Professional Documents
Culture Documents
CHAPTER I
INTRODUCTION
Nowadays, it is quite common for the school to maximize the use of computer
monitor the process of getting the schedule of faculty and staff, including their signing in
and off.
institutions, is the process of monitoring their employees' arrival and departure efficiently
during their working days. To resolve the issue, institutions started to rely on devices with
sensors to improve their monitoring capabilities. Such devices use a barcode system, a
system. With the convenience offered by a proper monitoring tool, the demand for them is
the human fingerprint characteristics has been widely employed in various aspects of life
for different purposes, most significantly regarding this study, employee attendance, and
schedule. This paper aims to develop an accurate and extremely efficient automatic
attendance system using the fingerprint verification technique. The proponent used a
Monitoring System for CDLB Employees 2
school with engaged 21st-century educators and students who are glad for their Filipino
legacy, holds Christian qualities, and are socially dependable residents of the world. It
exists to be the main establishment that gives pertinent and dependable schooling to its
understudies; persuades educators to shape the psyches of the adolescent so they can be
managers and staff to give a favorable and steady climate for learning and to do; and
collaborates with families, graduated class, and networks in setting up the understudies for
CDLB uses ID cards for the unique identification of employees. For their
attendance, the Bundy clock system is currently used. The time cards are checked manually
and are tabulated on the computer. This would serve as basis for the attendance report. To
verify the attendance of an employee, the time card is being checked manually. This
process can be improved through the adaptation of the newest technology that will enable
the college to improve the pace of the tracking process among faculty members, a more
Monitoring System for CDLB Employees 3
convenient confirmation of absences via e-mail, serving for notification of absences, are
Some problems that may be encountered with Bundy-clock attendance system are
punching of time card for someone who physically is not present or using their credentials
to hit them in is a deliberate criminal act involving two complicit employees. It wouldn’t
matter that a lot when the institution is small, but this would be a problem in the nearest
future for a larger scale. Nobody could predict what would happen to the institution.
The manual method nowadays isn't efficient. With all the institutions' processes,
Institutions are now adapting technology to help their rotation. One of the said technologies
is using biometrics that may be utilized in systems. The system would allow institutions to
have their process done more efficiently. Incorporating technology will enable the
The researcher proposed the “Faculty Attendance Monitoring System for CDLB
this kind of process, problems like fraud and the use of credentials and limited space of
storing the records would generally lead to the problem of the study “Faculty Attendance
1. What processes could be improved from the traditional approach at helping the
2. How would the attendance monitoring be performed more accurately and more
efficiently?
loss?
entitled "Faculty Attendance Monitoring System for CDLB using Biometrics." This helps
Colegio de Los Baños. The study aims to help the institution to focus on making the faculty
attendance monitoring process faster, keep the records without the risk of losing, keep track
Students of CDLB. The proposed system will help the students find their professor or
teacher easier, asking the person responsible for asking if they have records on their system.
Other Academic Institutions. The proposed system will give an insight into biometrics
technology used in the faculty monitoring system. This will aid future researchers willing
Future researchers. This study will guide and reference those conducting this study and
Objectives
using Biometrics,” which will help ease monitoring the attendance and generating the
report.
1. To identify things that can be improved in the current process to help the assigned
technology.
Monitoring System for CDLB using Biometrics” includes the following processes: The
system limited access in the system by providing accounts for the authorized personnel
only. There is a required login for the administrator who would enable the modification of
Colegio de Los Banos. The proposed system will be positioned near the guard post. Hence,
only monitored the entry and exit at the main gate. Room attendance are still done
manually. The system checked those who work on the premises and not those who work
from home. The system also cannot include those part time employees which have variable
working hours.
The equipment used to develop the system was Digital Personal 4500 U.are.U
reader, and a host computer with JDK or JRE version above 1.8 installed, using Windows
OS. A power interruption will affect the machine, unable to track the employee's attendance.
The system displays their daily time record of the employees. However,
computation of the employee's salary is not part of the study. However, the system provided
the total time that the employee's worked for a specified period, and the total time that an
employee has been tardy or absent, which may help the one in charge of the payroll to
Monitoring System for CDLB Employees 7
efficiently compute the employee's salary. Another limitation would be the system only
handles single schedule per employee, unavailable to handle multiple schedules per
employee as well as multiple fingerprint entry for each employee. Only one fingerprint per
For irregularities where the user needs to go out of the school premises outside the
range of the assigned standard settings, such as official business, the employee needs to
notify the administrator, they need to approach the administrator to override the system
and sign in and sign out. The system also has a limitation when the user forgets to time out
on a specific day; the system will automatically refresh at midnight and mark the user as
absent/tardy. Another irregularity may include emergency, vacation, or sick leaves, official
business trips, instances where they need to leave half-day, and other irregular
circumstances. On all occasions, the administrator need to override the system to sign in
The system was tested and evaluated from the end-users, and was tested by 19
respondents due to the pandemic; limited respondents were only available for testing. The
tested system may not accommodate the total population of CDLB employees due to the
pandemic, where the majority of the employees work at home or have a skeletal outline of
the schedule.
Monitoring System for CDLB Employees 8
Definition of Terms
Apache Netbeans 12.3. This is the Integrated Development Environment (IDE) used for
developing the system, mainly using Java programming language. IDE was used to help to
Administrator. This is the module of the system that allows an authorized administrator
user to add, edit, delete the records and the employees' information, and override the
physical and behavioral characteristics. The technology is mainly used for identification
and access control or for identifying individuals who are under surveillance. This is the
Database. Database refers to collecting information stored, keeping all records of the
employees, their records such as time-in and time-out of the employees of the CDLB, that
is organized and stored in a computer. It is the collection of tables, schemes, queries, reports,
designed to run code on many different platforms. Almost all of the codes are written in
Java Runtime Environment (JRE). is a software layer that runs on top of a computer’s
operating system software and provides full libraries and other resources that a specific
Java program needs to run, version at least 1.8 is required for the system. Almost all of the
the database for storing, adding, removing and processing data on the system.
Operating System (OS). is system software that manages computer hardware, software
resources, and provides common services for computer programs. Windows OS is required
Prototype. It is the model of what will be the output of the proposed system. It is the one
Secondary Development Kit (SDK). This was used in the study for the installation of the
libraries for the device to enable the computer to recognize the device and able to make it
programmable.
