ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Turkish Sign Language Recognition Using Hidden Markov Model csandit
In past years, there were a lot of researches made in order to provide more accurate and comfortable interaction between human and machine. Developing a system which recognizes human gestures, is an important study to improve interaction between human and machine.
Sign language is a way of communication for hearing-impaired people which enables them to communicate among themselves and with other people around them. Sign language consists of hand gestures and facial expressions. During the past 20 years, researches were made to facilitate communication of hearing-impaired people with others.
Sign language recognition systems are designed in various countries. This paper presents a sign language recognition system, which uses Kinect camera to obtain skeletal model. Our aim was to recognize expressions, which are used widely in Turkish Sign Language (TSL). For that purpose we have selected 15 words/expressions randomly (repeated 4 times each by 3 different signers) which belong to Turkish Sign Language. We have used 180 records in total. Videos are recorded using Microsoft Kinect Camera and Nui Capture. Joint angles and joint positions have been used as features of gesture and achieved close to 100% recognition rates.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Turkish Sign Language Recognition Using Hidden Markov Model csandit
In past years, there were a lot of researches made in order to provide more accurate and comfortable interaction between human and machine. Developing a system which recognizes human gestures, is an important study to improve interaction between human and machine.
Sign language is a way of communication for hearing-impaired people which enables them to communicate among themselves and with other people around them. Sign language consists of hand gestures and facial expressions. During the past 20 years, researches were made to facilitate communication of hearing-impaired people with others.
Sign language recognition systems are designed in various countries. This paper presents a sign language recognition system, which uses Kinect camera to obtain skeletal model. Our aim was to recognize expressions, which are used widely in Turkish Sign Language (TSL). For that purpose we have selected 15 words/expressions randomly (repeated 4 times each by 3 different signers) which belong to Turkish Sign Language. We have used 180 records in total. Videos are recorded using Microsoft Kinect Camera and Nui Capture. Joint angles and joint positions have been used as features of gesture and achieved close to 100% recognition rates.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
An Automatic Attendance System Using Image processingtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
Text and Object Recognition using Deep Learning for Visually Impaired Peopleijtsrd
the main aim of this paper is to aid the visually impaired people with object detection and text detection using deep learning. Object detection is done using a convolution neural network and text recognition is done by optical character recognition. The detected output is converted into speech using text to the speech synthesizer. Object detection comprises of two methods. One is object localization and the other is image classification. Image classification refers to the prediction of classes of different objects within an image. Object localization infers the location of objects using bounding boxes. R. Soniya | B. Mounica | A. Joshpin Shyamala | Mr. D. Balakumaran "Text and Object Recognition using Deep Learning for Visually Impaired People" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31508.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31508/text-and-object-recognition-using-deep-learning-for-visually-impaired-people/r-soniya
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
This article lists the results of an experimental test of algorithms for recognizing ear tags. Like most biometric technologies, one of the key issues is the separation of the characteristic image, which is also included in the recognition of the person on the basis of the ear studship. Because the accuracy and accuracy of the program depends on the criteria for recognizing the person on the basis of any biometric technology. Therefore, by distinguishing the problem of discrete cosine exchange, using the main component method and algorithms for separation, the characteristic sign of the ear stud was detected. These algorithms can be used to develop personal identification systems based on earphones. by Djuraeva Rano Bahrombekovna, Mukhammadiev Alisher Numonhan-ugli, Khodjaeva Mavluda Sabirovna and Jumaev Turdali Saminjonovich 2020. Explaining Aluminous Ascientification Of Significance Examples Of Personal Study On Personal Identity. International Journal on Integrated Education. 2, 1 (Mar. 2020), 48-52. DOI:https://doi.org/10.31149/ijie.v2i1.287. https://journals.researchparks.org/index.php/IJIE/article/view/287/280 https://journals.researchparks.org/index.php/IJIE/article/view/287
Hand gesture recognition system has received great attention in the recent few years because of its manifoldness applications and the ability to interact with machine efficiently through human computer interaction. In this work Hand segmentation using color models is introduced for obtaining hand gestures or detecting user’s hand by color segmentation technique for faster, better, robust, accurate and real-time applications. There are many such color models available for human hand and human skin detection with relative advantages and disadvantages in the field of Image Processing. For the purpose of hand Segmentation mix model approach has been adopted for best results. For detection of Hand from an image. The proposed approach is found to be accurate and effective for multiple conditions
Facial emotion detection on babies' emotional face using Deep Learning.Takrim Ul Islam Laskar
phase- 1
Face Detection.
