You are on page 1of 96

Monitoring System for CDLB Employees 1

CHAPTER I

INTRODUCTION

Nowadays, it is quite common for the school to maximize the use of computer

technology. In the educational setting, different monitoring systems were introduced to

monitor the process of getting the schedule of faculty and staff, including their signing in

and off.

One of the major concerns of all organizations, specifically in educational

institutions, is the process of monitoring their employees' arrival and departure efficiently

during their working days. To resolve the issue, institutions started to rely on devices with

sensors to improve their monitoring capabilities. Such devices use a barcode system, a

magnetic stripe system, radio-frequency identification (RFID) system, and a biometrics

system. With the convenience offered by a proper monitoring tool, the demand for them is

high. A simple monitoring system can observe devices, infrastructures, applications,

services, and even business processes.

Biometric technology that involves identifying and verifying people by analyzing

the human fingerprint characteristics has been widely employed in various aspects of life

for different purposes, most significantly regarding this study, employee attendance, and

schedule. This paper aims to develop an accurate and extremely efficient automatic

attendance system using the fingerprint verification technique. The proponent used a
Monitoring System for CDLB Employees 2

quantitative approach by designing a questionnaire because the data collection instrument

supports fingerprint matching biometric technologies.

Background of the Study

Colegio de Los Baños (CDLB) is a private, non-stock, non-benefit corporation

situated at Lopez Avenue, Los Baños, Laguna. It envisions to be a main tuition-based

school with engaged 21st-century educators and students who are glad for their Filipino

legacy, holds Christian qualities, and are socially dependable residents of the world. It

exists to be the main establishment that gives pertinent and dependable schooling to its

understudies; persuades educators to shape the psyches of the adolescent so they can be

ethically upstanding pioneers, long-lasting students, and gainful Filipinos, motivates

managers and staff to give a favorable and steady climate for learning and to do; and

collaborates with families, graduated class, and networks in setting up the understudies for

their picked future.

CDLB uses ID cards for the unique identification of employees. For their

attendance, the Bundy clock system is currently used. The time cards are checked manually

and are tabulated on the computer. This would serve as basis for the attendance report. To

verify the attendance of an employee, the time card is being checked manually. This

process can be improved through the adaptation of the newest technology that will enable

the college to improve the pace of the tracking process among faculty members, a more
Monitoring System for CDLB Employees 3

convenient confirmation of absences via e-mail, serving for notification of absences, are

among the improvements that the college needs to focus on.

Some problems that may be encountered with Bundy-clock attendance system are

punching of time card for someone who physically is not present or using their credentials

to hit them in is a deliberate criminal act involving two complicit employees. It wouldn’t

matter that a lot when the institution is small, but this would be a problem in the nearest

future for a larger scale. Nobody could predict what would happen to the institution.

The manual method nowadays isn't efficient. With all the institutions' processes,

monitoring manually is time-consuming and requires plenty of workforce and energy.

Institutions are now adapting technology to help their rotation. One of the said technologies

is using biometrics that may be utilized in systems. The system would allow institutions to

have their process done more efficiently. Incorporating technology will enable the

institution to observe its employees' attendance without excessive time.

The researcher proposed the “Faculty Attendance Monitoring System for CDLB

using Biometrics” to apply biometrics technology in attendance monitoring. The system

proposed will help the institution’s current system.


Monitoring System for CDLB Employees 4

Statement of the Problem

Colegio de Los Baños uses a Bundy-clock attendance based monitoring system. In

this kind of process, problems like fraud and the use of credentials and limited space of

storing the records would generally lead to the problem of the study “Faculty Attendance

Monitoring System for CDLB using Biometrics.”

1. What processes could be improved from the traditional approach at helping the

assigned employee monitor the attendance?

2. How would the attendance monitoring be performed more accurately and more

efficiently?

3. What technology could be used to improve record-keeping and avoid information

loss?

Significance of the Study

The researcher recommended a method to enhance the faculty's existing system,

entitled "Faculty Attendance Monitoring System for CDLB using Biometrics." This helps

to eliminate issues found in the current method of monitoring.

The research will benefit the following:

Colegio de Los Baños. The study aims to help the institution to focus on making the faculty

attendance monitoring process faster, keep the records without the risk of losing, keep track

of whether the personnel is inside the school or not.


Monitoring System for CDLB Employees 5

Students of CDLB. The proposed system will help the students find their professor or

teacher easier, asking the person responsible for asking if they have records on their system.

Other Academic Institutions. The proposed system will give an insight into biometrics

technology used in the faculty monitoring system. This will aid future researchers willing

to implement this technology.

Future researchers. This study will guide and reference those conducting this study and

support the studies with similar or the same concepts.

Objectives

Generally, this study aims to develop a “Faculty Attendance Monitoring System

using Biometrics,” which will help ease monitoring the attendance and generating the

report.

Specifically, the research project aims:

1. To identify things that can be improved in the current process to help the assigned

personnel monitor the attendance.

2. To maintain a daily time of record of the CDLB employees using biometrics

technology.

3. To keep the records safe and avoid information loss.


Monitoring System for CDLB Employees 6

Scope and Limitations of the Study

The scope of the researcher’s proposed system entitled “Faculty Attendance

Monitoring System for CDLB using Biometrics” includes the following processes: The

system limited access in the system by providing accounts for the authorized personnel

only. There is a required login for the administrator who would enable the modification of

records and adding, editing, deleting records.

The proposed system solely focused on doing attendance of the personnel of

Colegio de Los Banos. The proposed system will be positioned near the guard post. Hence,

only monitored the entry and exit at the main gate. Room attendance are still done

manually. The system checked those who work on the premises and not those who work

from home. The system also cannot include those part time employees which have variable

working hours.

The equipment used to develop the system was Digital Personal 4500 U.are.U

reader, and a host computer with JDK or JRE version above 1.8 installed, using Windows

OS. A power interruption will affect the machine, unable to track the employee's attendance.

The system displays their daily time record of the employees. However,

computation of the employee's salary is not part of the study. However, the system provided

the total time that the employee's worked for a specified period, and the total time that an

employee has been tardy or absent, which may help the one in charge of the payroll to
Monitoring System for CDLB Employees 7

efficiently compute the employee's salary. Another limitation would be the system only

handles single schedule per employee, unavailable to handle multiple schedules per

employee as well as multiple fingerprint entry for each employee. Only one fingerprint per

employee can be registered on the database.

For irregularities where the user needs to go out of the school premises outside the

range of the assigned standard settings, such as official business, the employee needs to

notify the administrator, they need to approach the administrator to override the system

and sign in and sign out. The system also has a limitation when the user forgets to time out

on a specific day; the system will automatically refresh at midnight and mark the user as

absent/tardy. Another irregularity may include emergency, vacation, or sick leaves, official

business trips, instances where they need to leave half-day, and other irregular

circumstances. On all occasions, the administrator need to override the system to sign in

and sign out when needed.

The system was tested and evaluated from the end-users, and was tested by 19

respondents due to the pandemic; limited respondents were only available for testing. The

tested system may not accommodate the total population of CDLB employees due to the

pandemic, where the majority of the employees work at home or have a skeletal outline of

the schedule.
Monitoring System for CDLB Employees 8

Definition of Terms

Apache Netbeans 12.3. This is the Integrated Development Environment (IDE) used for

developing the system, mainly using Java programming language. IDE was used to help to

code easier and is user friendly for creating desktop applications.

Administrator. This is the module of the system that allows an authorized administrator

user to add, edit, delete the records and the employees' information, and override the

schedule and view the log history of employees.

Biometrics. Biometrics is the measurement and statistical analysis of people's unique

physical and behavioral characteristics. The technology is mainly used for identification

and access control or for identifying individuals who are under surveillance. This is the

technology that would be used for the system.

Database. Database refers to collecting information stored, keeping all records of the

employees, their records such as time-in and time-out of the employees of the CDLB, that

is organized and stored in a computer. It is the collection of tables, schemes, queries, reports,

views, and others.

Java. Java is general-purpose, high-level, object-oriented programming language and is

designed to run code on many different platforms. Almost all of the codes are written in

Java for the development of this system.

Java Runtime Environment (JRE). is a software layer that runs on top of a computer’s

operating system software and provides full libraries and other resources that a specific

Java program needs to run, version at least 1.8 is required for the system. Almost all of the

codes are written in Java for the development of this system.


Monitoring System for CDLB Employees 9

My Structured Query Language (MySQL). It is the programming language used to build

the database for storing, adding, removing and processing data on the system.

Operating System (OS). is system software that manages computer hardware, software

resources, and provides common services for computer programs. Windows OS is required

for the system to run.

Prototype. It is the model of what will be the output of the proposed system. It is the one

that will be used to develop the system.

Secondary Development Kit (SDK). This was used in the study for the installation of the

libraries for the device to enable the computer to recognize the device and able to make it

programmable.