User. This refers to the employees who will be using the developed system.
Monitoring System for CDLB Employees 10
CHAPTER II
Foreign Studies
To expand the researcher's knowledge, even more, the researcher sought the aid of
published theses online from foreign researchers and documentation to support their study.
The Periodic tracking (for example, daily, weekly, monthly, quarterly, and annually)
of any activity’s progress by systematically gathering and analyzing data and information
is called Monitoring. The target audience/beneficiaries must be defined along with what
you are doing and whether your activities are being implemented as planned or not.
outputs and performance over time. It provides regular feedback and early indications of
consume, and inconvenient. Using an automated system with a technology like biometrics
will improve the process's accuracy and efficiency to eliminate these problems. (Indrayani
E, 2014)
and behavioral characteristics. The technology is mainly used for identification and access
Monitoring System for CDLB Employees 11
control or for identifying individuals who are under surveillance. The basic premise
intrinsic physical or behavioral traits. The term biometrics is derived from the Greek
words bio, meaning life, and metric, meaning to measure. Authentication by biometric
driving force behind biometric verification has been convenience, as there are no
measuring a person's gait, can operate with no direct contact with the authenticated person.
(Contributors T, 2020)
identification and verification. Such biometric characteristics that cannot be lost cannot be
forgotten and are not easily faked as it inherent in human existence. Each other will not be
the same; the uniqueness will be more guaranteed. God creates man to have his identity.
The part of the human body is not the same each other. Hence, the parts of the human body
All the data records that you have; it is needed to be managed carefully. Record
have efficient, transparent, and accountable governance. Also, with this, you will be able
to have a well-organized file plan. From that, the organization will be able to find
information easily. With records adequately filed and stored, accessing it is easy, and the
Monitoring System for CDLB Employees 12
orderly and efficient flow of information enables the organization to perform successfully
information from large datasets. It explores and analyses a large quantity of data to discover
meaningful patterns. It has broad applicability with intelligence and security analysis
applications, genetics, social and natural science, and business. It should be viewed as a
process that is needed to be clear about its purpose. Without being explicit, data mining
would be unsuccessful.
codes. It’s known as a high-level language because it can be read and written easily by
humans.
According to Paul Leahy (2012), Java has rules that determine how the instructions
are written. These rules are known as its syntax. Once a program has been written, the high-
level instructions are translated into numeric codes that computers can understand and
execute. Java could also be used for developing desktop applications and connect the
their relationship. By eliminating data redundancy, it dues only to save space and makes
electronics, and point-of-sale (POS) applications. In addition to security, the driving force
behind biometric verification has been convenience, as there are no passwords to remember
or security tokens to carry. Some biometric methods, such as measuring a person's gait,
• software to convert the scanned biometric data into a standardized digital format
and to compare match points of the observed data with stored data; and
Types of biometrics
The two main types of biometric identifiers are either physiological characteristics
• facial recognition
• fingerprints
• iris recognition
• vein recognition
• retina scanning
• voice recognition
• digital signatures
recognizing typing patterns, walking gait, and other gestures. Some of these behavioral
check.
Biometric data can be used to access information on a device like a smartphone, but there
are also other ways biometrics can be used. For example, biometric information can be
held on a smart card. A recognition system will read an individual's biometric information
The use of biometrics has plenty of advantages and disadvantages regarding its use,
security and other related functions. Biometrics are beneficial because they are:
• nontransferable; and
• If the system fails to capture all biometric data, it can lead to failure in identifying
a user.
Monitoring System for CDLB Employees 16
• Errors such as false rejects and false accepts can still happen.
• If a user gets injured, then a biometric authentication system may not work -- for
example, if a user burns their hand, then a fingerprint scanner may not be able to
identify them.
Aside from biometrics being in many smartphones in use today, biometrics are used in
many different fields. As an example, biometrics are used in the following fields and
organizations:
recognition systems.
• Healthcare. It is used in systems such as national identity cards for ID and health
• Airport security. This field sometimes uses biometrics such as iris recognition.
• However, not all organizations and programs will opt in to using biometrics. As an
example, some justice systems will not use biometrics to avoid any possible error
Biometric identifiers depend on the uniqueness of the factor being considered. For
iPhones, was the first widely used mass-market application of a biometric authentication
factor.
Other biometric factors include retina, iris recognition, vein, and voice scans.
However, they have not been adopted widely so far, in some part, because there is less
confidence in the uniqueness of the identifiers or because the factors are more comfortable
The stability of the biometric factor can also be necessary for the acceptance of the
element. Fingerprints do not change over a lifetime, while facial appearance can change
The most significant privacy issue of using biometrics is that physical attributes,
like fingerprints and retinal blood vessel patterns, are generally static and cannot be
modified. This is distinct from non-biometric factors, like passwords (something one
knows) and tokens (something one has), which can be replaced if they are breached or
individuals whose fingerprints were compromised in the 2014 U.S. Office of Personnel
readers in many of today's mobile devices means biometrics will continue to become a
more common method for authenticating users, particularly as Fast ID Online (FIDO) has
specified new standards for authentication with biometrics that support two-factor
While biometric readers' quality continues to improve, they can still produce false
negatives when an authorized user is not recognized or authenticated and false positives
Biometric vulnerabilities
While high-quality cameras and other sensors help enable the use of biometrics,
they can also allow attackers to. Because people do not shield their faces, ears, hands, voice,
or gait, attacks are possible by merely capturing biometric data from people without their
consent or knowledge.
