Professional Documents
Culture Documents
The researcher conducted a review of related literature and studies which includes
the ideas, finished thesis, generalizations or conclusions, methodologies and others. The
most relevant materials to the current study were selected and presented in this chapter
Foreign Literature
animals or sport animals, which are kept for economic or productive reasons.
The most popular pets are noted for their loyal or playful characteristics, for their
attractive appearance, or for their song. Pets also generally seem to provide their owners
In the world of audiology, pets are also known for their sensitive hearing, that
explains the reason why they always become restless if there’s going to have a calamity
even before they actually happens like tsunamis and earthquake. Like humans, pets and
first train the animal to respond to a presented sound stimulus by selecting between two
actions using rewards. Often this response is to try to drink or eat from one of two
dispensers when a sound is heard. The sounds are randomly presented from one side
or the other, and the subject must select the right dispenser (on the same side as the
stimulus) to get the reward; otherwise no food or drink is dispensed. This is done with
the animal hungry or thirsty to motivate responding. Stimuli are different pure tones at
varied frequencies (units of Hertz [Hz] - or kilohertz [kHz]) and at different loudness
intensities (units of decibels [dB] - a logarithmic measure). The investigator then plots
the responses on an audiogram, a graph of the softest intensity at which the subject was
able to detect a specific. The plot of responses is a bowl-shaped curve, steeper on the
high frequency end. A series of five typical audiograms for different dogs (Caniscanis) is
Figure 2
into a single difficult to find source (Fay, 1988). This particular audiogram compiles data
on the dog from two published sources: one reporting an average from 11 dogs of
unspecified breeds (Lipman&Grassi, 1942) and one reporting results from single dogs
to 100,000 Hz (100 kHz), while stimulus intensity is displayed (in dB sound pressure
level) from -30 to 80 dB. Curve 1 was from the Lipman study, while curve 2 (Poodle),
curve 3 (Dachshund), curve 4 (Saint Bernard) and curve 5 (Chihuahua) were from the
Heffner study. In general, dogs had slightly greater sound sensitivity (detected lower
intensity sounds) than humans, and cats had greater sensitivity than dogs, indicated by
From the figure it can be seen that choosing the frequencies for reporting the frequency
range for dogs is 67-45,000 Hz. Nevertheless, the following table reports the
approximate hearing range for different species with an attempt to apply the same cut-
off criteria to all, using data from Fay (1988) and Warfield (1973). Since different
experimental methods were used in these different studies, too much value should not
TABLE 1
Livestock Tracking
The identification of livestock in the United States began in the late 1800s and was
used as a way to show ownership and deter theft (USDA, 2010a). It was difficult for a
thief to sell livestock that had been branded, since it could be traced back to its rightful
owner. This identification has traditionally been achieved via hot iron branding, ear
notches, paint marks, and even tattoos. The same marks were typically made to an entire
herd, which makes tracking a single animal impossible. Tracking different herds of
animals meant a manual identification of the symbols, which led to complications when
markings from one herd were indistinguishable from another. The transfer of the
to be identified with the new herd. Some more modern techniques, such as numbered
ear tags provide a quicker, easier, and more humane method of identification. However,
they frequently have many of the same drawbacks as the older methods. The demand
for livestock tracking mechanisms has increased substantially in recent years. This
demand is being fueled by a number of factors including disease concerns (control,
efficiency, consumer concerns over food safety, and emergency management programs
(USDA, 2010a). The increasing public awareness of the advantages of livestock tracking
has also pressured governments to get involved. In the 2 U.S., incidents such as
domestic reports of mad cow disease have prompted the U.S. Department of Agriculture
(USDA) to create a nationwide animal tracking system in 2004 (Johnston, 2003). This
tracking system, dubbed NAIS, was initially established as a voluntary system to help
protect against the spread of animal diseases. The NAIS proposed that every farm
register with the USDA and provide location and contact information. The next step in
NAIS implementation is the tracking of animals and storage of these records in local and
state databases (USDA, 2007). Through this national database structure, animals can
be tracked throughout their lifecycle. In the event that a particular animal was found to
carry a disease such as mad cow, the origin of the animal and every transfer along the
way could be found. Any potentially contaminated animal could then be identified.