Facial Landmark detection.
phase- 2
Neural Network Training and Testing.
validation and implementation.
phase - 1 has been completed successfully.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
The modern education system is an essential part of the rise of technology. The E-learning education system is not just an experimental system; it is a vital learning system for the whole world over the last few months. In our research, we have developed our learning method in a more effective and modern way for students and teachers. For significant implementation, we are implementing convolutions neural networks and advanced data classifiers. The expression and mood analysis of a student during the online class is the main focus of our study. For output measure, we divide the final output result as attentive, inattentive, understand, and neutral. Showing the output in real-time online class and for sensory analysis, we have used support vector machine (SVM) and OpenCV. The level of 5*4 neural network is created for this work. An advanced learning medium is proposed through our study. Teachers can monitor the live class and different feelings of a student during the class period through this system.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
An Automatic Attendance System Using Image processingtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
Text and Object Recognition using Deep Learning for Visually Impaired Peopleijtsrd
the main aim of this paper is to aid the visually impaired people with object detection and text detection using deep learning. Object detection is done using a convolution neural network and text recognition is done by optical character recognition. The detected output is converted into speech using text to the speech synthesizer. Object detection comprises of two methods. One is object localization and the other is image classification. Image classification refers to the prediction of classes of different objects within an image. Object localization infers the location of objects using bounding boxes. R. Soniya | B. Mounica | A. Joshpin Shyamala | Mr. D. Balakumaran "Text and Object Recognition using Deep Learning for Visually Impaired People" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31508.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31508/text-and-object-recognition-using-deep-learning-for-visually-impaired-people/r-soniya
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
This article lists the results of an experimental test of algorithms for recognizing ear tags. Like most biometric technologies, one of the key issues is the separation of the characteristic image, which is also included in the recognition of the person on the basis of the ear studship. Because the accuracy and accuracy of the program depends on the criteria for recognizing the person on the basis of any biometric technology. Therefore, by distinguishing the problem of discrete cosine exchange, using the main component method and algorithms for separation, the characteristic sign of the ear stud was detected. These algorithms can be used to develop personal identification systems based on earphones. by Djuraeva Rano Bahrombekovna, Mukhammadiev Alisher Numonhan-ugli, Khodjaeva Mavluda Sabirovna and Jumaev Turdali Saminjonovich 2020. Explaining Aluminous Ascientification Of Significance Examples Of Personal Study On Personal Identity. International Journal on Integrated Education. 2, 1 (Mar. 2020), 48-52. DOI:https://doi.org/10.31149/ijie.v2i1.287. https://journals.researchparks.org/index.php/IJIE/article/view/287/280 https://journals.researchparks.org/index.php/IJIE/article/view/287
Hand gesture recognition system has received great attention in the recent few years because of its manifoldness applications and the ability to interact with machine efficiently through human computer interaction. In this work Hand segmentation using color models is introduced for obtaining hand gestures or detecting user’s hand by color segmentation technique for faster, better, robust, accurate and real-time applications. There are many such color models available for human hand and human skin detection with relative advantages and disadvantages in the field of Image Processing. For the purpose of hand Segmentation mix model approach has been adopted for best results. For detection of Hand from an image. The proposed approach is found to be accurate and effective for multiple conditions
Facial emotion detection on babies' emotional face using Deep Learning.Takrim Ul Islam Laskar
phase- 1
Face Detection.
Facial Landmark detection.
phase- 2
Neural Network Training and Testing.
validation and implementation.
phase - 1 has been completed successfully.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
The modern education system is an essential part of the rise of technology. The E-learning education system is not just an experimental system; it is a vital learning system for the whole world over the last few months. In our research, we have developed our learning method in a more effective and modern way for students and teachers. For significant implementation, we are implementing convolutions neural networks and advanced data classifiers. The expression and mood analysis of a student during the online class is the main focus of our study. For output measure, we divide the final output result as attentive, inattentive, understand, and neutral. Showing the output in real-time online class and for sensory analysis, we have used support vector machine (SVM) and OpenCV. The level of 5*4 neural network is created for this work. An advanced learning medium is proposed through our study. Teachers can monitor the live class and different feelings of a student during the class period through this system.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
This project investigates the use of face recognition for a surveillance system. The normal video surveillance system uses in closed-circuit television (CCTV) to record video for security purpose. It is used to identify the identity of a person through their appearances on the recorded video, manually. Today’s video surveillance camera system usually not occupied with a face recognition system. With some modification, a surveillance camera system can be used as face detection and recognition that can be done in real-time. The proposed system makes use of surveillance camera system that can identify the identity of a person automatically by using face recognition of Haar cascade classifier. The hardware used for this project were Raspberry Pi as a processor and Pi Camera as a camera module. The development of this project consist of three main phases which were data gathering, training recognizer, and face recognition process. All three phases have been executed using Python programming and OpenCV library, which have been performed in a Raspbian operation system. From the result, the proposed system successfully displays the output result of human face recognition, with facial angle within ±40°, in medium and normal light condition, and within a distance of 0.4 to 1.2 meter. Targeted image are allowed to wear face accessory as long as not covering the face structure. In conclusion, this system considered, can reduce the cost of manpower in order to identify the identity of a person in real time situation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
