Monday, June 3, 2019

Face Recognition Attendance System

Face fruition attention governanceIn the 21st century, everything around us has become depends upon engineering science to engage our life much easier. Daily tasks be continuously becoming succeedd. Nowadays more people prefer to do their scat electronically. To the best of our knowledge, the litigate of recording students attention at the university is hitherto manual. Lecturers go by dint of manual attendance tabs and supported papers to record attendance. This is slow, inefficient and term consuming. The main fair gameive of this project is to offer agreement that simplify and automate the process of recording and tracking students attendance through face acknowledgement techno lumbery. It is biometric technology to identify or verify a person from a digital characterisation or surveillance goggle box. Face reference is widely utilize like a shot in different atomic reckon 18as such(prenominal) as universities, banks, airports, and offices. We lead use p reprocessing techniques to detect, lie with and verify the captured faces like Eigenfaces method. We aim to provide a remains that will make the attendance process faster and more precisely. The core problem is identified along with solutions and project path. Furthermore, detailed brass analysis and design, user interface, methods and the estimated results are presented through our documentation.Keywords Attendance Automate Recording biometric face citeFRASFace light Attendance SystemNISTNational Institute of Standards and TechnologyUMLUnified Modeling quarrelIDEIntegrated Development EnvironmentMSMicrosoftVSVisual StudioSQLStructured Query LanguageSSMSSQL Server Management StudioOOObject Oriented1.1 knowledgeablenessOffice automation refers to the collective hardware, software and processes that enable automation of the information processing and communication tasks in an organization. It involves using computers and software to digitize, store, process and communicate som e routine tasks and processes in a standard office. 1In addition, attendance considered as the biggest issues that may face lecturers in class. It takes time, effort and difficult to manage. on that pointfore, our project will strain on online student attendance. In a nonher word, the aim of this project is to build a administration that help lecturers take students attendance in a professional personal manner.1.2 Problem DefinitionTaking and tracking students attendance manually, losing attendance sheets, dishonesty, wasted time and high error scales are problems facing the lecturers use the actual attendance clay. It is a hard process, take time and cause a lot of paper- base work. As a result, in order to solve these problems and avoid errors we point to computerize this process by providing a system that record and manage students attendance automatically without needing to lecturers interference.1.3 Project ObjectivesOur primary goal is to help the lecturers, improve an d organize the process of track and manage student attendance and lackingeeism. Additionally, we seek toProvides a valuable attendance service for both teachers and students.Reduce manual process errors by provide automated and a reliable attendance system uses face recognition technology.Increase privacy and security which student buttocksnot presenting himself or his friend while they are not.Produce monthly reports for lecturers.Flexibility, Lectures capability of editing attendance records.Calculate absenteeism percentage and send reminder messages to students.1.4 Project ScopeOur project tar receives the students of different academic levels and energy members. The main constraint we faced is distinguishing among identical twins. This situation is still a challenge to biometric systems especially facial nerve recognition technology. According to Phillips and his co-researcher paper 2 to get the best results of the algorithms your system employed, they should run under cert ain conditions for interpreted pictures (i.e age, gender, expressions, studio environmentetc.) otherwise, the problem is still ongoing.They provide application (method) to solve this problem, but in order to use this solution you have to sign a contract with the (NIST) organization and to be a researcher or acquireer. For us, to solve this issue we suggest to record twins attendance manually.1.5 Contributions of This StudyWe have searched for a system that can take, monitor and manage students attendance and absenteeism, send reminder messages, calculate absenteeism percentage, and break weekly, monthly, and annual reports. Based on our searches, there is no integrated system can support our idea.In this project, we are trying to develop such a system that can do all those tasks. Our project will serve students, lecturers, and the university as whole.1.6 Project TimelineWe utilized Gantt graph in figure 1.1, to show a project schedule with the start and finish dates of several tas ks of a project and the deadline to submit the project.1.7 Document OrganizationThis project consists of six chapters. These chapters organized to reflect the scientific steps toward our main objective. A brief rendering about the contents of each chapter given in the following paragraphsChapter 1 introduces the problem definition, project objectives, the part