Filters

Archive List of BSCS

Bachelor of Science in Computer Science


Mental Health Care Management System Using Blowfish Algorithm and Two-Factor Authentication

Submitted by: ADMIN

System that uses electronic health records for patients’ personal information have barriers to privacy and confidentiality when it comes to the extremely sensitive mental health information of the patients. The importance of digital privacy, mental health information of a patient, and breaching of the protected health information to keep the confidentiality of the patient’s electronic records has been the priority of digitized mental health organizations. The researchers studied different encryption algorithm that reduces unauthorized access of the accounts of the authorized users, helping mental health organizations and staff with their telemedicine. The proposed web-based Mental Health Care Management System Using Blowfish Algorithm and Two-Factor Authentication ensures the confidentiality and privacy for both patient and psychologist's account and information. The purpose of this study is to provide a secure, fast, and accessible treatment for the patient’s mental health with ease. The researchers tested the website on the Qualys SSL Labs and Immuniweb which got an A or the highest possible grade. They also tested the website on SSL Trust, resulting in getting 0 positives in malware, spam, and trust report. Based on the SSL Trust, the website showed no issues found in the SSL/TSL Report. The users, including 2 (two) psychologists and 2 (two) individuals tested the functional process of the website which got 4.25 weighted mean or a good verbal description. The 5 (five) IT experts: Drexel Domingo, Jefferson Torato, Lex Ochinang, Rolline Lactaoen, and Rengel Corpuz tested the suitability, usability, and security of the website. The researchers used ISO/IEC 25010 as the cornerstone or instrument for the evaluation which provides a strong basis for international regulation. The weighted mean of the suitability and usability test is 4.53, while the security test is 4.93, that both sum up for an excellent verbal description.

Likes: 0 | Downloads: 0

APPLIED FLAV FACENET ON TEACHER ATTENDANCE SYSTEM WITH ANTI-SPOOFING SCHEME

Submitted by: ADMIN

In today’s modern world, educational institutions value the importance of attendance monitoring for teachers avoiding absenteeism. The presence of a teacher is essential for delivering educational services, quality and learning of their students. Face recognition technology offers a contactless, non-intrusive, and unique biometric features which became a trend on some attendance systems which are now used in companies, offices, and even educational establishments. Spoofing is the center issue on biometric attendance systems on which it can bypass security in terms of taking of attendance. To solve this, the researchers used face detection and recognition algorithms to a teacher attendance system with an anti-spoofing scheme to facilitate marking and taking of attendance among teachers in Rang-Ayan School which needs a new technology to replace their traditional process. The system utilizes algorithms mainly Multitask Cascaded Convolutional Networks (MTCNN) for face detection and Support Vector Machines (SVM) for face recognition that supports recording and verifying a teacher’s attendance. A user interface (UI) was developed using Python to manage teacher details, training a face model and taking of attendance. The generation of the anti-spoofing feature was based on SVM where it is trained, refined, and modelled through Google Colab and was later integrated with the recognition feature of the system. Automated email notification was also added as feature applied for notifying the principal and teachers within a daily basis.

Likes: 0 | Downloads: 1

Loan Management System using Distributed Ledger Technology

Submitted by: ADMIN

This project mainly deals with the automation of activities performed while granting new loan. It keeps record of various kinds of loan, their customers monthly installments. All the master record of the loan automation system like loan type, loan percentage. Customer record entry is done by the concern staff along with his all details and loan type applied for. After approval, customer is given a unique a loan id.  The researchers applied the Distributed Ledger Technology (DLT) on this project. All the records are distributed, meaning once the one branch  updated the records it will reflected identically on the other branch.

