Human face detection and recognition is an important technology used in various applications such as video monitor system. Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students, there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the student.
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
"Attendance Management System bridges the effective communication between students, teachers, and parents by keep them notified about their wards' attendance via Email or SMS.
A.T.S.I. offers best biometric attendance management system, face recognition attendance system, fingerprint based attendance system, and RFID based attendance system and gives flexibility to institutions to choose the suitable system for them."
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
"Attendance Management System bridges the effective communication between students, teachers, and parents by keep them notified about their wards' attendance via Email or SMS.
A.T.S.I. offers best biometric attendance management system, face recognition attendance system, fingerprint based attendance system, and RFID based attendance system and gives flexibility to institutions to choose the suitable system for them."
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39856.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39856/face-recognition-based-attendance-system-using-machine-learning/benazir-begum-a
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39856.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39856/face-recognition-based-attendance-system-using-machine-learning/benazir-begum-a
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
Biometric systems are used for identifying and recognizing individual characteristics on the basis of biological or behavioral features. In the research work, a biometric fusion system based on fingerprint and face using the artificial intelligence technique is proposed. To achieve better accuracy of the biometric fusion system, the uniqueness of feature is significant. To find out the unique feature set from the data, we have used different feature extraction algorithm in the proposed biometric fusion system. Initially, pre-processing has been applied on the test images which is used to remove the unwanted data from the uploaded image and return an appropriate data for further process. In the fingerprint part, minutia extraction is used as a feature of fingerprint whereas Extended Local Binary pattern (ELBP) is used for extracting features of face and creates a pattern of face features. To create a unique feature set, optimization algorithm is needed and we have used genetic algorithm as a feature optimization technique. In the proposed fusion system, ANN is used to classify the test data according to the trained ANN structure with optimized feature data of fingerprint and face. To check the efficiency of proposed fusion system, we have calculated the performance parameters like FAR, FRR and Accuracy. From the analysis of proposed fusion system, we have observed that the accuracy of the proposed work is better than the previous ones and it is more than the 94%. To design a proposed biometric fusion system, image processing toolbox is used under the MATLAB environment.
Face recognition technology is the least intrusive and fastest bio-metric technology invented so for. The accurate recognition of a person is the sole aim of a face recognition system and this identification may be used for further processing. The methods to exploit this physical feature have seen a great change since the advent of image processing techniques. Here, the camera detects and recognizes the persons while them entering the door and then sends their personal information to the host to generate a 3D Facial Model. The proposed system will update the attendance once the students face is match with the template database. This paper describes the working of the face recognition system that will be deployed as an Automated Attendance System in a classroom environment.
Framework on Retrieval of Hypermedia Data using Data mining Techniquerahulmonikasharma
Image Annotation is a method to reveal the meaning for a specific image .The embedded meaning in the image is identified and mined. The Scenario is identified through the image annotation scheme with in a provided training. The focus is on the blur images, noisy images and images with pixels lost. The image annotation can be done on the good resolution image. The analysis carried outon the image data to derive the information and image restoration takes place. Image mining deals with extracting embedded details, patterns and their relationship in images. Embedded details in the image could be extracted using high-level features that are robust. Inpainting techniques can be utilized for cleaning the image .The analytics is applied on enormous amount of data, techniques performed on the test images sets for better accuracy.
Ingerprint based student attendance system with sms alert to parentseSAT Journals
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimizationrahulmonikasharma
Till now there is a huge research had in the field of visual information retrieval, but with the growth of data and with less processing speed we are not meeting the needs of current problem. The main focus of this paper is to identify the objects with salient features and object highlighting. Till now object identification is done with the pixel based or with the region based. Different methodologies are compared in this work and they will be processed with the learning work. Multi scale contrast is one of the pixel based technology where object borders are identified but not the object. This can be done with the histogram contrast. Still it is not covering all the features of the object and it is not clear in identifying the objects at high contrast regions. To solve this issue region based contrasting method is used which is the better solution for all this object identification. After extracting the features and identifying the object, now auto classification or identification of the object should be done. The other part of the work mainly concentrates on the learning system which uses most popular neural network algorithms. Identifying the drawbacks of neural network algorithms and proposing the new methodology identify the objects is done in this paper.
