Sei sulla pagina 1di 35

ABSTRACT

This system is an attendance monitoring in laboratory specifically the

Computer Engineering Laboratory (C18). A software application is developed to

create an automated system wherein students can log in and log out of the laboratory.

The proponents have used WAN Networking to connect all data and devices in one

interface. In this project work, attendance is marked after students’ biometric

identification or registration. For student identification, a fingerprint recognition-based

identification system is used. Fingerprint features are considered to be the best and

fastest method for biometric identification. These features are more secure to use and

unique for every person that don’t change in one’s lifetime. The proposed system has

been implemented using Java programming paradigm platform. The concept of

Arduino Uno was used to generate a program for the hardware of the project and LCD

Displays to create a legible output of the electronic system.


Chapter 1

INTRODUCTION

The present is the revolutionary time of computer technology. Most works

depend on computer applications. Despite of this, there are still establishments and

educational institutes that depend the old-fashioned way. The traditional student

attendance includes manual methods (roll calls and using paper-based attendance

registers). These manual methods have a problem such as inconsistency, inaccuracy,

and propensity that encourages fake or proxy attendance. Furthermore, passing around

attendance registers while learning events are going on can distract students which is

impractical in large classes and a time consuming.

Attendance is very important in every student, a single absent is big difference

in performance in the school. Mostly students of high schools are prone to absences,

because of reasons like they think it is a boring class, laziness than attending the class,

some students prefer going to computer shops to play games rather than entering the

class and some students are victims of peer pressure.

With the rise of globalization, it is becoming essential to find an easier and

more effective system to help an organization or company. Every organization

whether an educational institution or business organization, has to maintain a proper

record of attendance for effective functioning of organization.

Designing a better attendance management system for students is necessary, so

that the records are maintained with ease and accuracy. This would improve accuracy
of attendance records because it will remove all the hassles of roll calling and will

save valuable time of the students as well as teachers (Nweyokie, 2015).

As Prasad and his colleagues presented in a situation in their study entitled

Student Attendance Tracking System Using Biometrics last 2018, Biometrics

technologies are used to measure and analyze personal characteristics. These

characteristics include fingerprints, voice patterns, hand measurements, irises and

others, all used to identify human characteristics and to verify identity. These

biometrics or characteristics are tightly connected to an individual and cannot be

forgotten, shared, stolen or easily hacked. The characteristics can uniquely identify a

person, replacing or supplementing traditional security methods by providing two

major improvements: personal biometrics cannot be easily stolen and an individual

does not need to memorize passwords or codes. Authentication by biometric

verification is becoming increasingly common in corporate and public security

systems and applications. Like biometrics gives an alternative and higher security

compared to passwords or pin identification due to the fact that passwords and pin can

easily be compromised.

According to Salh, et. al in their study entitled Development of Fingerprint

Biometric Attendance System for Non-Academic Staff in a Tertiary Education last

2016, Fingerprint authentication is one of the most well-known and publicized

biometrics technologies. Because of their uniqueness and consistency over time,

fingerprints have been in use for identification for over a century, more recently

becoming automated due to advancements in computed capabilities. Fingerprint

reconstruction is popular because of the inherent ease of acquisition, the numerous


sources (e.g. ten fingers) available for collection, and their established use and

collections by law enforcement and immigration.

Conducting this research could bring about an enhancement to the above-

mentioned issues and concerns since this research is meant to provide a key on how to

automate laboratory class attendance and laboratory user attendance systems that

maintains a daily record of a students’ arrival and departure time which would be

locked enough to avoid all too common unauthorized data modifications and biases.
Chapter 2

