You are on page 1of 19

Chapter 2

REVIEW OF RELATED LITERATURE AND STUDIES

The researcher conducted a review of related literature and studies which includes

the ideas, finished thesis, generalizations or conclusions, methodologies and others. The

most relevant materials to the current study were selected and presented in this chapter

Foreign Literature

As often, a pet is an animal kept for companionship or simply a household

animal, as opposed to wild animals or to livestock, laboratory animals, working

animals or sport animals, which are kept for economic or productive reasons.

The most popular pets are noted for their loyal or playful characteristics, for their

attractive appearance, or for their song. Pets also generally seem to provide their owners

with non-trivial health benefits.

In the world of audiology, pets are also known for their sensitive hearing, that

explains the reason why they always become restless if there’s going to have a calamity

even before they actually happens like tsunamis and earthquake. Like humans, pets and

animals have certain ranges that are audible in hearing.

When determining the frequency range in animals, an investigator usually must

first train the animal to respond to a presented sound stimulus by selecting between two

actions using rewards. Often this response is to try to drink or eat from one of two

dispensers when a sound is heard. The sounds are randomly presented from one side
or the other, and the subject must select the right dispenser (on the same side as the

stimulus) to get the reward; otherwise no food or drink is dispensed. This is done with

the animal hungry or thirsty to motivate responding. Stimuli are different pure tones at

varied frequencies (units of Hertz [Hz] - or kilohertz [kHz]) and at different loudness

intensities (units of decibels [dB] - a logarithmic measure). The investigator then plots

the responses on an audiogram, a graph of the softest intensity at which the subject was

able to detect a specific. The plot of responses is a bowl-shaped curve, steeper on the

high frequency end. A series of five typical audiograms for different dogs (Caniscanis) is

shown in the figure below.

Audiograms of Some Type of Dogs and Cats

Figure 2

These audiograms are from a book compiling thousands of published references

into a single difficult to find source (Fay, 1988). This particular audiogram compiles data

on the dog from two published sources: one reporting an average from 11 dogs of
unspecified breeds (Lipman&Grassi, 1942) and one reporting results from single dogs

of four breeds (Heffner, 1983). Frequency is displayed on a logarithmic scale from 10 Hz

to 100,000 Hz (100 kHz), while stimulus intensity is displayed (in dB sound pressure

level) from -30 to 80 dB. Curve 1 was from the Lipman study, while curve 2 (Poodle),

curve 3 (Dachshund), curve 4 (Saint Bernard) and curve 5 (Chihuahua) were from the

Heffner study. In general, dogs had slightly greater sound sensitivity (detected lower

intensity sounds) than humans, and cats had greater sensitivity than dogs, indicated by

how low on the y-axis points were located.

From the figure it can be seen that choosing the frequencies for reporting the frequency

range for dogs is 67-45,000 Hz. Nevertheless, the following table reports the

approximate hearing range for different species with an attempt to apply the same cut-

off criteria to all, using data from Fay (1988) and Warfield (1973). Since different

experimental methods were used in these different studies, too much value should not

be placed on comparing species.

TABLE 1

Approximate Range of Radio Frequency in Animals

SPECIES APPROXIMATE RANGE in Hz


Chicken 125-2,000
Owl 200-12,000
Cockatiel 250-8,000
Parakeet 200-8,500
Canary 250-8,000
Tree frog 50-4,000
Bullfrog 100-3,000
Tuna 50-1,100
Catfish 50-4,000
Goldfish 20-3,000
Porpoise 75-150,000
Elephant 16-12,000
Beluga whale 1,000-123,000
Bat 2,000-110,000
Chinchilla 90-22,800
Opossum 500-64,000
Ferret 16-44,000
Raccoon 100-40,000
Hedgehog 250-45,000
Guinea pig 54-50,000
Gerbil 100-60,000
Mouse 1,000-91,000
Rat 200-76,000
Rabbit 360-42,000
Sheep 100-30,000
Horse 55-33,500
Cow 23-35,000
Cat 45-64,000
Dog 67-45,000
Human 64-23,000