Irrespective of the advantages that the NAIS had to offer, it had strong opposition from
a substantial population of livestock farmers. Larger farming facilities have been more
receptive of the proposed regulations since many of them have portions of the
requirements already in place. They are also able to absorb the higher prices more easily
since implementation costs can be amortized over a larger herd (Jeffries, 2006). Many
small farms oppose the NAIS as they foresee it moving from a voluntary to a required
system. The added costs incurred by the small farmer would have to be passed on to
the local meat markets and consumers, causing many small farms to go out of business
(Jeffries, 2006). Many farmers were also concerned about confidentiality and privacy
with this national database. Due to these concerns, the USDA announced on February
5, 2010 that it would cancel the NAIS and revise its policy on animal identification and 3
offer new methods for tracking livestock (APHIS, 2010). While the revised policy is not
complete at the time of this research, the goals are to develop a broad set of criteria and
is only targeting animals destined for interstate commerce, and is encouraging the use
of lower cost technology with the new policies and procedures (USDA, 2010a). This
Foreign Studies
(RFID) tags in an ultra-high frequency (GPS) band placed in the protective package for
animal traceability application. In his study, he examined the RFID tag performance by
varying the air gap between the tag and the package, both on the top and bottom of the
RFID tag. He uses two types of RFID tag antenna, the dipole and meandered dipole
antennas, plus two RFID tag material, FR4 and polyester (PET), are used. His calculation
results show the effects of the air gap size on the read range and resonant frequency. In
all cases, the read range decrease and the resonant frequency shift to the lower one,
when comparing with those of the antenna placed in free space. He used this resonance
frequency shift to tune the RFID tag antenna to the desired center frequency for the
certain size of the air gap between the tag and the package.
In the study of Cole (2005), a small passive GPS RFID tag for livestock
identification was used. Animals such as cattle and sheep are tagged for purposes such
Likewise the study of Yun Liu Peiji Shao (2010)entitled,”Applying RFID to the pet’s
protection association, which form a complex network that can be partitioned into
model is divided into three levels: the pet supply network, the epidemic-prevention
network and pet care products supply chain. We propose that in the pet supply network
the coordination and steering mechanism is track and trace of pets, and in the epidemic-
Design Structure Matrix (DSM), we analyse and optimize information flows in these two
networks and explain how coordinating and steering mechanisms work. In our solution
to the pet’s management, RFID tags, pet pedigrees and the website based on SOA
In the study of Polniak, S. (2007), he stressed out all the following drawbacks about
any other tagging that involve animals. Branding gave way to physical tags mounted on
the animals in holes that is made in their ears. This is the usual situation for the cattles
and other commercially raised animals. Also, traditional animal tagging has (1) no
external tag visible, just a mark, (2) could easily be damaged and alterate in any way.
(3) provide uncompromising records of animals such as date of birth, last vaccination
done, and medical history, and is prone to redundancy of data, and (4) invokes the
searing of flesh with a hot iron to produce a scar with an easily recognizable pattern for
Local Literature
The world have heard stories or sadly experienced losing a pet. Whether they have
slipped through an open window, cracked door or closing garage; finding them can be
While dog fences, crates, and other forms of containment can work effectively,
they are not 100% secure. What happens when we first discover our pet has gone
missing? We immediately spring into action recruiting friends to flyer the neighbourhood,
calling local shelters to see if he has been picked up and crossing our fingers hoping for
the best. Unfortunately some dogs become statistics, but most of the time proper
identification will help to bring him home. While the standard ID tag is a popular method
of identification there are several others to consider that increase the probability of
The standard method of placing metal tags on your dog’s collar work well, but there
are a few things you can do to increase their effectiveness. First, make sure that you get
new ones from time to time as the words can wear down and become difficult to read.
Next, you should always use a real key ring like you use for your keys to attach the tags.
You can purchase these in various sizes at your local home improvement superstore.
