0% found this document useful (0 votes)
379 views61 pages

Capstone Project

This document provides background information on biometrics and facial recognition technology. It discusses how facial recognition is used in applications like security cameras and attendance tracking systems. The document then presents the background and problem statement for a research project that aims to develop a facial recognition-based attendance system. It outlines the waterfall model that will be used and provides conceptual frameworks showing how the system would work and how it will be evaluated based on criteria like usability, reliability, and efficiency.

Uploaded by

Jayvee Magnaye
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
379 views61 pages

Capstone Project

This document provides background information on biometrics and facial recognition technology. It discusses how facial recognition is used in applications like security cameras and attendance tracking systems. The document then presents the background and problem statement for a research project that aims to develop a facial recognition-based attendance system. It outlines the waterfall model that will be used and provides conceptual frameworks showing how the system would work and how it will be evaluated based on criteria like usability, reliability, and efficiency.

Uploaded by

Jayvee Magnaye
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 61

CHAPTER I

The Problem and its Background

Introduction

In today’s networked world, Biometrics became one of the most

useful features because of its capability to scan and identify the user

based on its body features. Biometrics can be used anywhere

depending on how it is being used and there are also different

biometrics that contain only 1 or more features because biometrics

can be very expensive because of how it’s being created. Biometric

identifiers are the distinctive, measurable characteristics used to

label and describe individuals. Biometric identifiers are often

categorized as physiological versus behavioral characteristics.

Physiological characteristics are related to the shape of the body.

Examples include, but are not limited to fingerprint, palm veins, face

recognition, DNA, palm print, hand geometry, iris recognition, retina

and odor/scent. Behavioral characteristics are related to the pattern

of behavior of a person, including but not limited to typing rhythm,

gait, keystroke, signature, behavioral profiling, and voice. Some

researchers have coined the term behaviometrics to describe the

latter class of biometrics.

1
Facial recognition or face detection is one of those identifiers that

were being mostly used by companies to avoid any unknown visitors

and fake identities. Because of this identifier, most of the companies

are secured when it comes to securing their private information to

being leaked to unknown visitors. An example device that uses this

identifier is the CCTV cameras because it was being used by the

police department and the government to monitor their town from

harmful hazards or committed crimes and also to identify each

person so that the police can catch that person if he is a fugitive or

not.

Making attendance is one of the most used activities by the teachers

because making an attendance on every student in their class is

extremely important to note if they are present in their class or not.

Attendance systems are one of the most used systems used by their

respective schools and universities because it is very convenient

and useful because not only are they being marked or not, but can

also record their time and date the day they are marked. This

system was also being used by many companies so that they can

mark their employees, the employees need to check in and out to

record their time and date.

2
There are schools and universities that are using a biometric based

attendance system but it was only being used by the teachers and

staff that uses iris and fingerprints to mark their attendance while the

students only used a non-biometric attendance system and written

attendance to mark their attendance. This research will focus on

developing an attendance system that uses facial recognition to

mark their attendance.

Background of the Study

The Attendance System via Facial Recognition has been used by

not only on school and universities but also in other companies

because of how convenient it is to have it. Marking attendance via

writing is hard to do due to the amount of students in your class.

Attendance is important to the entirety of the school because it will

know if the students are present or not. Attendance is not only for

students but also for teachers, staff, higher positioned, etc. because

it will determine if they are present and if not they can adjust their

daily tasks. They are other types of attendance system that uses

your body features like your iris, fingerprints, etc. Systems that use

3
biometric technology are not only for attendance but also for

monitoring as well because biometrics are pretty useful to society

because they have the ability to identify a person based on their

body appearance and if it’s not matched, the security or police will

take notice of the difference. Biometrics has been used mostly by

the police and the government so that they can easily monitor their

residents via CCTV to avoid any harmful problems.

Theoretical Framework

A theoretical framework is a collection of interrelated concepts, like

a theory but not necessarily well worked-out. It also guides the

research determining what things will measure and what statistics

will look for.

The proponent had decided to make an attendance system since

some schools haven’t yet used this system. The system will be

beneficial to the entirety of the school’s campus because of how

useful it is. The goal is to introduce the system to teachers,

students and any other workers in the campus as it is easier to mark

4
their attendance by using the system.

The proponent used SDLC (Systems Development Life Cycle) but

with the application using a language-based system.

Figure 1.0

Figure 1.0 shows the Waterfall Model on how to create the

automated attendance system via facial recognition.

Requirement gathering and analysis

5
All possible requirements of the system to be developed are

captured in this phase and documented in a requirement

specification document.

System Design

The requirement specifications from the first phase are

studied in this phase and the system design is prepared. This

system design helps in specifying hardware and system

requirements and helps in defining the overall system architecture.

Implementation

With inputs from the system design, the system is first

developed in small programs called units, which are integrated in

the next phase. Each unit is developed and tested for its

functionality, which is referred to as Unit Testing.

Integration and Testing

All the units developed in the implementation phase are

integrated into a system after testing of each unit. Post integration

the entire system is tested for any faults and failures. During the

6
testing phase, it can edit its system design so that it can fix any

errors that occur during the testing phase.

Deployment of the system

Once the functional and non-functional testing is done; the product

is deployed in the customer environment or released into the

market.