User. This refers to the employees who will be using the developed system.
Monitoring System for CDLB Employees 10

CHAPTER II

REVIEW OF RELATED LITERATURE

Foreign Studies

To expand the researcher's knowledge, even more, the researcher sought the aid of

published theses online from foreign researchers and documentation to support their study.

The Periodic tracking (for example, daily, weekly, monthly, quarterly, and annually)

of any activity’s progress by systematically gathering and analyzing data and information

is called Monitoring. The target audience/beneficiaries must be defined along with what

you are doing and whether your activities are being implemented as planned or not.

Monitoring a program or intervention involves collecting routine data that measure

progress toward achieving program objectives. It is used to track changes in program

outputs and performance over time. It provides regular feedback and early indications of

progress. (“What is Monitoring?” (n.d.)

Manual faculty attendance monitoring can be frustrating, requires a lot of time to

consume, and inconvenient. Using an automated system with a technology like biometrics

will improve the process's accuracy and efficiency to eliminate these problems. (Indrayani

E, 2014)

Biometrics is the measurement and statistical analysis of people's unique physical

and behavioral characteristics. The technology is mainly used for identification and access
Monitoring System for CDLB Employees 11

control or for identifying individuals who are under surveillance. The basic premise

of biometric authentication is that every person can be accurately determined by their

intrinsic physical or behavioral traits. The term biometrics is derived from the Greek

words bio, meaning life, and metric, meaning to measure. Authentication by biometric

verification is becoming increasingly common in corporate and public security systems,

consumer electronics, and point-of-sale (POS) applications. In addition to security, the

driving force behind biometric verification has been convenience, as there are no

passwords to remember or security tokens to carry. Some biometric methods, such as

measuring a person's gait, can operate with no direct contact with the authenticated person.

(Contributors T, 2020)

Biometric technology is developed because it can fulfill two functions:

identification and verification. Such biometric characteristics that cannot be lost cannot be

forgotten and are not easily faked as it inherent in human existence. Each other will not be

the same; the uniqueness will be more guaranteed. God creates man to have his identity.

The part of the human body is not the same each other. Hence, the parts of the human body

are often used to determine a person’s identity. (Indrayani E, 2014)

All the data records that you have; it is needed to be managed carefully. Record

management is a way of creating, maintaining, using, and disposing of records properly to

have efficient, transparent, and accountable governance. Also, with this, you will be able

to have a well-organized file plan. From that, the organization will be able to find

information easily. With records adequately filed and stored, accessing it is easy, and the
Monitoring System for CDLB Employees 12

orderly and efficient flow of information enables the organization to perform successfully

and efficiently (Wright, 2011).

Furthermore, according to Ledolter (2013), data mining attempts to extract useful

information from large datasets. It explores and analyses a large quantity of data to discover

meaningful patterns. It has broad applicability with intelligence and security analysis

applications, genetics, social and natural science, and business. It should be viewed as a

process that is needed to be clear about its purpose. Without being explicit, data mining

would be unsuccessful.

Java is a computer programming language. It enables programmers to write

computer instructions using English-based commands instead of having to write in numeric

codes. It’s known as a high-level language because it can be read and written easily by

humans.

According to Paul Leahy (2012), Java has rules that determine how the instructions

are written. These rules are known as its syntax. Once a program has been written, the high-

level instructions are translated into numeric codes that computers can understand and

execute. Java could also be used for developing desktop applications and connect the

database to query out the database and the information.

A database is a structure that contains information about different categories and

their relationship. By eliminating data redundancy, it dues only to save space and makes

the updating of data much simpler. (Adamski & Pratt, 2012)


Monitoring System for CDLB Employees 13

How biometrics works

According to Margaret Rouse (2020), Authentication by biometric verification is

becoming increasingly common in corporate and public security systems, consumer

electronics, and point-of-sale (POS) applications. In addition to security, the driving force

behind biometric verification has been convenience, as there are no passwords to remember

or security tokens to carry. Some biometric methods, such as measuring a person's gait,

can operate with no direct contact with the authenticated person.

Components of biometric devices include the following:

• a reader or scanning device to record the biometric factor being authenticated;

• software to convert the scanned biometric data into a standardized digital format

and to compare match points of the observed data with stored data; and

• A database to securely store biometric data for comparison.

Biometric data may be held in a centralized database. However, modern biometric

implementations often depend on gathering biometric data locally and then

cryptographically hashing it so that authentication or identification can be accomplished

without direct access to the biometric data itself.

Types of biometrics

The two main types of biometric identifiers are either physiological characteristics

or behavioral characteristics. Physiological identifiers relate to the composition of the user

being authenticated and include the following:


Monitoring System for CDLB Employees 14

• facial recognition

• fingerprints

• finger geometry (the size and position of fingers)

• iris recognition

• vein recognition

• retina scanning

• voice recognition

• DNA (deoxyribonucleic acid) matching

• digital signatures

Figure 1. Types of biometric examples


Monitoring System for CDLB Employees 15

Behavioral identifiers include the unique ways individuals act, including

recognizing typing patterns, walking gait, and other gestures. Some of these behavioral

identifiers can provide continuous authentication instead of a single one-off authentication

check.

Biometric data can be used to access information on a device like a smartphone, but there

are also other ways biometrics can be used. For example, biometric information can be

held on a smart card. A recognition system will read an individual's biometric information

while comparing it against the smart card's biometric information.

Advantages and disadvantages of biometrics

The use of biometrics has plenty of advantages and disadvantages regarding its use,

security and other related functions. Biometrics are beneficial because they are:

• hard to fake or steal, unlike passwords;

• easy and convenient to use;

• generally, the same throughout a user's life;

• nontransferable; and

• efficient because templates take up less storage.

Disadvantages, however, include the following:

• It is costly to get a biometric system up and running.

• If the system fails to capture all biometric data, it can lead to failure in identifying

a user.
Monitoring System for CDLB Employees 16

• Databases holding biometric data can still be hacked.

• Errors such as false rejects and false accepts can still happen.

• If a user gets injured, then a biometric authentication system may not work -- for

example, if a user burns their hand, then a fingerprint scanner may not be able to

identify them.

Examples of biometrics in use

Aside from biometrics being in many smartphones in use today, biometrics are used in

many different fields. As an example, biometrics are used in the following fields and

organizations:

• Law enforcement. It is used in systems for criminal IDs, such as fingerprint or

palm print authentication systems.

• The United States Department of Homeland Security. It is used in Border Patrol

branches for numerous detection, vetting and credentialing processes, such as

systems for electronic passports, which store fingerprint data, or in facial

recognition systems.

• Healthcare. It is used in systems such as national identity cards for ID and health

insurance programs, using fingerprints for identification.

• Airport security. This field sometimes uses biometrics such as iris recognition.

• However, not all organizations and programs will opt in to using biometrics. As an

example, some justice systems will not use biometrics to avoid any possible error

that may occur.


Monitoring System for CDLB Employees 17

Security and privacy issues of biometrics

Biometric identifiers depend on the uniqueness of the factor being considered. For

example, fingerprints are generally considered to be highly unique to each person.

Fingerprint recognition, primarily as implemented in Apple's Touch ID for previous

iPhones, was the first widely used mass-market application of a biometric authentication

factor.

Other biometric factors include retina, iris recognition, vein, and voice scans.

However, they have not been adopted widely so far, in some part, because there is less

confidence in the uniqueness of the identifiers or because the factors are more comfortable

to spoof and use for malicious reasons, like identity theft.

The stability of the biometric factor can also be necessary for the acceptance of the

element. Fingerprints do not change over a lifetime, while facial appearance can change

drastically with age, illness, or other factors.

The most significant privacy issue of using biometrics is that physical attributes,

like fingerprints and retinal blood vessel patterns, are generally static and cannot be

modified. This is distinct from non-biometric factors, like passwords (something one

knows) and tokens (something one has), which can be replaced if they are breached or

otherwise compromised. A demonstration of this difficulty was the over 20 million

individuals whose fingerprints were compromised in the 2014 U.S. Office of Personnel

Management (OPM) data breach.


Monitoring System for CDLB Employees 18

The increasing ubiquity of high-quality cameras, microphones, and fingerprint

readers in many of today's mobile devices means biometrics will continue to become a

more common method for authenticating users, particularly as Fast ID Online (FIDO) has

specified new standards for authentication with biometrics that support two-factor

authentication (2FA) with biometric factors.

While biometric readers' quality continues to improve, they can still produce false

negatives when an authorized user is not recognized or authenticated and false positives

when an unauthorized user is recognized and authenticated.

Biometric vulnerabilities

While high-quality cameras and other sensors help enable the use of biometrics,

they can also allow attackers to. Because people do not shield their faces, ears, hands, voice,

or gait, attacks are possible by merely capturing biometric data from people without their

consent or knowledge.

An early attack on fingerprint biometric authentication was called the gummy bear

hack, and it dates back to 2002 when Japanese researchers, using a gelatin-based confection,

showed that an attacker could lift a latent fingerprint from a glossy surface; the capacitance

of gelatin is similar to that of a human finger, so fingerprint scanners designed to detect

capacitance would be fooled by the gelatin transfer.