REVIEW OF RELATED LITERATURE

Attendance System in relation to students’ academic performance

Monitoring student attendance (henceforth called attendance monitoring) is an

important and beneficial practice in higher education. Universities and colleges

monitor attendance for many obvious reasons such as to detect disengaged students at

an early stage and initiate strategies to re-engage them, thereby improving overall

student retention. Attendance monitoring can motivate students to attend learning

events such as classes, lectures, and labs, and as a result it enhances their academic

performance and success. Other benefits of attendance monitoring include catering for

students’ well-being and preparing them to be accountable professionals. In addition

to academic purposes, immigration regulations in some countries require most higher

learning institutions to monitor and report academic progress of students on study

visas, part of which is attendance in class and other learning events. Reducing the

rates of student truancy and chronic absenteeism has been and continues to be a goal

of many schools and school system. Despite the long history of concern over student

attendance, the issue has received relatively little attention from educational

researchers (Corville, 2015).

According to Priyanka, there is a significant correlation between students’

attendances and their academic performances for Empirical evidences. There was also

a statement stated that the students who have poor attendance records will generally

link to poor retention. This is also agreed by Dimitrova and Mazza where they both
claimed that the students’ attendances to the course may indicate their behaviors

towards the subject where it can be used to judge their tendency and commitment to

the course. Attendances of every students are being maintained by every school,

college and university. Faculty has to sustain proper record of the attendance. The

manual attendance record system is not efficient and requires more time to arrange

record and to calculate the mediocre attendance of each student. Hence there is a

necessity of a system that will resolve the problem of student record arrangement and

student average attendance calculation.

Automated Attendance Systems for School

Institutions, companies and organizations where security and net productivity is

vital, access to certain areas must be controlled and monitored through an automated

system of attendance. Every academic institute has certain criteria for students

regarding their attendance in class. That is why keeping the accurate record of

attendance is very important. An automated system is designed to overcome the

problems associated with attendance system. In the journal paper of “Wireless

Fingerprint Based College Attendance System Using Zigbee Technology” (Talaviya

G. et al., 2015), it had known that the attendance system using fingerprint recognition

is more efficient than the manual attendance system since it provide more automation

in managing the attendance of the students. As mentioned in the journal, there are

some works such as RFID-based and facial recognition had been done in improving

the method of managing the student attendance, but, cost of hardware of facial

recognition method is very high compared to the fingerprint recognition method. The

journal paper main objectives had concerned about to make use of fingerprint-based
attendance system in marking the attendance of the students who attending the classes

for purpose to save the time taken to record down every students’ attendance and

fasten the report generation.

The most common idea of automated attendance systems is by the use of

Biometrics (Fingerprint Recognition). In this new study, Biometric system for

attendance management will be utilized.

Arduino Uno

The Arduino project was started at the Interaction Design Institute Ivrea (IDII)

in Ivrea, Italy. In 2003 Hernando Barragán created the development platform Wiring

as a Master's thesis project at IDII, under the supervision of Massimo Banzi and Casey

Reas. The Arduino Uno is an easy to use, yet powerful single board computer that has

gained considerable traction in the hobby and professional market (W. Durfee, 2011).

Arduino’s little, blue circuit board, mythically taking its name from local pub in Italy

has, in a very short time, motivated a new generation of DIY’ers (Do-It-Yourself’ers)

of all ages to make a manner of wild projects found anywhere form the hollowed

grounds of our universities to the scorching desert sands of a particularly infamous

yearly arts festival and just about everywhere in between (Brian Evans, 2011). The

Arduino is an open-source electronics platform based on easy-to-use hardware and

software. Arduino boards are able to read inputs - light on a sensor, a finger on a

button, or a Twitter message - and turn it into an output - activating a motor, turning

on an LED, publishing something online.

The study of Myint, fucoses on the Web based Laboratory Fingerprint Based

Attendance System using Arduino The hardware system is implemented using


Biometric device with Arduino UNO microcontroller board that can detect the

students’ fingerprint. The website is divided into four modules consist of Home,

Admin Portal, Staff Portal and Student Portal. In this system, there are three main

parts: enrolling, searching and displaying the attendance. This simple device starts

with the connection of Arduino and fingerprint sensor to the computer for enrolling. In

searching phase, as soon as the user presses the fingerprint sensor, it reads the user’s

fingerprint and related user’s information are display on the computer depending on

the instruction written in. For this system, scanning time, date, user name and ID

number are displayed on the computer. Microsoft Excel is used in this system to show

the information. PLX-DAQ is a useful tool to connect the Arduino with Excel.

