CHAPTER-II Edited

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CHAPTER II

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter will present some related literature and studies related to the

researcher’s study after the thorough and in-depth search. The content of this chapter

were gathered from various sources such as the writings of experts, books and different

thesis projects. All of these have significant relation and contribution to the study.

Related Literature

Automated System Operation are a combination of both software and

hardware that is designed and programmed to work automatically without the need for a

human operator to provide inputs and instructions for each operation. Automated

system operations are used in a wide range of applications like control and monitoring

systems, data security applications, factory automation systems, automated message

response systems and so on. These systems take several system and environmental

events as input and perform operations based on conditional decision-making and

specific control logic. The use of automated system operations saves labor, time and

cost while increasing the accuracy and precision of the job being carried out. It

increases the availability, performance and reliability of the services delivered.

(https://www.techopedia.com/definition/31065/automated-system-operations-aso)

Foreign Related Studies


Digital Security System with Door Lock System Using RFID Technology

Verma & Tripathi, 2014 developed a security system which uses an RFID

technology to secure access of a space while keeping record tracks of users. The

system functions in real time and all the information will be stored in database server.

The similarity between their study and the proponent’s study is that they

both used an RFID technology to keep records and logs of transaction.

The difference between their study and the proponent’s study is that the

latter used the RFID as an attendance and monitoring device unlike to their study, they

used it as a security device to authenticate users before entering in a certain space.

Motion Detector Security System for Indoor Geolocation

Nosiri et al., 2018 developed a microcontroller based security system using

motion sensor. This system has a night vision capability which means it works day and

night in preventing intruders. When a moving body is detected, the motion sensor will

send information to raspberry pi so it can trigger the buzzer alarm. It can also send SMS

alert notification and recorded video to owner’s mobile phone.

The similarity of the system mentioned and the proposed system is that they

both used motion sensor to detect movements and to trigger alarms to easily warn the

personnel in the nearby area.

The difference of the system mentioned and the proposed system is that the

former used raspberry pi and GSM module while the latter uses motion sensor only and

it cannot send messages


A Secure Web Based Records Management System for Prison

Emmanuel Ahishakiye et.al., 2017 developed a web based record management \

system for Kisoro prison in Uganda. The system’s objective is to provide centralized

access to information and to have faster transaction in tracking inmate’s profile by valid

users. They used MYSQL as the backend database and a frontend web browser fot the

system.

The similarity between their study and the proponent’s study is that they both

developed a web-based system for prison.

The difference of the system mentioned and the proposed system is that the

latter developed a system that can manage information at the same time monitors the

facility using hardware devices while the other study only had a software system.

Development of Attendance System using Biometric Fingerprint Identification

Norshidah Katiran et al., 2010 develop an attendance system based on

fingerprint identification for class attendance of the students in their university.

Instructors can also tract student attendance instantly during lecture sessions.

The similarity between their study and the proponent’s study is that they both

used fingerprint scanner in their project.

The difference of the system mentioned and the proposed system is that the

latter used the fingerprint to monitor logs of the user while the other system used it as

an attendance.
Prison Monitoring Using Ibeacon and Arduino Microcontroller

S. Abraar et al., 2018 developed a system that monitor the prisoner’s activity

inside the jail and can send the location of the prisoner to a computer device or a

smartphone. The system also has a heartbeat sensor that was attach in the wrist and to

monitor their health.

The similarity between their study and the proponent’s study is that they both

developed a project that can monitor prisoner inside the jail.

The difference of the system mentioned and the proposed system is that the

former focuses on monitoring the prisoner’s health while the latter focuses more on the

improvement of the security of the facility.

Local Related Studies

A study of Tubongbanua et al., 2010 is an information system for the

Provincial Jail of Misamis Oriental. This system is computer-based system that keeps

tracks of inmate’s profile and it generates real time reports. Before this system has been

developed they use index cards to record the prisoner’s personal information.

The similarity of the system mentioned and the proposed system is that

they both used information system to keep and organize records of prisoner’s profile

with the aim for easy updating, searching, and viewing of records. There was not that

much difference on both systems except the latter used hardware for their project.

Rhowel M. Dellosa 2012 developed an Attendance Recorder with the Use

of Radio Frequency Identification (RFID) that will document the student’s information
together with the record of the time of entry and departure of student. This system can

also capture the image of the student entering the premises and the system also has a

walk through metal detector.

The similarity of the system mentioned and the proposed system is that

they both used RFID to record the logs of entry for monitoring. The difference between

the both systems is the latter did not used a metal detector for their system.

A study of Borlio et al., 2015 is a Visitor Tracking System. This system

aimed to track visitor’s current location inside the campus of the University of the

Immaculate Conception with the used of RFID tags. The objective of their study is to

create a system that continuously monitors to visitors inside the campus.

The similarity of the system mentioned and the proposed system is that

they both used RFID and their difference is that the former used the RFID to the visitors

in real time basis and they can locate them using their system while the latter used the

RFID as a counter to monitor the number of prisoner inside a single cell.

You might also like