These are sturdier than the flimsy rings that come with most dog tags. Next you should
always engrave “needs meds” on the tag. This will increase the urgency to return your
dog in the person who finds him and will decrease the chances of someone keeping him
for themselves.
Embroidered collars are standard web collars with the name of your dog and your
telephone number embroidered on them in bright white thread. These collars are
wonderful options for dogs who frequently lose their tags or manage to pull them off
themselves. In larger dogs the embroidery can be seen from a few feet away.
If those methods are not enough to give you peace of mind then you could try other more
permanent methods such as tattooing or micro chipping. Tattooing is just what it sounds
like, an identification tattoo for your dog. This practice involves a tattoo artist tattooing a
specific number on the inside of your dog’s groin and then registering that number with
a national registry. Animal control, Veterinarians and other animal care service workers
have access to these registries and can get the owner’s information from the registry.
Millions of dogs are lost every year so regardless of the method you use, always
use at least one. If your dog ends up in a shelter with no identification then there are no
guarantees that you will find him. On one hand he might be adopted out to a new family
and on the other he could run out of time and be euthanized. Don’t let your dog become
Mr.Liboro, J.P.Y. performed a study called “Child Monitoring Device using Low
Frequency RF Tagging dated last 2003”. In his study, a working prototype of a Low
application of RF Tagging had shown by using the system as a low cost Child Monitoring
Device. The Tag is worn by the child and is detected when it has passed through the
surveillance zone. The RF Tagging System transmits a swept signal varying from 200-
300kHz that includes the resonance frequency of the tag. A tag’s presence is translated
to voltage signals which triggers the alarm. The system requires only one antenna to
transmit and detect a tag. The tag which resonates at a frequency of 264kHz, is a simple
Another study, which was in possession of Lacap, E.J.S. dated last 2010, entitled,
“RFID-based access control system with a multimedia messaging device board.” In his
study, the vital need for limiting physical access to an environment housing confidential
Though access control solutions are already available in the market, they are commonly
based on proprietary and closed technology and come with high operating cost. He
developed a low-cost access control system by using radio frequency identification and
come with high operating cost. We have developed a low-cost access control system by
using radio frequency identification devices and off-the-shelf electronic relays both
solutions, his system was implemented on a secure and open platform employing the
widely accepted RADIUS as its authentication procedure. He drifted away from the
traditional in/out displays by taking full advantage of the user presence information made
available by the access control system. He added and organized messaging system that
would enable users to manipulate and broadcast their presence information and likewise
leave and retrieve multimedia messages through the access control display board. A
touch screen display with an enhanced graphical user interface was used to deliver the
messaging.
DAILY RFID has released series of RFID Animal Tags for animals tracking and
livestock management. Constructed from polyurethane, the RFID animal tags are
especially designed for animal lifecycle tracking, like cattle, pigs and sheep.
Animals tracking become easier by using DAILYs RFID animal tags, for RFID
technology increases the accuracy and efficiency of recording every tagged animal's
information. The RFID animal tag ensures fully automated livestock management in
and collecting more quickly. Integrated the RFID animal tags into the identification
system, the tagged cattle’s information such as regarding its feeding, location,
On the first foreign study discussed, it uses ultra-high frequency (GPS) that is
placed over the protective package for animal traceability application. It is quite a good
point to track animal in motion but, the proponents sees it unnecessary to trace around
animal by the institution since PAWS, as a practice, put pets on a separate shelter each.
What has the proponent inspired by this study is that it uses two types of antenna, the
dipole and meandered dipole antennas. This study would have been essential into
Also, one of the features of this study improves the way Animal Clinic trace records.
This is possible through the use of an Information Database System. This database
records all the valuable information about that pet. It would have been a good study if
Cole (2005) implored the use of database in his study. Plus, information would have
been organized.
In view of PAWS’ point, the institution strongly opposes the piercing of tags to
animal’s ears. Animal Identification and Records Monitoring Tool using RFID, as it name
firmly advocates, the RFID tag is situated on the collar of the pet—and, strictly, not into
ears! This form of animal tagging is one of the limitations to this study.
