Student Monitoring System Essay Sample
- Pages: 4
- Word count: 854
- Rewriting Possibility: 99% (excellent)
- Category: student
Get Full Essay
Get access to this section to get all help you need with your essay and educational issues.Try it free!
The computerized Students monitoring system that we developed is specifically for ID and Student’s verification only. The main objective of our system is to check wether the student have an authorized ID or a falsificated one and to verify whether the student is officially enrolled in the school.
The application of RFID Matrix card system as a boarding students monitoring system were proposed to improve management system And to monitor interest group movement. The unique RFID tags enable management to track the students movement in and out of the campus. An individual without RFID card will trigger the alarm and this will inform school management about the availability of using an online monitoring system. This system used main component of passive RFID system , database management system and wireless networking. RFID tag pass through the RFID reader in read range zone ,system recorded data from the RFID tag to the data base. Data sent online to the management for the supervision of the students
At some point , we realized that the registration must be included as well. The main reason why is that there are some records to be considered with regards to the students important records in registration file like the status of a student in their school.
All in all , we can say that this system is more effective and less time consuming for the school to identify wether the student is officialy enrolled and has an authorized school ID.
One of the primary goals of the modern human-computer interaction is to enhance all users by providing access to usable information technology. The developments in information technology however, are occurring at such rate that insufficient research is being conducted in how to provide usable software for the range or interactive technology currently available. RFID systems can be used ju
st about anywhere, from clothing tags to missiles to pet tags to food — anywhere that a unique
identification system is needed. The tag can carry information as simple as a pet owners name and address or the cleaning instruction on a sweater to as complex as instructions on how to assemble a car. Some auto manufacturers use RFID systems to move cars through an assembly line. At each successive stage of production, the RFID tag tells the computers what the next step of automated assembly is. One of the key differences between RFID and bar code technology is RFID eliminates the need for line-of-sight reading that bar coding depends on.
Also, RFID scanning can be done at greater distances than bar code scanning. High frequency RFID systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer transmission ranges of more than 90 feet, although wavelengths in the 2.4 GHz range are absorbed by water (the human body) and therefore has limitations. Computer has been very useful to everyone. Almost all transaction is being computerized in which the end users are being benefited. Therefore, the reason why the proponents come up to an idea is because of the problem in the manual monitoring of the student’s ID. The original design that we need is especially for ID and student’s verification only. The main objective of which is to check whether the student have an authorized ID or a falsificated one and to verify whether the student is officially enrolled in the school.
SYSTEM REQUIREMENTS :
The deployment in each site location might require one or more of the following:
Device mounting / casing
Adding these to each site will impact the project timelines; therefore these requirements need to be determined early.
SYSTEM ARCHITECTURE :
Local Literature :
Buenrostro (2004) stated that in order to survive and prosper in the information era, reference librarians need to possess technology skills. They must possess information technology skills to be able to make use of the different library resources that vary in types and formats. Torrijos (2000) discussed in her article presented at the 21st Gabriel A. Bernardo Memorial Lecture Series, the various aspects of the emerging information society as it influence the qualifications and skills of information professionals brought about by the recent developments in IT. With the developments in information and communications technologies (ICT), education and training of library and information professionals were affected.
Librarians are expected to manage and must provide the information programs and services to be able to support the evolving information society. Versoza (2010), in her speech as a keynote speaker on the changing library environment of technical services, cited the changes in the library environment as brought about by technology. Technological innovations paved the way for a change from the previous physical space where traditional services of the library such as acquisition, storage, preservation, retrieval, access and display were provided to an electronic space, where services may be delivered online.
Sorry, but A and B essays are only available for premium usersChoose a Membership Plan