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
Automatic attendance system is one of the significant issues of today’s research. Among other methods, human face recognition is highly used technique for attendance automation. Many systems have been proposed in literature using face recognition. Most of the systems are using fixed camera and desktop computers. We propose a system using mobile phones where an image is captured of group of peoples and face detection is done automatically. While considering computational and storage power of mobile devices, extracted local binary features for detected faces are then transferred to server machine using firebase database. Matching is done on server side, if face recognized than attendance is marked and feedback is sent back to client side. Experiments show effectiveness of proposed techniques with 95% correct recognition rate.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
Automatic Attendance Using Face Recognition
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 24 – 27
_______________________________________________________________________________________________
24
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Automatic Attendance Using Face Recognition
Ms. Pooja Humbe, Ms. Shivani Kudale, Ms. Apurva
Kamshetty
Trinity College of Engineering and Research
University of Pune, India
humbepooja888@gmail.com
shivanikudale0@gmail.com
apurvakamshetty@gmail.com
Ms. Akshata Jagtap, Prof. Krushna Belerao
Trinity College of Engineering and Research
University of Pune, India
akshatajagtap36566@gmail.com
krushnabelerao@gmail.com
Abstract— Human face detection and recognition is an important technology used in various applications such as video monitor system.
Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that
systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a
method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis
algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students,
there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the
student.
Keywords- face detection and recognition, Principal Component Analysis(PCA), MySQL, feature extraction.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Student should attend the lectures regularly. This has at
the end of a semester constituted part of student final grade
.To mark attendance manually which take a lot of time from
the teaching process. To create and maintain the record of
attendance is compulsory in all schools, colleges. Hence
there are so many approaches of taking attendance like,
automatic attendance. Image processing is a special kind of
signal processing which performs operations on images, to
extract useful data from it. Input is image, and output is
image with great features. A Face Recognition system is an
application of image processing which performs two major
tasks of identifying and verifying a person from an image .In
traditional attendance system there are some issues like fake
attendance , time consumption, manipulation of attendance
and information cannot be secure. It is an application of
identifying or verifying a person from a digital image. It is
by comparing some facial features from the image and a
face database. Nowadays digital ease of use is very popular
than pen and paper.This digital growth results is popular for
less time consuming and accurate user identification and
verification. So, there are number of algorithms are
available from which we included Principal Component
Analysis (PCA) algorithm.
II. LITERATURE SURVEY
Image processing is consists of the input image, a
photograph; the output of may be an image or a set of
characteristics or parameters respect to the image. Image
processing is classified into two types. They are,
1. Analog image processing
2. Digital image processing
Two dimensional analog signals is processed by analog
image processing. Digital image processing is the use of
computer algorithms or image processing on digital images.
Digital image processing is performed on a two dimensional
image by a digital computer.
Facial recognition technology is a new way of identify
people. It works by picking faces out of a crowd, obtaining
the measurements and comparing it to the images already
present in the database. The manual method will be replaced
by automatic attendance system , which is takes a lot of time
and is hard to maintain.
In general, there are two known approaches to HFR,
i.e. feature-based and brightness-based approach. The
feature- based approach uses key point features of the face,
such as edges, eyes, nose, mouth, or other special
characteristics. Therefore, the calculation process only
covers some parts of the given image that have been
extracted previously. On the other hand, the brightness-
based approach calculates all parts of the given image. It is
also known as holistic-based or image-based approach.
Eigenface Approach
Eigenface approach is used ,it transforms faces into a
set of characteristics, eigenfaces which is considered as
training data. Recognition is done by projecting a new
image in the eigenface subspace, in which person is
classified by comparing its position in eigenface space with
the position of known individuals.
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 24 – 27
_______________________________________________________________________________________________
25
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Set of eigenvectors are known as eigenvectors if they
are used for human face recognition. The covariance matrix
of the probability distribution is used for derivation of
eigenvectors. To construct the covariance matrix, eigenface
form a basic set of all images. To represent the original
training images, it produces dimension reduction by
allowing the smaller set of basis images Classification can
be achieved by comparing how faces are represented by the
basis set.
1. In this paper , Initially video clip of classroom is
taken and is stored in the database, then video is converted
to images, then apply the face detection techniques to detect
the faces and then features extraction is done by Histogram
of Oriented Gradients and Local Binary Pattern algorithm.