Maintenance

In this phase, the researcher did the maintenance of the

system. The system can account for considerable amounts of

maintenance. This can also lead to a considerable amount of cost

just for maintaining the system. The researcher built a well-designed

system that will cost less to maintain.

Conceptual Framework

7
Conceptual Framework is a type of intermediate theory that

attempts to an aspect of inquiry. It can also act like maps that give

coherence to empirical inquiry.

Figure 2.0

Conceptual Framework of the system for Attendance System via

Facial Recognition

Figure 2.0 shows the process of conceptual framework of an

attendance system via facial recognition. In the input, The user must

be a student, school administrator or a teacher. The data that needs

8
to be are the facial information of the user, his/her name and the

time they check in. The device that the system will use is a face

recognition device that will scan the face of the user and a computer

that will serve as a way to mark their attendance. In the process, it

shows the time they had checked in the system and also shows the

attendance information of the user. In the output, the LCD of the

computer will then display the current status of the user’s

attendance information and it will also display the attendance

information of every user that uses the system.

Upon developing the Attendance system, the proponent plans to

evaluate it using the following variables that are discussed below.

User Friendliness is a program or computer system designed so

that individuals who lack extensive computer experience or training

can use the system without becoming confused; it is a test to

determine if the system is easy to understand for the main targets of

the system.

Reliability refers to dependability of the system when it is used by

the users; it is a test to determine if the system gives the users their

attendance information to make sure that they have their

9
attendance.

Efficiency refers to the useful output to the total input in a system;

is a test to determine the competence and effectiveness of the

system in marking the users’ attendance and recording it.

Statement of the Problem

There are schools that use a written attendance system in order to

record the students' attendance. But marking attendance is very

hard to manage because of how many students that have enrolled

in this school and there is a chance that there will be misinformation

because the students often forgets to mark their attendance. That's

why these two are one of the problems that the teacher or anyone

that manages the student’s information faces because of the

number of students in the campus it will be hard to manage it. Even

though the teachers will be the ones who will mark the student’s

attendance if they are in the class, the teachers have a chance to be

absent that had a reason that they will not be in the school. This

kind of topic needs to be brought up to the public for the reason and

10
also it will improve their flexibility regarding marking the student’s

attendance. That’s why I proposed this kind of study so that getting

your attendance marked can easily be done and since the modern

era is about technology, getting used to this kind of system can be

helpful to our era and also getting used to technology is beneficial to

the current era and also we can understand more about technology.

Hypothesis

Ho (Null): There is no significant difference between the existing

facial recognition attendance system and the proposed system in

terms of clarity, completeness, security, and manageable.

Ha (Alternative): There is a significant difference between the

existing facial recognition attendance system and the proposed

system in terms of clarity, completeness, security, and manageable.

The level of significance is 0.05 or 1.6666

Significance of the Study

11
The result of the project will merit the following:

Students: In this project, the students are one of the main targets

for this project because it regards the attendance of the targets and

it will also become beneficial not only for the school but also for the

students.

Teachers: The teachers are also one of the main targets because

they are the ones who will not only take attendance but also get the

student’s attendance information so that they can easily manage

their student’s attendance.

School Administrators and Head Teachers: They will be the ones

who will manage the system’s contents and they will be the ones

who will hand out the student’s attendance information to their

respective teachers and they will also make their attendance

towards this project because they had the highest authority in the

school or university.

Scope and Limitations

12
The scope of the study is for the library and the main gate. The

project will cover all of the students when they enter the main gate.

The students will just face the webcam or camera before they enter

the campus grounds and the system will mark their attendance. All

the students’ attendance information will then hand out to their

respective subject teachers so that they can check if everyone is

present.

Definition of Terms

Biometrics. It is the measurement and statistical analysis of

people's unique physical and behavioral characteristics.

Attendance. the action or state of going regularly to or being

present at a place or event.

Facial Recognition. is a technology capable of matching a human

face from a digital image or a video frame against a database of

faces, typically employed to authenticate users through ID

verification services, works by pinpointing and measuring facial

13
features from a given image.

Webcam. Is a video camera that feeds or streams an image or

video in real time to or through a computer to a computer network,

such as the Internet.

School Administrator. They are responsible for overseeing the

administrative duties at schools from preschool through post-

graduate levels.

Head Teacher. Is the staff member of a school with the greatest

responsibility for the management of the school.

Clarity. The quality of being clear.

Completeness. The state of being complete of the system.

Security. The ability to secure the system.

Manageability. The ability to be managed and accurate of the

system.

14
CHAPTER II

REVIEW OF RELATED STUDIES AND LITERATURE

Related Studies

Foreign Studies

According to S. Sayeed, J. Hossen, S.M.A. Kalaiarasi, V.

Jayakumar and I. Yusof, A. Samraj said that:

“Authentication is a momentous issue in controlling systems

in computers based globally. Human face recognition has been

widely used to be an important branch of biometrics verifications in

many applications such as door control, video monitoring system,

network security and also human computer interactions.”

https://www.researchgate.net/publication/316091971_Real-

time_face_recognition_for_attendance_monitoring_system

According to Himanshu Maliik said that:

“Uniqueness or individuality of an individual is his face. In this

15
project the face of an individual is used for the purpose of

attendance making automatically. Attendance of the student is very

important for every college, universities and school. Conventional

methodology for taking attendance is by calling the name or roll

number of the student and the attendance is recorded. Time

consumption for this purpose is an important point of concern.