Human Resource Competencies: An Empirical AssessmentIJERDJOURNAL
ABSTRACT: Human beings are the essential part of the process. Today, technology and machines are taking over the human resource, as claimed by many people; but technology and machines can never replace human resource entirely. Humans are required for operating and maintaining these machines. Human resource is extremely important for developing or bringing about new and required changes to these machines and technologies. The study of the history and the current Human Resource Management trends points out some important facts
Prospects and Problems of Non-Governmental Organizations in Poverty Alleviati...IJERDJOURNAL
ABSTRACT: The World Bank sponsored Millennium Development Goals (MDGs), launched in 1990 envisaged a world free of poverty by the year 2015. The North-East (where Gombe State is centrally located) is experiencing significantly higher poverty and lack of progress in poverty reduction efforts. With coming to end of 2015, much still need to be done to attain the MDGs. With over 62.6% Nigerian population still very poor, there is need for a continuous search for alternative planning & development options that would help ameliorate poverty and sustained our dream for a world free of poverty and wants. This study examines the prospects and investigates the constraints of Non-Governmental Organizations (NGOs) in poverty alleviation and community development. Literature review, questionnaire and interview methods were used for the study. The findings revealed that: finance, continuity of projects/programmes, conflicts and insecurity were the major problems confronting the NGOs. An interesting revelation is that majority of the respondents indicated that they wait for the NGOs or Government to initiate poverty alleviation programmes/projects. The implication is that the community dwellers need attitudinal change necessary for self reliance. The prospect of NGOs in poverty alleviation and community development in the study area is very bright due to rapid population growth & increasing poverty levels with the attendant positive effects on urban planning and regional development. The study recommends that NGOs should (1) form an association to enable them work together, and utilize social capital in their operation/services. (2) seek to explore avenues for funding from donor agencies. Finally, the Government needs to address some of its short comings.
Development of Regression Model Using Lasso And Optimisation of Process Param...IJERDJOURNAL
ABSTRACT:- Metal Spinning is a concept of describing the forming of metal into seamless, axisymmetric shapes by a combination of rotational motion and force. Sheet metal spinning is one of the metal forming processes, which a flat metal blank is rotated at a high speed and formed into an axisymmetric part by a roller which gradually forces the blank on to a mandrel, bearing the final shape of the spun part. Over the last few decades, sheet metal spinning has developed significantly and spun products have been used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household‟s goods, rocket nose cones, gas cylinders etc. The objective of the current work is to develop the mathematical model for the spinning process with surface roughness as response and the input parameters as Mandrel speed (rpm), geometry of the Roller and Thickness of sheet (mm). Type of mandrel (EN8 Material) considered in the spinning process has the geometrical profile of parabola and single roller and double roller tools (EN8 Material) are used to deform the Al2024-T3 sheet metal paper aims to understand the process parameters that affect the surface finish of the spun component. Full factorial Design of Experiments technique is used to find the minimum number of experimental trials that are required to develop the regression model. A regression model using Least Absolute Shrinkage and Selection Operator (Lasso) is developed to further deepen the understanding between the input parameters and the surface roughness. The model was optimised using Sequential Quadratic Programming.
Use of Satellite Data for Feasibility Study And Preliminary Design Project Re...IJERDJOURNAL
ABSTRACT: In the developing countries like India, need of infrastructure is very high as compared to the available resources. The various organizations put their demands to state and center government for sanction of their project, government depends upon its various department to provide an approximate cost so that priorities can be assigned. The conventional procedure depends upon the land surveying, collection of data from various departments resulting in delay in necessary decision making or some time shelving due to unreasonable cost estimate due to field data being very old. Survey of India, The National Survey and Mapping Organization single handily taking this responsibility thus up gradation of data is far behind the actual development. From the satellite data, which is available in the form of images and terrains (even in 3d LiDAR points for some areas) is very useful for Feasibility Study, and Preliminary Project Report. In the present study natural drain named „Chai Nala‟ meanders through the prime property of Greater Mohali Area Development Authority (GMADA) thus making a big chunk of commercial land inoperative. It was proposed to straighten and channelize to reclaim the land from drain regime. Being the precious land department wanted the most economical and technically sound design without taking any risk. It was decided to counter check the hydraulic data, ground profile, acquired from the Punjab Irrigation Department with the satellite data and Differential Global Positioning System (DGPS). The data from the Google Earth was acquired using Cad Earth software and water shed analysis was carried out using Autodesk Civil 3D software. Comparison of results shows that this technique is quite useful and can be for preliminary feasibility and project preparation. Thus saving huge money and time.