Biometrics (Fingerprint Recognition)

Fingerprint recognition is one of the most well-known biometrics, and it is by

far the most used biometric solution for authentication on computerized systems. The

reason for fingerprint recognition being so popular is the ease of acquisition,

established use and acceptance when compared to other biometrics, and the fact that

there are numerous (ten) sources of this biometric on each individual.

Fingerprint sensor (Biometric) is an electronic device used to capture a digital

image of the fingerprint pattern (Cappelli et al., 2006). The captured image is called a

live scan. This live scan is digitally processed to create a biometric template (a

collection of extracted minutiae points) which is stored and used for matching.

Minutiae are defined as the pattern created and the uniqueness of how ridges end, split

and join, or appear as a simple dot. The Minutiae consists of bifurcations, ridge dots,

ridge endings and enclosures, to ensure further uniqueness, the minutiae are further
broken down into sub minutiae such as pores, crossovers, deltas. The pores are tiny

depressions within the ridge on a fingerprint; the crossover creates an X pattern within

the ridge of a fingerprint and deltas create a triangle shaped pattern within the ridge of

a fingerprint. Identification in a fingerprint technology exists when an individual

fingerprint is compared against a known source called the fingerprint template

(Chirillo & Scott, 2007). Fingerprint sensors are very intricate and continue to grow

more complicated. They are becoming a vital part of the transformation to a more

technologically integrated society. Current fingerprint technologies are generally

susceptible to acquiring poor quality images due to different skin conditions and

environmental effects. These poor-quality images adversely affect the ability to

accurately

determine a person’s identity. Poor fingerprint image can be enhanced through several

stages of enhancement (Wayman et al., 2005).

Hardware and Software Interfacing

Embedded System Interfacing: Design for the Internet-of-Things (IoT) and

Cyber-Physical Systems (CPS) takes a comprehensive approach to the interface

between embedded systems and software. It provides the principles needed to

understand how digital and analog interfaces work and how to design new interfaces

for specific applications. The presentation is self-contained and practical, with

discussions based on real-world components (Wolf, 2019). It is a shared boundary in

which three separate components of computer system exchange information (IEEE

100 – The Authoritative Dictionary of IEEE Standards Terms, 2000). The exchange
can be between the software, computer hardware, peripheral devices, humans, and any

other combinations of these.

Embedded systems impose strong constrains on design criteria such as area,

speed and power dissipation. These often force a mixed implementation consisting of

microcontrollers and microprocessors, for implementing software functionality, and

ASIC’s (Application-specific Integrated Circuit) and FPGA’s for hardware processes

(M. Eisenring & J. Teich). In today’s design flow, hardware and system design

methods are stretched to solve increasingly larger problems in order to overcome

increased complexity.

Java Programming

According to Gupta, Java is a general-purpose computer programming

language that is concurrent, class-based, object-oriented, and specifically designed to

have as few implementation dependencies as possible. It is intended to let application

developers “write once, run anywhere” (WORA), meaning that compiled Java code

can run on all platforms that support Java without the need for recompilation.

Java was originally developed by James Gosling at Sun Microsystems (which

has since been acquired by Oracle Corporation) and released in 1995 as a core

component of Sun Microsystems’ Java platform. The language derives much of its

syntax from C and C++, but it has fewer low-level facilities than either of them.

Oracle Corporation is the current owner of the official implementation of the Java SE

platform, following their acquisition of Sun Microsystems on January 27, 2010. This
implementation is based on the original implementation of Java by Sun. The Oracle

implementation is available for Microsoft Windows, Mac OS X, Linux and Solaris.