Assume that the duration for one subject is around 60 minutes or 1

hour & to record attendance takes 5 to 10 minutes. For every tutor

this is consumption of time. To stay away from these losses, an

automatic process is used in this project which is based on image

processing.”

http://ethesis.nitrkl.ac.in/7301/1/AUTOMATED_Mallik_2015.pdf

According to Farshad Ghahramani states that:

“In computer vision, face recognition is the process of labeling

a face as recognized or unrecognized. The process is based on a

pipeline that goes through collection, detection, pre-processing, and

recognition stages. The focus of this study is on the last stage of the

pipeline with the assumption that images have already been

collected and pre-processed. Conventional solutions to face

16
recognition use the entire facial image as the input to their

algorithms.”

https://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=8182&

context=etd_theses

According to Mabrur Mujib Chowdhury:

“The field of facial recognition is rapidly growing into a vital

part of our everyday lives. The use of facial recognition systems has

been extended primarily from security purposes to social networking

sites, managing fraud, and improved user experience. Numerous

algorithms have been designed to perform facial recognition with

greatest accuracy. The use of several preprocessing and post-

processing techniques is also known to improve the effectiveness of

these recognition algorithms. This paper focuses on a three-tier

approach towards facial recognition.”

https://core.ac.uk/download/pdf/61804826.pdf

17
According to Nandhini R, Duraimurugan and S.P. Chokkalingam

states that:

“Automatic face recognition (AFR) technologies have made

many improvements in the changing world. Smart Attendance using

Real-Time Face Recognition is a real-world solution which comes

with day to day activities of handling student attendance systems.

Face recognition-based attendance system is a process of

recognizing the students face for taking attendance by using face

biometrics based on high - definition monitor video and other

information technology. In my face recognition project, a computer

system will be able to find and recognize human faces fast and

precisely in images or videos that are being captured through a

surveillance camera. Numerous algorithms and techniques have

been developed for improving the performance of face recognition

but the concept to be implemented here is Deep Learning. It helps in

conversion of the frames of the video into images so that the face of

the student can be easily recognized for their attendance so that the

attendance database can be easily reflected automatically.”

https://www.ijeat.org/wp-

content/uploads/papers/v8i3S/C11230283S19.pdf

18
Local Studies

According to Christopher John Alolor, El Cid John Legaspi,

Pedro Legaspi II, John Lloyd Padecio, Alexander Reyes,

Arjimson Santiano, Mary Regina B. Apsay, Marissa G. Chua and

Florocito S. Camata said that:

“Face recognition has been one of the most interesting and

important research fields in the past two decades. The reasons

come from the need for automatic recognition and surveillance

systems, the interest in human visual systems on face recognition,

and the design of human-computer interfaces, etc. The rapid

development of face recognition is due to a combination of factors:

active development of algorithms, the availability of large databases

of facial images, and a method for evaluating the performance of

face recognition algorithms. The system covers any departments,

agencies or companies which require personal identification and

security to their employees. The face recognition system covers

multiple face photos, matching of faces, head rotations, detects 66

facial feature points (eyes, eyebrows, mouth and nose) and all data

is placed in a database. Additional enrolments will be required upon

various changes in registered faces. The said system only limits

19
personal identification which contains certain fields about the

registered user, it cannot detect the skin color and age of a person

and the system is not a video- based face recognition system. This

system does not expect to solve all the issues in face recognition,

such as extreme facial expression, wearing on the face, great age

discrepancy and extreme lightning condition and without frontal face

information.

http://www.ijstr.org/final-print/dec2014/Student-Monitoring-System-

Of-Our-Lady-Of-Fatima-University-Using-Face-Recognition.pdf

According to Alvin Sarraga Alon, Cherry D. Casuat, Mon Arjay F.

Malbog, Rufo I. Marasigan Jr. and Joshua S. Gulmatico saying:

“Checking attendance in a classroom is a factor contributing

to the final performance of the students in the course. For both

students and professors, attendance checking by name is very time-

consuming and, in particular, the latter is very susceptible to

simple attendance fraud.”

https://www.researchgate.net/publication/339602176_A_YOLOv3_In

ference_Approach_for_Student_Attendance_Face_Recognition_Sy

20
stem

According to Melanie Reynoso and Ariane M. Torres stated:

“Attendance monitoring has strategic importance for every

organization. It has shifted from utilizing paper-based attendance

monitoring to biometrics, radio-frequency identification, Bluetooth

and smart technologies, Internet of Things (IoT), cloud computing,

or face recognition technology.”

https://philssj.org/index.php/main/article/view/214

Romulo Maratas Estrera, Elmer A. Maravillas and Cherry Lyn C.

Sta. Romana said that:

“In today’s digital world, the need to maintain the security of

information or physical property is becoming both increasingly

important and increasingly difficult. Face recognition is one of the

few biometric methods, which is a very complicated system since

the human faces change depending on their age, appearance.

Every human being has several facial expressions. So it is not

possible to learn all types of facial characteristics into the network.