Microwave Assisted Sol Gel Synthesis of Magnesium Oxide(Mgo)IJERDJOURNAL
ABSTRACT: Magnesium oxide (MgO) nanoparticles have been synthesized by Microwave assisted Sol gel synthesis method by using the precursors citric acid (C2O4H2) and magnesium chloride (Mgcl2.6H2O). It is a simple, novel and cost effective method. The structure, morphology and crystalline phase of the magnesium oxide nanocrystals have been investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray diffraction (XRD).Presence of functional groups and optical characters are analyzed by using FTIR and UV- visible techniques
Development of Enhanced Frequency Drive for 3-Phase Induction Motors Submitte...IJERDJOURNAL
ABSTRACT: Three-phase induction motors produce mechanical power by electromagnetic induction and run on a 3-phase ac supply. They require efficient speed control, to enable them do variable speed operations, save power consumption and reduce machine noise. In this dissertation, a new switching device called MosControlled Thyristor (MCT) for frequency drive is introduced. Based on the new switching device and AT89C52 microcontroller, an enhanced frequency drive for controlling the speed and torque of 3-phase 15kW squirrel cage induction motor is modeled. Different voltages ranging from 342V to 415V and frequencies ranging from 50Hz to 60Hz are used in a systematic manner to simulate the system based on the new switching device. The simulation program is written in C language and tested with Proteus 7.6 simulation software. Voltage and frequency have significant impact on the actual speed and torque of the motor. Simulation results show that with the new model, the torque (56.66Nm) developed by the motor which is constant throughout each speed range is directly proportional to the ratio (6.7:1) of the applied voltage and the frequency of the supply and the selected speeds (1450, 1510, 1570, 1630, 1690 and 1750 rpm) are locked irrespective of change in load. This is unlike other models where magnetic saturation and conduction drop of IGBT lead to voltage/frequency imbalance resulting in excessive drawing of current by the motor and overheating. This new control method has a speed regulation of ±2 to 3% of maximum frequency, speed response of 3Hz, speed control range of 1: 40 and efficiency of 88%, as further advantages. Comparison of the system with other speed control techniques shows improved energy-saving, cost effectiveness and safety in operation. The contributions of this research aim to make Volts per Hertz speed control method based on MCT a reliable better alternative to other well known methods in speed control of three-phase induction motors
Short-Term Load Forecasting Using ARIMA Model For Karnataka State Electrical ...IJERDJOURNAL
ABSTRACT: Short-term load forecasting is a key issue for reliable and economic operation of power systems. This paper aims to develop short-term electric load forecasting ARIMA Model for Karnataka Electrical Load pattern based on Stochastic Time Series Analysis. The logical and organised procedures for model development using Autocorrelation Function and Partial Autocorrelation Function make ARIMA Model particularly attractive. The methodology involves Initial Model Development Phase, Parameter Estimation Phase and Forecasting Phase. To confirm the effectiveness, the proposed model is developed and tested using the historical data of Karnataka Electrical Load pattern (2016). The forecasting error of ARIMA Model is computed and results have shown favourable forecasting accuracy.
Optimal Pricing Policy for a Manufacturing Inventory Model with Two Productio...IJERDJOURNAL
ABSTRACT: When a new product is launched, a manufacturer applies the strategy of offering a quantity incentive initially for some time to boost up the demand of the product. The present paper describes a manufacturing inventory model with price sensitive demand enhanced by a quantity incentive. Later on demand becomes time increasing also. Inventory cycle starts with low production rate which is followed by higher production rate when demand is boosted up. Shortages are not allowed in this model. Presentation of numerical examples, tables, graphs and sensitivity analysis describes the model very well. Lastly case without incentive illustrates that usually the quantity incentive offered initially is beneficial.
Analysis of failure behavior of shear connection in push-out specimen by thre...IJERDJOURNAL
ABSTRACT:- This study analyzes the failure mechanism of shear connection by three-dimensional finite element analysis (FEA) of push-out specimens that was practically unaffordable experimentally or by twodimensional FEA. For the analysis of the failure behavior of the compression strut formed in the loaded concrete member, the three-dimensional principal stress space is transformed into two-dimensional space by means of the relation between the hydrostatic stress and the deviatoric stress. The analysis of the stress state in the compression strut revealed that the deviatoric stress increases with larger load particularly in the concrete surrounding the lower part of the shear stud. Accordingly, bearing failure of concrete occurred locally within a limited region in the slab. The steep increase of the deviatoric stress accompanying the increase of the load resulted in the failure of concrete around the lower part of the shear stud, which in turn provoked the deformation and the development of bending moment of the shear stud. Finally, plastic hinge formed in the shear stud leading it to reach its limit state. The proposed finite element model can also be used to model the shear connection of the composite beam and, the proposed stress analysis method can be applied to analyze its composite action behavior.
Discrete Time Batch Arrival Queue with Multiple VacationsIJERDJOURNAL
ABSTRACT:- In this paper we consider a discrete time batch arrival queueing system with multiple vacations. It is assume that the service of customers arrived in the system between a fixed intervals of time after which the service goes on vacations after completion of one service of cycle is taken up at the boundaries of the fixed duration of time. This is the case of late arrival. In case of early arrival i.e. arrival before the start of next cycles of service. If the customer finds the system empty, it is served immediately. We prove the Stochastic decomposition property for queue length and waiting time distribution for both the models.
