edited chapter 1 to 3

Upload: ayel-xander-loresco

Post on 04-Jun-2018

232 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Edited Chapter 1 to 3

    1/35

  • 8/13/2019 Edited Chapter 1 to 3

    2/35

    Chapter 1

    THE PROBLEM AND ITS BACKGROUND

    Introduction

    RFID stands for Radio-Frequency Identification. The acronym

    refers to small electronic devices that consist of a small chip

    and an antenna. The chip typically is capable of carrying 2,000

    bytes of data or less. The RFID device serves the same purpose

    as a bar code or a magnetic strip on the back of a credit card

    or ATM card; it provides a unique identifier for that object.

    And, just as a bar code or magnetic strip must be scanned to get

    the information, the RFID device must be scanned to retrieve the

    identifying information.

    RFID technology has been available for more than fifty

    years. It has only been recently that the ability to manufacture

    the RFID devices has fallen to the point where they can be used

    as a "throwaway" inventory or control device. Alien Technologies

    recently sold 500 million RFID tags to Gillette at a cost of

    about ten cents per tag.

    One reason that it has taken so long for RFID to come into

    common use is the lack of standards in the industry. Most

    companies invested in RFID technology only use the tags to track

    items within their control; many of the benefits of RFID come

  • 8/13/2019 Edited Chapter 1 to 3

    3/35

    when items are tracked from company to company or from country

    to country.

  • 8/13/2019 Edited Chapter 1 to 3

    4/35

    The Theoretical Model

    People gather information by personally going to the

    location of it, or using multiple, which is inconvenient and

    time consuming.

    Fig. 1.0: Theoretical Framework of the Study

    Figure 1.0 describes the difference in a visual and factual

    way. The existing system is represented by simply the actions we

    take today, to obtain information.

    The existing method requires the authority to verify

    physically. This also requires actions taken by the entity.

    After this, the authority evaluates the permissions of the

    entity and grants or denies access.

    Traditional way of information gathering

    Authority

    physically identify

    entity

    Authority denies or

    grants access

    Authority verifies

    Entitys location

    Entity giving

    information to

    Authority

    Authority denies or

    grants access

    Authority gets

    authorization and

    location from the

    proposed system

    The system way of generating Information

  • 8/13/2019 Edited Chapter 1 to 3

    5/35

    Taking a school for example, security personnel are

    required to visibility see proof of identification. This proof

    is given to the personnel by the student. Once obtained, this

    information is being evaluated on positive or negative results.

    With the proposed system, the authority obtains the

    information directly. There is no evaluation or action on the

    entitys part required. In schools, the security personnel gets

    information from a monitor and acts accordingly.

    The Conceptual Model

    Fig. 2.0: Conceptual depiction of the proposed system

    Figure 2.0 shows the concept of the proposed system on a

    high level explosion. The RFID tags pass information to the RF

    antenna, which is processed by the proposed system. The result

    Authority Output RIM Software RF Antenna

    Entity 3 with RFID

    Entity 2 with RFID

    Entity 1 with RFID

  • 8/13/2019 Edited Chapter 1 to 3

    6/35

    of the processing will be displayed on an output device. Through

    it the user is given a summary of processed data.

    The proponents goal with this systems implementation is to

    improve the speed in gathering data. The system uses newest

    technology to achieve this. The existing method of obtaining

    information is time consuming and tiring, factors which the

    proposed system will eliminate.

    The effectiveness of implementing RFID system in olpcc

    depends upon the school what progress, change and benefit it can

    bring to the education of the school, by knowing the perception

    of students and faculty of olpcc about it.

    Paradigm

    INPUT PROCESS OUTPUT

    Students

    Profile based

    on:

    a. Sex

    b. Age

    c. Civilstatus

    d. Course

    e. Field ofspecialization/course

    Analysis of

    data/information

    in the

    questionnaires

    and interview

    techniques

    Summary of the

    response of

    students on the

    proposed RFID

    monitoring system.

    Feedback

  • 8/13/2019 Edited Chapter 1 to 3

    7/35

    The researchers were guided by the paradigm in this study.