Determined attackers can also defeat other biometric factors. According to Jan

Krissler (2015), also known as Starbug, a Chaos Computer Club biometrics researcher,

demonstrated a method for extracting enough data from a high-resolution photograph to


Monitoring System for CDLB Employees 19

defeat iris scanning authentication. In 2017, Krissler reported defeating the iris scanner

authentication scheme used by the Samsung Galaxy S8 smartphone. Krissler had

previously recreated a user's thumbprint from a high-resolution image to demonstrate that

Apple's Touch ID fingerprinting authentication scheme was also vulnerable.

After Apple released iPhone X, it took researchers just two weeks to bypass Apple's

Face ID facial recognition using a 3D-printed mask; Face ID can also be defeated by

individuals related to the authenticated user, including children or siblings.

Local Studies

The researcher seeks the aid of other studies from different libraries located locally

and within reach. With this, the researcher aims to expand their knowledge regarding to

the proposed system further.

According to ELID Technology Intl., Inc.(2020) ,biometrics can provide a solution to

all of these problems because this technology would be a very efficient way to authenticate

your employees. You can save time and resources when you can authenticate just one time

and be appropriately recognized. This is why for many businesses in countries like the

Philippines, biometrics are being recognized as the more efficient choice.

According to Mitra (2017), fingerprinting is the oldest biometric identification

method. It dates back to 1891 when police Official Juan Vucetich first cataloged

fingerprints of criminals in Argentina. Fingerprint identification is based upon unique and


Monitoring System for CDLB Employees 20

invariant features of fingerprints. According to the Federal Bureau of Investigation (FBI),

the odds of two people sharing the same fingerprints are on in 64,000,000,000. Fingerprints

differ even for ten fingers of the same person. A fingerprint's uniqueness is determined by

global features like valleys and ridges and by local features like ridge endings and ridge

bifurcations, which are called minutiae.

Weiss (2020) stated that The National Capital Region Police Office (NCRPO) in

the Philippines is moving forward with the full implementation of a biometric attendance

and time tracking system. The NCRPO Biometric System utilizes fingerprint recognition

to monitor the comings and goings of various law enforcement personnel. Proving that

technology nowadays is in favor of using the biometrics.

Soren & Tudu (2011)’s project converted manual student management into a

computerized system to be convenient and reliable. Their system provides all types of

information about the students and faculty members, institute details, course available,

batch information, and other resources too. It stores all the students' data from their first

day up to the end of the period for reporting purposes and future reference. The ability to

manage student attendance during lecture periods and to compute its percentage is a

significant task if done manually. Thus, the author of the paper proposed the development

of an attendance management system using biometrics. It will take the attendance

electronically using the fingerprint device and will be stored in the database. With the said

system, the need for stationary materials and the personnel-in-charge for keeping the

records will be eliminated. (Idowu & Shoewu, 2012)


Monitoring System for CDLB Employees 21

According to Panarez (2011), due to data growth, IT managers experience a lot of

difficulties when it comes to securing information. Some storage becomes full and backing

it up is problematic because of the size of the data stored, plus sometimes it is incompatible

with the system. The other and last issue is the limited IT budget.

Moreover, according to Tuazon (2011), data is considered the most important

means for an organization to run despite the competition. But still, issues regarding the

security of the data of the organization arise. The Chairman of the Philippine Computer

Society (PCS) Foundation, Nelson Selis, firmly believes that the business continually

should be addressed by having a smart storage solution. With the industry sticking to the

regulatory standard, the data stability and integrity of data will be ensured.

Fingerprint Minutiae Computation

Fingerprint identification system is mainly divided into three modules; fingerprint

image preprocessing, minutiae extraction and minutiae matching. The input fingerprint

image is processed for skeleton image by the fingerprint image preprocessing stage and

subsequently processed by minutiae extraction stage for extracting minutiae using crossing

number concept.

After minutiae extraction stage, if input fingerprint image is processed for

enrollment then the skeleton image is saved as template fingerprint image in database,

otherwise skeleton image is given to matching stage. In matching stage system compares

skeleton image with template fingerprint images from database and make decision whether

input fingerprint match or not.


Monitoring System for CDLB Employees 22

Minutiae matching and detection is employed in this research which is the most

common method of extraction using the Crossing Number (CN) concept. This method

involves the use of the skeleton image where the ridge flow pattern is eight connected. The

minutiae are extracted by scanning the local neighborhood of each ridge pixel in the image

using a 3×3 window. The CN value is then computed, which is defined as half the sum of

the differences between pairs of adjacent pixels in the eight-neighborhood, The CN for a

ridge pixel P is given by

where Pi is the pixel value in the neighborhood of P. For a pixel P, its eight

neighboring pixels are scanned in an anticlockwise direction as display in figure 2: After

Cross Number for a ridge pixel has been computed, the pixel can then be classified

according to the property of its CN value.

Figure 2. Original Image


Monitoring System for CDLB Employees 23

Figure 3. Minutiae Extracted using Cross Number Concept

In conclusion, the related literature and studies mentioned and discussed gave

important information necessary for the researcher to create the proposed system and have

knowledge between the manual process and electronic process of attendance monitoring.
Monitoring System for CDLB Employees 24

Figure 4. This figure displays the Work Flow Diagram of Fingerprint Identification

System
Monitoring System for CDLB Employees 25

CHAPTER III

RESEARCH DESIGN AND METHODOLOGY

In this chapter, the methods and flow of the research used in constructing the system

are discussed. The data gathered by the researchers were strictly reviewed to provide

information that helped the study.

Research Design

The term descriptive study refers to the type of research that can be used for a given

subject, applying surveys, questionnaires, architecture, and data analysis. Descriptive

research explains numerous aspects of the phenomena, attributes, and behavior of the

participant population. It offers a realistic representation of a person's characteristics,

circumstance, or category in descriptive analysis. A question in this study typically begins

with "What is…".

With observational analyses, descriptive study is closely related. However, they are

not limited to data collection methods of observation; case studies and surveys may also

be described as well-known data collection methods applied to descriptive reviews.

The researcher decided to use this research design to gather the information needed

to develop the system. Since the researcher's concern is to know the current process

regarding the attendance monitoring, this research design is the most convenient to be used.
Monitoring System for CDLB Employees 26

Software Development Technology

The researcher chose the software development methodology that best worked for

the project at hand. Out of the top four best methods existing today, the researcher decided

to use the RAD method.

Rapid Application Development (RAD) is a form of agile software development

methodology that prioritizes rapid prototype releases and iterations. RAD emphasizes

software and user feedback over strict planning and requirements recording. RAD focuses

on collecting customer requirements through workshops or focus groups, early testing of

the prototypes by applying the iterative concept, reusing of existing prototypes, continuous

integration, and fast delivery.

Figure 5. Rapid Application Development (Singh, 2019)

RAD has five phases: defining and finalizing project requirements, building

prototypes, gathering user feedback, testing repeatedly, and presenting the system. The

defining and planning stage is when the researcher completes project requirements such as
Monitoring System for CDLB Employees 27

project goals, expectations, timelines, scope, and budget. When the researcher clearly

defined and scoped out each aspect of the project's needs, you can seek management

approvals. In the developing/building phase, the researcher worked closely with clients to

program until the project is done. Gathering user data improved the prototype until the

testing phase was done. The finished product goes to launch; that involved data conversion

and user training.

The researcher used RAD because of the flexibility and adaptable to changes and

can handle massive projects without a doubt. In the requirement or planning phase, the

researchers will gather the necessary information to formulate a solution to aid the current

system's problems. The researcher will continuously connect with the client and a proxy

tester if a client's representative is unavailable when the development and system design

phase is reached. Those phases will be done simultaneously until a favorable result is

acquired. With RAD's use, the researcher reduced the development time and minimized

the total expenses. RAD also helped meet the system requirement or standards of the end-

users and facilitated the project risk.


Monitoring System for CDLB Employees 28

Research Locale

The research locale is where the study takes place. It is where the researcher will

gather qualitative data through interviews and evaluation surveys.

Figure 6. Colegio de Los Baños Location (Google, 2020)

Colegio de Los Baños is located at Lopez Avenue, Brgy. Batong Malake, Los

Baños City, Laguna. Longitude 121.243609 degrees N Latitude 14.173127 degrees E.


Monitoring System for CDLB Employees 29

Data Gathering Tools

To gather and analyze the necessary information about the study itself, the current

process, and other problems, the researcher used the aid of several gathering tools:

Interview

The researcher was able to collect data by doing a face-to-face interview with the

target client, the Registrar. It was a semi-structured interview where there was a prepared

question and revised while doing the interview. But due to the pandemic right now, there

are many precautions and safety protocols to be followed before doing an interview. And

the researcher aimed to do an online interview if the client was uncomfortable due to the

pandemic. The interview was both done at school and online; the registrar who is one of

the heads of the HR department was the target client to be interviewed.


