SlideShare a Scribd company logo
1 of 9
Download to read offline
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
105 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Attendance Monitoring Using Face Recognition with Message Alert
E.Francy Irudaya Rani1
, R.Vedhapriyavadhana2
, S.Jeyabala3
, S.Jothi Monika4
, C.Krishnammal5
1,2
Assistant Professor, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India.
3,4,5
UG Students, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India.
Article Received: 30 December 2017 Article Accepted: 29 March 2018 Article Published: 31 May 2018
1. INTRODUCTION
Maintaining the attendance is very important in all the institutes for checking the presence of students. Every
institute has its own method in this regard. The conventional way of checking on attendance in classroom is calling
or making a sign, which is laborious and troublesome and waste a lot of time. So in our proposed classroom
attendance system, we use face recognition technique to check on attendance. This paper covers the topics on face
detection, face recognition and our new system, the details of processing of classroom image including detection,
morphological filter, segmentation, extracting features, classification, experiment. A group image of the class will
be captured and detected faces are segmented from the captured image. The segmented faces are then compared
with a predefined database of all the students of the class. A message will be sent to absentees through SMS using
a GSM module [1-11].
2. SYSTEM DESCRIPTION (METHODOLOGY)
Fig 1: Experimental setup
ABSTRACT
Face recognition technology is the least intrusive and fastest bio-metric technology invented so for. The accurate recognition of a person is the sole
aim of a face recognition system and this identification may be used for further processing. The methods to exploit this physical feature have seen a
great change since the advent of image processing techniques. Here, the camera detects and recognizes the persons while them entering the door and
then sends their personal information to the host to generate a 3D Facial Model. The proposed system will update the attendance once the students
face is match with the template database. This paper describes the working of the face recognition system that will be deployed as an Automated
Attendance System in a classroom environment.
Keywords: Image Processing, Face Recognition, Biometrics, Face detection, Student Attendance System, Database.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
106 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
The system consists of a camera that captures the images of the students and sends it to the image enhancement
module. After enhancement the image comes in the Face Detection and Recognition modules and then the
attendance is marked on the database server. This is shown in the experimental setup in Fig.1 at the time of
enrolment; templates of face images of individual students are stored in the Face database [12-27].
Here all the faces are detected from the input image and the algorithm compares them one by one with the face
database. If any face is recognized the attendance is marked on the server from where anyone can access and use it
for different purposes. In this way a lot of time is saved and this is highly securing process no one can mark the
attendance of others.
3. SOFTWARE SETUP
The name MATLAB is expanded as Matrix Laboratory. MATLAB is a high performance language for technical
computing. It integrates computation, visualization, and programming environment. It has sophisticated data
structures, contains built-in editing and debugging tools, and supports object oriented programming. These factors
make MATLAB an excellent tool for teaching and research .There are tool boxes in MATLAB for signal
processing, image processing, symbolic computation, control theory, simulation, optimization, and several other
applied sciences. The software part of this system is implemented using MATLAB version R2013a [28-36].
3.1. STEP OF VIOLA-JONES DETECTOR
1. Calculating the integral image- summed area table necessary for quick calculation.
2. Haar-like Features- simple rectangular features that achieve just above random.
Fig 2: Different features
3. AdaBoost learning algorithm- creates a small set of only the best features to create more efficient
classifiers.
4. PROPOSED SYSTEM
Face recognition biometrics is the science of programming a computer to recognize a human face. When a person is
enrolled in a face recognition system, a video camera takes a series of snapshots of the face and then represents it by
a unique holistic code. When someone has their face verified by the computer, it captures their current appearance
and compares it with the facial codes already stored in the system. The faces match, the person receives
authorization; otherwise, the person will not be identified. The existing face recognition system identifies only
static face images that almost exactly match with one of the images stored in the database.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
107 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Fig 3: Block Diagram of Attendance Monitoring
Fig 4: Image capturing
Fig 5: Image processing
Fig 6: Detecting the face
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
108 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Face Segmentation
The main objective here is to eliminate the foreign objects other than faces, which are detected. The detected faces