21
As a result, there is a solution for the unrecognized. Moreover, due

to the performance variations of the input device, faces cannot be

detected correctly, and patterns may change extremely.”

https://ejournals.ph/article.php?id=2804

According to Gima S. Batinggal, Jasmin D. Niguidula states that:

“Face Recognition System (FRS) can be used to match

pictures for a specific purpose like matching reports of found

persons vis-à-vis missing persons. In the Philippines, despite the

large number of missing persons every year, the Philippine National

Police (PNP) do not have a central database for it. Hence, police

from other precincts may not be aware about reports of missing

persons from one precinct unless informed by the precinct holding

the case.”

https://dl.acm.org/doi/abs/10.1145/3205946.3205952

22
Related Literatures

Foreign Literature

According to Jayita Bhattacharyya:

“Recognizing people by their faces in pictures and video

feeds is seen everywhere starting from social media to phone

cameras. A face recognition system is built for matching human

faces with a digital image. Ultimately what a computer recognizes is

pixel values ranging from 0-255.”

https://analyticsindiamag.com/a-complete-guide-on-building-a-face-

attendance-system/

Anita (2021) stated that:

” A detailed overview of the global and regional markets is

presented in the research report on the 3D Facial Recognition

Systems market and offers business-based insights into the outlook

and macro-economic factors influencing the use of 3D Facial

Recognition Systems for many applications. In addition, an in-depth

23
study of the main market trends, market threats, and the full market

structure is included in the 3D Facial Recognition Systems market

report. In addition, based on the latest systematic analysis review,

the 3D Facial Recognition Systems article is intended. Primary

analysis, though, can involve refining geographic and global

business datasets that are backed by interviews with major

individuals at top organizations across the globe. The thesis is

analyzed with the help of primary as well as secondary study

methodologies.”

https://analyticsindiamag.com/a-complete-guide-on-building-a-face-

attendance-system/

According to Clive Summerfield stated that:

“Biometrics, technologies that utilizes physical and/or

behavioral “characteristics” unique to an individual, has long been

vaulted as a solution to the password problem. The best-known

biometrics ( fingerprints, face recognition and voice biometrics )

have all found application in access control and telephone security,

but have not been widely adopted for internet security.”

24
https://www.securitymagazine.com/articles/94201-securing-and-

facilitating-online-education-with-voice-biometrics

Gregory Barber said that:

“Among the big-ticket items was a tablet designed to screen

students and staff for fevers. The devices were sold by a company

named OneScreen, which supplies schools with technology

including “smart” whiteboards and attendance apps. But this spring,

it had pivoted. Its new product, called GoSafe, could scan foreheads

for elevated temperatures and detect when students aren’t wearing

masks. It also came with a bonus: “top-of-the-line” facial recognition,

as a local vendor described it to the school board.”

https://www.wired.com/story/schools-adopt-face-recognition-name-

fighting-covid/

According to Dr. Ali Raza:

"Over time, our face could well be our digital identity, and

allow us seamless access to places and establishments without the

need for access or identification cards. Facial recognition is a

25
pathway to digital transformation. You can have paperless borders;

automation can ease travel and make access to several services

more efficient and faster.”

https://menafn.com/1101630432/Facial-recognition-in-UAE-How-

will-it-change-lives

Local Literature

According to Nelson Fung saying:

“Voice, facial recognition, and fingerprint are among the

trusted things to identify a person's identity. Facial recognition (for

instance) is easy to use but has low accuracy. Fingerprint (on the

other hand) has high accuracy, and is easy to use and reliable.”

https://www.pna.gov.ph/articles/1087335

According to Brig. Gen. Debold Sinas:

”The program is intended to improve discipline within the

ranks and clamp down on unexcused absences and late arrivals.

26
The new system is currently being deployed at the NCRPO regional

headquarters and its support units at Camp Bagong Diwa. However,

Sinas is planning to expand the program to five Metro Manila police

districts before introducing it at police stations. He implemented

similar systems while serving at the Philippine National Police Crime

Laboratory and as Chief of the Central Visayas police.”

“The Philippine National Police in Manila previously adopted

an Automated Fingerprint Identification System from NEC, although

that particular platform was intended to identify criminals rather than

the officers themselves. In any case, the NCRPO implementation

does speak to the country’s growing interest in biometric tech. The

Bangko Sentral ng Pilipinas (BSP) recently indicated that it expects

to print 23 million biometric IDs in 2020, while Gemalto tech was

used to verify the fingerprints of voters during elections that were

held earlier this year.”

https://findbiometrics.com/biometrics-news-philippines-police-adopt-

biometric-tracking-system-catch-truant-officers-010206/

27
FICO stated that:

“Filipinos have at the same time become more accepting of

biometrics, with the study revealing that 72% are also happy to

provide this information to their bank. The use of fingerprints was

the most widely accepted approach (76%), facial scans came

second (40%) and eye scans came in third (23%). A more popular

alternative with Filipinos was analysis of how they type in their

password (77%), a technique known as behavioral biometrics.”

https://fintechnews.sg/41682/fintechphilippines/fico-survey-filipinos-

showing-greater-acceptance-for-biometrics/

According to Brian Song said that:

“Fingerprint recognition is a secure and convenient

technology that has become common and widespread, not only in

smartphones, but in our everyday lives as well. However, the recent

global outbreak of COVID-19 is raising questions about how safe

using fingerprint authentication really is as touching the sensors can

potentially spread viruses. Based on 20 years of first-hand

experience witnessing the development of fingerprint recognition

28
technology and the market, I would like to discuss common

perceptions regarding the safety and use value of the technology.”

https://www.biometricupdate.com/202004/using-fingerprint-

recognition-under-covid-19

Synthesis

According to the literature, biometrics has been used for many years

not only for face recognition but other types of identifiers as well.