    On the input box are the students/respondents profiles. On the

    process box are the analysis and tabulation of data/information

    in the questionnaires and interview techniques and finally on

    the output box is the summary of the response of students on the

    proposed RFID monitoring system.

    Statement of the Problem

    This study aimed to make an assessment of the

    implementation of the Radio Frequency Identification in Our Lady

    of the Pillar College Cauayan.

    More specifically, it attempted to answer the following

    problems:

    1. What was the profile of the respondents with respect to

    the following variables:

    a. Sex

    b. Age

    c. civil status

    d. Course

    e. field of specialization/course

    2. What problems were met in the implementation of the

    RFID?

  • 8/13/2019 Edited Chapter 1 to 3

    8/35

    3. What suggestions were given by the respondents to

    improve the implementation of the RFID system?

    Assumption

    The researchers aim to know if RFID is the best solution to

    what we call absentness in our society especially in schools. To

    meet the aim of the researchers, they assume that the RFID

    system will help every parent that worries about their children

    if they are attending classes during school hours. With the RFID

    system, parents will be confident that their children will learn

    more because they will know if their children go to school or

    not.

    Scope and Delimitation

    Scope. The proposed system will allow administrators to

    monitor entities within the premises.

    Monitoring and locating entities Automated Data gathering and authorization verification.The overall design of the system, RF antenna and lag

    connection as well as the program structure and compatibility

    need to be designed very well.

    Delimitation. The system is just designed for monitoring

    purposes. It does not give detailed information about the entity

    in range or pinpoint its 100 percent accurate location. It

  • 8/13/2019 Edited Chapter 1 to 3

    9/35

    serves merely as an indicator of the entitys approximate

    position and identification.

    Significance of the Study

    The significance of the study deals with the careful

    formulation and presentation of the possible application of

    knowledge that denotes why developing the proposed device is

    important and worthwhile. This piece gives further explanations

    of the possible latent and manifest applications of the study.

    The proponent believes that the proposed system will

    enhance security and make the processing of information easier.

    Social Significance. The study the proponents conduct is

    for great value. Since its main purpose is monitoring. It

    automatically provides better overall security. It raises the

    awareness of monitoring methods like RFID.

    Educational Significance. The study showcases the use of

    the relatively new RFID technology, which might inspire other

    researches to explore newer technologies as well.

    Technological Significance. Since the system base is the

    RFID technology, which is not yet common in citizens, it

    introduces a new and more efficient way to use this technology

    for everyday tasks.

  • 8/13/2019 Edited Chapter 1 to 3

    10/35

    Economic Significance. The production price is relatively

    low which as a result can generate.

    Definition of Terms

    For a better understanding of the study, the following

    terms were defined operationally.

    RFID It is the use of a wireless non-contact system that

    uses radio-frequency electromagnetic fields to transfer data

    from a tag attached to an object, for the purposes of automatic

    identification and tracking.

    Tags -It contains identifying information or may just be a

    key into a database. An RFID system may replace or supplement

    bar codes and may offer another method of inventory management

    and self-service checkout by patrons. It can also act as a

    security device, taking the place of the more traditional

    electromagnetic security strip.

    System It is a number of things adjusted as a connected

    whole.

    Radio waves - It is an electromagnetic radiation at radio

    frequencies.

    Antenna -It is for receiving and transmitting signal.

    http://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Securityhttp://en.wikipedia.org/wiki/Electronic_article_surveillancehttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Electronic_article_surveillancehttp://en.wikipedia.org/wiki/Securityhttp://en.wikipedia.org/wiki/Electromagnetic_field
  • 8/13/2019 Edited Chapter 1 to 3

    11/35

    Integrated circuits - These are complex circuits etched

    onto tiny chips of semiconductor (silicon).

    Electromagnetic field - It is a coil that modulates an

    external magnetic field to transfer a coded identification

    number when queried by a reader device. This small type is

    incorporated in consumer products, and even implanted in pets,

    for identification.

    http://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electromagnetic_field
  • 8/13/2019 Edited Chapter 1 to 3

    12/35

    Chapter 2

    REVIEW OF RELATED LITERATURE AND STUDIES

    The following literature and studies were incorporated due

    to their relevance to the present study and quality of

    information that these content.