are segmented from the image and are pre-processed and stored for recognition. The segmented image will be
converted to gray scale for efficient recognition.
Face Recognition
The face recognition is the most important part of this system. It is an automatic method of identifying or verifying
a person from a digital image or a video frame. It is done by comparing the extracted features from the captured
image with the images that are previously stored in the predefined database. The recognition process is
implemented using PCA algorithm.
Fig 7: Extraction and Updating Database
Fig 8: Recognizing the faces
Identification of absentees and sending a SMS
The absentees are those who are present in the data base but not in the captured image. An automatic SMS
notification will be sent to the mobile numbers of the absentees.
5. HARDWARE SETUP
Camera
The camera used here is a PC web camera that captures the images of students for both database creation and test
images.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
109 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Display Unit
The LCD is used as a display unit in the system to display the results. A 16x2 display and 4 data pins are being used.
The operating voltage of LCD is 5V.
Fig 9: Display unit
Fig 10: GSM Module
Fig 11: Attendance system using GSM
Fig 12: PIC Microcontroller
PIC16F877A MICRO CONTROLLER
There are a wide variety of microcontrollers available to implement various tasks, among them the 8051 and PIC
are the mostly used. The 8051 is probably the most popular 8 bit microcontrollers ever. Many different I/O features
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
110 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
are integrated around the 8051 core to create a microcontroller which needs only very little extra hardware to do
most of the jobs. The main disadvantage of the standard 8051 core is that there's only one 16 bit pointer register
available. Moving a block of data is a very tedious job which takes far too much data moving overhead. It also does
not have an internal Analog to Digital Converter (ADC).
6. RESULT AND ANALYSIS
The developed programme was checked with our own model and it involves the following steps.
1. Creating the database by incorporating the individual student’s details (Name and ID) and their images in
the work station for recognition
2. The faces are detected by the Viola-Jones algorithm. Real time capture images are compare with the
database and recognize the faces.
3. By capturing and comparing the faces the program recognises the absentees face and mark the attendance
in the excel sheet.
Fig 13: Process involved in STEP-I
Fig 14: Process involved in STEP-II
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
111 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Fig 15: Process involved in STEP-III
7. CONCLUSION
In this paper, we have engineered an automated attendance system for lecturers to record student’s attendance
during lecturing and laboratory sections using face detecting concept. Automated attendance system based on
image processing techniques has been envisioned for the purpose of reducing the drawbacks in the traditional
(manual) systems. Here, the camera detects and recognizes the student who ever enter the door and sends their
personal information to the host to generate 3D Facial Model, the proposed system will update the attendance once
the students face is match with the template database. In addition to this the system is programmed in such a way
that it will send the absentees information to the corresponding student house through message. This system can
improve the goodwill of any institution.
ACKNOWLEDGEMENT
This work was supported in part by Department of Science & Technology (DST), FIST Program at Francis Xavier
Engineering College, Tirunelveli, Tamilnadu, India.
REFERENCES
[1] Nirmalya Kar, Mrinal Kanti Debbarma, Ashim Saha, and Dwijen Rudra Pal, “Study of Implementing Automated
Attendance System Using Face Recognition Technique”, International Journal of Computer and Communication
Engineering, Vol. 1, No. 2, July 2012
[2] Muthukumaran. N and Ravi. R, 'Hardware Implementation of Architecture Techniques for Fast Efficient loss less
Image Compression System', Wireless Personal Communications, Volume. 90, No. 3, pp. 1291-1315, October 2016,
SPRINGER.
[3] Rajni Sehgal, Renuka Nagpal, Diya Burman and Shinam Bansal Bachelor of Technology Computer Science &
Engineering, AUUP, India, “Real Time Face-Recognition Based Attendance Generation and Perception Level
Extraction”, World Applied Sciences Journal 29 (6): 805-810, 2014
[4] Muthukumaran. N and Ravi. R, 'The Performance Analysis of Fast Efficient Lossless Satellite Image Compression
and Decompression for Wavelet Based Algorithm', Wireless Personal Communications, Volume. 81, No. 2, pp.
839-859, March 2015, SPRINGER.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
112 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
[5] M. Turk And A. Pentland, "Eigenfaces For Recognition", Journal Of Cognitive Neuroscience, vol.3, no. 1, pp. 71-86,
1991, hard copy
[6] Muthukumaran. N and Ravi. R, 'VLSI Implementations of Compressive Image Acquisition using Block Based
Compression Algorithm', The International Arab Journal of Information Technology, vol. 12, no. 4, pp. 333-339, July
2015.
[7] Muthukumaran. N and Ravi. R, 'Simulation Based VLSI Implementation of Fast Efficient Lossless Image
Compression System using Simplified Adjusted Binary Code & Golumb Rice Code', World Academy of Science,