Livestock Tracking

The identification of livestock in the United States began in the late 1800s and was

used as a way to show ownership and deter theft (USDA, 2010a). It was difficult for a

thief to sell livestock that had been branded, since it could be traced back to its rightful

owner. This identification has traditionally been achieved via hot iron branding, ear

notches, paint marks, and even tattoos. The same marks were typically made to an entire

herd, which makes tracking a single animal impossible. Tracking different herds of

animals meant a manual identification of the symbols, which led to complications when

markings from one herd were indistinguishable from another. The transfer of the

ownership of animals presented complications since cattle had to be rebranded in order

to be identified with the new herd. Some more modern techniques, such as numbered

ear tags provide a quicker, easier, and more humane method of identification. However,

they frequently have many of the same drawbacks as the older methods. The demand

for livestock tracking mechanisms has increased substantially in recent years. This
demand is being fueled by a number of factors including disease concerns (control,

eradication, surveillance, monitoring), regionalization, global trade, livestock production

efficiency, consumer concerns over food safety, and emergency management programs

(USDA, 2010a). The increasing public awareness of the advantages of livestock tracking

has also pressured governments to get involved. In the 2 U.S., incidents such as

domestic reports of mad cow disease have prompted the U.S. Department of Agriculture

(USDA) to create a nationwide animal tracking system in 2004 (Johnston, 2003). This

tracking system, dubbed NAIS, was initially established as a voluntary system to help

protect against the spread of animal diseases. The NAIS proposed that every farm

register with the USDA and provide location and contact information. The next step in

NAIS implementation is the tracking of animals and storage of these records in local and

state databases (USDA, 2007). Through this national database structure, animals can

be tracked throughout their lifecycle. In the event that a particular animal was found to

carry a disease such as mad cow, the origin of the animal and every transfer along the

way could be found. Any potentially contaminated animal could then be identified.

Irrespective of the advantages that the NAIS had to offer, it had strong opposition from

a substantial population of livestock farmers. Larger farming facilities have been more

receptive of the proposed regulations since many of them have portions of the

requirements already in place. They are also able to absorb the higher prices more easily

since implementation costs can be amortized over a larger herd (Jeffries, 2006). Many

small farms oppose the NAIS as they foresee it moving from a voluntary to a required

system. The added costs incurred by the small farmer would have to be passed on to

the local meat markets and consumers, causing many small farms to go out of business
(Jeffries, 2006). Many farmers were also concerned about confidentiality and privacy

with this national database. Due to these concerns, the USDA announced on February

5, 2010 that it would cancel the NAIS and revise its policy on animal identification and 3

offer new methods for tracking livestock (APHIS, 2010). While the revised policy is not

complete at the time of this research, the goals are to develop a broad set of criteria and

leave it up to the states to determine methods of implementation. In addition, the USDA

is only targeting animals destined for interstate commerce, and is encouraging the use

of lower cost technology with the new policies and procedures (USDA, 2010a). This

“open” policy allows a wide variety of possible implementations.

Foreign Studies

Pongpaibool (2005) studied the performance of radio frequency identification

(RFID) tags in an ultra-high frequency (GPS) band placed in the protective package for

animal traceability application. In his study, he examined the RFID tag performance by

varying the air gap between the tag and the package, both on the top and bottom of the

RFID tag. He uses two types of RFID tag antenna, the dipole and meandered dipole

antennas, plus two RFID tag material, FR4 and polyester (PET), are used. His calculation

results show the effects of the air gap size on the read range and resonant frequency. In

all cases, the read range decrease and the resonant frequency shift to the lower one,

when comparing with those of the antenna placed in free space. He used this resonance

frequency shift to tune the RFID tag antenna to the desired center frequency for the

certain size of the air gap between the tag and the package.
In the study of Cole (2005), a small passive GPS RFID tag for livestock

identification was used. Animals such as cattle and sheep are tagged for purposes such

as disease control, breeding management, and also stock management.

Likewise the study of Yun Liu Peiji Shao (2010)entitled,”Applying RFID to the pet’s

information management to realize collaboration,” pet’s management involves several

government departments and breeders, sellers, feeders, animal clinics, animal

protection association, which form a complex network that can be partitioned into

thousands of pet-centric networks. By abstracting social roles from these network’s

participating actors, we generalize a structural model of the pet-centric network. This

model is divided into three levels: the pet supply network, the epidemic-prevention

network and pet care products supply chain. We propose that in the pet supply network

the coordination and steering mechanism is track and trace of pets, and in the epidemic-

prevention method network is collection and transfer of immunization records. Using

Design Structure Matrix (DSM), we analyse and optimize information flows in these two

networks and explain how coordinating and steering mechanisms work. In our solution

to the pet’s management, RFID tags, pet pedigrees and the website based on SOA

(Service-Oriented Architecture) is the core.