of this project, the scope of the work, and the project layout.Chapter 2 provides the reader with an overview of the literature review.Chapter 3 displays the analysis of the existing system, requirements elicitation which includes ( in operation(p) requirements, cosmetic requirements, intaker Requirements.), requirements specification, research methodology.Chapter 4 displays the architectural design, object oriented design figure.Chapter 6 displays the conclusion that includes limitation and future work. 2.1 IntroductionOver the past decade, taking down students attendance process had been developed and changed.The contro l force of this development is the desire to automate, facilitate, speed up and save time and efforts. Although that the attendance systems are around us everywhere, Taibah university lecturers still use a traditionalistic way to record students attendance either through calling out students names or through a passing attendance sheet among students to sign beside their names. Both ways are time consuming and associated with high error scales. In this project, we attempt to turn off wasted time, eliminate buddy clocking, and automate the process. Our system uses facial recognition technology to record the attendance through a high resolution digital photographic camera that detects and recognizes faces and compare the recognize faces with students faces images stored in faces database. one time the recognized face matches a stored image, attendance is marked in attendance database for that person. The process will repeat if there are missed faces. For example, if there are 4 face s missed for a bad position while the detecting phase, then this phase will start again to detect the missed faces and recognize them and continue the attending process. By the end of the month, a monthly report is send to the lecturer contains attendance and absence rates as a chart and the names of absentees. Also, a warning message sends to the student if he passes the allowed number of absence.In this chapter, we present a brief overview of face recognition in the desktop section, relevant works to our project with their advantages and disadvantages, how we relate to these studies and how this project can provide some beneficial features for lecturer.2.2 BackgroundMost lecturers have a significant number of students and it is hard to keep taking or tracking all their absence. nervus facialis recognition is mutually used in many institutions to take attendance of a significant number of students. There are many errors that could occur during this process, including misidentifi cation and self-recognition 3. Lecturer can control the errors and correct it.In the next subsection, brief overview of the usage,techniques, and methods in facial recognition.2.2.1 Face Recognition UsageFace recognition rises from the moment that machine started to become more and more intelligent and had the advance of fill in, correct or help the lack of human abilities and senses. 4. Common uses ofFacial recognition clarify in following pointsSecurity can be crime-fighting it will recognize people based on their eyes, nose and face.Searching for lost people.GamesTaking student or employee attendance2.2.2 Face Recognition Techniques and Methods Many factors influence the process of face recognition such as shape, size, pose, occlusion, and illumination. Facial recognition, have two different applications basic and advanced . Major face recognition recognizes faces or no faces such as balls and animals. If it is a face, then the system searches for eyes, a nose, and a mouth. Advan ced facial recognition manages the question on a specific face. This contains unique landtag the width of nose, richness of the eyes, the depth and angle of the jaw, the height of cheekbones, and the separation between the eyes, and makes a unique numerical code.Utilizing these numerical codes, the system then matches that image with another image and distinguishes how comparable to(predicate) the pictures are to each other. The image provenance for face recognition include pre-existing pictures from various databases and video camera signals. 5A facial recognition system involves the following phases Face detection, feature conjure upion, and face recognition as illustrated in Figure 2.1. 5Figure 2.1General structure of the face recognition system.The following get across compares some of the biometric technology used lately.Table 2.1 Comparison among some of the biometric technologiesBiometric TechnologyAccuracyPriceTools requiredFacial recognitionModerateModerate cameraVoice recognitionModerateModerateMicrophoneFingerprintHighModerateScanner2.3 Related WorkIn this section, we highlight some tie in works that were developed to recognize faces and takedown attendance together with the advantages and disadvantages of each system.2.3.1 Review of Relevant Work2.3.1.1 Auto Attendance Using Face Recognition (by Mahvish Tania)Figure 2.2 Screenshot of Main Interface (Admin Tasks Interface)Figure 2.3 Screenshot of Auto Attendance systems interfaceIn this project, we have two users liable for the system 6. The instructor who takes the attendance and admin who is responsible for managing students faces in the faces database. Admin selects a camera to capture, collect and save images to database or a folder. After the