Engineering and Technology, Volume. 8, No. 9, pp.1603-1606, 2014.
[8] Seifedine Kadry And Mohamad Smaili faculty of science, lebanese university, lebano, “wireless attendance
management system based on iris recognition”, scientific research and essays vol. 5(12), pp. 1428-1435, 18 june,
2010.
[9] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for
Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016.
[10]Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International
Journal for Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016.
[11]Anil Lamba, “Cyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)”,
Cikitusi Journal for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014.
[12]Anil Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystems”,
International Journal of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014.
[13]Anil Lamba, “Analysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Security”,
International Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014.
[14]Anil Lamba, “Enhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theory”,
International Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I,
pp.71-82, 2013.
[15]Anil Lamba, “Resolve Security Policies Conflicts Through Semantics Matching Alignment”, International Journal of
Scientific Research and Review, Volume 2, Issue 2, pp.43-58, 2013.
[16]Anil Lamba, “A Detailed Analysis of Data Security in a cloud Environment”, SURAJ PUNJ Journal for
Multidisciplinary Research, Volume 3, Issue 2, pp.43-51, 2013.
[17]Ruban Kingston. M,Muthukumaran. and N, Ravi. R, 'A Novel Scheme of CMOS VCO Design with reduce number of
Transistors using 180nm CAD Tool', International Journal of Applied Engineering Research, Volume. 10, No. 14, pp.
11934-11938, 2015.
[18]Muthukumaran. N and Ravi. R, 'Design and analysis of VLSI based FELICS Algorithm for lossless Image
Compression', International Journal of Advanced Research in Technology, Vol. 2, No. 3, pp. 115-119, March 2012.
[19]Manoj Kumar. B and Muthukumaran. N, 'Design of Low power high Speed CASCADED Double Tail Comparator',
International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2, No. 4,
pp.18-22, June 2016.
[20]N. Muthukumaran, 'Analyzing Throughput of MANET with Reduced Packet Loss', Wireless Personal
Communications, Vol. 97, No. 1, pp. 565-578, November 2017, SPRINGER.
[21]P.Venkateswari, E.Jebitha Steffy, Dr. N. Muthukumaran, 'License Plate cognizance by Ocular Character Perception',
International Research Journal of Engineering and Technology, Vol. 5, No. 2, pp. 536-542, February 2018.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018
113 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
[22]Patil, Ajinkya, and Mrudang Shukla. "Implementation Of Classroom Attendance System Based On Face Recognition
In Class." International Journal of Advances in Engineering & Technology 7.3 (2014): 974
[23]N. Muthukumaran, Mrs R.Sonya, Dr.Rajashekhara and Chitra V, 'Computation of Optimum ATC Using Generator
Participation Factor in Deregulated System', International Journal of Advanced Research Trends in Engineering and
Technology, Vol. 4, No. 1, pp. 8-11, January 2017.
[24]Ms. A. Aruna, Ms.Y.Bibisha Mol, Ms.G.Delcy, Dr. N. Muthukumaran, 'Arduino Powered Obstacles Avoidance for
Visually Impaired Person', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 101-106, April 2018.
[25]Mrs. S. Murine Sharmili, Dr. N. Muthukumaran, 'Performance Analysis of Elevation & Building Contours Image
using K-Mean Clustering with Mathematical Morphology and SVM', Asian Journal of Applied Science and
Technology, Vol. 2, No. 2, pp. 80-85, April 2018.
[26]Keziah. J, Muthukumaran. N, 'Design of K Band Transmitting Antenna for Harbor Surveillance Radar Application',
International Journal on Applications in Electrical and Electronics Engineering, Vol. 2, No. 5, pp. 16-20, May 2016.
[27]Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation
System", International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014.
[28]Anil Lamba, “Uses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure",
International Journal for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014.
[29]Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert System”, International Journal
for Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014.
[30]Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment
Methodologies”, International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836,
2015.
[31]Anil Lamba, “A Study Paper On Security Related Issue Before Adopting Cloud Computing Service Model”,
International Journal for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015.
[32]Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection System”,
International Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015.
[33]Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for
Technological Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016.
[34]Akhil. M.S and Muthukumaran. N, 'Design of Optimizing Adders for Low Power Digital Signal Processing',
International Journal of Engineering Research and Applications, Vol. 5, pp. 59-65, March 2014.
[35]Muthukumaran. N and Ravi. R, 'Quad Tree Decomposition based Analysis of Compressed Image Data
Communication for Lossy and Lossless using WSN', World Academy of Science, Engineering and Technology,
Volume. 8, No. 9, pp. 1543-1549, 2014.
[36]Balcoh, Naveed Khan, et al. "Algorithm for efficient attendance management: Face recognition based approach."
IJCSI International Journal of Computer Science Issues 9.4 (2012): 146-150.