    Related Literature

    Related literature is the summary of all the former

    writings showing what is already known and still unknown about

    the proposed topic. Some related literature made a huge impact

    with respect to the study especially in determining the

    requirements in developing the device and its accompanying

    software. During the length of the search for related literature

    and studies the proponents found out that the topic is the first

    of its kind and ideas close to the project has never been put in

    mound. The researchers gathered the following related

    literatures to add on their familiarity the study.

    RFID tags have been around since the late 70s originally

    developed for Russian spies. How exactly RFID chips work can be

    found on HowStuffWorks.com

    Long checkout lines at the grocery store are one of the

    biggest complaints about the shopping experience. Soon, these

    lines could disappear when the ubiquitous Universal Product Code

  • 8/13/2019 Edited Chapter 1 to 3

    13/35

    (UPC) bar code is replaced by smart labels, also called radio

    frequency identification (RFID) tags. RFID tags are intelligent

    bar codes that can talk to a networked system to track every

    product that you put in your shopping cart.

    Imagine going to the grocery store, filling up your cart

    and walking right out the door. No longer will you have to wait

    as someone rings up each item in your cart one at a time.

    Instead, these RFID tags will communicate with an electronic

    reader that will detect every item in the cart and ring each up

    almost instantly. The reader will be connected to a large

    network that will send information on your products to the

    reader and product manufacturers. You bank will then be notified

    and the amount of the bill will be deducted from your accounts.

    No line, no waiting.

    RFID tags, a technology once limited to tracking cattle,

    are tracking consumer products worldwide. Many manufacturers use

    the tags to track the location they make of each product they

    make from the time its made until its pulled off the shelf and

    tossed in shopping cart.

    Outside the realm of retail merchandise, RFID tags are

    trucking vehicles, airline passengers. Alzheimers patients and

    pets. Soon, they may even track your preferences for chunky or

    creamy peanut butter. Some critics say RFID technology is

  • 8/13/2019 Edited Chapter 1 to 3

    14/35

    becoming too much a part of our lives that is, if were even

    aware of all the [arts of our lives that it affects.

    In this article, youll learn about the types of RFID tags

    and how these tags can be tracked through the entire supply

    chain. Well also look at the non-commercial uses of RFID tags

    and how the Department of State and Homeland Security are using

    them. Lastly, well examine what some critics consider an

    Orwellian application of RFID tags in animals, humans and our

    society.

    The use of RFID tags is highly polarizing and

    controversial, the strongest argument being the total control

    over every individuals personal information, similar as in

    George Orwells 1984.

    George Orwells 1984, tells the story of a society in

    which all citizens are patrolled by the Thought police, who

    ensure that no one has any independent or rebellious thoughts

    that arent sanctioned by the Party. In this society, everyone

    answers to Big Brother the ultimate authority on education,

    government and recreation. When critics of RFID call the

    technology Orwellian, they mean that the technology is too

    invasive and that businesses and government are made too

    knowledgeable of our private actions, just like Big Brother

    watching us.

  • 8/13/2019 Edited Chapter 1 to 3

    15/35

    Conservative Christian critics even claim that RFID and its

    possible use is a sign for the end of times. According to

    Revelation 13: 16-17 the Antichrist will place the mark of the

    beast on the right hand or on the forehead of humans which they

    need for commerce.

    And causeth all, both small and great, rich and poor, free

    and bond, to receive a mark in their right hand, or in their

    foreheads

    And that no man might buy or sell, save he that had the

    mark, or the name of the beast, or the number of his name.

    - Revelation 13: 16-17

    The use RFID chips however is undeniably various. A list of

    possible application can be found in an article of the Seattle

    Times Website, although with a negative connection.

