino

• Hardware Computer Troubleshoot

Certificates
Certificate of Participation

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic
Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 63

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

SENIOR HIGH SCHOOL: SCIENCE TECHNOLY ENGINEERING AND


MATHEMATICS
STI College San Fernando
San Fernando, Pampanga
June 2016 – March 2018

JUNIOR HIGH SCHOOL: San Roque Dau High School


San Roque Dau 1st, Lubao, Pampanga
June 2012 – March 2016

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 64

PERSONAL INFORMATION
Age: 22
Date of Birth: July 15, 1999
Place of Birth: Angeles City
Sex: Male
Name of Father: Francisco III Lagman Ocampo
Occupation: None
Name of Mother: Evelyn Naluz
Occupation: Housewife
Nationality: Filipino
Religion: Iglesia Ni Cristo
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 65

Karl Vince P. Jimenez


Address: Saguin City of San Fernando, Pampanga
Email Address: karlvincepineda.28@gmail.com
Contact No: 09068563122

OBJECTIVE: I am a dedicated person and looking for a suitable job and opportunity where
I can use and enhance my talents, skills, and abilities in serving and dealing with people
and to grow and expand my knowledge and develop my personality as a career person.

Technical Skills

• Software MS Office, C++, Python, Arduino

• Hardware Computer Troubleshoot

Certificates
Certificate of Participation
About: EVOLVERE: Transforming the World Through the Evolution of
Technological Innovations
Date: January 27, 2020

About: Robotics Technology


Date: March 07, 2020

About: Machine Learning


Date: March 07, 2020

About: Unmask Potentials Decrypting Future Professionals


Date: January 16, 2021

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 66

Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

About: Webinar on Data Analysis Using Python


Date: January 19, 2022

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 67

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – Present

SENIOR HIGH SCHOOL: GENERAL ACADEMIC STRAND


Pampanga High School
Lourdes, San Fernando, Pampanga
June 2017 – March 2018

ABM STRAND
City College of San Fernando, Pampanga
Heroes Hall, Magdalena St., San Juan, City of San
Fernando, Pampanga
June 2016 – March 2017

JUNIOR HIGH SCHOOL: New Era University


KM 76 Mc Arthur Highway Dela Paz City of San
Fernando Pampanga 2000 San Fernando,
Philippines
June 2012 – March 2016

PRIMARY: Saguin Integrated School


Saguin, San Fernando, Pampanga
June 2006 – March 2012

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 68

PERSONAL INFORMATION
Age: 22
Date of Birth: November 28, 1999
Place of Birth: San Fernando, Pampanga
Sex: Male
Name of Father: Rolly G. Jimenez
Occupation: None
Name of Mother: Karen P. Jimenez
Occupation: OFW
Nationality: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 69

Marck Joshua B. Punzalan


Address: San Matias, Sto. Tomas, Pampanga
Email Address: marckjoshuapunzalan@gmail.com
Contact No: 09761129296

OBJECTIVE: To make use of my interpersonal skills to achieve goals of a company that


focuses on customer satisfaction and customer experience.

Technical Skills

• Software MS Office, C++, Python, Arduino, Photoshop

• Hardware Computer Troubleshoot

Certificates
Certificate of Participation
About: Robotics Technology
Date: March 07, 2020

About: Machine Learning


Date: March 07, 2020

About: Unmask Potentials Decrypting Future Professionals


Date: January 16, 2021

About: Boost your Career and Thrive in the New Normal: Application of
Machine Learning and Artificial Intelligence Amidst the Pandemic
Date: November 03, 2021

About: Going Online and Beyond: An Introduction to Cloud Computing


Date: November 05, 2021

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 70

About: IT JOBS CAREER OPTIONS, TITLE AND DESCRIPTION


WEBINAR
Date: May 20, 2022

About: UNLEASHING THE POTENTIAL OF THE EDUCATION SECTOR


FOR IT GRADUATE
Date: May 28, 2022

About: BLENDING WEB TECHNOLOGIES IN BUSINESS USING THE


RIGHT TOOLS
Date: May 28, 2022

About: THE POWER BEING YOURSELF: JOURNEY TO A


SUCCESSFUL IT CAREER
Date: May 30, 2022

About: IT GRADUATE: WHAT TO EXPECT IN REAL WORLD SETTING


Date: May 30, 2022

EDUCATIONAL ATTAINMENT

TERTIARY: Bachelor of Science in Computer Engineering


Don Honorio Ventura State University
Villa de Bacolor, Pampanga
June 2018 – PresentS

SENIOR HIGH SCHOOL: Humanities and Social Sciences


Pampanga High School
Lourdes, San Fernando, Pampanga
June 2016 – March 2018
JUNIOR HIGH SCHOOL: Pampanga High School

COLLEGE OF COMPUTING STUDIES


DON HONORIO VENTURA STATE UNIVERSITY 71

Lourdes, San Fernando, Pampanga


June 2012 – March 2016

PRIMARY: San Matias Elementary School


San Matias, Sto. Tomas, Pampanga
June 2006 – March 2012

PERSONAL INFORMATION
Age: 22
Date of Birth: December 20, 1999
Place of Birth: San Matias, Sto. Tomas, Pampanga
Sex: Male
Name of Father: Ricardo Punzalan
Occupation: Delivery
Name of Mother: Madonna Punzalan
Occupation: Secretary
Nationality: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Kapampangan

COLLEGE OF COMPUTING STUDIES

You might also like