An early attack on fingerprint biometric authentication was called the gummy bear
hack, and it dates back to 2002 when Japanese researchers, using a gelatin-based confection,
showed that an attacker could lift a latent fingerprint from a glossy surface; the capacitance
Determined attackers can also defeat other biometric factors. According to Jan
Krissler (2015), also known as Starbug, a Chaos Computer Club biometrics researcher,
defeat iris scanning authentication. In 2017, Krissler reported defeating the iris scanner
After Apple released iPhone X, it took researchers just two weeks to bypass Apple's
Face ID facial recognition using a 3D-printed mask; Face ID can also be defeated by
Local Studies
The researcher seeks the aid of other studies from different libraries located locally
and within reach. With this, the researcher aims to expand their knowledge regarding to
all of these problems because this technology would be a very efficient way to authenticate
your employees. You can save time and resources when you can authenticate just one time
and be appropriately recognized. This is why for many businesses in countries like the
method. It dates back to 1891 when police Official Juan Vucetich first cataloged
the odds of two people sharing the same fingerprints are on in 64,000,000,000. Fingerprints
differ even for ten fingers of the same person. A fingerprint's uniqueness is determined by
global features like valleys and ridges and by local features like ridge endings and ridge
Weiss (2020) stated that The National Capital Region Police Office (NCRPO) in
the Philippines is moving forward with the full implementation of a biometric attendance
and time tracking system. The NCRPO Biometric System utilizes fingerprint recognition
to monitor the comings and goings of various law enforcement personnel. Proving that
Soren & Tudu (2011)’s project converted manual student management into a
computerized system to be convenient and reliable. Their system provides all types of
information about the students and faculty members, institute details, course available,
batch information, and other resources too. It stores all the students' data from their first
day up to the end of the period for reporting purposes and future reference. The ability to
manage student attendance during lecture periods and to compute its percentage is a
significant task if done manually. Thus, the author of the paper proposed the development
electronically using the fingerprint device and will be stored in the database. With the said
system, the need for stationary materials and the personnel-in-charge for keeping the
difficulties when it comes to securing information. Some storage becomes full and backing
it up is problematic because of the size of the data stored, plus sometimes it is incompatible
with the system. The other and last issue is the limited IT budget.
means for an organization to run despite the competition. But still, issues regarding the
security of the data of the organization arise. The Chairman of the Philippine Computer
Society (PCS) Foundation, Nelson Selis, firmly believes that the business continually
should be addressed by having a smart storage solution. With the industry sticking to the
regulatory standard, the data stability and integrity of data will be ensured.
image preprocessing, minutiae extraction and minutiae matching. The input fingerprint
image is processed for skeleton image by the fingerprint image preprocessing stage and
subsequently processed by minutiae extraction stage for extracting minutiae using crossing
number concept.
enrollment then the skeleton image is saved as template fingerprint image in database,
otherwise skeleton image is given to matching stage. In matching stage system compares
skeleton image with template fingerprint images from database and make decision whether
Minutiae matching and detection is employed in this research which is the most
common method of extraction using the Crossing Number (CN) concept. This method
involves the use of the skeleton image where the ridge flow pattern is eight connected. The
minutiae are extracted by scanning the local neighborhood of each ridge pixel in the image
using a 3×3 window. The CN value is then computed, which is defined as half the sum of
the differences between pairs of adjacent pixels in the eight-neighborhood, The CN for a
where Pi is the pixel value in the neighborhood of P. For a pixel P, its eight
Cross Number for a ridge pixel has been computed, the pixel can then be classified
In conclusion, the related literature and studies mentioned and discussed gave
important information necessary for the researcher to create the proposed system and have
knowledge between the manual process and electronic process of attendance monitoring.
Monitoring System for CDLB Employees 24
Figure 4. This figure displays the Work Flow Diagram of Fingerprint Identification
System
Monitoring System for CDLB Employees 25
CHAPTER III
In this chapter, the methods and flow of the research used in constructing the system
are discussed. The data gathered by the researchers were strictly reviewed to provide
Research Design
The term descriptive study refers to the type of research that can be used for a given
research explains numerous aspects of the phenomena, attributes, and behavior of the
With observational analyses, descriptive study is closely related. However, they are
not limited to data collection methods of observation; case studies and surveys may also
The researcher decided to use this research design to gather the information needed
to develop the system. Since the researcher's concern is to know the current process
regarding the attendance monitoring, this research design is the most convenient to be used.
Monitoring System for CDLB Employees 26
The researcher chose the software development methodology that best worked for
the project at hand. Out of the top four best methods existing today, the researcher decided
methodology that prioritizes rapid prototype releases and iterations. RAD emphasizes
software and user feedback over strict planning and requirements recording. RAD focuses
the prototypes by applying the iterative concept, reusing of existing prototypes, continuous
RAD has five phases: defining and finalizing project requirements, building
prototypes, gathering user feedback, testing repeatedly, and presenting the system. The
defining and planning stage is when the researcher completes project requirements such as
Monitoring System for CDLB Employees 27
project goals, expectations, timelines, scope, and budget. When the researcher clearly
defined and scoped out each aspect of the project's needs, you can seek management
approvals. In the developing/building phase, the researcher worked closely with clients to
program until the project is done. Gathering user data improved the prototype until the
testing phase was done. The finished product goes to launch; that involved data conversion
The researcher used RAD because of the flexibility and adaptable to changes and
can handle massive projects without a doubt. In the requirement or planning phase, the
researchers will gather the necessary information to formulate a solution to aid the current
system's problems. The researcher will continuously connect with the client and a proxy
tester if a client's representative is unavailable when the development and system design
phase is reached. Those phases will be done simultaneously until a favorable result is
acquired. With RAD's use, the researcher reduced the development time and minimized
the total expenses. RAD also helped meet the system requirement or standards of the end-
Research Locale
The research locale is where the study takes place. It is where the researcher will
Colegio de Los Baños is located at Lopez Avenue, Brgy. Batong Malake, Los
To gather and analyze the necessary information about the study itself, the current
process, and other problems, the researcher used the aid of several gathering tools:
Interview
The researcher was able to collect data by doing a face-to-face interview with the
target client, the Registrar. It was a semi-structured interview where there was a prepared
question and revised while doing the interview. But due to the pandemic right now, there
are many precautions and safety protocols to be followed before doing an interview. And
the researcher aimed to do an online interview if the client was uncomfortable due to the
pandemic. The interview was both done at school and online; the registrar who is one of
Table 1
Evaluation Form
An evaluation form was used to conduct and to gather data from the user and the
client. Two sets of evaluation forms were used to collect data and analyze to improve the
system and determine whether the system was going in favor of the target clients and the
proponents' users.
Sampling Design
Slovin’s formula was used for the sampling design. The researcher selected
nineteen employees from the school, due to the situation now because of the pandemic,
only limited numbers were suggested, to those who were willingly to respond.