Regional Rainfall Frequency Analysis By L-Moments Approach For Madina Region,...IJERDJOURNAL
ABSTRACT:- In arid regions, extreme rainfall event frequency predictions are still a challenging problem, because of the rain gauge stations scarcity and the record length limitation, which are usually short to insure reliable quantile estimates. Regional frequency analysis is one of the popular approaches used to compensate the data limitation. In this paper, regional frequency analysis of maximum daily rainfall is investigated for Madinah province in the Western Kingdom of Saudi Arabia (KSA). The observed maximum daily rainfall records of 20 rainfall stations are selected from 1968 to 2015. The rainfall data is evaluated using four tests, namely, Discordance test (Di), Homogeneity test (H), Goodness of fit test (Zdist) and L-moment ratios diagram (LMRD). The Di of L-moments shows that all the sites belong to one group (Di <3.0).><1). Finally, the Zdist is used to evaluate five probability distribution functions (PDFs) including generalized logistic (GLO), generalized extreme value (GEV), generalized normal (GNO), generalized Pareto (GPA), and Pearson Type III (PE3). Zdist and LMRD both showed that PE3 distribution is the best among the other PDFs. The regional parameters of the candidate PDF are computed using L-moments approach and accordingly the regional dimensionless growth curve is developed. The results enhance the accuracy of extreme rainfall prediction at-sites and also they can be used for ungauged catchment in the region.
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
ABSTRACT: In this digital mobile world, it‟s need of time to streamline and increase efficiency in business processes like effective data collection, measurement, automatic validation, editing and estimation of measurement data, analysis and dashboard for forecasting and ease in end user accessibility with Just in Time. This paper is following two methodology in this process. CEMLI is an extensive framework for developing and implementing for Oracle whereas OUM is business process and use case driven process which supports products, tool, technologies and documentation. This paper have focused on analytical data, system automation functionality along with prototype designing. For this, analysts and administrators will collect and define calculation rule for data collection and measurement, deployment methods, dashboards and security features. This paper gives measure understanding of cloud technologies and their features like services (SaaS), deployment methods, security and ability to reduce overhead cost, downtime, and automate business processes with 360 degree review and analysis. It consolidates data in one system with volumes of analog and interval data which facilitates new customer with offering and effective program. Also it maximizes return on investments and protects revenue through comprehensive exception management.
Business Intelligence - A Gift for Decision Maker for the Effective Decision ...IJERDJOURNAL
ABSTRACT: Business Intelligence is a socio-technical concept emerged to help managers especially in their decision making tasks. A manager with different decision making styles has been started to make use of business intelligence in their own ways. Are the all managers taking benefits of Business intelligence in the same way? Does Business intelligence give each category what they want in the decision making process? If the answer to these questions is – No, then what is the expectation of managers from BI having different decision making style? Will BI could satisfy their needs? If yes, then how? By using well-formed theory in different styles of decision making and taking BI capabilities into consideration this paper highlights the framework which defines appropriate BI capabilities with each decision making style. Study shows in order to serve each style of decision in which BI capabilities changes with respect to style. It is believed that by making BI customized based on decision making styles; BI would be the much more successful in serving all the categories of managers
Effect of Water And Ethyl Alcohol Mixed Solvent System on the Stability of Be...IJERDJOURNAL
ABSTRACT: The stabilities of ternary complexes of metal ions (copper, nickel, zinc and cobalt) with betahydroxy ketone(BHK) derivatives and benzotriazole(BTAZ) derivatives in various mixed solvent systems (Water+Ethyl Alcohol) medium in 0.1 M KNO3 ionic strength at 250C using pH metric titration method have been established. The data reveal that the copper forms more stable complexes, which is followed by zinc and Ni complexes with these ligands. Cobalt form less stable complexes with these ligands. The stabilities of these complexes are further quantified with Δ log K values, intra-molecular equilibrium constants and percentage of stacking interaction in the ternary systems. The observed positive Δ log K values suggest that the flexible side chain alkyl moiety (ethyl group, butyl group) or aromatic moiety (phenyl group) in BHK ligand overlaps with the fixed aromatic moiety of BTAZ ligand in the ternary complex, which results in the enhanced stabilities for the (BHK-Alk)-Metal(II)-BTAZ and (BHK-Ph)-Metal(II)-BTAZ systems. Interestingly, the positive Δ log K values for both BHK-Alk and BHK-Ph ligands in their corresponding ternary complexes are about the same. This suggests the flexible Alkyl or phenyl side chain of BHK is overlapping with the triazole ring, but not the phenoxy ring of the BTAZ ligand.