The researcher gets the idea because of how biometrics was being

used for many years, the idea will help not only for teachers and

staff but also for the students considering how hard marking

students regarding their attendance is because of how many

students are there in a class. It relates to this proposed system

because it uses a biometric identifier which is facial recognition to

mark its attendance when it faces the webcam. It aims to attain the

goal of providing for the benefits for the entirety of the school.

29
CHAPTER III

Methodology

Research Methods Use

The chronological data were gathered and previous studies were

reviewed again in order to improve present study. It may be

distinguished that a lot of tools were used in order to come up with a

wide-ranging result.

The methods stated below gives the partial idea on how the

researchers designed their research. In order to have a deeper

understanding of the software, the process of ways it was developed

must be understood. The proponent tools were used in order to

accurate the essential idea.

Descriptive Research Method

Descriptive research aims to accurately and systematically describe

30
a population, situation or phenomenon. It can answer what, where,

when and how questions, but not why questions.

A descriptive research design can use a wide variety of research

methods to investigate one or more variables. Unlike in

experimental research, the researcher does not control or

manipulate any of the variables, but only observes and measures

them.

Descriptive research is usually defined as a type of quantitative

research, though qualitative research can also be used for

descriptive purposes. The research design should be carefully

developed to ensure that the results are valid and reliable.

Surveys

Survey research allows you to gather large volumes of data that can

be analyzed for frequencies, averages and patterns. Common uses

of surveys include:

● Describing the demographics of a country or region

● Gauging public opinion on political and social topics

31
● Evaluating satisfaction with a company’s products or

an organization’s services

Observations

Observations allow you to gather data on behaviors and phenomena

without having to rely on the honesty and accuracy of respondents.

This method is often used by psychological, social and market

researchers to understand how people act in real-life situations.

Observation of physical entities and phenomena is also an important

part of research in the natural sciences. Before you can develop

testable hypotheses, models or theories, it’s necessary to observe

and systematically describe the subject under investigation.

Case Studies

A case study can be used to describe the characteristics of a

specific subject (such as a person, group, event or organization).

Instead of gathering a large volume of data to identify patterns

32
across time or location, case studies gather detailed data to identify

the characteristics of a narrowly defined subject.

Rather than aiming to describe generalizable facts, case studies

often focus on unusual or interesting cases that challenge

assumptions, add complexity, or reveal something new about a

research problem.

Sample and Sampling Technique

When you conduct research about a group of people, it’s rarely

possible to collect data from every person in that group. Instead, you

select a sample. The sample is the group of individuals who will

actually participate in the research.

To draw valid conclusions from your results, you have to carefully

decide how you will select a sample that is representative of the

group as a whole. There are two types of sampling methods:

● Probability sampling involves random selection,

33
allowing you to make strong statistical inferences about

the whole group.

● Non-probability sampling involves non-random

selection based on convenience or other criteria,

allowing you to easily collect data.

Probability sampling methods

Probability sampling means that every member of the population

has a chance of being selected. It is mainly used in quantitative

research. If you want to produce results that are representative of

the whole population, probability sampling techniques are the most

valid choice.

There are four main types of probability sample:

34
Figure 3.0

The 4 main types of probability sample.

1. Simple random sampling

In a simple random sample, every member of the population has an

equal chance of being selected. Your sampling frame should include

the whole population.

To conduct this type of sampling, you can use tools like random

35
number generators or other techniques that are based entirely on

chance.

Example

You want to select a simple random sample of 100 employees of

Company X. You assign a number to every employee in the

company database from 1 to 1000, and use a random number

generator to select 100 numbers.

2. Systematic sampling

Systematic sampling is similar to simple random sampling, but it is

usually slightly easier to conduct. Every member of the population is

listed with a number, but instead of randomly generating numbers,

individuals are chosen at regular intervals.

Example

All employees of the company are listed in alphabetical order. From

the first 10 numbers, you randomly select a starting point: number 6.

From number 6 onwards, every 10th person on the list is selected

36
(6, 16, 26, 36, and so on), and you end up with a sample of 100

people.

If you use this technique, it is important to make sure that there is no

hidden pattern in the list that might skew the sample. For example, if

the HR database groups employees by team, and team members

are listed in order of seniority, there is a risk that your interval might

skip over people in junior roles, resulting in a sample that is skewed

towards senior employees.

3. Stratified sampling

Stratified sampling involves dividing the population into

subpopulations that may differ in important ways. It allows you to

draw more precise conclusions by ensuring that every subgroup is

properly represented in the sample.

To use this sampling method, you divide the population into

subgroups (called strata) based on the relevant characteristic (e.g.

gender, age range, income bracket, job role).