Java is a popular general-purpose programming language and computing

platform. It is fast, reliable, and secure. According to Oracle, the company that owns

Java, Java runs on 3 billion devices worldwide. A platform is an environment that

helps to develop and run programs written in any programming language. From

desktop to web applications, scientific supercomputers to gaming consoles, cell

phones to the Internet, Java is used in every nook and corner (Prabhu, 2016).

Local Area Network (LAN)

In the 1960s, large colleges and universities had the first local area networks
(LAN). In the mid-1970s, Ethernet was developed by Xerox PARC (Xerox Palo Alto
Research Center) and deployed in 1976. Chase Manhattan Bank in New York had the
first commercial use of a LAN in December 1977. In the late 1970s and early 1980s, it
was common to have dozens or hundreds of individual computers located in the same
site. Many users and administrators were attracted to the concept of multiple
computers sharing expensive disk space and laser printers. From the mid-1980s to
through the 1990s, Novell's Netware dominated the LAN software market. Over time,
competitors such as Microsoft released comparable products to the point where
nowadays, local networking is considered base fuanctionality for any operating
system.

According to Beal, a local-area network (LAN) is a computer network that


spans a relatively small area. Most often, a LAN is confined to a single room, building
or group of buildings, however, one LAN can be connected to other LANs over any
distance via telephone lines and radio waves. A system of LANs connected in this
way is called a wide-area network (WAN). The difference between a LAN and WAN
is that the wide-area network spans a relatively large geographical area. Typically, a
WAN consists of two or more local-area networks (LANs) and are often connected
through public networks

If the network is contained within a relatively small area, such as a classroom,


school, or single building, it is commonly referred to as a local area network (LAN).
This type of network has the lowest cost and least overall capability of the three
geographic classifications. Because the pieces of equipment in a LAN are in relatively
close proximity, LANs are inexpensive to install. Despite their decreased capability,
however, their closeness and resultant low costs typically result in the use of the
fastest technology on a LAN. Thus, this network classification usually has the highest
speed components and fastest communications equipment before the other network
classifications see such equipment using the same speeds. This is because it takes less
overall investment to get the smaller network running the faster equipment. LANs,
therefore, are commonly considered the building blocks for creating larger networks
(Bonaventure,2011).

In lining with this study, the study of Maharastra and et. al. automated the
whole system of students’ attendance registration using Biometric system to build
appropriate software application. In order to achieve the simple and high real-time
system, it realized low cost and high-performance fingerprint attendance function,
which provided a new fingerprint attendance system for institutions. However, this
system does not require additional extra cost because it can easily integrate within the
existing campus LAN infrastructure, it requires a Fingerprint Scanner only.

MySQL

MySQL is the world's most popular open-source database. Despite its powerful

features, MySQL is simple to set up and easy to use. MySQL programming was used

to program the database in order to log, store and update information. In order for the

database to be connected to the microcontroller, the researchers used the Arduino

Ethernet Shield which allowed the Arduino Mega2560 board to connect to the PC’s

local host and internet network through a router using the Ethernet library in the
Arduino IDE. The shield contains a Micro SD card socket which could be used for

storage and retrieval of data (Palencia, G. F.,2015).

According to Dong and Li, the system uses MySQL communication protocol to
communicate with other layers, including upper applications and underlying MySQL
databases. This would consume extra work, compared with the use of existing plugins,
but it can also more effectively optimize the underlying system structure. Generally
speaking, MySQL mainly supports four networking protocols: TCP/IP, Unix socket
file, Named pipe and Shared memory. Since the latter three protocols rely on the
specific Operating System, we chose TCP/IP as our communication protocol, which is
supported by all major type of Operating Systems and could support local or remote
connect.