Monitoring System for CDLB Employees 30

Table 1

Questions used on interview

Problem Statement Procedure Resource Statistical Analysis


1. What processes can be
improved in the current
approach to helping the Interview Target client in Qualitative
assigned personnel charge Analysis
monitor the attendance?

2. How accurate is the


confirmation of absences
among the faculty be Interview Target client in Qualitative
improved? charge Analysis

3. What would it take to


improve and keep track of
recordkeeping of the Interview Target client in Qualitative
faculty and staff's charge Analysis
attendances?
4. How can the integration
of biometrics technology
be adapted in the Interview Target client in Qualitative
monitoring of faculty in charge Analysis
Colegio de Los Banos?

Table 1. shows the problems used on an interview conducted the gathering


procedure to be used to gain essential information.
Monitoring System for CDLB Employees 31

Evaluation Form

An evaluation form was used to conduct and to gather data from the user and the

client. Two sets of evaluation forms were used to collect data and analyze to improve the

system and determine whether the system was going in favor of the target clients and the

proponents' users.

Sampling Design

Slovin’s formula was used for the sampling design. The researcher selected

nineteen employees from the school, due to the situation now because of the pandemic,

only limited numbers were suggested, to those who were willingly to respond.

The numbers of employee respondents were determined using the Slovin formula

described below:

n = N/1+N(e²)

Where: n = Sampling size

N = Total population

e = Margin of error (5%)

A margin of error of 5% is within the limits of the allowable deviation from true

value of the survey results.

n = 20 (CDLB employees) / 1 + 25 (.05) (.05) = 19.047 or 19

Nineteen faculty and staff were selected to answer the questionnaire: the number of

employee respondent excluded the panelists and adviser of the study.


Monitoring System for CDLB Employees 32

Data Collection

The inputs of the respondents to the assertions in the polls were recorded and given

loads from a scope of 1 (strongly disagree), 2 (disagree), 3 (Uncertain), 4(agree), 5(strongly

agree). The responses to questions in the given variables of the weighted mean were scaled

using the “five-point-scale” or Likert Scale system and given weight as follows:

Rate Verbal Interpretation Range

5 Strongly Agree (SA) 4.6 – 5.0

4 Agree (A) 3.6 – 4.5

3 Uncertain 2.6 – 3.5

2 Disagree (D) 1.6 – 2.5

1 Strongly Disagree (SD) 1.0 – 1.5

Data Analysis

The data collected was tallied and the sum was totaled. The weighted average of

the responses was also calculated per statement. The number of respondents per response

was multiplied by the weights given to the response. (1 to 5 as described above) and divided

by the total number of respondents (N).

Σ (No. of respondents) x (weight of response) = Weighted Average

(responses)

(No. of respondents)
Monitoring System for CDLB Employees 33

Some information cannot be gathered in libraries, and with the help of the internet,

the researcher looked for published foreign studies, also provided some information that

can expand their knowledge about their research.

Database Design

The database design was based from the flowchart (Appendix B) and the entity

relationship diagram (ERD) in (Appendix E). My Structured Query Language (MySQL)

was used for creating the needed database and created tables for storing, adding, editing,

deleting details of the employees. Sets of data have their own unique identifier called as

“primary key” are used to relate data with each other.

Data Gathering Procedure

They acquired a specific title to be addressed in it before the researcher began the

report. After the title was accepted, the researcher went to the client to let them sign the

consent certificate, which would act as a record and confirmation that they have decided to
Monitoring System for CDLB Employees 34

become the study client. They called for an interview and allowed them to provide a copy

of specific documentation that might help the report.

The researcher then mainly used internet research to seek information due to

pandemic; library sources are limited and restricted. However, the researcher should seek

information on the libraries since not all information would be found on the Internet, and

library research plans are currently delayed.

Internet Research

The majority of the studies made by the researcher was with the help of using the

Internet. Due to the pandemic and the situation right now, most of the problems and

developing the system were done with the Internet's help.

Library Research

The researcher gathered more information about the proposed system by going to

various libraries searching for studies and literature related to the researcher's topic. The

research resources usually are academically published books and scholarly journal articles.

(Binghamton University, 2016) To completely understand the study, the researcher will go

to different libraries of different schools. There, they will gather literature and reviews

related to theirs.
Monitoring System for CDLB Employees 35

Data Analysis Plan

Qualitative and quantitative analysis was used by the researcher in the data analysis

plan. According to Allwood (2011), quantitative research is a systematic approach to

investigations during which numerical data is obtained, and the researcher converts what

is accepted or observed into numerical data. Besides, the quantitative analysis gives

quantifiable and easy to understand results. But then, the researcher won't conduct surveys

since they will focus on getting interviews directly from the client, as well as the feedback.

Qualitative research provides ways to analyze, synthesize, compare, understand,

and interpret meaningful patterns related to the study (Allwood, 2011). The information

obtained from the interview and research were documented and developed to form the ideas

and concept that will aid in the progression of the study.

Qualitative Data

The qualitative data or information was obtained from interviews, observation, and

document review from the client. The researcher used the interview to gather the

information that will help in developing a new system. The interview allowed the

researcher to analyze the existing process of attendance monitoring. The interview

questions focus on determining the school's problems regarding their manual process of

attendance monitoring. The researcher also suggests and give opinions that made the new

system more functional.


Monitoring System for CDLB Employees 36

Software Requirements

The graphical user interface (GUI) of the host system application was designed

using Java, with the help of an IDE using Apache. Apache NetBeans IDE 12.3 with JDK

version 11 was used to build the application. At least the JDK version of 8 or the JRE

version of 1.8 must run the system without any errors from importing libraries. Java was

first created in June 1991 by James Gosling. Up to now, Java is one of the most used object

oriented programming language up to now, enable to run on almost any platforms; being

so powerful, are mainly used for desktop applications and web applications.

The database management system used the My Structured Query Language

(MySQL) to store the employee details, records of time, pictures, IDs. MySQL is one of

the most popular open-source relational database management systems. It is governed by

the relationships between different data fields such as one-to-one, one-to-many, many-to-

many, unique and optional, and pointers between tables.

System Requirements

The host computer must have an operating system of Windows version at least 7

with the system type of 64-bit to run successfully, with at least 4 GB (Gigabytes) of RAM

(Read Access Memory), and at least 2 CPU cores, with or without a video card, a computer

with mouse and keyboard is needed to access the system without encountering any problem

fully. And Microsoft Excel is needed to successfully export the data without encountering

any problems.
Monitoring System for CDLB Employees 37

CHAPTER IV

PRESENTATION OF RESULTS AND DISCUSSION

This chapter shows the program GUI (Graphical user interface), and a brief

discussion about their function and uses. The system contains two modules – User

(Employees) and the Administrator. The user module allows the employee to tap their

finger to the biometrics reader so that the time in and time out will be reflected on the

screen while the time will be stored in the database. The administrator module allows the

authorized personnel to view and edit the personnel information, add personnel information,

register their fingerprints to the database, and view the employee's attendance records and

logs. And also export the data of an employee with a list of absences, tardiness, overtime,

coming with their attendance logs.

This chapter explains how the system will run time to time, displaying first with

the loading screen, login, and jump to the user module for the scanning, and to the

administrator module.
Monitoring System for CDLB Employees 38

Loading Screen

The Figure 7 is the first thing that is displayed when the system is opened. The

loading screen will start as the output and to make sure if the program is running smoothly.

When the program successfully loads, it means the app doesn’t have an error and will be

good to go for executing the system. When the program won’t load, the system lacks

requirements of software such as Java version is outdated. Once the loading screen reaches

100%, it would be shown in figure 8, the Login screen.

Figure 7. Loading Screen


Monitoring System for CDLB Employees 39

Login Screen

After successfully loading, Figure 8 would be displayed, the administrator should

click the Login button on Figure 8, tap the fingerprint to the device (Biometrics Scanner)

to access the administrator dashboard. Once verified, administrator would be able to access

to the main form at Figure 9. If the user isn’t an administrator, he/she would only have

access to the scanner, which would hold and do the attendance monitoring scanning for the

employees—Figure 34 for the Scanning form, Figure 9 for the Main administrator form.

Figure 8. Login Screen


Monitoring System for CDLB Employees 40

Administrator Module

Administrator module consists of adding, editing, deleting the details of the

employees, setting the time and schedule of the employees, viewing records real time as

well as exporting the employee’s data filtered by the date, to view tardiness, absences, and

total working hours for the administrator to keep track of their attendance.
Monitoring System for CDLB Employees 41

Main Administrator Form (Home)

Once successfully logged in, a pop-up message would show that the credentials

were correct; as shown in Figure 9 below, the main form would be the main GUI for the

administrator to handle the employees. There is a total of five (5) navigation tabs on the

left side panel, namely, “Home”, “Employee”, “Logs”, “Export Data”, and “Logout”. Upon

clicking the “Home” tab, Colegio de Los Baños mission and vision would be displayed,

with a CDLB mark included, proving to be a thesis for the school. There is also a header

to indicate the current date and time, with a footer of copyright.