Design of Synthesizable Asynchronous FIFO And Implementation on FPGAIJERDJOURNAL
ABSTRACT: This paper presents a design of asynchronous FIFO which, along with the regular status signals, consists of some extra status signals for more user-friendly design and added safety. Gray code pointers are used in the design. For synchronisation purpose, two synchroniser modules are used which contain two D-flip-flops each. The design is implemented and synthesised at register transfer level (RTL) using Verilog HDL. Simulation and implementation is done using Xilinx ISE Design Suite. Further, the design is implemented on Basys 2 Spartan-3E FPGA Board. Asynchronous FIFO is used to carry out steady data transmission at high speeds between two asynchronous clock domains.
Prospect and Challenges of Renewable Energy Resources Exploration, Exploitati...IJERDJOURNAL
ABSTRACT: This paper enumerates the status and challenges of exploration, exploitation and development of renewable energy resources and its roles in sustainable development in Africa. A brief review of energy and renewable energy resources in Africa was succinctly done. The concept of sustainable development as it borders on the Renewable Energy Technologies and their roles were also discussed. The challenges facing the acceptance, deployment and promotion of Renewable Energy Technologies in Africa were also highlighted. The barriers were classified as; policy, regulation and institutional; information and technical capacity and financial. Recommendations were made towards solving problems peculiar to exploration, exploitation and development of Renewable Energy in entirety in Africa.
Power Quality Disturbaces Clasification And Automatic Detection Using Wavelet...IJERDJOURNAL
Abstract— In this paper a development method to detect and classify the several power quality problems using the discrete wavelet transformation and artificial neural networks combined. There are several other methods in use to detect the same problem like Hilbert transform, Gabor transform, Gabor-Wigner transform, S transform, and Hilbert-Haung transform. The method of using wavelet and ANN includes the development of voltage waveforms of sampling rate and number of cycles, and also large number of power quality events with help of MATLAB software. The wavelet transformation and ANN tools used to get required coefficients. The obtained events of power quality monitored in each step to classify the particular event. These steps of the paper lead towards the automatic real time monitoring, detection and classification of power signals
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 13, Issue 8 (August 2017), PP.52-62
52
An Iot Based Smart Manifold Attendance System
*
Dr.Sanjay Jain1,Syeda Sana2,Theertha Prabhakaran3,Liby Ann Baby4
1HOD, Department of ECE, New Horizon College of Engineering, Bangalore, India.
2UG Student , Department of ECE, New Horizon College of Engineering, Bangalore, India.
3UG Student , Department of ECE, New Horizon College of Engineering, Bangalore, India.
4UG Student , Department of ECE, New Horizon College of Engineering, Bangalore, India.
Corresponding author:
*
Dr.Sanjay Jain
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational
institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight
of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed /
scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one
will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that
means employing passive attendance, where at a time, the attendance of multiple people can get captured. We
have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the
attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed
system, creation of database and face detection is done by using the concepts of bounding box, whereas for face
recognition we employ histogram equalization and matching technique.
Keywords:- Bounding box, Face detection, Face recognition, Histogram, Manifold (passive)
I. INTRODUCTION
The traditional attendance technique involves human to human interaction (attendance slip being
passed from teacher to peon) and human to computer interaction (teacher updates the attendance in the system).
While a normal working day comprises of 7 to 8 hours of class, even if a minimal of 10 minutes each is devoted
for attendance, it sums up to approximately 80 minutes per day. This is truly increasing the plight of the teacher.
Advancements in attendance included techniques like retinal scanning, fingerprint scanning, face recognition.
Smart Manifold Attendance using Real Time Face Recognition is a real world solution to the existing issues in
traditional methods. This system consists of four phases - face database, face detection, face recognition and
marking attendance. Image acquisition is accomplished using a camera fitted in the classroom. The system first
stores the faces in the database. The faces of students are detected / located from the image captured in real time.
The detected faces are then compared with those stored in the database during face recognition. If the system
recognizes faces, the attendance gets marked immediately in the excel sheets. Also, we send hourly text
messages to parents, of wards that are absent. Teachers‟ attendance is monitored as well. As per VTU, 52 hours
need to be completed per subject and this purpose is also served in the proposed system on a MATLAB
platform.
II. METHODOLOGY
This section discusses starting from the creation of database, face detection, recognition of faces from
the captured image and performing appropriate attendance updating and monitoring without any human
intrusion.
The step by step procedure for implementation is as follows:
Step 1: Creation of database
Step 2: Capturing a classroom image in real time from a web camera
Step 3: Detecting/Locating faces in the captured image
Step 4: Recognising faces i.e comparing the detected faces with those present in the database.
Step 5: Updating Excel sheets
Step 6: Sending text messages using GSM module
Step 7: Sending mail containing summary of the attendance
Step 8: Updating ThingSpeak page
Fig 1 shows the architecture of the manifold attendance system . An image of the classroom is
captured from the camera, in our prototype the images are already fed into the system and the image is given to
2. An Iot Based Smart Manifold Attendance System
53
the MATLAB environment for further processing in order to extract faces from the group picture. Face
recognition is performed to determine if the student is present or absent. After which, the corresponding details
are given to the GSM module where text messages are sent and attendance summary is mailed to the HOD. IOT
concepts are employed to provide ease in attendance tracking.