More Related Content

What's hot

Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
ijtsrd
 

What's hot (20)

IRJET- Attendance Management System using Real Time Face Recognition
IRJET- Attendance Management System using Real Time Face RecognitionIRJET- Attendance Management System using Real Time Face Recognition
IRJET- Attendance Management System using Real Time Face Recognition
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
IRJET - Biometric Attendance System
IRJET - Biometric Attendance SystemIRJET - Biometric Attendance System
IRJET - Biometric Attendance System
 
IRJET- Student Attendance Tracking System using Biometrics
IRJET- Student Attendance Tracking System using BiometricsIRJET- Student Attendance Tracking System using Biometrics
IRJET- Student Attendance Tracking System using Biometrics
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Artificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLABArtificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLAB
 
IRJET- E-Attendance Manager: A Review
IRJET-  	  E-Attendance Manager: A ReviewIRJET-  	  E-Attendance Manager: A Review
IRJET- E-Attendance Manager: A Review
 
IRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial Recognition
 
IRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image Processing
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
IRJET- Leaf Quality Detection for Rudimentary Urban Home Gardeners using Imag...
IRJET- Leaf Quality Detection for Rudimentary Urban Home Gardeners using Imag...IRJET- Leaf Quality Detection for Rudimentary Urban Home Gardeners using Imag...
IRJET- Leaf Quality Detection for Rudimentary Urban Home Gardeners using Imag...
 
Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 

Similar to Attendance Monitoring Using Face Recognition with Message Alert

Similar to Attendance Monitoring Using Face Recognition with Message Alert (20)

FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...
 
Student Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition AlgorithmStudent Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition Algorithm
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring System
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
IRJET- Intelligent Automated Attendance System based on Facial Recognition
IRJET-  	  Intelligent Automated Attendance System based on Facial RecognitionIRJET-  	  Intelligent Automated Attendance System based on Facial Recognition
IRJET- Intelligent Automated Attendance System based on Facial Recognition
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 

More from Associate Professor in VSB Coimbatore

Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Associate Professor in VSB Coimbatore
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
Associate Professor in VSB Coimbatore
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Associate Professor in VSB Coimbatore
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Associate Professor in VSB Coimbatore
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Associate Professor in VSB Coimbatore
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Associate Professor in VSB Coimbatore
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Associate Professor in VSB Coimbatore
 

More from Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Attendance Monitoring Using Face Recognition with Message Alert