Figure 9. Main Form (Home)


Monitoring System for CDLB Employees 42

Employee Form

Upon clicking the Employee tab in Figure 10, the table will be displaying all of the

existing users on the database. There is a search bar to query the employee by typing their

name or their unique ID registered on the database. There are a total of nine (9) buttons on

this form, namely, “Add Employee,” “set schedule,” “set time,” “INFO,” “EDIT,”

“DELETE, “Add Holidays, “Add Day off” and “Who is inside now?”. Upon clicking the

Add Employee button, Add Employee form would display shown in Figure 11. The same

goes for the other buttons, respectively, “Set Schedule” at Figure 14, “Set time” at Figure

15, “INFO” at Figure 16, “EDIT” in Figure 17, “DELETE” in Figure 18 and 19, “Add

Holidays” in Figure 20, “Add Day off” in Figure 21, “Who is inside now?” in Figure 22.

Figure 10. Employee Form


Monitoring System for CDLB Employees 43

Add Employee Form

Add Employee form requires the administrator to fill up the details of the employee

to be added. The form requires the administrator to input all of the data without any blank

information to prevent dummy data on the database. The Enrollment form would be

prompted upon clicking the “Open scanner” button, shown in Figure 13 Upon clicking the

“Save” button, once the details are all filled up, a success message would prompt together

with the employee number has been added, shown in Figure 12. Once the cancel button is

clicked, the form would close and return to the Employee Form at Figure 10.

Figure 11. Add Employee Form


Monitoring System for CDLB Employees 44

Figure 12. Adding success

Enrollment Form

The enrollment form requires the employee to tap the same finger four times to get

the most accurate fingerprint data to store it in the database. Once the "Enrollment template

created message is shown in Figure 13, the registration is done, and you may press the

"Back" button to return to the add employee form at Figure 11 to finalize the employee's

enrollment.

Figure 13. Enrollment Form


Monitoring System for CDLB Employees 45

Add Schedule

Once successfully adding the employee’s information, add schedule form lets the

administrator to add the schedule for the chosen employee; administrator will check the

checkbox to let the system determine the absences of the employee when the date reviewed

has no records of time in. Schedules may be dynamic, and may be edited and changed by

the administrator.

Figure 14. Add Schedule Form


Monitoring System for CDLB Employees 46

Set Time

Set Time form lets the administrator add time per employee. The time runs with a 12-hour

clock to flag the employee’s tardiness and under time. Once the time is set, the time set

would be their temporary schedule for the system. The time may be changed whenever the

administrator edits the time. The system requires two Time to be recorded, their check-in

time and check-out time.

Figure 15. Set Time Form


Monitoring System for CDLB Employees 47

View Employee Form

Once the row on the table in Figure 10 is clicked, and the Info button is clicked, the

form shows full employee details with the attached photo. On the upper part, when the

employee is not in the school, the panel will change to the color red, while if the employee

is inside, it will turn green. When no row is clicked, a pop-up message will show to select

a single user to view. Upon clicking the “X” button upper right of the screen, the form will

close and return to the Employee form at Figure 10.

Figure 16. View Employee Information


Monitoring System for CDLB Employees 48

Edit Employee Form

Same as viewing the info, click the row at the table from Employee form in Figure

10, and press the “EDIT” button; Most of the employee’s information could be edited

except for the ID and the fingerprint ID. Upon clicking the “Change Photo” button, the

administrator may choose a photo with the type of JPG or PNG format. The image will

automatically scale regardless of its size. Once the image is chosen, the label will update

to the selected image. When all needed information is edited, the administrator may press

the “Save” button to update the database successfully, a pop-up message will appear with

the text “Successfully updated”. Upon clicking the “Cancel” button, the form will close

and return to the Employee form at Figure 10.

Figure 17. Edit Employee Information


Monitoring System for CDLB Employees 49

Delete Employee

To successfully delete the employee, the administrator is required to click the row

on the table of Employee form in Figure 10, and then click the button “DELETE,” to avoid

deleting accidentally, the prompt would show with the employee ID to double-check shown

in Figure 18. The delete button only deletes the employee details but won’t delete the

records of their attendance. Once successfully deleted, a message prompted shown in

Figure 19 that the employee with the number is successfully deleted from the database.

Figure 18. Delete Employee Information

Figure 19. Delete success


Monitoring System for CDLB Employees 50

Add Holiday Form

Add Holiday Form allows the administrator to add a global Holiday for the

system to compute and exclude absences for the employees who won’t be doing an

attendance check due to being a Holiday. The administrator may also add for special

Holidays, like school’s anniversary, city’s day, and many other days. Once the date is

chosen, the administrator may click the “Save” button on Figure 20 to successfully insert

the date selected. Upon clicking the “Delete” button, after the row at the table in Figure 20

is chosen, the administrator may delete the data that is currently on the list. Upon clicking

the “Cancel button, the form will close and go back to the Employee form in Figure 10.

Figure 20. Add Holiday Form


Monitoring System for CDLB Employees 51

Add Day Off Form

Add Day off form requires the administrator to choose the employee at the table

from the Employee form in Figure 10. Once the “Add Day off” button is clicked, the

administrator will select the date of the employee’s day-off or for other reasons. Upon

clicking the “Save” button in Figure 21, the date chosen will be inserted into the database

for the employee selected by the administrator. Upon clicking the “Cancel” button, the

form will close and return to the Employee form at Figure 10.

Figure 21. Add Day off Form


Monitoring System for CDLB Employees 52

Employee Tracker Form

Employee tracker form views all of the employee’s state whether they are inside

the school or not. Two tables would be displayed, on the upper where all of the members

who aren’t at the school would display, while the other table shows all employees who are

currently inside the school. Upon clicking the “close” button in Figure 22, the form will

close and return to the Employee Form in Figure 10.

Figure 22. Employee Tracker Form


Monitoring System for CDLB Employees 53

Log Form

Upon clicking the “Logs” from the navigation tab, the Log form includes the records

of employees of their time in and time out schedules; it could be filtered by their name thru

the search text field or with the date filtered. To view the logs within the range of dates,

the date button consists of the date from and after. Once the administrator chose the dates,

upon clicking the “Filter button in Figure 23, logs of the employees will be shown at the

table in Figure 23. The filter button would only work when the range of dates is chosen.

Upon clicking the “Refresh” button, the contents of the table would display the logs for the

day today. The primary purpose of this form is to show all records of time in and time out

of the employee. By default, the table would display all of their records within the day.

Figure 23. Log Form


Monitoring System for CDLB Employees 54

Export Form

Upon clicking “Export Data” from the navigation tab in Figure 24, the export form

table would be blank by default and will show the record once the date button is clicked,

requires the administrator to insert the date from and to for the range of dates, and choose

the employee’s name. Upon clicking the “Find” button in Figure 24, the records of

employee logs are queried with the dates inputted. To export the current date, the

administrator should input two dates with the corresponding date the same in order to query

for the day of the log. Upon clicking the “Export to Excel” button, the table contents would

convert the current list of records to an excel file. A Microsoft Excel is needed to export

the data; otherwise, an error message will display.

Once the “Export” button successfully runs, the program will prompt an excel with

all of their data recorded and listed within the range of date chosen for an employee.

Calculation of their total hours late, total under time hours, and total working time would

be listed, with a message of the status of their logs, as seen in Figure 25.

Upon clicking “View Logs Today,” the table with the logs of all employees who

logged will display and export to an excel file. Upon clicking the “refresh button,” the table

in Figure 24 will refresh and clear the records of the queried records. The export form

includes their time in the schedule and their time out schedule, viewing all of the completed

logs of the day.


Monitoring System for CDLB Employees 55

Figure 24. Export Form

Figure 25. Sample Excel with Calculations


Monitoring System for CDLB Employees 56

Another example of excel from the another sheet, would show the lists of absences,

all of the dates being excluded from employee’s rest day and Holidays, and their personal

leave. The sheet would show their working schedule days, and their total absences made

for the range of date filtered as shown in Figure 26.

Figure 26. Sample Excel with Absence Tracker


Monitoring System for CDLB Employees 57

Setting up

To run this program, the user must have an SDK installed on their computer,

depending on their platform; for Digital Persona, only the Windows platform is supported

with a Java version of at least 1.6 (JRE or JDK) and a browser to open the link (IE,

Microsoft Edge, Firefox, Chrome), and a USB port where the fingerprint reader is to be

connected. This is the link to the SDK:

https://drive.google.com/drive/folders/1CwFiCkXZI94FI9L5J3iPpqvpOJ6FuSwt .