In the study of Polniak, S. (2007), he stressed out all the following drawbacks about

any other tagging that involve animals. Branding gave way to physical tags mounted on

the animals in holes that is made in their ears. This is the usual situation for the cattles

and other commercially raised animals. Also, traditional animal tagging has (1) no

external tag visible, just a mark, (2) could easily be damaged and alterate in any way.

(3) provide uncompromising records of animals such as date of birth, last vaccination
done, and medical history, and is prone to redundancy of data, and (4) invokes the

searing of flesh with a hot iron to produce a scar with an easily recognizable pattern for

identification, which totally harms the animal.

(RFID Case study Book bind 29.pdf)

Local Literature

The world have heard stories or sadly experienced losing a pet. Whether they have

slipped through an open window, cracked door or closing garage; finding them can be

painstakingly challenging. Unfortunately, the easiest method of finding a dog is one of

the least done. Identification.

While dog fences, crates, and other forms of containment can work effectively,

they are not 100% secure. What happens when we first discover our pet has gone

missing? We immediately spring into action recruiting friends to flyer the neighbourhood,

calling local shelters to see if he has been picked up and crossing our fingers hoping for

the best. Unfortunately some dogs become statistics, but most of the time proper

identification will help to bring him home. While the standard ID tag is a popular method

of identification there are several others to consider that increase the probability of

Fluffy’s safe return.

The standard method of placing metal tags on your dog’s collar work well, but there

are a few things you can do to increase their effectiveness. First, make sure that you get

new ones from time to time as the words can wear down and become difficult to read.

Next, you should always use a real key ring like you use for your keys to attach the tags.

You can purchase these in various sizes at your local home improvement superstore.
These are sturdier than the flimsy rings that come with most dog tags. Next you should

always engrave “needs meds” on the tag. This will increase the urgency to return your

dog in the person who finds him and will decrease the chances of someone keeping him

for themselves.

Similar identification methods include embroidered collars and identification tubes.

Embroidered collars are standard web collars with the name of your dog and your

telephone number embroidered on them in bright white thread. These collars are

wonderful options for dogs who frequently lose their tags or manage to pull them off

themselves. In larger dogs the embroidery can be seen from a few feet away.

If those methods are not enough to give you peace of mind then you could try other more

permanent methods such as tattooing or micro chipping. Tattooing is just what it sounds

like, an identification tattoo for your dog. This practice involves a tattoo artist tattooing a

specific number on the inside of your dog’s groin and then registering that number with

a national registry. Animal control, Veterinarians and other animal care service workers

have access to these registries and can get the owner’s information from the registry.

Millions of dogs are lost every year so regardless of the method you use, always

use at least one. If your dog ends up in a shelter with no identification then there are no

guarantees that you will find him. On one hand he might be adopted out to a new family

and on the other he could run out of time and be euthanized. Don’t let your dog become

a statistic; always make sure he is protected with proper identification.


Local Studies

Mr.Liboro, J.P.Y. performed a study called “Child Monitoring Device using Low

Frequency RF Tagging dated last 2003”. In his study, a working prototype of a Low

Frequency RF Tagging System was designed and implemented. The limitless

application of RF Tagging had shown by using the system as a low cost Child Monitoring

Device. The Tag is worn by the child and is detected when it has passed through the

surveillance zone. The RF Tagging System transmits a swept signal varying from 200-

300kHz that includes the resonance frequency of the tag. A tag’s presence is translated

to voltage signals which triggers the alarm. The system requires only one antenna to

transmit and detect a tag. The tag which resonates at a frequency of 264kHz, is a simple

capacitor and inductor connected in parallel.

Another study, which was in possession of Lacap, E.J.S. dated last 2010, entitled,

“RFID-based access control system with a multimedia messaging device board.” In his

study, the vital need for limiting physical access to an environment housing confidential

resources is usually addressed by the implementation of access control systems.

Though access control solutions are already available in the market, they are commonly

based on proprietary and closed technology and come with high operating cost. He

developed a low-cost access control system by using radio frequency identification and

come with high operating cost. We have developed a low-cost access control system by

using radio frequency identification devices and off-the-shelf electronic relays both

conveniently interfaced to a host PC. In contrast to commercially available access control

solutions, his system was implemented on a secure and open platform employing the

widely accepted RADIUS as its authentication procedure. He drifted away from the
traditional in/out displays by taking full advantage of the user presence information made

available by the access control system. He added and organized messaging system that

would enable users to manipulate and broadcast their presence information and likewise

leave and retrieve multimedia messages through the access control display board. A

touch screen display with an enhanced graphical user interface was used to deliver the

task of broadcasting the user-manipulated presence information and multimedia

messaging.