The database connection is a kind of limited expensive resources, so the


effective management can significantly improve the scalability and robustness of the
entire system. The connection pool is the best choice in practice, which is a cache of
database connections maintained so that the connections can be reused when future
requests to the database are required. However, for a distributed database, the
traditional method, which is based on the database, has a significant challenge in the
concurrency since the data is distributed across multiple databases. So, we modify the
traditional method, which make connection pool directly manage the MySQL
instances (Dong and Li,2015).
Chapter 3

ELECTRONIC ATTENDANCE SYSTEMS FOR COMPUTER


LABORATORIES

Abstract

Computer Laboratories in University of Mindanao Digos College

especially in Computer Engineering contains equipment which are expensive and

highly delicate. These are under a strict and disciplined maintenance of the laboratory

staffs since it is beneficial to the students who use the laboratory for their concrete

examinations and laboratory practices of the field works. However, there are instances

of lost computer peripherals where the custodians or faculty is nowhere to be found

because of poor security systems. In addition to this, there are incidents wherein

students who apply request for use of the laboratory are usually mixed with the

attendance of the regular students having that scheduled class.

In order to give a solution to challenges of attendance systems, it is best to

address it together with the fast pace of technology and innovation. This research

project is initiated to develop previous studies of electronic attendance systems which

are used by industries to monitor organization compliance, employee attendance,

student attendance monitoring and even for listing and monitoring of guests in events.

By the use of networked computer systems, an application (developed using Java


Netbeans) is used to run in different computers and gather data in a central server

through the power of database techniques (MySQL Workbench).

Rationale

In the recent time, it has been reported that some of the laboratory equipment

and some computer peripherals had lost.

On the other hand, there are also issues regarding the attendance accuracy of

manual attendance lists that most teachers and students may have observed. These

include difficulty in keeping the attendance list over a long period of time,

unnecessary time wastage during writing or signing attendance papers, improper

documentation, students forgetting to write or sign the attendance sheet, lecturers

forgetting the attendance list in classrooms or students signing illegally for an

absentee among others.

Gagare and his co-researchers of the IJRITCC research in study entitled “Smart

Attendance System” gave a brief comparison of how technology innovations

presented a way for attendance system electronic developments. In earlier days,

supervision system was cumbersome to detect the location of student and it has

become a very tedious task to take attendance manually. Now that technology has

advanced, integrating the monitoring system with automated technology provides a

more convenient way of monitoring the students. They stated that the Fingerprint

Scanning (Biometrics) technology is one of the most secure automation technologies

that is beneficial in improving the current traditional way of monitoring students’


attendance. Furthermore, biometrics gives a higher security compared to passwords or

pin identification due to the fact that passwords and pin can easily be compromised, as

every students’ had unique fingerprint that never stolen and an individual does not

need to memorize passwords or codes.

In addition, a Graphical User Interface (GUI) provides a more efficient way to

review the attendance. Thus, the integration of Fingerprint Scanning (Biometrics)

technology and the GUI in an attendance system produces an automated system which

gives a far better performance and efficiency than that of the traditional method of

monitoring attendance.

Objectives of the Study

This study is conducted to design an automated student attendance log in and

log out of the University of Mindanao Digos College, more specifically the Computer

Engineering Laboratory (C18). As we go along with the research design of the project,

we aim to address the following:

a. To eliminate the chances for fake attendance information.

b. Replace the manual monitoring of attendance to fully computerized and

accessible for later used.

c. Design a system that utilizes fingerprint recognition to securely track of

students’ attendance and stores the students’ and teachers’ information in a

secure database that in which the system can access at any given time.

d. Design a secure system that makes it possible for students to log-in and log-out

their daily attendance record and not make it possible for unauthorized

personnel to modify or alter the recorded items in the database.


e. Design a network system (LAN) for the project that connects the installed

monitoring system in the laboratory into one central server and a MySQL

Workbench Database which is conveniently accessible by the Local Network.

f. Design the right kind of hardware that could house the entire system and could

make them visible and accessible to students alike as they come in and out of

the laboratory.