How to install:

Figure 27. Setup SDK for Digital Persona


Monitoring System for CDLB Employees 58

Figure 28. Installing SDK step 1

Figure 29. Installing SDK step 2


Monitoring System for CDLB Employees 59

Figure 30. Installing SDK step 3


Monitoring System for CDLB Employees 60

User Module

User module consists of one form, which is the scanner form, once tapped, user

would be able to see their time of time in and out, along with their details. The form would

display whether the matched fingerprint has record on database, when no database is read,

the form would display as “No Match”.

Scanner form

The scanner form from the Figure 31, shows the employee ID, employee name,

image saved, and fingerprint photo whenever the user taps their finger on the device. The

button "Scan Finger" should be pressed for the system to run the automation of attendance

checking, passing the check-in and check-out time to the database. Upon clicking the

button “Go back”, the form will close and will redirect to the Login form in Figure 8.

Figure 31. Scanner Form


Monitoring System for CDLB Employees 61

Biometrics scanner

When the “Scan Finger” button is pressed from Figure 31, the Verification form will

prompt, once the finger is tapped on the device, employee details will be shown on the

scanner form, as while as the program is running, the details will change once the device

recognizes another fingerprint ID registered on the database. If the device recognizes the

fingerprint, a sound will be prompted confirming the check-in of the employee. When the

device detects a fingerprint that wasn’t identified nor registered, the prompt will show in

the textbox that nobody matched with an error sound.

Figure 32. Attendance Scanner


Monitoring System for CDLB Employees 62

EVALUATION OF FACULTY ATTENDANCE MONITORING SYSTEM FOR

CDLB USING BIOMETRICS

The developed attendance monitoring system was demonstrated to possible users –

CDLB employees. The respondents evaluated the system through a survey evaluation form

(Appendix C). The responses of 19 employees are indicated on Table 2.

The first statement was about the device's speed to determine if the system responds

immediately once tapped on the device. The second statement was about the device's

accuracy to determine if the system displayed correct and accurate time-in and time-out of

the users. The third statement was about the system's validity to check whether the details

saved to the database were accurate. The fourth statement was to compare the system of

attendance checking of the school with the system. The fifth statement was to know the

efficiency of the system for the users. The sixth statement was to determine if the system

would be beneficial to Colegio de Los Baños, and the seventh statement was to determine

if the school would adopt the approach for their attendance checking.
Monitoring System for CDLB Employees 63

Table 2.

Employee evaluation of attendance monitoring system using the survey questionnaire.

No. of respondents1
Statements
SD D U A SA WA2

1. The system responded immediately


when the finger was tapped on the 0 2 3 3 11 4.2
biometrics device reader.

2. The system displayed the correct 0 0 0 7 12 4.6


time in and time out of the user.

3. The system displayed the correct 0 0 1 5 13 4.6


personal information of the user.

4. The system was convenient to use


compared to the attendance system 0 0 3 5 11 4.5
currently used now.

5. The system is an efficient way of


recording the attendance of the CDLB 0 0 0 6 13 4.7
staffs.

6. The system will be beneficial to CDLB. 0 0 0 6 13 4.7

7. The system may be adapted by CDLB 0 0 0 8 11 4.6


in the near future.

AVE. 0 0.3 0.9 5 12 4.5

1 Refersto the number of respondents for a particular response (SA – strongly agree,
A – agree, U – uncertain, D – disagree, SD- strongly disagree)

2
Refers to the weighted average (WA) of each response per a particular statement
Monitoring System for CDLB Employees 64

Evaluation of the System from Employees Responses

The survey was conducted on last April 26 – 27, 2021 and the responses of the

employees are indicated on Table 2. The significance of the response was measured using

the weighted average, and the weighted average were scaled with the Likert’s scaling and

percent in favor of the response done.

The first statement was how fast the system responded immediately when the finger

was tapped on the device reader. Recognizing the fingerprint took a long time for others,

for those who were not used to fingerprint tapping had a hard time doing enrollment for

the fingerprint, some irregularities have been proven when the finger has a sweat, the finger

needs to be dry for the device to recognize immediately. As seen through results, the

weighted average is (4.2), leaving a narrative result of “Agree”.

The second statement refers to the device's accuracy to collect the employee's

information and display the correct data. So when the fingerprint is tapped on the device,

the scanner would show and display the time they logged in and logged out, seen from the

scanner and the logs. Most of the respondents strongly agreed that the correct information

was shown as indicated in the weighted average of (4.6).

The third statement regarded the system's accuracy when the reader was tapped to

display the employee's personal information to those who are registered. The data will be

viewed on the scanner when tapped, and also to the administrator panel, the employees can
Monitoring System for CDLB Employees 65

be manually viewed, such as picture, name, age, birthdate, contact number, address, email.

Most of the respondents strongly agreed that the system displayed the correct information

registered on the database. This is also indicated in the weighted average of (4.6).

The fourth statement refers to the efficiency of the system comparing with the

current system the premises have. Currently, the school uses a Bundy clock with manual

time in and time out and can lose the records when misplaced. The said system was being

compared with the current system now. The majority of the respondents strongly agreed,

while few respondents said uncertain, but still a lot agreed to be convenient having a

weighted average of (4.5).

The fifth statement pertains to the efficiency of the system in recording the

attendance of the CDLB employees. The system records time in and time out of registered

users. The system arranges data into a log history (sorted according to ascending date and

time) where the administrator can check the time in and time out records of employees for

a day or for a month depending on the date they choose. Most of the respondents strongly

agreed that the system is an efficient way to store and record the attendance, with a

weighted average of (4.7).

The sixth statement detects the perception of the respondents if the system will be

beneficial to CDLB. Most of the respondents strongly agreed that would be beneficial to

the school a weighted average of (4.7).


Monitoring System for CDLB Employees 66

The seventh statement refers to the possibility that CDLB would implement and

adapt the system in the near future. Most of the respondents strongly agreed to adapt the

current system to the school. This is also indicated in the weighted mean of (4.6).

Highlights of the User Module Evaluation of Employees

In all of the seven statements, the highest number of responses was “Strongly

Agree.” The statement with the lowest number of “Strongly Agree” was comparing the

convenience with the current system of CDLB in checking attendance, and the response of

the reader to the fingerprint having two disagree, there were employees who had a hard

time recognizing their fingerprint.

The statement with the highest number of “Strongly Agree” was displaying the

correct information of the employees, the efficiency of record keeping the attendance, and

the benefit of the system to CDLB. The overall weighted average for all seven statements

was (4.5) which means that most employees agreed to almost all of the statements

regarding the system proposed.

Although the questionnaire allowed the respondents to put in comments on how to

improve the system and giving recommendations, there were two respondents who added

a comment. One said, “How would the system secure the information of the employees

registered on the database?” while the other comment was, “How would the system help

the school, not only for the attendance checking but other features too?”. While the
Monitoring System for CDLB Employees 67

researcher was conducting a test and survey, they said how would the system be

implemented if the school decides to use it, like for the device it was very small for the

whole school to use it for verification. This may explain the first statement having a lot of

negative feedback, where some employees had a hard time recognizing their fingerprints,

especially when the enrollment state was done.


Monitoring System for CDLB Employees 68

Table 3.

Employee evaluation of attendance monitoring system using the survey questionnaire.

No. of respondents1
Statements
SD D U A SA WA2

1. The system responded immediately


when the finger was tapped on the 0 0 0 0 2 5.0
biometrics device reader.

2. The system displayed the correct 0 0 0 1 1 4.5


time in and time out of the user and
their personal information.

3. The system design is (User interface) 0 0 0 2 0 4.0


is visually good.

4. The system was convenient to use


compared to the attendance system 0 0 0 1 1 4.5
currently used now.

5. The system is an efficient way of


recording the attendance of the CDLB 0 0 0 1 1 4.5
staffs.

6. The system may be adapted by CDLB 0 0 0 1 1 4.5


in the near future.

7. The system exporting data was efficient. 0 0 1 0 1 4.0

AVE. 0 0 0.1 0.8 0.9 4.4

1 Refersto the number of respondents for a particular response (SA – strongly agree,
A – agree, U – uncertain, D – disagree, SD- strongly disagree)
2
Refers to the weighted average (WA) of each response per a particular statement
Monitoring System for CDLB Employees 69

Evaluation of the System Administrator Module Responses

The survey was conducted on last May 17, 2021 and the responses of the

administrators are indicated on Table 3. The significance of the response was measured

using the weighted average, and the weighted average were scaled with the Likert’s scaling

and percent in favor of the response done.

The first statement was how fast the system responded immediately when the finger

was tapped on the device reader. Administrators strongly agreed that the fingerprint tapped

responded immediately, giving an average of (5.0) for the evaluation.

The second statement refers to the device's accuracy to collect the employee's

information and display the correct data. So when the fingerprint is tapped on the device,

the scanner would show and display the time they logged in and logged out, seen from the

scanner and the logs. Both of the administrators agreed that the information displayed was

accurate, with an evaluation of (4.5).

The third statement regarded the system's user interface, whether visually pleasing,

another meaning if the system was user friendly, where the administrators agreed to give

an evaluation of (4.0).