Fig 1: Proposed architecture for manifold attendance system
A. Creating Database: Acquisition from Live Streaming Video
It is necessary to store the images of all the students in an organization. To facilitate ease in doing so,
live video acquisition is done so that snapshots are taken from a live video. The user will be first asked to enter
the USN of the student like so:
A. Creating Database: Acquisition from Live Streaming Video
It is necessary to store the images of all the students in an organization. To facilitate ease in doing so,
live video acquisition is done so that snapshots are taken from a live video. The user will be first asked to enter
the USN of the student like so:
Fig 2:Interface for entering USN
3. An Iot Based Smart Manifold Attendance System
54
After which, the video player gets enabled .Face Detect function helps to locate the face and returns the
row-column where the face begins and the face ends. Using this, a bounding box is drawn. Point Tracker
stabilizes the video and provides camera motion estimation.
Fig 3: Live stream
Fig 4: Snapshots and cropped faces
4. An Iot Based Smart Manifold Attendance System
55
Fig 5: Database created
B. Image Acquisition
Image acquisition in general involves the capturing or getting an image from a source. In real time
implementation of smart attendance monitoring system, a webcam or a HD camera is fixed at a suitable
position, create a webcam object and then use the snapshot function to acquire images from a webcam. We can
acquire a single image or set up a loop to acquire multiple images and use the preview function to test the
camera stream. The MATLAB GUI (Graphical User Interface) is implemented using the GUIDE option
available in MATLAB.
C. Face Detection
Face detection is the computer technology that identifies the human faces in digital images. A human
can do this easily, but a computer requires precise instructions and constraints. MATLAB provides an inbuilt
function called Cascade Object Detector to locate the faces in the captured image .This inbuilt function make
use of the Viola Jones algorithm that detects the eyes, nose, face in the upper portion of the body. To make the
task more manageable, Viola Jones requires full view frontal upright faces. Thus, in order to be detected, the
entire face must point towards the camera and should not be tilted to either side. The goal is to distinguish
between faces and non-faces. Skin color varies with many facts such as race, health, degree of sun tan etc.
Consider an example of a captured image in which two faces are detected. The pixels that are closely related to
skin pixels appear white. The pixels that have a drastic change in the pixel value compared to the previous
pixels collectively appear as black. A pixel value is classified as skin pixel if its value falls within the threshold.
5. An Iot Based Smart Manifold Attendance System
56
Fig 6 : Creation of Bounding Box on detected faces.
Once the faces are identified in the captured image, they need to be demarcated which is employed by using the
concept of bounding box. A bounding box represents the co-ordinates of the rectangular border thatencloses a
digital image, It uses the co-ordinates at the initial and the final point where it recognizes the skin pixels to form
diagonal and thereby draw the rectangle.
Each row in the matrix of the bounding box represents a face been detected. Thus, the number of rows gives the
number of faces that are located in the captured image and thereby the number of students present in each class.
The faces that are pointed by bounding box (Fig 5) are cropped and fed as input for further processing.This
concept is used when there is a single student in case of data base creation or multiple students in case of real
time attendance monitoring.
D. Face Recognition
For face recognition, we employ the technique of histogram equalization.
The steps involved are:
1. Consider an image as shown below, whose pixel values are represented using 3-bit data. There are 8
possible grey levels ranging from 0-7
2. Determine Pixel frequency and their respective pixel probability P(i).
6. An Iot Based Smart Manifold Attendance System
57
Fig 7: Results of steps in histogram equalization and enhanced image matrix.
E. Face Matching
First value of the test_processed_bin (histogram values of the detected face) is then compared with all the
values of train_processed_bin (histogram values of image in the database) to determine a certain distance
given by EU =
{a –b} ; where a= test_processed_bin, and b= train_processed_bin The EU values corresponding to each of
the images are stored as img_bin_hist_sum which is a single columned matrix.
By using the function min, we can determine the minimum value „M‟, as well as the corresponding index
„temp‟ of that value „M‟ present in a matrix. This function is used to determine the minimum EUand is
stored as M. [ temp M] = min ( img_bin_hist_sum );
The bin value is used to differentiate histograms of different people. i.e. The obtained M value is divided by
this bin value and rounded off to nearest positive infinity and updated. The value hence gives the folder
number where the image histogram match was found.
Depending on the folder found, the first image present is selected by default and displayed as
“STUDENT NAME FACE FOUND”.
F. Updating Excel Sheets
Some key features of the excel sheets include:
Column A is dedicated for the list of students.
Column B is dedicated for the USN numbers of respective students.
A total of 10 classes will be taken for each of the 4 subjects from column C to L
Percentage calculation is done using the formula :
(Number of classes attended / Total number of classes taken)
7. An Iot Based Smart Manifold Attendance System
58
Fig 8: Excel sheet corresponding to 10 students and 10 classes
G. Sending Messages
Serial communication is used and appropriate port name must be included to activate it. Character „A‟
is sent to the controller which then uses Send SMS function to send the message employing the GSM module.