    Microchips Everywhere: a Future Vision

    By TODD LEWAN

    AP National Water

    Heres a vision of the not-so-distant future:

    Microchips with antennas will be embedded in virtually

    everything you buy, wear, drive and read, allowing retailers and

  • 8/13/2019 Edited Chapter 1 to 3

    16/35

  • 8/13/2019 Edited Chapter 1 to 3

    17/35

    contactless payment cards (such as American Express Blue and

    ExxonMobils Speed test.)

  • 8/13/2019 Edited Chapter 1 to 3

    18/35

    Related Studies

    Since RFID arguably the hottest and the most controversial

    piece of technology currently around, a lot of studies have been

    conducted. The German Federal Institute for Information Security

    published a study of RFID, its capabilities and vulnerable,

    entitled Security Aspects and Prospective Applications of RFID

    System. Here a passage of the study regarding types of attacks

    on RFID tags.

    7. Threat situation and invention of common security measures

    7.1 Overview

    Once of the goals of the present study is to investigate

    the future threat situation resulting from the application of

    RFID systems (within a time frame of three to five years), as

    well as to assess the effectiveness security measures. The

    present chapter describes the results of this phase of the work.

    Sections 7.2 to 7.7 provide an overview of possible attacks and

    countermeasure.

    Section 7.8 contains an evaluation of the threat situation,

    especially with regard to the practically and coat of the

    attacks and countermeasures. A list of the experts who were

    consulted regarding these matters can be found at the beginning

    of the study in the Section Authors and Experts Section 7.9

  • 8/13/2019 Edited Chapter 1 to 3

    19/35

    contains a brief description of the current availability of

    security measures.

    One application was explored in an eBook containing

    collections of sample case studies by Abhisam software, 2007.

    The following passage is taken the section titled Anti-Theft

    System

    The RFID Solution

    Each item to be protected is tagged with an RFID anti-theft

    tag. The tag can be re-used in many cases. The tag is typically

    attached by a strong string or a plastic band or other means

    (similar to a price tag, sometimes it is the price tag), to the

    item (say for example an umbrella). Now once a shoplifter takes

    this umbrella and walks to the exit, large RFID door antennas

    placed near the exit detect the presence of the tag and sound an

    alarm. In case of a genuine shopper, if he takes the umbrella to

    the checkout counter, the clerk, after receiving payment for the

    item, cuts the plastic band and removes the tag. The umbrella

    can now be carried by the shopper outside passing by the door

    antennas, without triggering any alarm. The store staff will

    then typically attach the same tag to a new umbrella that would

    be now kept on the store shelf. Alternatively, in case of

    disposable tag, the checkout clerk will hold the item nears a

  • 8/13/2019 Edited Chapter 1 to 3

    20/35

    tag killer machine, which kills (destroy) the tag by

    subjecting it to strong electromagnetic radiation. The tag, then

    though physically present on the item, will not trigger the

    alarm while passing through the door antenna field.

    As one can see, there are various fields of application for

    RFID tags already available. The components think it is time to

    make the next step and incorporating it in schools.

  • 8/13/2019 Edited Chapter 1 to 3

    21/35

    Chapter 3

    METHODS OF RESEARCH AND DESIGN

    Research methods are very vital in gathering data about the

    proposed system device. The methods of research that the

    proponents decided to use and apply are of great help in

    determining how and where they can find the data and information

    needed in order to produce a possible solution to problems of

    the existing systems.

    This chapter contains information regarding the methods of

    research used, the data gathering instruments used, the

    analytical tools, as well as methods used in developing the

    devices and its software. This chapter also contains the methods

    used for product evaluation, technical, operational and economic

    feasibility of the proposed system.

    Methods of Research Used

    Statistics are requires and are of significance in the

    development of the proposed system. The proponents made use of

    different approaches or methods of research for this study in

    order to process all the accumulated data, produce reliable

    information and build the proposed system.

    Descriptive Method. This method was used by the proponents

    to further understand the existing system. It is a fact-finding

  • 8/13/2019 Edited Chapter 1 to 3

    22/35

    with proper interpretation of the data gathered which were used

    to analyse how the existing system. Through this method the

    researchers were able to examine and construe the information

    that they have gathered, hoping that it will lead them to the

    achievement of this study.