Likes: 0 | Downloads: 0

Web-Based Contact Tracing System with Use of SMS Alert Notification

Submitted by: ADMIN

The advent of COVID-19 spread rapidly, infecting millions of people worldwide. One of the strategies to fight the spread of COVID-19 is through contact tracing, where exposed individuals are identified and notified. The researchers developed a web-based contact tracing system capable of digitally recording logs of individuals that comes with a unique feature of alerting individuals via SMS alert notifications. The researchers incorporated RAD or Rapid Application Development as the methodology to make the development process time efficient, more productive with fewer people, and improve reusability of components. The researchers developed five prototypes and performed two stages of testing in which five testing attempts were made per stage. The system underwent Black Box Testing for its functionalities and Use-Case Testing to evaluate its performance from the end-user point of view which is grouped into three for the roles: User-Person, User-Establishment and Admin, that resulted with the expected output. The study aims to develop a system capable of informing individuals who might have been in close combat with an infected person via SMS to raise awareness and lessen the further spread of the virus. To evaluate the system quality, the researchers asked three IT experts to assess the contact tracing system by answering a questionnaire based on ISO 25010. The developed system has met the objectives of the project as it performed well in recording accurate logs of users who enter an establishment, and the SMS alert notifications are successfully sent to individuals with the possible exposure to COVID-19. The developed contact tracing system benefits the community by helping to mitigate the spread of the virus by raising awareness about the possible exposure to a COVID-19 positive individual with the guidelines on health protocols needed to follow in case of receiving an alert.

Likes: 1 | Downloads: 2

ONLINE PAYROLL SYSTEM WITH SCREENSHOT MONITORING USING DECISION TREE ALGORITHM

Submitted by: ADMIN

To prevent the spread of the COVID-19 pandemic, many workers were forced to work from home. When the pandemic struck, most businesses and institutions were unable to prepare their employees for this situation. Many people were caught off guard by the sudden turn of events and were confined to their homes following the announcement of a lockdown. Working from home provides many advantages, including schedule flexibility, more time to spend with family, lower expenses, and time saved from commuting. On the other hand, there are numerous factors that have a negative impact on productivity when working from home. According to research, the job environment and management support have the greatest direct and indirect effects on job performance. Leaving the employers in a disadvantage, making them unaware if their employees are working according to what they are paid for. The aim of this thesis is to develop a payroll system with screenshot monitoring that helps employers to classify whether their employees who work in a remote area are working productively or unproductively. A payroll management system handles all of the tasks involved in paying an organization's employees. It typically entails keeping track of employee hours and ensuring that they are properly compensated. Tax and social security calculations, as well as ensuring that they are withheld and processed correctly, are all part of the job. Depending on the organization, a variety of other deductions may be estimated, withheld, and processed as part of payroll administration. Adding screenshot monitoring in their payroll system can help the employers see if their employers are really working during work hours.

Likes: 3 | Downloads: 2

E-LMS Transcriber That Utilizes Tone of Voice that Applies Modulation in Speech Recognition

Submitted by: ADMIN

Voice is the basic, most common form of communication. It is a method to interact with each other and understand each other. Speech recognition technology is one of the fastest growing technologies. The purpose of this study is to look into the advantage of transcription in their learning and teaching processes. The objectives of the study is to design a learning management system and provide media content such as videos and images, and to design and develop a transcription software with the help of speech recognition algorithm and NLP algorithm. This study utilized a prototyping method, an inductive qualitative technique, and a single case study design method of observations were used. Human-assisted transcription is currently a realistic and cost-effective method for collecting speech from Learning Management System (LMS) in the absence of fully automated, highly accurate transcription technologies. This study aims to gain a better knowledge of human-assisted transcribing and annotation systems, as well as how to improve their efficiency and, lastly, how the human input is divided among various transcriber interaction types. Examining the outcomes of the system will allow us to gain better understanding and knowledge of the transcription process

Likes: 1 | Downloads: 1

Automated Accident Notification using YOLOv4-Tiny Algorithm via Smart Phone Device

Submitted by: ADMIN

The researchers created an application which if it detects an accident, it can send out a notification to the database which can be seen by the responder. The notification contains the time and date, name, and the location of the sender. The researchers gathered 700 trained images to help the algorithm detect an accident. The detection time extends if the dataset’s count is low, vice versa the detection time shortens when the dataset’s count is high.