The fourth statement refers to the efficiency of the system comparing with the

current system the premises have. Currently, the school uses a Bundy clock with manual

time in and time out and can lose the records when misplaced. The said system was being
Monitoring System for CDLB Employees 70

compared with the current system now. Both of the administrators agreed, both giving (4.0)

for the evaluation.

The fifth statement pertains to the efficiency of the system in recording the

attendance of the CDLB employees. The system records time in and time out of registered

users. The system arranges data into a log history (sorted according to ascending date and

time) where the administrator can check the time in and time out records of employees for

a day or for a month depending on the date they choose. Both of the administrators agreed

that the system is an efficient way to store and record the attendance, with a weighted

average of (4.5).

The sixth statement refers to the possibility that CDLB would implement and adapt

the system in the near future. Both of the administrators agreed to adapt the current system

to the school. This is also indicated in the weighted mean of (4.5).

The seventh statement refers to the exporting of data was accurate. One of the

administrators evaluated as uncertain, giving an average of (4.0), showing that it was not

very accurate compared to the other statements having an average higher than seventh

statement.
Monitoring System for CDLB Employees 71

Highlights of the of Target Client Evaluation

Of all the seven statements evaluated by the administrators, the average mean for

the total evaluation was (4.4), the target clients agreed that most of the evaluation of the

system had a positive remark, with the lack of exporting data, having the lowest average,

proves to be the weakness and to be improved on for the system. No comments were made

by the administrators, as well as a suggestion given. The system was revised every time

the target client asked for changes, which made the evaluation receive positive remarks.
Monitoring System for CDLB Employees 72

CHAPTER V

SUMMARY, CONCLUSION AND RECOMMENDATION

SUMMARY

The attendance monitoring system using biometrics was developed by a BS

Computer Science student, it can be used to monitor time in and time out of the CDLB

employees, pertaining faculty and staff. The staff will tap their fingerprint on the device to

display their personal information and record their time in and time out.

The system has two modules, the User (employees) and an Administrator module.

The User module allows the tapping of their finger unto the biometrics reader for the time

in and time out to be reflected on the system. The administrator module can edit, add, delete

employee information and view the logs and records of their attendance, including the late

count, under time count, override the attendance if any irregularities may happen such as

forgetting the time out, on business leave, emergency leave, etc. Overriding the attendance

cannot be edited by the administrator. Once the employee is timed in, only time out can be

overridden to prevent editing the attendance of the employee.

For the user module, a total of 19 employees were asked to evaluate through a survey

questionnaire; the respondents may be low due to the situation right now because of the

pandemic, majority of the employees working at home, some other employees have a

skeletal schedule where the researcher could not conduct to every employee on CDLB.
Monitoring System for CDLB Employees 73

According to the study, 90% of the respondents favor the system, where the average was

made from the total weighted mean out of the total answers made. The highest number of

responses were “Strongly Agree,” the statement with displaying the information of the User,

recording efficiently of their attendance, and the benefits giving to CDLB were the highest

responses with “Strongly Agree” pertaining to viewing the details of the information was

correct and precise, time in and time out record was precise without any bugs, and giving

benefits to the school.

For the administrator module, a total of 2 personnel were asked to evaluate, where

the average of their responses were (4.4). Based on the Likert’s scale, the narrative scaling

would be “Agree”. Based on the study, highest response was the accuracy of the device

and the efficiency for the record keeping.

CONCLUSION

The system was developed for the target clients of Colegio de Los Baños. This

system provides an improved and a more efficient way to monitor the attendance of the

employees of CDLB. The system helped improve record-keeping and avoid information

loss, which answered the objective proposed by the researcher. Efficiency compared to the

system of CDLB having right now was also positive, showing the accuracy of the records

saved when running real-time attendance.


Monitoring System for CDLB Employees 74

The system was developed to record and monitor the time in and time out of

employees of CDLB. The system allowed for only the employees who were registered on

the database thru the biometrics reader to register their time in and time out, and

additionally including their personal information to the system, where the personnel

handling and managing the employees would have an easier task to filter and search the

employees with their ID saved on the database, as well as helped the assigned personnel

on keep in track of the records and avoided data loss.

The system was created with two programming languages, Java and MySQL. It

involved a special hardware device called Digital Persona U.are.U 4500, a biometrics

reader to efficiently record their data and display the user’s personal information, and

record time in and time out when tapped on the device. The accuracy was the best when

using biometrics compared to other methods since biometrics will only ask for your

fingerprint, not others, cannot be cheated nor fake their attendance.

RECOMMENDATIONS

The system will be open to any changes that can be improved by implementing a

working Short Message Service, internet and a host on Twilio is needed, or a development

using GSM module to perfectly run the SMS feature locally without the use and need of

Internet.
Monitoring System for CDLB Employees 75

A Java developer is recommended to further improve the system, such as adding

features like Payroll may be implemented since the system already calculates the time for

the working hours, tardiness, and absences. The employee information and management is

already made from the system, and implementing multiple schedule per employee is also

recommended. Student attendance may be implemented by adding additional databases

and forms for the student. The process would be the same with the employee with different

limitations; the system may be improved on.


Monitoring System for CDLB Employees 76

BIBLIOGRAPHY

Adamski, J.J. & Pratt, P.J.( 2012). Concepts of Database Management Seventh Edition.

Allwood, C., M.. Alvesson, D., Bryman, A., J.. Bullington, G., N.. Denzin, Y., Flick, U., . . .
Ziman, J. (1999, January 01). The distinction between qualitative and quantitative
research methods is problematic. Retrieved December 12, 2020, from
https://link.springer.com/article/10.1007/s11135-011-9455-8

Bromwich, D. (2019) How Words Make Things Happen. Retrieved December 12, 2020,
from
https://oxford.universitypressscholarship.com/view/10.1093/oso/9780199672790.0
01.0001/oso-9780199672790

Cappelli, R., Lumini, A., Maio, D. and Maltoni, D. (2007). Fingerprint Image
Reconstruction from Standard Templates, IEEE Transactions, vol. 29, pp.1489-1503.
Cappelli, R., Maio, D.,

Easwaramoorthy, M. (2006). INTERVIEWING FOR RESEARCH.

Idowu, O. A. & Shoewu, O. (2012). “Development of Attendance Management System


Using Biometrics”. Retrieved on November 3, 2016 from
http://s3.amazonaws.com/academia.edu.documents/31407186/PJST13_1_300.pdf?
AWSAccessKeyId=AKIAJ56TQJRTWSMTNPEA&Expires=1478163893&Signat
ure= xJuL8LClmR9zzcnX%2Bg3%2FTA7XpEI%3D&response-content
disposition=inline%3B%20filename%3DDevelopment_of_Attendance_
Management_Sys.pdf

Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems
in Supporting National Database Based on Single ID Card Number (The Implementation
of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4: 129. doi:10.4172/2165-
7866.1000129

Korolov, M. (2019, February 12). What is biometrics? 10 physical and behavioral


identifiers. Retrieved October 29, 2020, from
https://www.csoonline.com/article/3339565/what-is-biometrics-and-why-
collecting-biometric-data-is-risky.html

Krissler, J. (2014, December 30). Hacker fakes German minister's fingerprints using
photos of her hands. The Guardian.
https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-
ministers-fingerprints-using-photos-of-her-hands.
Monitoring System for CDLB Employees 77

Leahy, P. (2012). Wondering What Java Is? Here's the Answer. Retrieved November 25,
2020, from https://www.thoughtco.com/what-is-java-2034117

Ledolter, J. (2013). Data Mining and Business Analytics with R.

Maltoni, D., Wayman, J., L. and Jain, A. K. (2006). Performance evaluation of fingerprint
verification systems, IEEE Trans. Pattern Anal., 28(1), pp. 3-18. Chirillo, J. and Scott, B.
(2007). Implementing Biometric Security. Indianapolis: John Wiley Publishing Inc., ISBN:
0 7654 25026.

Mitra, S. (2020). Biometrics In A Data Driven World: trends, technologies, and challenges.
CRC PRESS.

Newton, D. (2019, February 22). Learning big o notation with o(n) complexity - dzone
performance. Retrieved April 19, 2021, from https://dzone.com/articles/learning-
big-o-notation-with-on-
complexity#:~:text=O(n)%20represents%20the%20complexity,after%20reading%2
0all%20n%20elements.

Neurotechnology. (2021, April 22). DigitalPersona U.ARE.U 4500 SCANNER. Retrieved


April 24, 2021, from https://www.neurotechnology.com/fingerprint-scanner-
digitalpersona-u-are-u-4500.html

Panarez.(2011). Data Storage Management

Pandora FMS’s editorial team is made up of a group o. (2020, January 29). Why you need
a monitoring system ? Offer the best service for your clients. Retrieved October 29,
2020, from https://pandorafms.com/blog/why-you-need-a-monitoring-system/

Rouse, M. (2020, August 25). What are Biometrics and How Do They Work? Retrieved
November 23, 2020, from
https://searchsecurity.techtarget.com/definition/biometrics

Soren, R. & Tudu, D. K. (2011). “RFID Based Student Database Management System”
Retrieved on November 4, 2016 from
http://ethesis.nitrkl.ac.in/2665/1/Final_Thesis.pdf

Tuazon, J.V. (2011). Managing Storage for Data Safekeeping.