    Internet Research Method Data gathering for this study

    started over Internet. Since the data and information available

    over the Internet is unlimited in relation to the study to find

    more adequate data for the proposed device. The history and

    topics regarding existing devices. Door lock systems were mostly

    found in the web.

    Creative Research Method. Creativity means being able to

    use ones imagination to develop new and original ideas or

    things, especially in an artistic context. This method was

    employed by the researches to conceptualize the layout and

    design of the proposed system. The proponents realized that it

    is not always possible to find all needed materials in any study

    or research, but by means of creativity, the proponents hope

    that they will be able to come up with a system that will meet

    the needs of their target user. With this, this determines the

    proponents unique imagination that would help them in making

    the impossible possible.

  • 8/13/2019 Edited Chapter 1 to 3

    23/35

    Prognostic Research Method. Prognosis is an act of

    pretending hoe a given situation will develop or turn out in the

    future. Prognostic Research method refers to any scientific

    investigation in which the main and stated purpose is to predict

    the future operation of factors. This method will be used in the

    form of scientific observation prognosis on how the system will

    perform in the future in terms of effectiveness and reliability.

    Evaluation forms and Market Analysis were also considered in

    order to determine if the proposed system is technically,

    operationally and economically feasible.

    Historical Research Method. This method interprets past

    trends of attitude, events and facts. From one point of view,

    history deals with unique phenomena, collected and reported

    without ordered reflective thoughts. The proponents made use of

    this method to fully understand the development history of

    peripheral hardware devices in existence today. And these were

    used as strong information for the development of the proposed

    devices.

    Data Gathering Instruments

    The data gathering instruments to be used by the

    researchers are questionnaires, observation, and evaluation

    forms. These are tools which are sufficient in gathering

    information for the completion of the study.

  • 8/13/2019 Edited Chapter 1 to 3

    24/35

    Observation. This method is the taking notice of the

    current systems/devices, describing and identifying the problems

    encountered. It serves as an additional judgment in order to

    improve the existing system/devices. It is also used to agree or

    contradict the data gathered from interviews, questionnaires and

    other research methods. With this, the proponents in general

    carefully and critically used observation with respect to the

    parts and parcels concerning the assistive and adaptive proposed

    device with its accompanying software.

    Questionnaire. A questionnaire, basically, is a set of

    carefully organized and logically ordered questions. This is a

    tool to investigate on the interest and knowledge of the people

    on the existing and proposed system. This helped the proponents

    anticipate the probability of effectiveness of the proposed

    system. In the case of the study, the questionnaire prepared by

    the proponents would help the proponents themselves on how to

    develop and further enhance the proposed device with respect to

    the data results of the questionnaires respondents.

    Evaluation Form. This tool aided the researchers in

    determining the distinction between the existing and proposed

    system. It basically determines the operational feasibility of

    the proposed device and its software. The criteria used as bases

    in the evaluation form are Efficiency, Reliability,

  • 8/13/2019 Edited Chapter 1 to 3

    25/35

    Accessibility, User-friendliness, Ergonomic, Compatibility,

    Assistive and Adaptability.

    Statistical tools used

    Based on the need of the study, the researchers employed

    simple applications of statistics. These are frequency count,

    percentage count, and mean and t-test analysis to provide a

    clearer view and deeper interpretation and meaning of the

    analyzed data.

    Frequency count. It is used in determining the number or cases

    belonging to a certain classification like male and female.

    Percentage. It is used to determine the relative magnitude of

    certain cases.

    * 100

    Where:

    P = percentage

    f = frequency

    n = number of respondents

    100 = constant multiplier

  • 8/13/2019 Edited Chapter 1 to 3

    26/35

    Slovins Formula. This was used to determine the number of

    sample or respondents that will represents the consumers of

    Olpcc in Cauayan City.

    Where :

    S= Slovin

    n = total number of population

    1= constant

    Analytical Tools

    These tools serve as illustration of the systems structure

    and essentially a diagram of how the system flows. Since the

    proposed study is a device, the proponents used the following

    Analytical tools: the Context Flow Diagram (CFD), visual table

    of Contents (VTOC), Input Process output (IPO) and Program

    Flowchart.