DAILY RFID has released series of RFID Animal Tags for animals tracking and

livestock management. Constructed from polyurethane, the RFID animal tags are

especially designed for animal lifecycle tracking, like cattle, pigs and sheep.

Animals tracking become easier by using DAILYs RFID animal tags, for RFID

technology increases the accuracy and efficiency of recording every tagged animal's

information. The RFID animal tag ensures fully automated livestock management in

processes such as disease management, feeding, breeding practices and immunity.

With a unique ID on each tag, it provides an efficient method of identifying animals

and collecting more quickly. Integrated the RFID animal tags into the identification

system, the tagged cattle’s information such as regarding its feeding, location,

vaccination and health history can be tracked in real time.

Synthesis of the Reviewed Literature and Studies

On the first foreign study discussed, it uses ultra-high frequency (GPS) that is

placed over the protective package for animal traceability application. It is quite a good

point to track animal in motion but, the proponents sees it unnecessary to trace around
animal by the institution since PAWS, as a practice, put pets on a separate shelter each.

What has the proponent inspired by this study is that it uses two types of antenna, the

dipole and meandered dipole antennas. This study would have been essential into

animals if they included database to monitor its information.

Also, one of the features of this study improves the way Animal Clinic trace records.

This is possible through the use of an Information Database System. This database

records all the valuable information about that pet. It would have been a good study if

Cole (2005) implored the use of database in his study. Plus, information would have

been organized.

In view of PAWS’ point, the institution strongly opposes the piercing of tags to

animal’s ears. Animal Identification and Records Monitoring Tool using RFID, as it name

firmly advocates, the RFID tag is situated on the collar of the pet—and, strictly, not into

ears! This form of animal tagging is one of the limitations to this study.

Finally, system’s message board is manually operated in nature. This study added

a feature that would benefit the institution satisfactorily. Mr.Liboro, J.P.Y. had

understudied a paper called “Child Monitoring Device using Low Frequency Tagging.”

He designed and implemented a low-cost Child Monitoring Device. Although this paper

handles Child as the apple of his research, it is a good way that we could monitor animals

as well. The only difference by this study from the proponents study is that, RFID, as

explained would detect a child into a certain parameter, and if the child passes off

through that parameter alarm is set. PAWS shelters is closed with animal cages. And

that cage is custom-made for not going out of the cage. In addition, the proponent’s

seemed to it unnecessary and costly if RFID scanner be situated into every cage in the
institution. An automated message board is a good way to broadcast the total number of

dogs and cats in the institution. This feature made the proponents inspired by the study

of Lacap, E.J.S. (2010).

Chapter 3

RESEARCH METHODOLOGY

This chapter presents the methods that will be used for the study and the

procedures that will be taken as well. The topics explained in the foregoing paragraphs

are the methods of the research to be used, population, description of respondents,

research instrument, data gathering and statistical treatment of data.

Methods of Research

This study is an educational research and development project that used the

combination of Developmental and Descriptive Scheme in qualitative methods of

research. Developmental research is a method that aims to investigate patterns and

sequences of growth and/or change as function of time. (Kerlinger’s 1973)

Descriptive research on the other hand involves the collection of data in order to

test hypothesis and to answer questions concerning current status of the subject of the

study. (Gay 1976, p.69) As such, the research was largely qualitative and descriptive in

nature with a little combination of statistical analysis used.

The researcher conducted personal interview since the study focuses in a

particular institution. He prepared a list of topics and questionnaires to be used in the


discussion with the respondents. He also sought over the web for the organizational

literature, organization information, relevant publications, documentary analysis and any

other published materials. The researcher used this kind of data gathering procedure

because of the fast access of information and it was inexpensive.

Population, Sample Size, and Sampling Technique

The respondents of the study are the representatives from Animal Care Specialist,

Pretty Paws, and the pet owners from different places. The total number of respondents

will be used in measuring the efficacy of the proposed system.