The numbers of employee respondents were determined using the Slovin formula
described below:
n = N/1+N(e²)
N = Total population
A margin of error of 5% is within the limits of the allowable deviation from true
Nineteen faculty and staff were selected to answer the questionnaire: the number of
Data Collection
The inputs of the respondents to the assertions in the polls were recorded and given
agree). The responses to questions in the given variables of the weighted mean were scaled
using the “five-point-scale” or Likert Scale system and given weight as follows:
Data Analysis
The data collected was tallied and the sum was totaled. The weighted average of
the responses was also calculated per statement. The number of respondents per response
was multiplied by the weights given to the response. (1 to 5 as described above) and divided
(responses)
(No. of respondents)
Monitoring System for CDLB Employees 33
Some information cannot be gathered in libraries, and with the help of the internet,
the researcher looked for published foreign studies, also provided some information that
Database Design
The database design was based from the flowchart (Appendix B) and the entity
was used for creating the needed database and created tables for storing, adding, editing,
deleting details of the employees. Sets of data have their own unique identifier called as
They acquired a specific title to be addressed in it before the researcher began the
report. After the title was accepted, the researcher went to the client to let them sign the
consent certificate, which would act as a record and confirmation that they have decided to
Monitoring System for CDLB Employees 34
become the study client. They called for an interview and allowed them to provide a copy
The researcher then mainly used internet research to seek information due to
pandemic; library sources are limited and restricted. However, the researcher should seek
information on the libraries since not all information would be found on the Internet, and
Internet Research
The majority of the studies made by the researcher was with the help of using the
Internet. Due to the pandemic and the situation right now, most of the problems and
Library Research
The researcher gathered more information about the proposed system by going to
various libraries searching for studies and literature related to the researcher's topic. The
research resources usually are academically published books and scholarly journal articles.
(Binghamton University, 2016) To completely understand the study, the researcher will go
to different libraries of different schools. There, they will gather literature and reviews
related to theirs.
Monitoring System for CDLB Employees 35
Qualitative and quantitative analysis was used by the researcher in the data analysis
investigations during which numerical data is obtained, and the researcher converts what
is accepted or observed into numerical data. Besides, the quantitative analysis gives
quantifiable and easy to understand results. But then, the researcher won't conduct surveys
since they will focus on getting interviews directly from the client, as well as the feedback.
and interpret meaningful patterns related to the study (Allwood, 2011). The information
obtained from the interview and research were documented and developed to form the ideas
Qualitative Data
The qualitative data or information was obtained from interviews, observation, and
document review from the client. The researcher used the interview to gather the
information that will help in developing a new system. The interview allowed the
questions focus on determining the school's problems regarding their manual process of
attendance monitoring. The researcher also suggests and give opinions that made the new
Software Requirements
The graphical user interface (GUI) of the host system application was designed
using Java, with the help of an IDE using Apache. Apache NetBeans IDE 12.3 with JDK
version 11 was used to build the application. At least the JDK version of 8 or the JRE
version of 1.8 must run the system without any errors from importing libraries. Java was
first created in June 1991 by James Gosling. Up to now, Java is one of the most used object
oriented programming language up to now, enable to run on almost any platforms; being
so powerful, are mainly used for desktop applications and web applications.
(MySQL) to store the employee details, records of time, pictures, IDs. MySQL is one of
the relationships between different data fields such as one-to-one, one-to-many, many-to-
System Requirements
The host computer must have an operating system of Windows version at least 7
with the system type of 64-bit to run successfully, with at least 4 GB (Gigabytes) of RAM
(Read Access Memory), and at least 2 CPU cores, with or without a video card, a computer
with mouse and keyboard is needed to access the system without encountering any problem
fully. And Microsoft Excel is needed to successfully export the data without encountering
any problems.
Monitoring System for CDLB Employees 37
CHAPTER IV
This chapter shows the program GUI (Graphical user interface), and a brief
discussion about their function and uses. The system contains two modules – User
(Employees) and the Administrator. The user module allows the employee to tap their
finger to the biometrics reader so that the time in and time out will be reflected on the
screen while the time will be stored in the database. The administrator module allows the
authorized personnel to view and edit the personnel information, add personnel information,
register their fingerprints to the database, and view the employee's attendance records and
logs. And also export the data of an employee with a list of absences, tardiness, overtime,
This chapter explains how the system will run time to time, displaying first with
the loading screen, login, and jump to the user module for the scanning, and to the
administrator module.
Monitoring System for CDLB Employees 38
Loading Screen
The Figure 7 is the first thing that is displayed when the system is opened. The
loading screen will start as the output and to make sure if the program is running smoothly.
When the program successfully loads, it means the app doesn’t have an error and will be
good to go for executing the system. When the program won’t load, the system lacks
requirements of software such as Java version is outdated. Once the loading screen reaches
Login Screen
click the Login button on Figure 8, tap the fingerprint to the device (Biometrics Scanner)
to access the administrator dashboard. Once verified, administrator would be able to access
to the main form at Figure 9. If the user isn’t an administrator, he/she would only have
access to the scanner, which would hold and do the attendance monitoring scanning for the
employees—Figure 34 for the Scanning form, Figure 9 for the Main administrator form.
Administrator Module
employees, setting the time and schedule of the employees, viewing records real time as
well as exporting the employee’s data filtered by the date, to view tardiness, absences, and
total working hours for the administrator to keep track of their attendance.
Monitoring System for CDLB Employees 41
Once successfully logged in, a pop-up message would show that the credentials
were correct; as shown in Figure 9 below, the main form would be the main GUI for the
administrator to handle the employees. There is a total of five (5) navigation tabs on the
left side panel, namely, “Home”, “Employee”, “Logs”, “Export Data”, and “Logout”. Upon
clicking the “Home” tab, Colegio de Los Baños mission and vision would be displayed,
with a CDLB mark included, proving to be a thesis for the school. There is also a header
Employee Form
Upon clicking the Employee tab in Figure 10, the table will be displaying all of the
existing users on the database. There is a search bar to query the employee by typing their
name or their unique ID registered on the database. There are a total of nine (9) buttons on
this form, namely, “Add Employee,” “set schedule,” “set time,” “INFO,” “EDIT,”
“DELETE, “Add Holidays, “Add Day off” and “Who is inside now?”. Upon clicking the
Add Employee button, Add Employee form would display shown in Figure 11. The same
goes for the other buttons, respectively, “Set Schedule” at Figure 14, “Set time” at Figure
15, “INFO” at Figure 16, “EDIT” in Figure 17, “DELETE” in Figure 18 and 19, “Add
Holidays” in Figure 20, “Add Day off” in Figure 21, “Who is inside now?” in Figure 22.