  • 1. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 105 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Attendance Monitoring Using Face Recognition with Message Alert E.Francy Irudaya Rani1 , R.Vedhapriyavadhana2 , S.Jeyabala3 , S.Jothi Monika4 , C.Krishnammal5 1,2 Assistant Professor, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India. 3,4,5 UG Students, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India. Article Received: 30 December 2017 Article Accepted: 29 March 2018 Article Published: 31 May 2018 1. INTRODUCTION Maintaining the attendance is very important in all the institutes for checking the presence of students. Every institute has its own method in this regard. The conventional way of checking on attendance in classroom is calling or making a sign, which is laborious and troublesome and waste a lot of time. So in our proposed classroom attendance system, we use face recognition technique to check on attendance. This paper covers the topics on face detection, face recognition and our new system, the details of processing of classroom image including detection, morphological filter, segmentation, extracting features, classification, experiment. A group image of the class will be captured and detected faces are segmented from the captured image. The segmented faces are then compared with a predefined database of all the students of the class. A message will be sent to absentees through SMS using a GSM module [1-11]. 2. SYSTEM DESCRIPTION (METHODOLOGY) Fig 1: Experimental setup ABSTRACT Face recognition technology is the least intrusive and fastest bio-metric technology invented so for. The accurate recognition of a person is the sole aim of a face recognition system and this identification may be used for further processing. The methods to exploit this physical feature have seen a great change since the advent of image processing techniques. Here, the camera detects and recognizes the persons while them entering the door and then sends their personal information to the host to generate a 3D Facial Model. The proposed system will update the attendance once the students face is match with the template database. This paper describes the working of the face recognition system that will be deployed as an Automated Attendance System in a classroom environment. Keywords: Image Processing, Face Recognition, Biometrics, Face detection, Student Attendance System, Database.
  • 2. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 106 | P a g e ISSN: 2581-4362 Website: www.iijsr.com The system consists of a camera that captures the images of the students and sends it to the image enhancement module. After enhancement the image comes in the Face Detection and Recognition modules and then the attendance is marked on the database server. This is shown in the experimental setup in Fig.1 at the time of enrolment; templates of face images of individual students are stored in the Face database [12-27]. Here all the faces are detected from the input image and the algorithm compares them one by one with the face database. If any face is recognized the attendance is marked on the server from where anyone can access and use it for different purposes. In this way a lot of time is saved and this is highly securing process no one can mark the attendance of others. 3. SOFTWARE SETUP The name MATLAB is expanded as Matrix Laboratory. MATLAB is a high performance language for technical computing. It integrates computation, visualization, and programming environment. It has sophisticated data structures, contains built-in editing and debugging tools, and supports object oriented programming. These factors make MATLAB an excellent tool for teaching and research .There are tool boxes in MATLAB for signal processing, image processing, symbolic computation, control theory, simulation, optimization, and several other applied sciences. The software part of this system is implemented using MATLAB version R2013a [28-36]. 3.1. STEP OF VIOLA-JONES DETECTOR 1. Calculating the integral image- summed area table necessary for quick calculation. 2. Haar-like Features- simple rectangular features that achieve just above random. Fig 2: Different features 3. AdaBoost learning algorithm- creates a small set of only the best features to create more efficient classifiers. 4. PROPOSED SYSTEM Face recognition biometrics is the science of programming a computer to recognize a human face. When a person is enrolled in a face recognition system, a video camera takes a series of snapshots of the face and then represents it by a unique holistic code. When someone has their face verified by the computer, it captures their current appearance and compares it with the facial codes already stored in the system. The faces match, the person receives authorization; otherwise, the person will not be identified. The existing face recognition system identifies only static face images that almost exactly match with one of the images stored in the database.
  • 3. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 107 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Fig 3: Block Diagram of Attendance Monitoring Fig 4: Image capturing Fig 5: Image processing Fig 6: Detecting the face