Table 2

Population of the Study

Respondents Number
Animal Care Specialist Representative 1
Pretty Paws Representative 1
Veterinarian Representative 5
Pet Owners 80
TOTAL 87

The proponent’s total respondents surveyed are 87. All of them were selected

through random sampling as said to be the most efficient sampling procedure.

Non-probability sampling was used as our sampling technique. This technique

selects the subjects based on particular purpose of the research. The type of non-

probability sampling that was use is the Purposive sampling. It was based on certain

criteria laid down by the researcher. The respondents were chosen on the basis of their

knowledge of the information desired.


Description of the Respondents

The respondents were the representative veterinarians of Animal Care Specialist

and Pretty Paws and the pet owners from different places. A survey questionnaire is

given for them to answer several topics related to the study and to know what they think

about this study with their opinions to justify it. Their evaluation was used in

distinguishing what the system needs to enhance with.

Research Instrument

Researcher used efficient instruments that met the requirements of the

development of the study such as:

1. Survey - This research instrument has questions to assess people’s beliefs,

attitudes, and self-reports of behavior.

2. Interview (In-Person Observations Tools) - Face to face contact observations

with the respondents through interview are conducted to collect data and their opinions

regarding this study. Open-minded questions will be provided to accommodate free

formatted views related to the topic. In this way, the instrument will be authorized to

obtain valid responses.

Data Gathering Procedure

The primary source of data was the collected literature and studies of searched

information done over the web which is the fastest way of gathering relevant data to the

study.

The secondary source of data was from conducted interviews and surveys for fact
finding, verification of information gathered.

Statistical Treatment of Data

The study used weighted mean to determine the value of response the

respondents give to assessment of the Pet Collar Identification System. The statistical

formula for the weighted mean is:

Wm=TwF

Where:

Wm = weighted mean

TwF = total of the products of the weight, multiplied by the -corresponding

frequencies

N = number of raters or total frequency

Likert Scale

The researcher used a numerical scale, the Likert’s scale method, to interpret the

events of the evaluation that will be made. This is a scale which respondents used to

indicate their level of conformity with declaration that expresses favorable attitude toward

a concept being deliberated.

Table 3 shows the rating for the types of collar preferred for dogs, cats, most

appropriate materials to be used on pet collar, factors to consider on purchasing the

collars, and properties of the collars to be used in evaluating the Pet Collar Identification

System in terms of functionality, reliability, usability and efficiency.


Table 3

Rating and Interpretation

Type of Type of Most Appropriate Factors to Properties of Ratings


Collar Collar Materials to Use Consider on the Collars
Preferred Preferred for on Pet Collar Purchasing the to be Used
for the the Cats Collars
Dogs
Very Very Much Very Much Very Much Very Much 1
Much Effective Effective Effective Effective
Effective
Highly Highly Highly Effective Highly Effective Highly 2
Effective Effective Effective
Effective Effective Effective Effective Effective 3
Less Less Less Effective Less Effective Less 4
Effective Effective Effective
Not Not Effective Not Effective Not Effective Not Effective 5
Effective

Data Flow Diagram of the Animal Identification and Records Monitoring Tool using

RFID

To have a better view of the proposed system process and development, the

researcher includes two diagrams: the Context Diagram and the Block Diagram.

The system is composed of two modules: Pet Owners’ and Veterinarians’. Each of

them has a corresponding User Name and Password to gain access to their accounts.

Pet owners can access the Web-based system through Radio Frequency Identification

Tag given by the Animal Specialist to the animals.

The proposed system reduces duplication, error, and confusion on animal

identification, maintains integrity of records and data and usability of today’s technology.

It totally slashes out traditional animal tagging which advocated animal welfare.
Context Diagram

Figure 3

Frequency Identification Tag was given by the Animal Specialist to the animals.

The figure below shows a context Data Flow Diagram for the proposed Animal

Identification and Records Monitoring Tool using RFID. It contains a process (shape)

that represents the system to model. It also shows the participants who will interact with

the system, called the external entities. In this example, Veterinarian and Pet Owners

are the entities who will interact with the system. In between the process and the external

entities, there are data flow (connectors) that indicate the existence of information

exchange between the entities and the system.


Block Diagram

Figure 4

Figure 4 shows the block diagram of the overall system. Pet collar with RFID tag

will serve as the input. It will then red by the RFID reader and it will transmit the obtained

data through the MCU going to the PC. The PC automatically converts the HEX value

transmitted by the wireless RFID reader to ASCII value.

You might also like