Add Employee form requires the administrator to fill up the details of the employee
to be added. The form requires the administrator to input all of the data without any blank
information to prevent dummy data on the database. The Enrollment form would be
prompted upon clicking the “Open scanner” button, shown in Figure 13 Upon clicking the
“Save” button, once the details are all filled up, a success message would prompt together
with the employee number has been added, shown in Figure 12. Once the cancel button is
clicked, the form would close and return to the Employee Form at Figure 10.
Enrollment Form
The enrollment form requires the employee to tap the same finger four times to get
the most accurate fingerprint data to store it in the database. Once the "Enrollment template
created message is shown in Figure 13, the registration is done, and you may press the
"Back" button to return to the add employee form at Figure 11 to finalize the employee's
enrollment.
Add Schedule
Once successfully adding the employee’s information, add schedule form lets the
administrator to add the schedule for the chosen employee; administrator will check the
checkbox to let the system determine the absences of the employee when the date reviewed
has no records of time in. Schedules may be dynamic, and may be edited and changed by
the administrator.
Set Time
Set Time form lets the administrator add time per employee. The time runs with a 12-hour
clock to flag the employee’s tardiness and under time. Once the time is set, the time set
would be their temporary schedule for the system. The time may be changed whenever the
administrator edits the time. The system requires two Time to be recorded, their check-in
Once the row on the table in Figure 10 is clicked, and the Info button is clicked, the
form shows full employee details with the attached photo. On the upper part, when the
employee is not in the school, the panel will change to the color red, while if the employee
is inside, it will turn green. When no row is clicked, a pop-up message will show to select
a single user to view. Upon clicking the “X” button upper right of the screen, the form will
Same as viewing the info, click the row at the table from Employee form in Figure
10, and press the “EDIT” button; Most of the employee’s information could be edited
except for the ID and the fingerprint ID. Upon clicking the “Change Photo” button, the
administrator may choose a photo with the type of JPG or PNG format. The image will
automatically scale regardless of its size. Once the image is chosen, the label will update
to the selected image. When all needed information is edited, the administrator may press
the “Save” button to update the database successfully, a pop-up message will appear with
the text “Successfully updated”. Upon clicking the “Cancel” button, the form will close
Delete Employee
To successfully delete the employee, the administrator is required to click the row
on the table of Employee form in Figure 10, and then click the button “DELETE,” to avoid
deleting accidentally, the prompt would show with the employee ID to double-check shown
in Figure 18. The delete button only deletes the employee details but won’t delete the
Figure 19 that the employee with the number is successfully deleted from the database.
Add Holiday Form allows the administrator to add a global Holiday for the
system to compute and exclude absences for the employees who won’t be doing an
attendance check due to being a Holiday. The administrator may also add for special
Holidays, like school’s anniversary, city’s day, and many other days. Once the date is
chosen, the administrator may click the “Save” button on Figure 20 to successfully insert
the date selected. Upon clicking the “Delete” button, after the row at the table in Figure 20
is chosen, the administrator may delete the data that is currently on the list. Upon clicking
the “Cancel button, the form will close and go back to the Employee form in Figure 10.
Add Day off form requires the administrator to choose the employee at the table
from the Employee form in Figure 10. Once the “Add Day off” button is clicked, the
administrator will select the date of the employee’s day-off or for other reasons. Upon
clicking the “Save” button in Figure 21, the date chosen will be inserted into the database
for the employee selected by the administrator. Upon clicking the “Cancel” button, the
form will close and return to the Employee form at Figure 10.
Employee tracker form views all of the employee’s state whether they are inside
the school or not. Two tables would be displayed, on the upper where all of the members
who aren’t at the school would display, while the other table shows all employees who are
currently inside the school. Upon clicking the “close” button in Figure 22, the form will
Log Form
Upon clicking the “Logs” from the navigation tab, the Log form includes the records
of employees of their time in and time out schedules; it could be filtered by their name thru
the search text field or with the date filtered. To view the logs within the range of dates,
the date button consists of the date from and after. Once the administrator chose the dates,
upon clicking the “Filter button in Figure 23, logs of the employees will be shown at the
table in Figure 23. The filter button would only work when the range of dates is chosen.
Upon clicking the “Refresh” button, the contents of the table would display the logs for the
day today. The primary purpose of this form is to show all records of time in and time out
of the employee. By default, the table would display all of their records within the day.
Export Form
Upon clicking “Export Data” from the navigation tab in Figure 24, the export form
table would be blank by default and will show the record once the date button is clicked,
requires the administrator to insert the date from and to for the range of dates, and choose
the employee’s name. Upon clicking the “Find” button in Figure 24, the records of
employee logs are queried with the dates inputted. To export the current date, the
administrator should input two dates with the corresponding date the same in order to query
for the day of the log. Upon clicking the “Export to Excel” button, the table contents would
convert the current list of records to an excel file. A Microsoft Excel is needed to export
Once the “Export” button successfully runs, the program will prompt an excel with
all of their data recorded and listed within the range of date chosen for an employee.
Calculation of their total hours late, total under time hours, and total working time would
be listed, with a message of the status of their logs, as seen in Figure 25.
Upon clicking “View Logs Today,” the table with the logs of all employees who
logged will display and export to an excel file. Upon clicking the “refresh button,” the table
in Figure 24 will refresh and clear the records of the queried records. The export form
includes their time in the schedule and their time out schedule, viewing all of the completed
Another example of excel from the another sheet, would show the lists of absences,
all of the dates being excluded from employee’s rest day and Holidays, and their personal
leave. The sheet would show their working schedule days, and their total absences made
Setting up
To run this program, the user must have an SDK installed on their computer,
depending on their platform; for Digital Persona, only the Windows platform is supported
with a Java version of at least 1.6 (JRE or JDK) and a browser to open the link (IE,
Microsoft Edge, Firefox, Chrome), and a USB port where the fingerprint reader is to be
https://drive.google.com/drive/folders/1CwFiCkXZI94FI9L5J3iPpqvpOJ6FuSwt .