Based on the overall proportions of the population, you calculate

37
how many people should be sampled from each subgroup. Then

you use random or systematic sampling to select a sample from

each subgroup.

Example

The company has 800 female employees and 200 male employees.

You want to ensure that the sample reflects the gender balance of

the company, so you sort the population into two strata based on

gender. Then you use random sampling on each group, selecting 80

women and 20 men, which gives you a representative sample of

100 people.

4. Cluster sampling

Cluster sampling also involves dividing the population into

subgroups, but each subgroup should have similar characteristics to

the whole sample. Instead of sampling individuals from each

subgroup, you randomly select entire subgroups.

If it is practically possible, you might include every individual from

each sampled cluster. If the clusters themselves are large, you can

38
also sample individuals from within each cluster using one of the

techniques above.

This method is good for dealing with large and dispersed

populations, but there is more risk of error in the sample, as there

could be substantial differences between clusters. It’s difficult to

guarantee that the sampled clusters are really representative of the

whole population.

Example

The company has offices in 10 cities across the country (all with

roughly the same number of employees in similar roles). You don’t

have the capacity to travel to every office to collect your data, so you

use random sampling to select 3 offices – these are your clusters.

Non-probability sampling methods

In a non-probability sample, individuals are selected based on non-

random criteria, and not every individual has a chance of being

39
included.

This type of sample is easier and cheaper to access, but it has a

higher risk of sampling bias. That means the inferences you can

make about the population are weaker than with probability

samples, and your conclusions may be more limited. If you use a

non-probability sample, you should still aim to make it as

representative of the population as possible.

Non-probability sampling techniques are often used in exploratory

and qualitative research. In these types of research, the aim is not to

test a hypothesis about a broad population, but to develop an initial

understanding of a small or under-researched population.

40
Figure 4.0

Non-probability sampling techniques.

1. Convenience sampling

A convenience sample simply includes the individuals who happen

to be most accessible to the researcher.

This is an easy and inexpensive way to gather initial data, but there

is no way to tell if the sample is representative of the population, so

41
it can’t produce generalizable results.

Example

You are researching opinions about student support services in your

university, so after each of your classes, you ask your fellow

students to complete a survey on the topic. This is a convenient way

to gather data, but as you only surveyed students taking the same

classes as you at the same level, the sample is not representative of

all the students at your university.

2. Voluntary response sampling

Similar to a convenience sample, a voluntary response sample is

mainly based on ease of access. Instead of the researcher choosing

participants and directly contacting them, people volunteer

themselves (e.g. by responding to a public online survey).

Voluntary response samples are always at least somewhat biased,

as some people will inherently be more likely to volunteer than

others.

42
Example

You send out the survey to all students at your university and a lot of

students decide to complete it. This can certainly give you some

insight into the topic, but the people who responded are more likely

to be those who have strong opinions about the student support

services, so you can’t be sure that their opinions are representative

of all students.

3. Purposive sampling

This type of sampling, also known as judgment sampling, involves

the researcher using their expertise to select a sample that is most

useful to the purposes of the research.

It is often used in qualitative research, where the researcher wants

to gain detailed knowledge about a specific phenomenon rather than

make statistical inferences, or where the population is very small

and specific. An effective purposive sample must have clear criteria

and rationale for inclusion.

Example

43
You want to know more about the opinions and experiences of

disabled students at your university, so you purposefully select a

number of students with different support needs in order to gather a

varied range of data on their experiences with student services.

4. Snowball sampling

If the population is hard to access, snowball sampling can be used

to recruit participants via other participants. The number of people

you have access to “snowballs” as you get in contact with more

people.

Example

You are researching experiences of homelessness in your city.

Since there is no list of all homeless people in the city, probability

sampling isn’t possible. You meet one person who agrees to

participate in the research, and she puts you in contact with other

homeless people that she knows in the area.

44
Respondents of the Study

This study or research will be composed of 50 respondents. The

respondent comprises all the teachers and students of the campus.

The sampling technique that will be used is random sampling.

Locale of the Study

The locale of this study was in the National College of Business and

Arts. This was conducted in the Midterm of the year 2020-2021

Instrumentation

This study presents the instruments to be used by the proponent.

The proponent will be using a self-devised questionnaire as

instruments.

Online Interview Method. It is an online research method

conducted using computer-mediated communication (CMC), such

45
as instant messaging, email, or video. Online interviews require

different ethical considerations, sampling and rapport than practices

found in traditional face-to-face (F2F) interviews.

Online Library Method. It is an online research method that uses

an online database of digital objects that can include text, still

images, audio, video, digital documents, or other digital media

formats. Objects can consist of digitized content like print or

photographs, as well as originally produced digital content like word

processor files or social media posts. In addition to storing content,

digital libraries provide means for organizing, searching, and

retrieving the content contained in the collection.

Online Survey Method. It is an online research method that uses a

structured questionnaire that your target audience completes over

the internet generally through filling out a form. Online surveys can

vary in length and format. The data is stored in a database and the

survey tool generally provides some level of analysis of the data in

addition to review by a trained expert.

Online Research Method. Are ways in which researchers can

collect data via the internet. Many of these online research methods

46
are related to existing research methodologies but re-invent and re

imagine them in the light of new technologies and conditions

associated with the internet.

