Sei sulla pagina 1di 7

CHAPTER I PROJECT AND ITS BACKGROUND In this chapter, the topics discussed were about the introduction of the

project, its background, its objectives, significance, and its scope and limitations. Introduction The global challenge of technological innovations had been observed greatly and more competitively with the introduction of automated system designs. A phrase that is often used nowadays is the so called technology lifestyle. A new generation fad in accomplishing manually operated task is highly taking place solutions are upgraded momentously. More advanced technological applications were created and highly levelled devices were invented. Despite being a third world country, here in Asia, Philippines were not so much left behind in terms of technology on all aspects of life. In fact, Filipinos are so innovative and tech conscious with respect to all aspects of business and education. In the transition stage they find ways and means to adjust and cope with the complex system of modern technology. Today, more people as the world embrace technology, internet had become a household term even here in the Philippines. Much time and effort had been devoted in making inventions, with one great purpose of providing convenience to people.

CHAPTER II REVIEW OF RELATED LITERATURE In the aspect of making a program that would facilitate each individuals valuable secured, the researchers had conducted a research for other studies that led them to make this project. This chapter includes conceptual literature, related studies, related readings, synthesis, conceptual framework and definition of terms.

Conceptual Literature This section discusses the topics and concepts that serve as the foundation of the study. The concepts and information are gathered from books and encyclopaedias. An electronic lock (more precisely an electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. More often electric locks are connected to an access control system. The advantages of an electric lock connected to an access control system include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors and transaction logging, where activity is recorded. (http://en.wikipedia.org/wiki/Electronic_lock,
2010)

An electric strike which is also known as electric latch release replace a standard strike mounted on the door frame and receives the latch and latch bolt. Electric strikes can be simple to install when they are designed for drop-in replacement of a standard

CHAPTER III DEVELOPMENT, METHODS AND PROCEDURES The completion of this study is due to the processes involved in its development.

1.

Planning and Designing Stage After gathering and collecting the needed information, planning and designing stage

is set. At this stage the gathered information were evaluated and analyzed. Visualizing ideas and making flow chart are main focus. The researchers tried to find an

appropriate programming language after getting familiar with the database environment, and MC agent. Designing flowchart of the project eventually took place. Concepts in physical features were also established. 2. Development Stage

In the development of PC-Based Students and Professors Locker, all relevant materials were gathered and analyzed, followed the important steps such as construction of built in locker. Then the construction process is monitored carefully to ensure that the plans for the lockers were followed. This stage focus on the methods or procedures to consider developing the system of the program, it includes gathering of materials to be used in achieving the desire output. Preparing all the materials that was used as a base of the device. Next, the 29 input/output modules that was used to control the device. The DC Motor which

CHAPTER IV PRESENTATION, ANALYSIS, AND INTERPRETATION OF RESULTS This chapter presents the systematic procedures of the proposed PC-Based Professors and Students Locker for BatState-U Lemery and its different users. 1. Planned and Designed of the Project

a) System Lay-out The researchers collected all the information that will help them in developing their project. They looked for some security devices that will make their project unique to others and make an evaluation about the devices they have research and choose among them the best that could make the security tighter. The researchers have used the following tools and equipments throughout the development of this study. The Information of the user, while he/she is opening his/her locker will appear on the screen of computer. The whole system that will be use will be store in the Desktop Computer. The locker will be use as storage of valuable things of the user. The 29 Input/ Output Module together with the RS232 connector will be use to send signals to the DC Motor to unlock the locker. Aside from that, they will use a Numeric pad for entering a password to lock the locker and Fingerprint Reader for the authentication, if he/she is the authorize user of the locker. The researchers plan to have a built-in PC-Based Locker which were compose of two lockers place downward in the left side with a screen on the right (level to the first

CHAPTER V FINDINGS, CONCLUSION & RECOMMENDATION This chapter presents all findings, conclusion, and recommendation of the researchers after the achievement of the study. Summary It is very important to ensure the security and safety of the students in Batangas State University. Today through the use of computer there are many systems for security information purposes. Despite being considered a third country, here in Asia, Philippines were not so much left behind in terms of technology on all aspects of life. PC-Based Professors and Students Locker for BatState-U Lemery is develop to secure all the important belongings and personal things of the students and professors of the Batangas State University. Security pertains to freedom from danger as it is relevant in many institutions especially in the maintenance and proper care of their belongings. Only the user to whom it is recognize by the system can use and have a sole access on the designated lockers provided with pin codes. It aims to attain convenience and orderliness.

TABLE OF CONTENTS PAGE TITLE PAGE....i APPROVAL SHEETii ACKNOWLEDGEMENT....iii DEDICATION..iv TABLE OF CONTENTSv LIST OF TABLES...vi LIST OF FIGURESvii ABSTRACT....vii CHAPTER I. PROJECT AND ITS BACKGROUND Introduction...1 Background of the Study.2 Objective of the Study...3
Scope, Limitation and Delimitation.4

Significance of the Study..5

II.

REVIEW OF RELATED LITERATURE Conceptual Literature6 Related Readings.10 Related Studies.13

Potrebbero piacerti anche