[1]
2. In this paper, a method for student attendance
system in classroom using face recognition technique by
using Discrete Wavelet Transforms and Discrete Cosine
Transform to extract the features of student’s face which is
followed by use of Radial Basis Function for classifying the
facial components. [2]
3. In this paper, the proposed system describes a
method like when he enters the class room and marks the
attendance by extracting the image using Personal
Component Analysis algorithm. The system will mark the
attendance of the student and it will maintain a log of each
student of each subject and also generates a pdf report of the
student attendance. Using Simple Mail Transfer Protocol the
report will be sent to the faculty and also to the parents. [3]
III. SYSTEM REQUIREMENT
A. Software
PP Controller
XAMPP Controller is open source cross-platform, web
server solution database free software which contains the
MariaDB database Apache HTTP Server, and interpreters
for scripts which are written in the Perl and PHP
programming languages.
NetBeans
NetBeans is written in java,it is a software development
platform. Applications are developed from modules.
Applications are designed on the NetBeans Platform, with
integrated development environment (IDE), it can be
extended by third party and other developers.
Frontend
Java Advance(JSwing,Applet)
Backend
MySQL
B. Hardware
Camera
Specifications
Pan Angle: 360 degree
Connectivity: Ethernet, Fireware Focus Range: 100-150cm
It has Night Vision and Devices: Laptop, PC
Video Sensor Resolution: 1280*720 pixel Still Image Sensor
Resolution: 720 MPHD
IV. METHODOLOGY
The first step is that, the staff is provided with their
own Username and Password to Log-in. Next step is, the
training image and their features are stored in the database.
Then, testing image features are compared with the training
images. Once the image is identified, the attendance will be
registered. Finally, the attendance details of the student are
send to staff and parent through E-Mail.
1. Login.
2. Staff & Student Information.
3. Update Attendance.
4. Feature Extraction.
5. Feature classification
V. SYSTEM ARCHITECTURE
Figure 2. System Architecture
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 24 – 27
_______________________________________________________________________________________________
26
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Image Acquisition
Images can be acquired by facial-scan technology from
camera that captures images of better quality and resolution.
Pre-processing
First Image is cropped from acquired image. Then
cropped images are resized to some pixels for face
recognition. These resized images are converted from RGB
to Gray level.
Database (DB)
It stores the pre-processed images for further processing
and results.
Template Matching
It compares match templates against enrollment
templates. In identifying a single individual from a large
database, facial scan is not so effective as iris scan. After
large-scale facial-scan identification searches, numbers of
matches are returned.
Face Recognition
For face recognition or detection it compares selected
facial components from the image and a face database, it
identifies or verifies a person in image.
Face Database Generation
Original face database consists of images of all students
having 5 images per student. With change in intensity of
light and various facial expressions, the original database
images are acquired at various interval of time.
VI. ALGORITHM
Principal Component Analysis (PCA)
In this , a face contains set of important feature and
these are called Principal Components or Eigen Faces. By
implementing PCA Technique facial features are extracted
from original database.
Usage of PCA algorithm
1. For data analysis
2. In data mining and machine learning.
Benefits of PCA Algorithm
1. Very robust to outliers and data corruption
2. Speed and performance is good.
3. Identifying moving objects
4. Facial recognition.
Steps
1. Reduction of data into single vector.
2. Calculate mean of the data.
3. Calculate the covariance matrix.
4. Compute the eigenvalues and eigenvectors of
the covariance matrix.
5. Choosing component and forming a feature vector.
6. Deriving new data coordinates.
7. Approximation.
VII. CONCLUSION
The automated student attendance system using human
face recognition technique works nicely.The automatic
attendance management will replace the traditional method,
which takes a lot of time and is hard to maintain.
Certainly, it is improved for better result particularly by
paying attention in feature extraction or recognition process.
This improvement may help the recognition process become
more robust.
VIII. FUTURESCOPE
The current developed software is installed on the system,
i.e. it is a desktop application, and it will be used for some
institute. But later it can be updated so that it will be operate
as online application. Currently, the system has reached up
to some great accuracy level for partial and dense images. It
can further be improved to obtain higher accuracy level. It
can be automatically updated by the use of the concept of
Internet of Things.
ACKNOWLEDGMENT
The project on “Automatic attendance using face
recognition“ is a source of trending and immense
information to us. We would glad to express our sincere
gratitude to the “Trinity College of Engineering and
Research department of Computer Technology for the
guidance and most valuable support in the help for this
project work. We acknowledge with a pleasant gratitude, the
encouragement and inspiration received from our guide
Prof.Krushana Belerao, Head of the Department
Prof.Dr.S.B.Chaudhari , Principal Dr. P. Dabeer and
colleagues.