Statement of the Problem

This study aims to solve the following challenges and issues regarding
laboratory attendance monitoring within the Computer Engineering Laboratory (C18)
of the University of Mindanao Digos College:

 Inaccurate verification of students entering and using the laboratory.


 Not all of the students are able to log in the attendance sheet due to s
 Improper identification of students due to manual logging in and out.
 Inefficient manual attendance which has a high probability of getting lost or
being misplaced.

Scope and Limitation

The study will focus on the development and assessment of performance,

whether the study is reliable, and on monitoring the student’s attendance . The

study will also focus on showing if the system is able to produce the same result to the

data collected of time. The system will be developed using Java, and will be utilized

through Java platform for the database system. The confinements of this endeavor

are identified with manual info while the Adviser will physically check the season of

every understudy's biometric recognizable proof in the database additionally the

framework can't print the information sheet on the framework and due to numerous
research centers recorded in our objective organization We limit the classes to

guarantee exactness which is one research facility for one framework. The framework

that can provide generation and calculation of absences for the implementation of the

institution’s policies and standards. The system that can be gotten to through local

area network. The framework is WAN/LAN based and must be gotten to if the client

inside the region of the system in the association. In making a computerized

framework, there are delimitations that the researcher might want to underline, for

example: The created framework can't be gotten to on the web. The server can't be

gotten through public IP address. The system must be utilized and changed by the

laboratory custodian to enroll, to recover and has the specialist to get to the database.

The registration of the students' fingerprint will be done on the principal day of

classes. The framework will just acknowledge login in and log out on the given span

of participation time, either the understudies missed the time interval or the educators

expand their class time. Students will be limited as of 15-25 in total to guarantee

exactness of the framework covering at least 1-2 hours of class hour. To this point to

see the testing as accurate as it be. The testing day’s will be 3-4 weeks of testing until

the results are in our satisfaction point. A certain test will be conduct during

laboratory hours and class/subjects are added, which tested on real time for further

data collecting.

Significance of the study

The system’s purpose is for the benefit of the University of Mindanao Digos

College specifically the CpE laboratory custodian and student teacher who used the

laboratory as it will help improve the student’s punctuality, utilize time efficiency and
generate a precise, no bias attendance data. To monitor the attendance progress of the

student’s, help the educator supervise number of present students in such class time

and reduce the work load of educators.

The attendance system aims to provide efficient data for standardize

compilation and helps the educator to ensure data collection for year-end report.

Target Beneficiaries

The following are the people who will benefit from the proposed system:

To The Administration. The proposed system helps the school in terms of

automating the current system, reducing human errors, obtaining secured database and

file maintenance, ranking down detail accurately, reducing paper works and labor

cost, and could easily trace the student’s records for a more efficient process.

To The Teachers/Custodian. This system would help Teachers in monitoring the

Daily Time Records of their students. Also, it gives an ease to the Laboratory

custodian to easily identify students’ attendance. Using the proposed Attendance

Monitoring System, they could easily view, access and retrieve data.

To The Students. This system will help those students who will used the

Laboratory to be more time conscious, actively be punctual and improve their time

management. It also promotes against biases/favoritism and reduce their absences in

avoiding being dropped.

To The proponents. This study would help the proponents and prepare them in

the field of Computer Engineering, the research study enhances and improves the
researcher's current programming ability by encountering and using new languages.

Enhanced their skills in innovation new prototype for the project.

The Future researcher. This research study would help future researchers to be

aware and knowledgeable of the processes involved in the attendance monitoring

system using fingerprint scanner. This research study would serve as a reference for

future researchers for more advanced enhancement and modifications.

Definition of Terms

 Attendance Systems

Attendance in class is a must for students since it is one of the bases of


improvements and enhancement of one’s academic performance in school.
Students are expected to attend 60 percent of the class before they are allowed
to sit for the course examination. The manual method of taking attendance in
schools comes with writing the names down and signing. However, in recent
years, innovated technologies for automated attendance systems became widely
known.