How to install:
User Module
User module consists of one form, which is the scanner form, once tapped, user
would be able to see their time of time in and out, along with their details. The form would
display whether the matched fingerprint has record on database, when no database is read,
Scanner form
The scanner form from the Figure 31, shows the employee ID, employee name,
image saved, and fingerprint photo whenever the user taps their finger on the device. The
button "Scan Finger" should be pressed for the system to run the automation of attendance
checking, passing the check-in and check-out time to the database. Upon clicking the
button “Go back”, the form will close and will redirect to the Login form in Figure 8.
Biometrics scanner
When the “Scan Finger” button is pressed from Figure 31, the Verification form will
prompt, once the finger is tapped on the device, employee details will be shown on the
scanner form, as while as the program is running, the details will change once the device
recognizes another fingerprint ID registered on the database. If the device recognizes the
fingerprint, a sound will be prompted confirming the check-in of the employee. When the
device detects a fingerprint that wasn’t identified nor registered, the prompt will show in
CDLB employees. The respondents evaluated the system through a survey evaluation form
The first statement was about the device's speed to determine if the system responds
immediately once tapped on the device. The second statement was about the device's
accuracy to determine if the system displayed correct and accurate time-in and time-out of
the users. The third statement was about the system's validity to check whether the details
saved to the database were accurate. The fourth statement was to compare the system of
attendance checking of the school with the system. The fifth statement was to know the
efficiency of the system for the users. The sixth statement was to determine if the system
would be beneficial to Colegio de Los Baños, and the seventh statement was to determine
if the school would adopt the approach for their attendance checking.
Monitoring System for CDLB Employees 63
Table 2.
No. of respondents1
Statements
SD D U A SA WA2
1 Refersto the number of respondents for a particular response (SA – strongly agree,
A – agree, U – uncertain, D – disagree, SD- strongly disagree)
2
Refers to the weighted average (WA) of each response per a particular statement
Monitoring System for CDLB Employees 64
The survey was conducted on last April 26 – 27, 2021 and the responses of the
employees are indicated on Table 2. The significance of the response was measured using
the weighted average, and the weighted average were scaled with the Likert’s scaling and
The first statement was how fast the system responded immediately when the finger
was tapped on the device reader. Recognizing the fingerprint took a long time for others,
for those who were not used to fingerprint tapping had a hard time doing enrollment for
the fingerprint, some irregularities have been proven when the finger has a sweat, the finger
needs to be dry for the device to recognize immediately. As seen through results, the
The second statement refers to the device's accuracy to collect the employee's
information and display the correct data. So when the fingerprint is tapped on the device,
the scanner would show and display the time they logged in and logged out, seen from the
scanner and the logs. Most of the respondents strongly agreed that the correct information
The third statement regarded the system's accuracy when the reader was tapped to
display the employee's personal information to those who are registered. The data will be
viewed on the scanner when tapped, and also to the administrator panel, the employees can
Monitoring System for CDLB Employees 65
be manually viewed, such as picture, name, age, birthdate, contact number, address, email.
Most of the respondents strongly agreed that the system displayed the correct information
registered on the database. This is also indicated in the weighted average of (4.6).
The fourth statement refers to the efficiency of the system comparing with the
current system the premises have. Currently, the school uses a Bundy clock with manual
time in and time out and can lose the records when misplaced. The said system was being
compared with the current system now. The majority of the respondents strongly agreed,
while few respondents said uncertain, but still a lot agreed to be convenient having a
The fifth statement pertains to the efficiency of the system in recording the
attendance of the CDLB employees. The system records time in and time out of registered
users. The system arranges data into a log history (sorted according to ascending date and
time) where the administrator can check the time in and time out records of employees for
a day or for a month depending on the date they choose. Most of the respondents strongly
agreed that the system is an efficient way to store and record the attendance, with a
The sixth statement detects the perception of the respondents if the system will be
beneficial to CDLB. Most of the respondents strongly agreed that would be beneficial to
The seventh statement refers to the possibility that CDLB would implement and
adapt the system in the near future. Most of the respondents strongly agreed to adapt the
current system to the school. This is also indicated in the weighted mean of (4.6).
In all of the seven statements, the highest number of responses was “Strongly
Agree.” The statement with the lowest number of “Strongly Agree” was comparing the
convenience with the current system of CDLB in checking attendance, and the response of
the reader to the fingerprint having two disagree, there were employees who had a hard
The statement with the highest number of “Strongly Agree” was displaying the
correct information of the employees, the efficiency of record keeping the attendance, and
the benefit of the system to CDLB. The overall weighted average for all seven statements
was (4.5) which means that most employees agreed to almost all of the statements
improve the system and giving recommendations, there were two respondents who added
a comment. One said, “How would the system secure the information of the employees
registered on the database?” while the other comment was, “How would the system help
the school, not only for the attendance checking but other features too?”. While the
Monitoring System for CDLB Employees 67
researcher was conducting a test and survey, they said how would the system be
implemented if the school decides to use it, like for the device it was very small for the
whole school to use it for verification. This may explain the first statement having a lot of
negative feedback, where some employees had a hard time recognizing their fingerprints,
Table 3.
No. of respondents1
Statements
SD D U A SA WA2
1 Refersto the number of respondents for a particular response (SA – strongly agree,
A – agree, U – uncertain, D – disagree, SD- strongly disagree)
2
Refers to the weighted average (WA) of each response per a particular statement
Monitoring System for CDLB Employees 69
The survey was conducted on last May 17, 2021 and the responses of the
administrators are indicated on Table 3. The significance of the response was measured
using the weighted average, and the weighted average were scaled with the Likert’s scaling
The first statement was how fast the system responded immediately when the finger
was tapped on the device reader. Administrators strongly agreed that the fingerprint tapped
The second statement refers to the device's accuracy to collect the employee's
information and display the correct data. So when the fingerprint is tapped on the device,
the scanner would show and display the time they logged in and logged out, seen from the
scanner and the logs. Both of the administrators agreed that the information displayed was
The third statement regarded the system's user interface, whether visually pleasing,
another meaning if the system was user friendly, where the administrators agreed to give
an evaluation of (4.0).