    Context Flow Diagram (CFD). This tool is used to

    graphically illustrate the highest level in a data flow diagram

    and contains one process, representing the entire system. The

  • 8/13/2019 Edited Chapter 1 to 3

    27/35

    modelling tool will provide the proponents to have a concept of

    systems environment. Data Flow Diagram is also regarded as

    bubble chart and bubble diagram.Visual Table of Contents (VToC). It presents a tree-

    structured diagram which illustrates the program flow. It is a

    stylized structure chart, moving from general to specific,

    graphically, describing the system. Furthermore, it illustrates

    the hierarchical process in the level of detail, increase from

    the top to bottom and as said, from general to specific.

    Input Process Output (IPO. It is a chart which gives

    processing sequence and detailed information about the input,

    process activities and output for any given unit in the Visual

    Table of Contents.

    Program Flowchart. It is graphical representation of the

    logic and data flow of the entire program. A block diagram used

    in the designing of the software, it puts into view the

    succession of steps performed on the computer program. It

    provided the proponents a representation of the algorithm in

    amore visual form. It is an overview of the programs major

    processes and other actions inside the program.

  • 8/13/2019 Edited Chapter 1 to 3

    28/35

    Methods Used In Developing the System

    This part of the study is concerned with the actual

    development and procedures on implementing the proposed system.

    The traditional software engineering models do not deal

    with the risks involved in the projects. Many projects have

    failed because the risks involved were not taken into account at

    all. Barry Boehm tried to fix this by incorporating the

    strengths of other models namely the Waterfall model and coming

    up with the spiral model, and changing the management emphasis

    to risk analysis. This model development combines the features

    of the prototyping model and the waterfall model. The spiral

    model is favoured for large and complicated projects.

    Figure 2.0 Barry Boehms Spiral Model

  • 8/13/2019 Edited Chapter 1 to 3

    29/35

    Planning. This phase is where the objectives, alternative,

    and constraints are determined. Requirements are gathered during

    the planning phase. A prototype is produced at the end of the

    risk analysis phase.

    Risk Analysis. In the risk analysis phase, a process is

    undertaken to identify risk and alternate solutions. A prototype

    is produced at the end of the risk analysis phase. . What

    happens here is that alternative solutions and constraints are

    defined, and risks are identified and analyzed. If risk analysis

    indicates uncertainly in the requirements, the prototyping model

    might be used to assist the situation.

    Engineering. Software is a product in the engineering

    phase, along with testing at the end of the phase. Here the

    costumer decides when the next phase of planning and risk

    analysis occurs. If it is determined that the risks are too

    high, the project can be terminated.

    Evaluation. The evaluation phase allows the costumer to

    evaluate the project to date before the project continues to the

    next spiral. In this phase, the customer will assess the

    engineering results and make changes if necessary.

  • 8/13/2019 Edited Chapter 1 to 3

    30/35

    Justification of Method Used

    Out of many methods, the proponents have chosen Barry

    Boehms Spiral model. Since the proponents are going to enhance

    existing peripheral system, the development and creation of the

    proposed system must be carefully taken into account. It is in a

    way complex and complicated for the proposed system is something

    new among the line.

    In view of the fact that the spiral life cycle model is the

    combination of the classic waterfall model and an element called

    risk analysis. This model is very appropriate for the proposed

    system have higher risk than those of simpler projects.

    This is the reason why risk analysis is very essential in

    creation and development of the system, and for the record, only

    the Spiral model offer risk analysis. Moreover, the strengths of

    the spiral model include the direct consideration of risks of

    all levels greatly reduces problems. It is also good for large

    complex projects. This models evaluation allows for any changed

    deemed necessary, or would allow for new technological advances

    to be used. Lastly, it allows the user or customer and the

    developer to determine and to react to risk each evolutionary

    level.

  • 8/13/2019 Edited Chapter 1 to 3

    31/35

    Methods Used for Product Evaluation

    The evaluation of the proposed system is based on its

    performance and feasibility. To prove the effectiveness of the

    proposed system, the proponents tested its technical, economic

    and operational feasibility.

