Professional Documents
Culture Documents
CHAPTER-II Edited
CHAPTER-II Edited
CHAPTER-II Edited
This chapter will present some related literature and studies related to the
researcher’s study after the thorough and in-depth search. The content of this chapter
were gathered from various sources such as the writings of experts, books and different
thesis projects. All of these have significant relation and contribution to the study.
Related Literature
hardware that is designed and programmed to work automatically without the need for a
human operator to provide inputs and instructions for each operation. Automated
system operations are used in a wide range of applications like control and monitoring
response systems and so on. These systems take several system and environmental
specific control logic. The use of automated system operations saves labor, time and
cost while increasing the accuracy and precision of the job being carried out. It
(https://www.techopedia.com/definition/31065/automated-system-operations-aso)
Verma & Tripathi, 2014 developed a security system which uses an RFID
technology to secure access of a space while keeping record tracks of users. The
system functions in real time and all the information will be stored in database server.
The similarity between their study and the proponent’s study is that they
The difference between their study and the proponent’s study is that the
latter used the RFID as an attendance and monitoring device unlike to their study, they
motion sensor. This system has a night vision capability which means it works day and
night in preventing intruders. When a moving body is detected, the motion sensor will
send information to raspberry pi so it can trigger the buzzer alarm. It can also send SMS
The similarity of the system mentioned and the proposed system is that they
both used motion sensor to detect movements and to trigger alarms to easily warn the
The difference of the system mentioned and the proposed system is that the
former used raspberry pi and GSM module while the latter uses motion sensor only and
system for Kisoro prison in Uganda. The system’s objective is to provide centralized
access to information and to have faster transaction in tracking inmate’s profile by valid
users. They used MYSQL as the backend database and a frontend web browser fot the
system.
The similarity between their study and the proponent’s study is that they both
The difference of the system mentioned and the proposed system is that the
latter developed a system that can manage information at the same time monitors the
facility using hardware devices while the other study only had a software system.
Instructors can also tract student attendance instantly during lecture sessions.
The similarity between their study and the proponent’s study is that they both
The difference of the system mentioned and the proposed system is that the
latter used the fingerprint to monitor logs of the user while the other system used it as
an attendance.
Prison Monitoring Using Ibeacon and Arduino Microcontroller
S. Abraar et al., 2018 developed a system that monitor the prisoner’s activity
inside the jail and can send the location of the prisoner to a computer device or a
smartphone. The system also has a heartbeat sensor that was attach in the wrist and to
The similarity between their study and the proponent’s study is that they both
The difference of the system mentioned and the proposed system is that the
former focuses on monitoring the prisoner’s health while the latter focuses more on the
Provincial Jail of Misamis Oriental. This system is computer-based system that keeps
tracks of inmate’s profile and it generates real time reports. Before this system has been
developed they use index cards to record the prisoner’s personal information.
The similarity of the system mentioned and the proposed system is that
they both used information system to keep and organize records of prisoner’s profile
with the aim for easy updating, searching, and viewing of records. There was not that
much difference on both systems except the latter used hardware for their project.
of Radio Frequency Identification (RFID) that will document the student’s information
together with the record of the time of entry and departure of student. This system can
also capture the image of the student entering the premises and the system also has a
The similarity of the system mentioned and the proposed system is that
they both used RFID to record the logs of entry for monitoring. The difference between
the both systems is the latter did not used a metal detector for their system.
aimed to track visitor’s current location inside the campus of the University of the
Immaculate Conception with the used of RFID tags. The objective of their study is to
The similarity of the system mentioned and the proposed system is that
they both used RFID and their difference is that the former used the RFID to the visitors
in real time basis and they can locate them using their system while the latter used the