The fourth statement refers to the efficiency of the system comparing with the
current system the premises have. Currently, the school uses a Bundy clock with manual
time in and time out and can lose the records when misplaced. The said system was being
Monitoring System for CDLB Employees 70
compared with the current system now. Both of the administrators agreed, both giving (4.0)
The fifth statement pertains to the efficiency of the system in recording the
attendance of the CDLB employees. The system records time in and time out of registered
users. The system arranges data into a log history (sorted according to ascending date and
time) where the administrator can check the time in and time out records of employees for
a day or for a month depending on the date they choose. Both of the administrators agreed
that the system is an efficient way to store and record the attendance, with a weighted
average of (4.5).
The sixth statement refers to the possibility that CDLB would implement and adapt
the system in the near future. Both of the administrators agreed to adapt the current system
The seventh statement refers to the exporting of data was accurate. One of the
administrators evaluated as uncertain, giving an average of (4.0), showing that it was not
very accurate compared to the other statements having an average higher than seventh
statement.
Monitoring System for CDLB Employees 71
Of all the seven statements evaluated by the administrators, the average mean for
the total evaluation was (4.4), the target clients agreed that most of the evaluation of the
system had a positive remark, with the lack of exporting data, having the lowest average,
proves to be the weakness and to be improved on for the system. No comments were made
by the administrators, as well as a suggestion given. The system was revised every time
the target client asked for changes, which made the evaluation receive positive remarks.
Monitoring System for CDLB Employees 72
CHAPTER V
SUMMARY
Computer Science student, it can be used to monitor time in and time out of the CDLB
employees, pertaining faculty and staff. The staff will tap their fingerprint on the device to
display their personal information and record their time in and time out.
The system has two modules, the User (employees) and an Administrator module.
The User module allows the tapping of their finger unto the biometrics reader for the time
in and time out to be reflected on the system. The administrator module can edit, add, delete
employee information and view the logs and records of their attendance, including the late
count, under time count, override the attendance if any irregularities may happen such as
forgetting the time out, on business leave, emergency leave, etc. Overriding the attendance
cannot be edited by the administrator. Once the employee is timed in, only time out can be
For the user module, a total of 19 employees were asked to evaluate through a survey
questionnaire; the respondents may be low due to the situation right now because of the
pandemic, majority of the employees working at home, some other employees have a
skeletal schedule where the researcher could not conduct to every employee on CDLB.
Monitoring System for CDLB Employees 73
According to the study, 90% of the respondents favor the system, where the average was
made from the total weighted mean out of the total answers made. The highest number of
responses were “Strongly Agree,” the statement with displaying the information of the User,
recording efficiently of their attendance, and the benefits giving to CDLB were the highest
responses with “Strongly Agree” pertaining to viewing the details of the information was
correct and precise, time in and time out record was precise without any bugs, and giving
For the administrator module, a total of 2 personnel were asked to evaluate, where
the average of their responses were (4.4). Based on the Likert’s scale, the narrative scaling
would be “Agree”. Based on the study, highest response was the accuracy of the device
CONCLUSION
The system was developed for the target clients of Colegio de Los Baños. This
system provides an improved and a more efficient way to monitor the attendance of the
employees of CDLB. The system helped improve record-keeping and avoid information
loss, which answered the objective proposed by the researcher. Efficiency compared to the
system of CDLB having right now was also positive, showing the accuracy of the records
The system was developed to record and monitor the time in and time out of
employees of CDLB. The system allowed for only the employees who were registered on
the database thru the biometrics reader to register their time in and time out, and
additionally including their personal information to the system, where the personnel
handling and managing the employees would have an easier task to filter and search the
employees with their ID saved on the database, as well as helped the assigned personnel
The system was created with two programming languages, Java and MySQL. It
involved a special hardware device called Digital Persona U.are.U 4500, a biometrics
reader to efficiently record their data and display the user’s personal information, and
record time in and time out when tapped on the device. The accuracy was the best when
using biometrics compared to other methods since biometrics will only ask for your
RECOMMENDATIONS
The system will be open to any changes that can be improved by implementing a
working Short Message Service, internet and a host on Twilio is needed, or a development
using GSM module to perfectly run the SMS feature locally without the use and need of
Internet.
Monitoring System for CDLB Employees 75
features like Payroll may be implemented since the system already calculates the time for
the working hours, tardiness, and absences. The employee information and management is
already made from the system, and implementing multiple schedule per employee is also
and forms for the student. The process would be the same with the employee with different
BIBLIOGRAPHY
Adamski, J.J. & Pratt, P.J.( 2012). Concepts of Database Management Seventh Edition.
Allwood, C., M.. Alvesson, D., Bryman, A., J.. Bullington, G., N.. Denzin, Y., Flick, U., . . .
Ziman, J. (1999, January 01). The distinction between qualitative and quantitative
research methods is problematic. Retrieved December 12, 2020, from
https://link.springer.com/article/10.1007/s11135-011-9455-8
Bromwich, D. (2019) How Words Make Things Happen. Retrieved December 12, 2020,
from
https://oxford.universitypressscholarship.com/view/10.1093/oso/9780199672790.0
01.0001/oso-9780199672790
Cappelli, R., Lumini, A., Maio, D. and Maltoni, D. (2007). Fingerprint Image
Reconstruction from Standard Templates, IEEE Transactions, vol. 29, pp.1489-1503.
Cappelli, R., Maio, D.,
Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems
in Supporting National Database Based on Single ID Card Number (The Implementation
of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4: 129. doi:10.4172/2165-
7866.1000129
Krissler, J. (2014, December 30). Hacker fakes German minister's fingerprints using
photos of her hands. The Guardian.
https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-
ministers-fingerprints-using-photos-of-her-hands.
Monitoring System for CDLB Employees 77
Leahy, P. (2012). Wondering What Java Is? Here's the Answer. Retrieved November 25,
2020, from https://www.thoughtco.com/what-is-java-2034117
Maltoni, D., Wayman, J., L. and Jain, A. K. (2006). Performance evaluation of fingerprint
verification systems, IEEE Trans. Pattern Anal., 28(1), pp. 3-18. Chirillo, J. and Scott, B.
(2007). Implementing Biometric Security. Indianapolis: John Wiley Publishing Inc., ISBN:
0 7654 25026.
Mitra, S. (2020). Biometrics In A Data Driven World: trends, technologies, and challenges.