    Technical Feasibility. This evaluation method will determine if

    the software and hardware specifications needed in the

    development and implementation of the proposed system is

    currently available. Moreover, this is also a way to find out if

    the current technical resources can be upgrade or added to in a

    manner that fulfils the request under consideration.

    Operational Feasibility. This method refers to the significant

    difference between the existing system and proposed system. The

    proposed system will be evaluated according to the following

    criteria:

    Efficiency The ability of the system to generate results with

    effectiveness and productivity.

    Reliability The dependability of the system to perform

    required functions.

    User-friendliness The trouble-free interaction of a user with

    the system.

  • 8/13/2019 Edited Chapter 1 to 3

    32/35

    Ergonomic The ability of the device in which it maximizes

    productivity by minimizing operator fatigue and discomfort.

    Compatibility The condition in which it has an efficient

    integration and operation with the user and the system.

    The criteria ranges from 1 to 5, where 5 excellent, 4

    very good, 3 good, 2 fair, and 1 poor.

    Evaluation Formula

    t-Computed = WMP WME

    Let:

    t = test value

    N = total number of correspondents

    WMP = weighted mean of the proposed system

    WME = weighted mean of the existing system.

    WMP = summation of the WMP

    WME = summation of the WME

    Mean(M) = f(x1 + x2 + + xn)

    n

  • 8/13/2019 Edited Chapter 1 to 3

    33/35

    where: f=frequency

    x(1,2n) = any numerical rating given by the

    researchers

    n = total number of respondents

    Weighted mean = f(x1 + x2+ + xn)

    n

    where: f(x1 + x2+ + xn)/n = represents the sum of all

    means of each criteria

    n = total number of criteria

    Economic Feasibility. This is used in order to determine if

    the proposed system is more profitable or cost efficient than

    the existing system. Through the software development cost, the

    researchers can easily determine which is more expensive, the

    existing or the proposed system. All of these expenses are shown

    in the market analysis. The following formula will be used for

    the market analysis.

    Formula for the Computation)

    A.Computation for the Salvage Value of the HardwareSalvage Value = ((Hardware Acquisition Cost/Life

    expectancy)* Devt period)/ 12

    B.Computation for The Annual Depreciation Cost of HardwareAnnual Depreciation Cost = (Hardware Acquisition Cost

    Salvage Value)/ Life Expectancy

  • 8/13/2019 Edited Chapter 1 to 3

    34/35

    C.Computation for Monthly Depreciation Cost of HardwareMonthly Depreciation Cost = Annual Depreciation Cost/ 12

    D.Computation for Hardware DevelopmentHardware Development Cost= Monthly Depreciation Cost*Devt

    period)

    E.Computation for Salvage value of SoftwareSalvage Value = (Software Cost/Life Expectancy)*Devt

    Period/12

    F.Computation for the Annual Depreciation Cost of SoftwareAnnual Depreciation Cost = Software Acquisition Cost -

    Software Value / Life expectancy

    G.Computation for the Monthly Depreciation Cost of SoftwareMonthly Depreciation Cost = Annual Depreciation cost / 12

    H.Computation for the Software Development CostSoftware Development Cost = Monthly Depreciation Cost *

    Devt period

    I.Computation for the Labor CostLabor cost = Development fee * Devt Period

    J.Computation for the Kwh Use of ComputerKwh Used of Computer = No.of watts * No. of hours a month

    *qty / 1000w

    K.Computation for software CostSoftware Cost = Total Devt Cost/ No. of copies

    L.Computation for Selling Price

  • 8/13/2019 Edited Chapter 1 to 3

    35/35

    Selling Price = (software cost * mark-up) + software cost +

    CD + packaging

    M.Computation for the profit for the First YearProfit for the First Year = Total Annual Benefit Total

    devt Cost

    N.Computation for the playback PeriodPlayback Period = (Total Devt Cost / Total annual Benefit)

    * 12

    O.Computation for the Investment ReturnReturn of Investment = ( Total Annual Benefit / Total Devt

    Cost) * 100%