Dynamic Real Time User Centralized Room Utilization and Monitoring System Using Radio Frequency Identification

Archie Nel B. de Jesus

The "Room utilization,” term and often also referred to as "space utilization," or sometimes called "facility utilization," or more generically as "resource utilization," is an indication of measurement of the operational effectiveness prominently now existing in a number of industries around the world. It would help the management, administrators and room users to manage the room the correct way. The technology that RFID provides would be exceptional, because RFID does not need a line of sight unlike barcode readers. Compared to barcode readers that only write data, RFID can both read and at the same time write data. RFID are also reusable and they are durable. These are some of the many reasons why people use RFID in the industry and even in the academe. The current system of the College of Information and Communications Technology when it comes to room utilization is still primitive. The college uses the traditional doorknob and key and a logbook for room utilization. Instructors can easily switch rooms even without the permission from the college dean. Monitoring of computer users per room is not fully monitored, as the CCTV located outside the room is not enough to prevent these problems. Along with those problems comes another problem, which is theft. Lots of computer spare parts are stolen. By using a Centralized Room Utilization System using Radio Frequency Identification these problems can be avoided. It is intended for the faculty members, technicians and custodians of CICT. This can secure the safety and monitoring of every computer. It can facilitate the wake up, restart, shutdown, locking and unlocking of computers in using RFID. It can also determine the level of access of users of the room. Room custodians can add and edit the laboratory room schedules. It can determine whom the room users using the RFID card, by this, the system would know what controls are only required to appear for usage. It can also determine and monitor the opened application by the users. Having this, it will be much easier for the instructors/ technician to monitor the user’s activities. It generates reports of used computers, log and the schedules of users of the room. These reports will help the custodian and technician to monitor and be notified on the activities of the room. Regarding the development tools needed the researcher utilized Visual Basic 6 for the Programming Language and MS SQL 5.5 for the database.

Volume 11 | Issue 1

Pages: 7-14