Weiss, E. (2020, January 2). Philippines Police Adopt Biometric Tracking System for
Officers. FindBiometrics. https://findbiometrics.com/biometrics-news-philippines-
police-adopt-biometric-tracking-system-catch-truant-officers-010206/.

What is Monitoring? (n.d.). Retrieved November 23, 2020, from


http://www.mnestudies.com/monitoring/what-monitoring
Monitoring System for CDLB Employees 78

What Is Rapid Application Development (RAD)? (n.d.). Retrieved December 11, 2020,
from https://blog.capterra.com/what-is-rapid-application-development/

Wright, P. (2011). The Chief HR Officer: Defining the New Role of Human Resource
Leaders Jossey-Bass
Monitoring System for CDLB Employees 79

APPENDIX A

Conceptual Framework

INPUT PROCESS OUTPUT

Administrator Planning, analysis, “Faculty Attendance


design,
- Employee ID development, Monitoring System for
- Fingerprint ID
implementation of
- Name CDLB using
Biometrics Device
User Biometrics”
- Time in
- Time out

Graphical User
Interface (Java)

Database (MySQL)
Monitoring System for CDLB Employees 80

APPENDIX B

Flow Chart of the Faculty Attendance Monitoring System for CDLB using

Biometrics
Monitoring System for CDLB Employees 81

APPENDIX C

Evaluation Survey

(For users)

Based on the research entitled “Faculty Attendance Monitoring System for CDLB using

Biometrics”, the researcher is requesting for your cooperation to sincerely and honestly

answer this questionnaire. It is reassured that your answer will be treated with

confidentiality.

Name (Optional) _______________________________________

Kindly check the box that correspond your choice.

1 2 3 4 5
No. Statements Strongly Disagree Uncertain Agree Strongly
Disagree Agree
1 The system responded immediately
when the finger was tapped on the
biometrics device reader.
2 The system displayed the correct
time in and time out of the user.
3 The system displayed the correct
personal information of the user.
4 The system was convenient to use
compared to the attendance system
currently used now.
5 The system is an efficient way of
recording the attendance of the
CDLB staffs.
6 The system will be beneficial to
CDLB.
7 The system may be adapted by
CDLB in the near future.
Other comments and suggestions for the improvement of the system in the near future:
Monitoring System for CDLB Employees 82

APPENDIX D

Evaluation Survey

(For administrators)

Based on the research entitled “Faculty Attendance Monitoring System for CDLB using

Biometrics”, the researcher is requesting for your cooperation to sincerely and honestly

answer this questionnaire. It is reassured that your answer will be treated with

confidentiality.

Name (Optional) _______________________________________

Kindly check the box that correspond your choice.

1 2 3 4 5
No. Statements Strongly Disagree Uncertain Agree Strongly
Disagree Agree
1 The system responded immediately
when the finger was tapped on the
biometrics device reader.
2 The system displayed the correct
time in and time out of the user and
their personal info.
3 The system design (User interface)
is visually good.
4 The system was convenient to use
compared to the attendance system
currently used now.
5 The system is an efficient way of
recording the attendance of the
CDLB staffs.
7 The system may be adapted by
CDLB in the near future.
8 The system exporting data was
efficient.
Other comments and suggestions for the improvement of the system in the near future:
Monitoring System for CDLB Employees 83

APPENDIX E

Entity Relationship Diagram


Monitoring System for CDLB Employees 84

APPENDIX F

System Folder

The Faculty Attendance Monitoring System using Biometrics contains the steps on how to
install the time record system to the user’s workstation. It contains the following:

• ReadMe text file – provide the steps on how to install the app

• Source code folder – provides all codes used by the system

• Digital Persona U.are.U 4500 SDK zip – needs to unzip the folder, has

ReadMe also for the installation of SDK

• Xampp installer – installer for the host computer to enable to run the

database which will be using My Structured Query Language (MySQL)

• JDK 11.0.1 windows x64 – Java version installer, needs to run for the

program to run on the host computer normally without any bugs.

• attendanceDatabase – file to create database table needed for the system.


Monitoring System for CDLB Employees 85

Faculty Attendance Monitoring System for CDLB using Biometrics

USER’S MANUAL

1) Install Java Development Kit version at least 1.6.

2) Run CMD and type “javac –version” to check if java is successfully installed on the

computer.

3) Download Secondary Development kit (SDK) for Digital Persona U.are.U Reader.

4) Install xampp provided at the source folder.

5) Install database to the localhost, myPhpAdmin, with the file name

attendanceDatabase.sql.

6) Run xampp with Apache and MySQL server on.

7) Connect the device to the USB port. Check if the reader responds to confirm that the

Secondary Development Kit (SDK) successfully installed.

8) Run the JAR file.


Monitoring System for CDLB Employees 86

Login Form

1 – Button 1 is a button to enter the administrator module, the administrator must be

enrolled on a biometrics device to tap on their device to login.

2 – Button 2 is a button to enter the user scanner, this is the place where attendance

checking starts.

3 – Button 3 is a button where the dedicated administrator will go to register, before

registering, only the super administrator can access to the registration form.

4 – Button 4 will close the system.


Monitoring System for CDLB Employees 87

Scanner Form

1 – Button 1 will open the form at the right as seen from the photo above, where the

attendance of the employee will be keep tracked.

2 – Button 2 will return to the login form.


Monitoring System for CDLB Employees 88

Main Form(Administrator)

1 – Button 1 will go to the form as seen from the picture above.

2 – Button 2 will go to the employee form, where the employees would be added, edited,

deleted, view the details, override their schedule, etc.

3 – Button 3 will go to the current logs, the logs of the day, that can be filtered by search

or choosing the calendars.

4 – Button 4 will list all of the completed time in and time outs of employees, filtered by

the date, and can be exported to excel for record keeping.

5 – Button 5 will log out the current administrator user, going back to the login screen.
Monitoring System for CDLB Employees 89

Employee Form

1 – Button 1 will go to the adding of employees, employee’s information is needed, their

picture, name, birthdate, address, contact numbers, enrolling of the fingerprint to

database.

2 – Button 2 will set the schedule of every employee, in order to determine if the

employee is present or absent.

3 – Button 3 will set the time of every employee, in order to determine if the employee is

on time or late.

4 – Button 4 will view the details of the employees, showing if they are currently inside

the premises, all of their details will be shown.

5 – Button 5 will edit the employee details, will also override their schedule when needed

due to irregularities.

6 – Button 6 will delete the employee’s data from the database.


Monitoring System for CDLB Employees 90

7 – Button 7 will add global Holidays.

8 – Button 8 will add employee’s day off.

9 – Button 9 will view the list of employees who are at school and not for the day.

Add Employee Form

1 – Button 1 will upload the photo of the employee that is saved on the computer.

2 – Button 2 will open the scanner to perform enrollment of the employee.

3 – Button 3 will add the employee’s info to the database, filling up the form is required.

4 – Button 4 will cancel and return to the employee form.


Monitoring System for CDLB Employees 91

Edit Employee Form

1 – Button 1 will enable the user to change the photo of the employee.

2 – Button 2 will save the current details that are edited.

3 – Button 3 will cancel the current editing form.


Monitoring System for CDLB Employees 92

Add Holiday Form

1 – Button 1 will let the Administrator choose the day to add the Holiday.

2 – Button 2 will let the Administrator save the day chosen.

3 – Button 3 will cancel the form.

4 – Button 4 will delete the day of the lists of Holidays.


Monitoring System for CDLB Employees 93

Add Schedule Form

1 – Button 1 will let the Administrator choose the days for the employee.

2 – Button 2 will save the days for the employee, to reflect their schedule.

3 – Button 3 will cancel the form.


Monitoring System for CDLB Employees 94

Logs Form

1 – Button 1 will enable to filter the logs list by typing any keywords

2 – Button 2 are the dates that are to be filtered by inputting two different dates.

3 – Button 3 will filter after the dates are chosen.

4 – Button 4 will refresh the logs to the current logs.


Monitoring System for CDLB Employees 95

Export Form

1 – Button 1 are the dates that are to be filtered by inputting two different dates.

2 – Button 2 is the employee name to be filtered to show it to the logs together with the

filtered date.

3 – Button 3 is the filter form.

4 – Button 4 will export the excel with the current list of logs on the table.

5 – Button 5 will view the logs for all employees for the day.

6 – Button 6 will refresh the list to be clean.


Monitoring System for CDLB Employees 96

Export Today Form

1 – Button 1 will export the excel with the current list of logs on the table.

2 – Button 2 will cancel the form

You might also like