collection and saving the process done the trainingSet manager start to extract faces from the image by face detection.Finally, the trainingSet manager (Admin) will add the extracted image -person- to class or trainingSet. And as you can see in the illustrated figure, 2.3 above, attendance is taken down by recognizing the faces through a web camera and automatically marked in attendance sheet with daytime. The instructor chooses the course ID and the class ID to stick the attending process.AdvantagesThe system stores the faces that are detected and automatically marks attendance.Provide authorized access.Ease of use.Multiple face detection.Provide methods to maximize the number of extracted faces from an image.DisadvantagesThe verity of the system is not 100%.Face detection and loading training data processes just a little bit slow.The instructor and trainingSet manager still have to do some work manually.2.3.1.2 Attendance System on Face Detection (By NevonProjects)The system is created for employing a simple and a secure way of recording attendance. First of all, the software takes a picture of all the authorized individuals and stores the information into the systems database. Then, the system stores pictures by mapping i t into a face match structure. The system will recognize the registered person and mark his/her attendance along with the arrival time whenever he/she enters the locations again 7.AdvantagesThe system stores the faces that are detected and automatically marks attendance.Ease of use.Manipulate and recognize the faces in real time using live video data.Multiple face detection.Multipurpose software.Can be used in different places.DisadvantagesThe accuracy of the system is not 100%.It can only detect face from a limited distance.It cannot repeat live video to recognize missed faces.2.3.1.3 Face put downinFace Login allows you to log in to your PC by looking at your webcam. FaceLogin associates user accounts with a picture, and then, when looking at your webcam, you can login because it detects you on the webcam. 8AdvantagesOnly an administrator can run FaceLogin and change its settings.More than one way to configure users.Can store more than one image for a user to maximize face detect ion.DisadvantagesApplications accuracy is not 100%.Adding users manually.Associated risks with stored data and images.Uses traditional way to access the application.Limited use.2.3.1.4 Biometric Face Detection Attendance SystemsFace recognition systems with time attendance provide multi-biometric and multi-authentication modes. Attached with high resolution infra-red camera works in low light, best face recognition algorithms and identification methods.AdvantagesConvenient.Provide many recognition ways.High accuracy.Used for secure purposes.Provide many communication models.DisadvantagesLimited capacity.Detect faces from a limited distance. raft stand in a queue to take their attendance.Screen size.Still uses traditional authentication PIN way.2.3.1.5 C-400 Facial Recognition Clocking SystemFacial recognition clock systems will give you precise attendance information and stop employees buddy clocking when employee sing on behalf of his colleague-. 9AdvantagesC-400 Face recognition timing technology reduces any likelihood of your employees signing for each other in/out.Complete suite of reports.Printable attendance register in the event of an emergency.DisadvantagesThere is no External Bell Attachment.Device is expensive.The face has to be in front of the device to record attendance.2.3.1.6 Churchix Face Recognition software productChurchix presents face recognition software, which takes someones face through a picture or video and then identifies it by comparing it with those in a database of pictures. The software is becoming more common in every day interactions. 10AdvantagesAttending members in videos and photos.High quality photos.High accuracy.DisadvantagesSome people they see as a threat to privacy.unfitness to capture all the faces in the video.Restart the video several times to capture all faces.Figure 2.5 Screenshot of Churchix Face Recognition Software2.3.2 Relationship mingled with the Relevant Work and Our Own WorkTable 2.2 Comparison among appli cations viewed in the previous sectionApplicationAuto Attendance Using Face Recognition by MahvishTaniaAttendance System on Face Detection By NevonProjectsFace LoginBiometric Face Detection Attendance SystemsC-400 Facial Recognition Clocking SystemChurchix Face Recognition SoftwareFace Recognition Attendance SystemDatabaseHardwarePCWebcamPC , cameraPc , webcamCameracameraPC , cameraPC , cameraLanguageCCunknownUnknownunknownunknownCScopestudentstudentanyoneemployeesemployeesanyone schoolchildlight-onwhen-the camera startsFast Face detectionunlimited distanceHigh accuracyFrom table 2.2, the main point in our project is to create a system that facilitates students attending process. The following points summarize features will be adopted in the systemThe light on when the camera starts facial recognition because reduce the errorThere are try next to the camera to display the result of attendees and absenteesThe system at the end of the class update attendance sheet2.4 SummaryAn automa tic attendance management system is needed tool for huge organizations. Many organizations have been used face recognition system such