Document Analysis Method. It requires the use of different

materials that is needed to improve the current system. All the

information that can be useful is gathered and carefully selected

data is used to improve the current system.

Observation Method. It is another method used to gather

information that can be done by observing nature in learning Filipino

dishes recipes, to further improve the current system that is being

used by the parents, students, cooking savvy, and people who have

an interest in it.

Procedures

The proponent gathers data by giving online surveys to respondents

that is done by creating a set of questions and then distributes them

to the target respondents. The question should be dealing only with

the topic interest of the research.

47
And another one is interviewing the target respondents via chat or

video call within the topic process may take a lot of time and effort

but at least the proponents immediately capture the true feelings

and opinions of the respondents.

Statistical Treatment and Analysis of Data

The following are the statistical tools to be used by the proponents

in this study:

Weighted Mean Is an average computed by giving different weights

to some of the individual values. If all the weights are equal, then the

weighted mean is the same as the arithmetic mean. Whereas

weighted means generally behave in a similar approach to

arithmetic means, they do have a few counter instinctive properties.

Formula:

48
Where:

X is the repeating value

W is the number of occurrences of x (weight)

X is the weighted mean

Frequency Is the number of occurrences of a repeating event per

unit time. It is also referred to as temporary frequency

Formula:

T= 1/f

Where:

T = period

1 = cycle

f = frequency

49
Percentage Is a way of expressing a number as a fraction of 100

(percent meaning “per hundred” in Latin.) it is often denoted using

the percentage sign “%”, or the abbreviation “pct.” Percentages are

used to express how large/ small one quantity is relative to another

quantity. The first quantity usually represents a part of or change in

the second quantity which should be greater than zero.

Formula:

P=N/F * 100

Where:

P = Percentage

F = Frequency

N = Number of Respondents

100 = Constant Value

Likert Scale the Likert Scale is an ordered; one dimension scale

from which respondents choose one option that best aligns with

50
their view. A method of ascribing quantitative data, to make it

amenable to statistical analysis. A numerical value is assigned to

each potential choice and a mean figure for all the responses is

computed at the end evaluation or survey.

1 = Strongly Disagree

2 = Disagree

3 = Neutral

4 = Agree

5 = Strongly Agree

Accessibility

Criteria Frequency Percentage Rank

5 - Strongly Agree 8 16% 3

4 - Agree 8 16% 4

3 - Neutral 16 32% 1

2 - Disagree 13 26% 2

51
1 - Strongly Disagree 5 10% 5

Total Respondents 50 100%

Table 1.0

Table 1.0 shows the total respondents answered strongly agree and

agree are 8 with a total of sixteen percent (16%). Thirty-two percent

(32%) chooses neutral. Twenty-six percent (26%) disagree and ten

percent (10%) strongly disagree.

Accuracy

Criteria Frequency Percentage Rank

5 - Strongly Agree 10 20% 3

4 - Agree 7 14% 4

3 - Neutral 14 28% 1

2 - Disagree 13 26% 2

1 - Strongly Disagree 6 12% 5

Total Respondents 50 100%

Table 2.0

Table 2.0 shows the total of 14 respondents answered neutral with

a total of twenty-eight percent (28%) and twenty percent (20%)

strongly agree. Fourteen percent (14%) chosed agree. Twenty-six

percent (26%) disagree and twelve percent (12%) strongly disagree.

52
Speed

Criteria Frequency Percentage Rank

5 - Strongly Agree 9 18% 3

4 - Agree 9 18% 4

3 - Neutral 12 24% 1

2 - Disagree 12 24% 2

1 - Strongly Disagree 8 16% 5

Total Respondents 50 100%

Table 3.0

Table 3.0 shows the total of 12 respondents answered neutral and

disagree with a total of twenty-four percent (24%). Eighteen percent

(18%) chooses both strongly agree and agree and sixteen percent

(16%) strongly disagree.

Security

Criteria Frequency Percentage Rank

5 - Strongly Agree 8 16% 4

4 - Agree 11 22% 2

3 - Neutral 11 22% 3

2 - Disagree 13 26% 1

1 - Strongly Disagree 7 14% 5

Total Respondents 50 100%

Table 4.0

53
Table 4.0 shows the total of 11 respondents answered agreed and

neutral with a total of twenty-two percent (22%). Sixteen percent

(16%) chosen strongly agree. Twenty-six percent (26%) disagree

and fourteen percent (14%) strongly disagree.

Usability

Criteria Frequency Percentage Rank

5 - Strongly Agree 10 20% 4

4 - Agree 11 22% 1

3 - Neutral 11 22% 2

2 - Disagree 11 22% 3

1 - Strongly Disagree 7 14% 5

Total Respondents 50 100%

Table 5.0

Table 5.0 shows the total of 11 respondents answered agreed,

neutral and disagree with a total of twenty-two percent (22%).

Twenty percent (20%) strongly agree and fourteen percent (14%)

strongly disagree.