  • 4. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 108 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Face Segmentation The main objective here is to eliminate the foreign objects other than faces, which are detected. The detected faces are segmented from the image and are pre-processed and stored for recognition. The segmented image will be converted to gray scale for efficient recognition. Face Recognition The face recognition is the most important part of this system. It is an automatic method of identifying or verifying a person from a digital image or a video frame. It is done by comparing the extracted features from the captured image with the images that are previously stored in the predefined database. The recognition process is implemented using PCA algorithm. Fig 7: Extraction and Updating Database Fig 8: Recognizing the faces Identification of absentees and sending a SMS The absentees are those who are present in the data base but not in the captured image. An automatic SMS notification will be sent to the mobile numbers of the absentees. 5. HARDWARE SETUP Camera The camera used here is a PC web camera that captures the images of students for both database creation and test images.
  • 5. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 109 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Display Unit The LCD is used as a display unit in the system to display the results. A 16x2 display and 4 data pins are being used. The operating voltage of LCD is 5V. Fig 9: Display unit Fig 10: GSM Module Fig 11: Attendance system using GSM Fig 12: PIC Microcontroller PIC16F877A MICRO CONTROLLER There are a wide variety of microcontrollers available to implement various tasks, among them the 8051 and PIC are the mostly used. The 8051 is probably the most popular 8 bit microcontrollers ever. Many different I/O features
  • 6. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 110 | P a g e ISSN: 2581-4362 Website: www.iijsr.com are integrated around the 8051 core to create a microcontroller which needs only very little extra hardware to do most of the jobs. The main disadvantage of the standard 8051 core is that there's only one 16 bit pointer register available. Moving a block of data is a very tedious job which takes far too much data moving overhead. It also does not have an internal Analog to Digital Converter (ADC). 6. RESULT AND ANALYSIS The developed programme was checked with our own model and it involves the following steps. 1. Creating the database by incorporating the individual student’s details (Name and ID) and their images in the work station for recognition 2. The faces are detected by the Viola-Jones algorithm. Real time capture images are compare with the database and recognize the faces. 3. By capturing and comparing the faces the program recognises the absentees face and mark the attendance in the excel sheet. Fig 13: Process involved in STEP-I Fig 14: Process involved in STEP-II
  • 7. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 111 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Fig 15: Process involved in STEP-III 7. CONCLUSION In this paper, we have engineered an automated attendance system for lecturers to record student’s attendance during lecturing and laboratory sections using face detecting concept. Automated attendance system based on image processing techniques has been envisioned for the purpose of reducing the drawbacks in the traditional (manual) systems. Here, the camera detects and recognizes the student who ever enter the door and sends their personal information to the host to generate 3D Facial Model, the proposed system will update the attendance once the students face is match with the template database. In addition to this the system is programmed in such a way that it will send the absentees information to the corresponding student house through message. This system can improve the goodwill of any institution. ACKNOWLEDGEMENT This work was supported in part by Department of Science & Technology (DST), FIST Program at Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India. REFERENCES [1] Nirmalya Kar, Mrinal Kanti Debbarma, Ashim Saha, and Dwijen Rudra Pal, “Study of Implementing Automated Attendance System Using Face Recognition Technique”, International Journal of Computer and Communication Engineering, Vol. 1, No. 2, July 2012 [2] Muthukumaran. N and Ravi. R, 'Hardware Implementation of Architecture Techniques for Fast Efficient loss less Image Compression System', Wireless Personal Communications, Volume. 90, No. 3, pp. 1291-1315, October 2016, SPRINGER. [3] Rajni Sehgal, Renuka Nagpal, Diya Burman and Shinam Bansal Bachelor of Technology Computer Science & Engineering, AUUP, India, “Real Time Face-Recognition Based Attendance Generation and Perception Level Extraction”, World Applied Sciences Journal 29 (6): 805-810, 2014 [4] Muthukumaran. N and Ravi. R, 'The Performance Analysis of Fast Efficient Lossless Satellite Image Compression and Decompression for Wavelet Based Algorithm', Wireless Personal Communications, Volume. 81, No. 2, pp. 839-859, March 2015, SPRINGER.