Finally, system’s message board is manually operated in nature. This study added
a feature that would benefit the institution satisfactorily. Mr.Liboro, J.P.Y. had
understudied a paper called “Child Monitoring Device using Low Frequency Tagging.”
He designed and implemented a low-cost Child Monitoring Device. Although this paper
handles Child as the apple of his research, it is a good way that we could monitor animals
as well. The only difference by this study from the proponents study is that, RFID, as
explained would detect a child into a certain parameter, and if the child passes off
through that parameter alarm is set. PAWS shelters is closed with animal cages. And
that cage is custom-made for not going out of the cage. In addition, the proponent’s
seemed to it unnecessary and costly if RFID scanner be situated into every cage in the
institution. An automated message board is a good way to broadcast the total number of
dogs and cats in the institution. This feature made the proponents inspired by the study
Chapter 3
RESEARCH METHODOLOGY
This chapter presents the methods that will be used for the study and the
procedures that will be taken as well. The topics explained in the foregoing paragraphs
Methods of Research
This study is an educational research and development project that used the
Descriptive research on the other hand involves the collection of data in order to
test hypothesis and to answer questions concerning current status of the subject of the
study. (Gay 1976, p.69) As such, the research was largely qualitative and descriptive in
other published materials. The researcher used this kind of data gathering procedure
The respondents of the study are the representatives from Animal Care Specialist,
Pretty Paws, and the pet owners from different places. The total number of respondents
Table 2
Respondents Number
Animal Care Specialist Representative 1
Pretty Paws Representative 1
Veterinarian Representative 5
Pet Owners 80
TOTAL 87
The proponent’s total respondents surveyed are 87. All of them were selected
selects the subjects based on particular purpose of the research. The type of non-
probability sampling that was use is the Purposive sampling. It was based on certain
criteria laid down by the researcher. The respondents were chosen on the basis of their
and Pretty Paws and the pet owners from different places. A survey questionnaire is
given for them to answer several topics related to the study and to know what they think
about this study with their opinions to justify it. Their evaluation was used in
Research Instrument
with the respondents through interview are conducted to collect data and their opinions
formatted views related to the topic. In this way, the instrument will be authorized to
The primary source of data was the collected literature and studies of searched
information done over the web which is the fastest way of gathering relevant data to the
study.
The secondary source of data was from conducted interviews and surveys for fact
finding, verification of information gathered.
The study used weighted mean to determine the value of response the
respondents give to assessment of the Pet Collar Identification System. The statistical
Wm=TwF
Where:
Wm = weighted mean
frequencies
Likert Scale
The researcher used a numerical scale, the Likert’s scale method, to interpret the
events of the evaluation that will be made. This is a scale which respondents used to
indicate their level of conformity with declaration that expresses favorable attitude toward
Table 3 shows the rating for the types of collar preferred for dogs, cats, most
collars, and properties of the collars to be used in evaluating the Pet Collar Identification
Data Flow Diagram of the Animal Identification and Records Monitoring Tool using
RFID
To have a better view of the proposed system process and development, the
researcher includes two diagrams: the Context Diagram and the Block Diagram.
The system is composed of two modules: Pet Owners’ and Veterinarians’. Each of
them has a corresponding User Name and Password to gain access to their accounts.
Pet owners can access the Web-based system through Radio Frequency Identification
identification, maintains integrity of records and data and usability of today’s technology.
It totally slashes out traditional animal tagging which advocated animal welfare.
Context Diagram
Figure 3
Frequency Identification Tag was given by the Animal Specialist to the animals.
The figure below shows a context Data Flow Diagram for the proposed Animal
Identification and Records Monitoring Tool using RFID. It contains a process (shape)
that represents the system to model. It also shows the participants who will interact with
the system, called the external entities. In this example, Veterinarian and Pet Owners
are the entities who will interact with the system. In between the process and the external
entities, there are data flow (connectors) that indicate the existence of information
Figure 4
Figure 4 shows the block diagram of the overall system. Pet collar with RFID tag
will serve as the input. It will then red by the RFID reader and it will transmit the obtained
data through the MCU going to the PC. The PC automatically converts the HEX value