as train stations, airports, and companies. Overall, this chapter provided an overview of some related works that were developed with their advantages and disadvantages. Moreover, we compare between the relevant work and our own work and show the differentiation between them.The matter that has to be taken into consideration in the future is a method to guarantee users privacy. Whenever an image is stored on servers, it must be impossible for unlicensed person to get or see that image.3.1 IntroductionThis chapter examines the analysis that determined the adequacy of the existing attendance system and identifies the requirements of the new system. Additionally, a specification of functional, nonfunctional and user requirements will be presented to understand how the system will work. In the term of analyzing these requirements, UML diagrams of the ne w system will be presented.3.2 Analysis of Existing SystemsIn the school, colleges and universities attendance system are used to keep the record of a student presence and absence. It is true that the Taibah University has an electronic system but still demand a manual intervention.There are two case to attend studentsFirst, add students attendance directly to the attendance web page.Second, write attendees names on a paper then move it to the web page.These two cases have drawbacks such as in the first case, there is a possibility to disconnectedness the connection and chose the wrong date. In the second case, there is a happen to loss the paper and it is a waste of resources We did a questionnaire that was targeted a lecturer in Taibah University and the number of participants nineteen.The aim of this questionnaire is to determine the satisfaction of the current system. Here are some questions and their statistics.As shown in figure 3.1, 84.2% of lecturers do not like the exist ing systems, we should take into consideration this percentage and develop a new attendance system.As can be seen from the Figure 3.2, 84.2% of the lecturer sees the existing system not suitable for all people like deaf. This is one of the drawbacks of the existing system, and there are more such asThere is always a chance of forgery (one person signing the presence of the other one)More manpower is required (some person to take attendance) To overcome the problems in the existing system, we will develop a face recognition attendance system.The majority of lecturer sees as in the figure 3.3, if we replace the current system with a biometric system it will be successful. Overall these statistics, the lecturer is not satisfied about the existing attendance system.3.3 Requirements ElicitationThe requirements are the descriptions of the system services and constraints.3.3.1 Functional RequirementsSystem functional requirement describes activities and services that must provide.Taking an d tracking student attendance by facial recognition in specific time.Sending the names of the absent student directly to the lecturerPermitting the lecturer to modify the student absent or late.Showing the names of who is absent or late in the screen to avoid errors.3.3.2 Non-Functional RequirementsNonfunctional Requirements are characteristics or attributes of the system that can judge its operation. The following points clarify themAccuracy and Precision the system should perform its process in accuracy and Precision to avoid problems.Modifiability the system should be easy to modify, any wrong should be correct.Security the system should be secure and saving students privacy.Usability the system should be easy to deal with and simple to understand.Maintainability the maintenance group should be able to fix any problem occur suddenly.Speed and Responsiveness carrying out of operations should be fast.3.3.3 User Requirements or Domain requirementsTools that the user must have in or der to use the system and obtain good resultsSoftware Requirements windows7 or higher, SQL and visual studio.Hardware Requirements high resolution camera and screen.3.4 Requirements SpecificationUse case diagram is one of Unified Modeling Language (UML) that describes the system functionality, what actors that interact with the system and any associations between use cases.As shown in figure 3.4, the FRAS has actors named Admin, Lecturer and Student which are the main users of the system. Other actor, timer which turns camera on to record attendance by detecting and recognizing faces.3.4.1 Use Case Description (Detailed Use Cases)(1) Log inTable 3.1 Log-in usecase description Use Case NameLog inUse Case Number1ActorsAdmin, Lecturer, studentDescriptionThis use case describes how Admin, Lecturer and student log into the system.Triggering eventsLecturer, admin and student enter his username and password.Steps Performed (Main Path)1-System requires users to enter username/password.2-Use rs enter username/password.3-System validate entered username/password.4-The use case ends successfully.PreconditionsSystem installed on pc.Admin, Lecturer and student must be authorized.Post-conditionsLog in is successfully.AlternateIf the Admin, Lecturer and student is not fill correctly, the log in fails.(2) Manage student attendance.Table 3.2 Manage student attendance usecase descriptionUse Case NameManage student attendanceUse Case Number 2ActorsAdmin, Lecturer.Description

No comments:

Post a Comment