  • 8. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 112 | P a g e ISSN: 2581-4362 Website: www.iijsr.com [5] M. Turk And A. Pentland, "Eigenfaces For Recognition", Journal Of Cognitive Neuroscience, vol.3, no. 1, pp. 71-86, 1991, hard copy [6] Muthukumaran. N and Ravi. R, 'VLSI Implementations of Compressive Image Acquisition using Block Based Compression Algorithm', The International Arab Journal of Information Technology, vol. 12, no. 4, pp. 333-339, July 2015. [7] Muthukumaran. N and Ravi. R, 'Simulation Based VLSI Implementation of Fast Efficient Lossless Image Compression System using Simplified Adjusted Binary Code & Golumb Rice Code', World Academy of Science, Engineering and Technology, Volume. 8, No. 9, pp.1603-1606, 2014. [8] Seifedine Kadry And Mohamad Smaili faculty of science, lebanese university, lebano, “wireless attendance management system based on iris recognition”, scientific research and essays vol. 5(12), pp. 1428-1435, 18 june, 2010. [9] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016. [10]Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International Journal for Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016. [11]Anil Lamba, “Cyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)”, Cikitusi Journal for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014. [12]Anil Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystems”, International Journal of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014. [13]Anil Lamba, “Analysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Security”, International Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014. [14]Anil Lamba, “Enhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theory”, International Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I, pp.71-82, 2013. [15]Anil Lamba, “Resolve Security Policies Conflicts Through Semantics Matching Alignment”, International Journal of Scientific Research and Review, Volume 2, Issue 2, pp.43-58, 2013. [16]Anil Lamba, “A Detailed Analysis of Data Security in a cloud Environment”, SURAJ PUNJ Journal for Multidisciplinary Research, Volume 3, Issue 2, pp.43-51, 2013. [17]Ruban Kingston. M,Muthukumaran. and N, Ravi. R, 'A Novel Scheme of CMOS VCO Design with reduce number of Transistors using 180nm CAD Tool', International Journal of Applied Engineering Research, Volume. 10, No. 14, pp. 11934-11938, 2015. [18]Muthukumaran. N and Ravi. R, 'Design and analysis of VLSI based FELICS Algorithm for lossless Image Compression', International Journal of Advanced Research in Technology, Vol. 2, No. 3, pp. 115-119, March 2012. [19]Manoj Kumar. B and Muthukumaran. N, 'Design of Low power high Speed CASCADED Double Tail Comparator', International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2, No. 4, pp.18-22, June 2016. [20]N. Muthukumaran, 'Analyzing Throughput of MANET with Reduced Packet Loss', Wireless Personal Communications, Vol. 97, No. 1, pp. 565-578, November 2017, SPRINGER. [21]P.Venkateswari, E.Jebitha Steffy, Dr. N. Muthukumaran, 'License Plate cognizance by Ocular Character Perception', International Research Journal of Engineering and Technology, Vol. 5, No. 2, pp. 536-542, February 2018.
  • 9. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 105-113, April-June 2018 113 | P a g e ISSN: 2581-4362 Website: www.iijsr.com [22]Patil, Ajinkya, and Mrudang Shukla. "Implementation Of Classroom Attendance System Based On Face Recognition In Class." International Journal of Advances in Engineering & Technology 7.3 (2014): 974 [23]N. Muthukumaran, Mrs R.Sonya, Dr.Rajashekhara and Chitra V, 'Computation of Optimum ATC Using Generator Participation Factor in Deregulated System', International Journal of Advanced Research Trends in Engineering and Technology, Vol. 4, No. 1, pp. 8-11, January 2017. [24]Ms. A. Aruna, Ms.Y.Bibisha Mol, Ms.G.Delcy, Dr. N. Muthukumaran, 'Arduino Powered Obstacles Avoidance for Visually Impaired Person', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 101-106, April 2018. [25]Mrs. S. Murine Sharmili, Dr. N. Muthukumaran, 'Performance Analysis of Elevation & Building Contours Image using K-Mean Clustering with Mathematical Morphology and SVM', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 80-85, April 2018. [26]Keziah. J, Muthukumaran. N, 'Design of K Band Transmitting Antenna for Harbor Surveillance Radar Application', International Journal on Applications in Electrical and Electronics Engineering, Vol. 2, No. 5, pp. 16-20, May 2016. [27]Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation System", International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014. [28]Anil Lamba, “Uses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure", International Journal for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014. [29]Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert System”, International Journal for Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014. [30]Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment Methodologies”, International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836, 2015. [31]Anil Lamba, “A Study Paper On Security Related Issue Before Adopting Cloud Computing Service Model”, International Journal for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015. [32]Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection System”, International Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015. [33]Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for Technological Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016. [34]Akhil. M.S and Muthukumaran. N, 'Design of Optimizing Adders for Low Power Digital Signal Processing', International Journal of Engineering Research and Applications, Vol. 5, pp. 59-65, March 2014. [35]Muthukumaran. N and Ravi. R, 'Quad Tree Decomposition based Analysis of Compressed Image Data Communication for Lossy and Lossless using WSN', World Academy of Science, Engineering and Technology, Volume. 8, No. 9, pp. 1543-1549, 2014. [36]Balcoh, Naveed Khan, et al. "Algorithm for efficient attendance management: Face recognition based approach." IJCSI International Journal of Computer Science Issues 9.4 (2012): 146-150.