CRC PRESS.
Newton, D. (2019, February 22). Learning big o notation with o(n) complexity - dzone
performance. Retrieved April 19, 2021, from https://dzone.com/articles/learning-
big-o-notation-with-on-
complexity#:~:text=O(n)%20represents%20the%20complexity,after%20reading%2
0all%20n%20elements.
Pandora FMS’s editorial team is made up of a group o. (2020, January 29). Why you need
a monitoring system ? Offer the best service for your clients. Retrieved October 29,
2020, from https://pandorafms.com/blog/why-you-need-a-monitoring-system/
Rouse, M. (2020, August 25). What are Biometrics and How Do They Work? Retrieved
November 23, 2020, from
https://searchsecurity.techtarget.com/definition/biometrics
Soren, R. & Tudu, D. K. (2011). “RFID Based Student Database Management System”
Retrieved on November 4, 2016 from
http://ethesis.nitrkl.ac.in/2665/1/Final_Thesis.pdf
Weiss, E. (2020, January 2). Philippines Police Adopt Biometric Tracking System for
Officers. FindBiometrics. https://findbiometrics.com/biometrics-news-philippines-
police-adopt-biometric-tracking-system-catch-truant-officers-010206/.
What Is Rapid Application Development (RAD)? (n.d.). Retrieved December 11, 2020,
from https://blog.capterra.com/what-is-rapid-application-development/
Wright, P. (2011). The Chief HR Officer: Defining the New Role of Human Resource
Leaders Jossey-Bass
Monitoring System for CDLB Employees 79
APPENDIX A
Conceptual Framework
Graphical User
Interface (Java)
Database (MySQL)
Monitoring System for CDLB Employees 80
APPENDIX B
Flow Chart of the Faculty Attendance Monitoring System for CDLB using
Biometrics
Monitoring System for CDLB Employees 81
APPENDIX C
Evaluation Survey
(For users)
Based on the research entitled “Faculty Attendance Monitoring System for CDLB using
Biometrics”, the researcher is requesting for your cooperation to sincerely and honestly
answer this questionnaire. It is reassured that your answer will be treated with
confidentiality.
1 2 3 4 5
No. Statements Strongly Disagree Uncertain Agree Strongly
Disagree Agree
1 The system responded immediately
when the finger was tapped on the
biometrics device reader.
2 The system displayed the correct
time in and time out of the user.
3 The system displayed the correct
personal information of the user.
4 The system was convenient to use
compared to the attendance system
currently used now.
5 The system is an efficient way of
recording the attendance of the
CDLB staffs.
6 The system will be beneficial to
CDLB.
7 The system may be adapted by
CDLB in the near future.
Other comments and suggestions for the improvement of the system in the near future:
Monitoring System for CDLB Employees 82
APPENDIX D
Evaluation Survey
(For administrators)
Based on the research entitled “Faculty Attendance Monitoring System for CDLB using
Biometrics”, the researcher is requesting for your cooperation to sincerely and honestly
answer this questionnaire. It is reassured that your answer will be treated with
confidentiality.
1 2 3 4 5
No. Statements Strongly Disagree Uncertain Agree Strongly
Disagree Agree
1 The system responded immediately
when the finger was tapped on the
biometrics device reader.
2 The system displayed the correct
time in and time out of the user and
their personal info.
3 The system design (User interface)
is visually good.
4 The system was convenient to use
compared to the attendance system
currently used now.
5 The system is an efficient way of
recording the attendance of the
CDLB staffs.
7 The system may be adapted by
CDLB in the near future.
8 The system exporting data was
efficient.
Other comments and suggestions for the improvement of the system in the near future:
Monitoring System for CDLB Employees 83
APPENDIX E
APPENDIX F
System Folder
The Faculty Attendance Monitoring System using Biometrics contains the steps on how to
install the time record system to the user’s workstation. It contains the following:
• ReadMe text file – provide the steps on how to install the app
• Digital Persona U.are.U 4500 SDK zip – needs to unzip the folder, has
• Xampp installer – installer for the host computer to enable to run the
• JDK 11.0.1 windows x64 – Java version installer, needs to run for the
USER’S MANUAL
2) Run CMD and type “javac –version” to check if java is successfully installed on the
computer.
3) Download Secondary Development kit (SDK) for Digital Persona U.are.U Reader.
attendanceDatabase.sql.
7) Connect the device to the USB port. Check if the reader responds to confirm that the
Login Form
2 – Button 2 is a button to enter the user scanner, this is the place where attendance
checking starts.
registering, only the super administrator can access to the registration form.
Scanner Form
1 – Button 1 will open the form at the right as seen from the photo above, where the
Main Form(Administrator)
2 – Button 2 will go to the employee form, where the employees would be added, edited,
3 – Button 3 will go to the current logs, the logs of the day, that can be filtered by search
4 – Button 4 will list all of the completed time in and time outs of employees, filtered by
5 – Button 5 will log out the current administrator user, going back to the login screen.
Monitoring System for CDLB Employees 89
Employee Form
database.
2 – Button 2 will set the schedule of every employee, in order to determine if the
3 – Button 3 will set the time of every employee, in order to determine if the employee is
on time or late.
4 – Button 4 will view the details of the employees, showing if they are currently inside
5 – Button 5 will edit the employee details, will also override their schedule when needed
due to irregularities.
9 – Button 9 will view the list of employees who are at school and not for the day.
1 – Button 1 will upload the photo of the employee that is saved on the computer.
3 – Button 3 will add the employee’s info to the database, filling up the form is required.
1 – Button 1 will enable the user to change the photo of the employee.
1 – Button 1 will let the Administrator choose the day to add the Holiday.
1 – Button 1 will let the Administrator choose the days for the employee.
2 – Button 2 will save the days for the employee, to reflect their schedule.
Logs Form
1 – Button 1 will enable to filter the logs list by typing any keywords
2 – Button 2 are the dates that are to be filtered by inputting two different dates.
Export Form
1 – Button 1 are the dates that are to be filtered by inputting two different dates.
2 – Button 2 is the employee name to be filtered to show it to the logs together with the
filtered date.
4 – Button 4 will export the excel with the current list of logs on the table.
5 – Button 5 will view the logs for all employees for the day.
1 – Button 1 will export the excel with the current list of logs on the table.