Likes: 1 | Downloads: 1

IMAGE AND VIDEO COMPRESSION USING DISCRETE COSINE AND WAVELET TRANSFORM APPLIED IN E-LEARNING SYSTEM

Submitted by: ADMIN

The image and video are predominant data files in consuming data storage. The problem is when uploading massive data file size, it can cause slow data transmission which it instigates delays and when downloading, it needed a massive data storage which is difficult for individuals having only limited storage capacity. The solution for the stated problem is compression. Data compression is a technique in decreasing data file size; this could save the storage and bandwidth consequently in uploading and download duration. The developed e- learning system with an image and video compression features will benefit the teachers and students. The developed system used lossy data compression specifically the discrete cosine and wavelet transforms which it both significantly decrease the data size. The Discrete Cosine Transform is widely used in image compression for its effectiveness in reducing data file size and the Discrete Wavelet Transform can compress image energy into a minimal number of coefficients, providing a mix of frequency and time information for more accurate image reconstruction. The developed system used the advantages of both transform techniques which result in an effective compression for uploaded image and video file size where the student can automatically download and save the uploaded file in a much lower storage capacity need. Therefore, the process of two lossy compression techniques successfully provides image and video compression features in the developed e- learning system

Likes: 1 | Downloads: 1

BARANGAY INFORMATION SYSTEM WITH REMOTE SYNCHRONIZATION OF COVID-19 PATIENT'S DATA USING THE RSYNC ALGORITHM

Submitted by: ADMIN

Nowadays, technology plays an important role of daily life. This helps the individual in creating multiple tasks simpler and easier to accomplish. This computer technology benefited the government sectors, particularly the barangay units. Different system and software have been implemented to record and store data, and they are immensely beneficial since they reduce some human errors and time, boost productivity, and produce high-quality output in the industry. The study also emphasizes synchronization using the rsync algorithm because there are times when this data needs to be synced locally in the computer by the user. The Barangay Information System aims to record and manage information about Covid-19 cases while also sending documents to the municipality area. This can result in much faster and more accurate performance than using pen and paper and doing transactions face-to-face. This ensures that the recorded information is safe and secure because access to the system requires authorization. After it has been recorded, it will be sent to the municipality, which will help to determine the status of the barangay. Additionally, this can be used for synchronization using the rsync algorithm using Linux commands to maintain file consistency and availability across multiple computers. This type of data collection through use of system is necessary, especially in providing everyone with up-to-date information

Likes: 0 | Downloads: 0

Blockchain-based Voting System

Submitted by: ADMIN

Electronic voting is getting increasingly common in today’s day and age, it increases voter accessibility, speeds up ballot counting, and speeds up the export and publication of results. However, as electronic voting becomes more popular, it introduces new threat. A single vulnerability can cause large vote manipulation. When utilized in elections, electronic voting systems must be legitimate, accurate, safe, and convenient. However, inherent difficulties associated with electronic voting methods may limit adoption. Most of the issues with traditional voting systems and conventional e-voting can be addressed with blockchain-based e-voting architecture. Blockchain technology is irreversible, offers higher security, and provides decentralized nodes for electronic voting, it was built to answer these concerns. With these benefits, Blockchain technology is a viable alternative to existing electronic voting systems. Blockchain anonymity and transparency, is an ideal solution for many of the issues that plague traditional e-voting systems. Most of the problems with traditional voting systems, such as voter authentication, vote verification, voter privacy protection, vote security, and election results integrity, could be addressed by blockchain. End-to-end verification benefits is commonly used to develop electronic voting systems. Because blockchain technology is decentralized, non-repudiable, secure, and transparent, it is an excellent replacement for existing electronic voting methods. The researchers have found that blockchain could support in the resolution of some of the issues. Confidentiality and speed are the two most widely discussed issues in blockchain platforms.

Likes: 0 | Downloads: 0