Reliability

Criteria Frequency Percentage Rank

54
5 - Strongly Agree 10 20% 3

4 - Agree 9 18% 4

3 - Neutral 14 28% 1

2 - Disagree 12 24% 2

1 - Strongly Disagree 5 10% 5

Total Respondents 50 100%

Table 6.0

Table 6.0 shows the total of 14 respondents answered neutral with

a total of twenty-eight percent (28%). Twenty percent (20%) choose

strongly to agree. Eighteen percent (18%) choose to agree. Twenty-

four percent (24%) disagree and ten percent (10%) strongly

disagree.

Existing System Rating

Criteria 5 4 3 2 1 Mean Mean2

Accessibility 8 8 16 13 5 3.02 9.12

Accuracy 10 7 14 13 6 3.04 9.24

Speed 9 9 12 12 8 2.98 8.88

Security 8 11 11 13 7 3 9

Usability 10 11 11 11 7 3.08 9.49

55
Reliability 10 9 14 12 5 3.14 9.86

Total 55 55 78 74 38 18.26 55.59

Table 7.0 shows the results of the Existing System

Accessibility

Criteria Frequency Percentage Rank

5 - Strongly Agree 10 20% 2

4 - Agree 25 50% 1

3 - Neutral 4 8% 5

2 - Disagree 5 10% 4

1 - Strongly Disagree 6 12% 3

Total Respondents 50 100%

Table 8.0

A total of 25 respondents answered agree with a total of fifty percent

(50%). Twenty percent (20%) choose strongly to agree. Eight

percent (8%) chooses neutral. Ten percent (10%) disagree and

twelve percent (12%) strongly disagree.

Accuracy

Criteria Frequency Percentage Rank

5 - Strongly Agree 9 18% 2

56
4 - Agree 26 52% 1

3 - Neutral 5 10% 3

2 - Disagree 5 10% 4

1 - Strongly Disagree 5 10% 5

Total Respondents 50 100%

Table 9.0

A total of 5 respondents answered neutral, disagree and strongly

disagree with a total of ten percent (10%). Fifty-two percent (52%)

choose to agree and eighteen percent (18%) strongly agree.

Speed

Criteria Frequency Percentage Rank

5 - Strongly Agree 10 20% 2

4 - Agree 25 50% 1

3 - Neutral 6 12% 3

2 - Disagree 4 8% 5

1 - Strongly Disagree 5 10% 4

Total Respondents 50 100%

Table 10.0

A total of 25 respondents answered agree with a total of fifty percent

(50%). Twenty percent (20%) choose strongly to agree. Twelve

57
percent (12%) chooses neutral. Eight percent (8%) disagree and ten

percent (10%) strongly disagree.

Security

Criteria Frequency Percentage Rank

5 - Strongly Agree 6 12% 4

4 - Agree 26 52% 1

3 - Neutral 7 14% 3

2 - Disagree 3 6% 5

1 - Strongly Disagree 8 16% 2

Total Respondents 50 100%

Table 11.0

A total of 26 respondents answered agree with a total of fifty-two

percent (52%). Twelve percent (12%) choose strongly to agree.

Fourteen percent (14%) chooses neutral. Six percent (6%) disagree

and sixteen percent (16%) strongly disagree.

Usability

Criteria Frequency Percentage Rank

5 - Strongly Agree 9 18% 2

4 - Agree 24 48% 1

3 - Neutral 5 10% 4

58
2 - Disagree 7 14% 3

1 - Strongly Disagree 5 10% 5

Total Respondents 50 100%

Table 12.0

A total of 24 respondents answered agree with a total of forty-eight

percent (48%). Eighteen percent (18%) choose strongly to agree.

Ten percent (10%) chooses neutral. Fourteen percent (14%)

disagree and ten percent (10%) strongly disagree.

Reliability

Criteria Frequency Percentage Rank

5 - Strongly Agree 8 16% 2

4 - Agree 23 46% 1

3 - Neutral 8 16% 3

2 - Disagree 6 12% 4

1 - Strongly Disagree 5 10% 5

Total Respondents 50 100%

Table 13.0

A total of 23 respondents answered agree with a total of forty-six

percent (46%). Sixteen percent (16%) choose strongly to agree.

59
Sixteen percent (16%) chooses neutral. Twelve percent (12%)

disagree and ten percent (10%) strongly disagree.

Proposed System Rating

Criteria 5 4 3 2 1 Mean Mean2

Accessibility 10 25 4 5 6 3.56 12.67

Accuracy 9 26 5 5 5 3.58 12.82

Speed 10 25 6 4 5 3.62 13.10

Security 6 26 7 3 8 3.38 11.42

Usability 9 24 5 7 5 3.5 12.25

Reliability 8 23 8 6 5 3.46 11.97

Total 52 149 35 30 34 21.1 74.23

Table 14.0 shows the results of the Proposed System

WMPS = (3.56 + 3.58 + 3.62 + 3.38 + 3.5 + 3.46) / 6

= 21.1 / 6

= 3.52

WMES = (3.02 + 3.04 + 2.98 + 3 + 3.08 + 3.14) / 6

60
= 18.26 / 6

= 3.04

T Computed = 3.52 – 3.04 / √ 12.39 + 9.24 / 2450

= 0.48 / 4.65 / 2450

= 0.48 / 0.18

= 2.67

T Computed = 2.67

The final result is 2.67 compared to the level of significance of 1.699


or 0.05 the result is higher.

61

You might also like