 Biometric Technology (Fingerprint Scanning)

Biometric technologies generally refer to the use of technology to

identify a person based on some aspect of their biology. Fingerprint

recognition is one of the first and original biometric technologies that have been

grouped loosely under digital forensics. With the ever-growing number of video

surveillance cameras mushrooming in large cities, the use of the data captured

by these cameras has been at the center of a number of privacy and human rights

storms. Following the 9/11 terrorist attack, the use of facial recognition,
especially in crowded places, as a means of detecting possible threats has been

debated widely. The way the technology works is straightforward. 

 A Wide Area Network (WAN)

A computer network covering multiple distance areas, which may


spread across the entire world. WANs often connect multiple smaller networks,
such as local area networks (LANs) or metro area networks (MANs). The
world's most popular WAN is the Internet. Some segments of the Internet are
also WANs in themselves. The key difference between WAN and LAN
technologies is scalability. C WAN must be able to grow as needed to cover
multiple cities, even countries and continents. A set of switches and routers are
interconnected to form a Wide Area Network. The switches can be connected
in different topologies such as full mesh and half mesh. A wide area network
may be privately owned or rented from a service provider, but the term usually
connotes the inclusion of public (shared user) networks. Both packet switching
and circuit switching technologies are used in the WAN. Packet switching
allows users to share common carrier resources so that the carrier can make
more efficient use of its infrastructure. In a packet switching setup, networks
have connections into the carrier's network, and many customers share the
carrier's network. The carrier can then create virtual circuits between
customers' sites by which packets of data are delivered from one to the other
through the network. Circuit Switching allows data connections to be
established when needed and then terminated when communication is
complete. This works like a normal telephone line works for voice
communication. Integrated Services Digital Network (ISDN) is a good example
of circuit switching. When a router has data for a remote site, the switched
circuit is initiated with the circuit number of the remote network.
 Embedded Systems
An embedded system is an applied computer system, as distinguished
from other types of computer systems such as personal computers (PCSs) or
supercomputers. It is also defined as a system which has computer hardware
with software embedded in it.

 Net Beans IDE

NetBeans started as a student project (originally called Xelfi) in

Czechoslovakia, now the Czech Republic, in 1996. The goal was to write a

Delphi-like Java IDE (Integrated Development Environment) in Java. Xelfi

was the first Java IDE written in Java, with its first pre-releases in 1997. Xelfi

was a fun project to work on, especially since the Java IDE space was

uncharted territory at that time. Today, the NetBeans team couldn't be prouder

of how far the NetBeans project and community has come. It is also worth

noting that many of the original architects are still involved in the project, and

can be found participating on the NetBeans mailing lists. There are more

people using NetBeans software than ever before in 2010.

 ESP 8266

The ESP8266 WiFi Module is a self-contained SOC with integrated

TCP/IP protocol stack that can give any microcontroller access to your WiFi

network. The ESP8266 is capable of either hosting an application or offloading

all Wi-Fi networking functions from another application processor. Each

ESP8266 module comes pre-programmed with an AT command set firmware,

meaning, you can simply hook this up to your Arduino device and get about as

much WiFi-ability as a WiFi Shield offers (and that's just out of the box)! The
ESP8266 module is an extremely cost-effective board with a huge, and ever

growing, community.

Hardware Design

Log In Desk 3D – Model SE View


Log In Desk 3D – Model NE View

Log In Desk 3D – Model Back View


Log In Desk 3D – Model Top View

PERSONAL INFORMATION

Name: Jannene Daragosa Gore

Address: Purok 3, Sitio Inyam Brgy. Asbang Matanao Davao del Sur

Contact Number: 09107641498

Email: jannene91@gmail.com

EDUCATIONAL ATTAINMENT
Bachelor of Science in Computer Engineering
Tertiary Education:
University of Mindanao, Digos College
Secondary Education: Bangkal National High School

Elementary Education: Bangkal Elementary School

MOTTO

Every failure is a step closer to success.


