Academic Resources Recommender System (ARReS)
Theses and Dissertations

The Academic Resources Recommender System (ARReS) includes collection of Theses and Dissertations available in the Camarines Sur Polytechnic Colleges Library.

AN IMPLEMENTATION OF GREEDY ALGORITHM TO COIN CHANGE MACHINE USING ARDUINO
Author: Mary Jhun F. Goleta; Mark Ryan B. Laurel; Jennilyn F. Taduran; Jessa M. Lorio; April Joy L. Sendon
2022 Computer Science

The world has been struck by a virus called Covid- 19 and until now, it’s still a problem in some countries especially in the Philippines. It spreads through droplets of sneezes, coughs, respiratory droplets but it’s also been spreading through surfaces. And touching money bills and coins cannot be avoided since it plays a vital role in transactions. Cash has been revealed to be a possible vector of transmissible diseases such as bacteria and viruses. In this connection, this study generally aimed to develop an anti- interaction device coin change machine for vendors/customers using Arduino that implements the greedy algorithm. This study employed specifically both development and descriptive forms of quantitative research. Upon the development of the coin change machine, the researchers found out some limitations: inability to accept some of the denomination of coin/ paper bills, hoppers are dispensing 1-2 pcs of coins. Moreover, the effectiveness and accuracy of the greedy algorithm was evaluated through optimization. In the optimization process, the results in greedy algorithm indicates that all values in expected output and actual output are almost identical. The coin change machine was deployed to the available twenty (20) respondents; ten (10) vendors and ten (10) customers and was evaluated through the responses in the questionnaires. The evaluation of the system has a weighted mean of 4.43 which means that the system is always efficient. In conclusion, the objectives of this study was answered and that the implemented greedy algorithm


File:

Related Theses and Dissertations:
COMPARATIVE ANALYSIS BETWEEN RSA & ECC ALGORITHM ON DATA SECURITY: BASIS FOR METASYS 3.0 DEVELOPMENT

Paul Aldredge B. Iglesia; Mary Joy O. Anzano; Jovelyn G. Calpe; Princess Anne E. Delmita; Christian Jay R. Navida

2022 Computer Science

RSA and ECC Cryptography Algorithm is one of the most powerful cryptography algorithms today. Thestudy enables to compare the algorithms in terms of its data security using a tabulation prototype namely Multi Event Tabulation System 3.0 that can be executed in both computer and android base devices....

INTEGRATED PAYROLL, SCHEDULING, AND ATTENDANCE MONITORING SYSTEM USING BIOMETRICS

Pamela Alen Aleman; Rosa Nori D. Nagasaka; Rica Mae Lanuzo; Jiferzon R. Radaza; Jerome Ian N. Rull

2022 Information Technology

Change and innovation go hand in hand that integrative technology drives the majority of advances. Attendance and payroll systems are very common nowadays, but the majority of these systems do not work together. With this, the researchers developed a system that intends to provide the integration of...

BNHS ENROLMENT MANAGEMENT SYSTEM

Marjorie Q. Guaves; Mayet D. Dagon; Ailyn B. Manzano; Raymart M. Ruiz

2022 Information Technology

Education is a powerful agent of change, helps improve health and livelihoods, and builds on long-term economic growth. Technology furnishes students with easy-to- access information, advanced knowledge, and great opportunities. The computer serves a crucial part in our society, most especially on s...

Intelligent Waste Management Trash Bin Using Convolutional Neural Networks Algorithm

Jonalyn L. Bugnot; Kim Clarice Garcia; Jude Romar B. Cerdeño; Maria Jessica T. Sayin

2022 Computer Science

Classification of waste is one common problem in waste management, waste can bring a huge impact in everyday living causing pollution and some other infectious diseases. The traditional way of sorting waste manually takes much time and brings negative effect as it is already contaminated. Generally,...