Likewise, a unique character will be assigned for each student like „B‟,‟C‟ and so on and in case of student‟s
absence, that particular character is considered, from which the students name is decoded and this will be sent to
LCD for displaying.
H. Sending Mail
Function sendmail (recipient, subject, message, attachments) is used to mail the updated sheet to the
email-id specified. We use JAVA concepts to initialize the mail sending process, SMTP and setting preferences.
I. Implementation of IOT
The Internet of Things (IOT) is a system of „connected things‟. The things generally comprise of an
embedded operating system and an ability to communicate with the internet or with the neighbouring things.
One of the key elements of a generic IOT system that bridges the various „things‟ is an IOT service. An
interesting implication from the „things‟ comprising the IOT systems is that the things by themselves cannot do
anything. At a bare minimum, they should have an ability to connect to other „things‟. But the real power of IOT
is harnessed when the things connect to a „service‟ either directly or via other „things‟. In such systems, the
service plays the role of an invisible manager by providing capabilities ranging from simple data collection and
monitoring to complex data analytics. The below diagram illustrates where an IOT service fits in an IOT
ecosystem. One such IOT application platform that offers a wide variety of analysis, monitoring and
counteraction capabilities is „ThingSpeak‟. The channel page settings and display of attendance on ThingSpeak
is shown in Fig 12.
8. An Iot Based Smart Manifold Attendance System
59
III. RESULTS
All This section mainly shows the experimented results of the implemented algorithm. Each steps of
the algorithm is executed in the MATLAB and all the expected results are discussed below. Fig 9 shows the
overview of the GUI model, the algorithm is developed in MATLAB using graphical user interface (GUI), the
platform of MATLAB which enables to develop a devise without any hardware requirement. Let us consider a
test case where only two students are present. The teacher enters the subject name and the class number as well,
where the corresponding excel sheet is selected. By clicking on the „capture‟ ushbutton an image of classroom
is captured. Fig 10 shows how the faces are detected and cropped. These faces are temporarily stored which is
then compared with the faces present in the database on clicking the „Test‟ pushbutton. Here the technique of
histogram matching is employed as discussed earlier where the best face is matched. The face under test, the
matched face is then displayed as shown in Fig 11. Based on the faces recognised excel sheets are updated and
on clicking the „Send Message‟ and „Send Mail‟ pushbuttons text messages and mail is sent respectively as
shown in Fig 12. All the above discussed steps can be carried out at one stretch without any intervention with
LIVE pushbutton, where each step will be executed one after another with a mentioned time span.
Fig 9: Overview of GUI
Fig 10: Test case considered
9. An Iot Based Smart Manifold Attendance System
60
Fig 11: Dialogue box display for detected faces
Fig 11: Screenshots of how text messages and mail is received
10. An Iot Based Smart Manifold Attendance System
61
Fig 12: Details of channels created and display of student attendance on ThingSpeak
11. An Iot Based Smart Manifold Attendance System
62
IV. CONCLUSIONS
A study of image processing techniques and the existing attendance techniques was done and the
MATLAB program for the manifold recognition of students in a captured classroom picture was successfully
ccomplished. The attendance sheets were created using MS-Excel. The interface of LPC2148 with LCD, GSM
module was done. IOT assistance was successfully provided using ThingSpeak. The program corresponding to
hardware flow was written in Kiel u4, dumped on the controller using Flash magic
and was successfully tested.
ACKNOWLEDGMENT
All work done, images shown in this paper are for educational purpose only and not for commercial purpose.
REFERENCES
[1]. “Performance evaluation and comparison of PCA based, face recognition methods for distorted
Images”,
[2]. B.Poon, M.Ashraful Amin, Hong Yan, International Journal of Machine learning and cybernetics,
Volume 2, July, 2011.
[3]. “Face Recognition and Verification using Histogram Equalization” by Kelsey, Ramiraz, Daniel,
Hector,
[4]. Postgraduate Section of Studies and Investigation Mechanical and Electrical Engineering School,
National
[5]. Polytechnic Institute. Av, International Journal of Scientific & Engineering Research Volume 3, Issue
12, December-2012
[6]. Face recognition based attendance management system by using embedded Linux by T Muni Reddy, V
[7]. Prasad, N V Ramanaiah, IJERST, May 2015
[8]. MATLAB GUI Tutorial for Beginners-https://www.youtube.com
[9]. https://www.mathworks.com/matlabcentral/answers/32137-use-video-live-stream
[10]. https://thingspeak.com/pages/how_to
[11]. Rectangle around the object, Bounding box – https://in.mathworks.com
*Dr.Sanjay Jain. “An Iot Based Smart Manifold Attendance System.” International Journal of
Engineering Research and Development, vol. 13, no. 08, 2017, pp. 52–62.