PERSONAL INFORMATION

Name: Dion Carl Refugio Nacin

Address: Barangay Nagpan, Malungon Sarangani Province

Contact Number: 09468174306

Email: vanquishersky@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Malandag National High School

Elementary Education: Malandag Central Elementary School

MOTTO

Time is gold. If you want my time give me gold.


PERSONAL INFORMATION

Name: Emmanuel Enot Vergara Jr.

Address: 0190 Lopez Jaena Street Digos City Davao del Sur

Contact Number: 09074183594

Email: emmanuelvergarajr@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Digos City National High School

Elementary Education: Digos Central Digos City

MOTTO

Keep pursuing your dreams and never give up in life.


PERSONAL INFORMATION

Name: Ruin C. Garcia

Address: Punta Biao Cogon Digos City

Contact Number: 09107749925

Email: ruingarcia12@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Holy Cross Academy of Digos City

Elementary Education: Pedro Garcia Elementary School

MOTTO

All is well.
PERSONAL INFORMATION

Name: Japheth Mier Escalona

Address: Crumb Bataan Digos City Davao del Sur

Contact Number: 09468486349

Email: japhethmier2015@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Digos City National High School

Elementary Education: Don Mariano Elementary School

MOTTO

Nothing is impossible with God.

PERSONAL INFORMATION
Name: Clifford Kent Albores Semaña

Address: Rizal Bansalan Davao del Sur

Contact Number: 09102097490

Email: fordcliff012418@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Nazareth High School of Bansalan Inc.

Elementary Education: Rizal Elementary School

MOTTO

Forget the mistake. Remember the lesson.

PERSONAL INFORMATION

Name: Rock Javelona Fondevilla III


Address: Fortune Ville Subdivision Quezon Avenue Digos City

Contact Number: 09101899051

Email: thirdyfondevilla@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Sta. Ana National High School Davao City

Elementary Education: San Jose Seventh Day Adventist Digos City

MOTTO

Life is short. Always choice for happiness.

PERSONAL INFORMATION

Name: Anthony Jay Pelayo

Address: Lapu -lapu Bataan Digos City


Contact Number: 09484625783

Email: anthonyjaypelayo@umdigoscollege.edu.ph

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Digos City National High School

Elementary Education: Ramon Magsaysay Central Elementary School

MOTTO

Cheating is a choice.

PERSONAL INFORMATION

Name: Zeth Leandro Baron Madrid

Address: New Ilocos Magsaysay Davao del Sur

Contact Number: 09384835038


Email: zealrondeath@gmail.com

EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Barayong National High School

Elementary Education: New Ilocos Elementary School

MOTTO

Life is just an RPG game with shitty developers.

PERSONAL INFORMATION

Name: Japheth Louie Maranan Gofredo

Address: Purok Durian Lapu lapu Extension Digos City

Contact Number: 09487674385

Email: japhethlouie@gmail.com
EDUCATIONAL ATTAINMENT

Tertiary Education: Bachelor of Science in Computer Engineering


University of Mindanao, Digos College
Secondary Education: Bethesda Baptist Christian Academy

Elementary Education: Bethesda Baptist Christian Academy

MOTTO

The journey of a thousand miles begins with a single step.

PERSONAL INFORMATION

Name: Ian John Eugenio Samson

Address: Sambas Subdivision Digos City

Contact Number: 09501661782

Email: jaysamson257@yahoo.com

EDUCATIONAL ATTAINMENT
Tertiary Education: Bachelor of Science in Computer Engineering
University of Mindanao, Digos College
Secondary Education: Digos City National High School

Elementary Education: Digos City Central Elementary School

MOTTO

Once is enough, twice is too much.

Potrebbero piacerti anche