REFERENCES
[1] Aziza Ahmedi , Dr Suvarna Nandyal.” An Automatic
Attendance System using Image Processing.”The
International Journal Of Engineering And Science (IJES) ||
Volume || 4 || Issue || 11 || Pages || PP - 01-08|| 2015 ||ISSN
(e): 2319 1813 ISSN (p): 2319 1805
[2] Samuel Lukas , Aditya Rama Mitra , Ririn Ikana Desanti ,
Dion Krisnadi “Student Attendance System in Classroom
Using Face Recognition Technique.”
ieeexplore.ieee.org/document/7763360/
[3] D. Nithya.“Automated Class Attendance System based on
Face Recognition using PCA Algorithm.”Avinashilingam
Institute for Home Science and Higher Education for
Women, Coimbatore, India. (IJERT)ISSN: 2278-0181Vol.
4 Issue 12, December-2015.
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 24 – 27
_______________________________________________________________________________________________
27
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
[4] Dr. Nita Thakare , Meghna Shrivastava , Nidhi Kumari
,Neha Kumari , Darleen Kaur , Rinku Singh .”Face
Detection And Recognition For Automatic Attendance
System.” International Journal of Computer Science and
Mobile Computing, Vol.5 Issue.4,
[5] Shireesha Chintalapati, M. V. Raghunadh,“ Automated
attendance management system using face
recognition algorithms.” (ICCIC), 2013 IEEE International
Conference, DOI: 10.1109/ICCIC.2013.6724266.
[6] Mangesh Owandkar.” Attendance Monitoring System using
Face Recognition.”International Research Journal of
Engineering and Technology (IRJET), www.irjet.net
.Volume: 04 Issue: 05 | May -2017
https://www.irjet.net/archives/V4/i5/IRJET-V4I5228.pdf.
[7] Abhishek Jha ,” Class Room Attendance System Using
Facial Recognition System.”The International Journal of
Mathematics, Science, Technology and Management (ISSN
: 2319-8125) Vol. 2 Issue 3
[8] E.Varadharajan,R.Dharani, S.Jeevitha, B.Kavinmathi,
S.Hemalatha,” AUTOMATIC ATTENDANCE
MANAGEMENT SYSTEM USING FACE
DETECTION”, ieeexplore.ieee.org/document/7916753/
[9] Jyotshana Kanti, Shubha Sharma,” Automated Attendance
using Face Recognition based on PCA with Artificial
Neural Network.” Volume 3 Issue 6, June 2014
www.ijsr.net., Paper ID: 0201420.
[10] Yohei KAWAGUCHI ,Tetsuo SHOJI, Weijane LIN,Koh
KAKUSHO, Michihiko MINOH,” Face Recognition based
Lecture Attendance
System.”https://www.researchgate.net/publication/2416086
17_Face_Rec ognition-based_Lecture_Attendance_System.
[11] A. R. Mitra, R. I. Desanti., L. Samuel, D.
Krisndi.,“Implementing Discrete Wavelet and Cosine
Transform with Radial Basis Function Neural Network in
Facial Image Recognition”, Journal of Image and Graphics,
June 2016.
[12] Khayam S.A, The Discrete Cosine Transform
(DCT):Theory and Application, Michigan State University,
2003
[13] Nikunj Jain, Mr. Manish Kumar, Mayank Agarwal and
Himanshu Agrawal. Face Recognition with Eigen Faces,
Artificial Neural Network. International Journal of
Computer Engineering, August, 2010.
[14] U. B. Desai, V. V. Kohir, Face Recognition Using a DCT-
HMM Approach, Indian Institute of Technology,
Mumbai,India, 1998.
[15] R.W. Jasutkar, Y. S. Bute “Implement discrete wavelet
transform for image compression,” (IJCSN), 2012
[16] Z. Shaaban, M. Alwakeel “Face recognition based on
wavelet transform, principal component analysis with
Levenberg-Marquardt back propagation neural network,”
European Journal of Scientific Research, 2010.
[17] S. E. Handy, S. Lukas, “Further tests for face recognition
using discrete cosine transform with HMM,” in Proc.
(MICEEI), Makasar,2012.
[18] J.Nalini, A.A. Blessie and S.C.Ramesh, “Image
compression using wavelet transform based on the lifting
scheme and its implementation,” International Journal of
Computer Science Issues, 2011.
[19] S. Choubey, Y. S. Bute “Discrete wavelet transform for
image processing,” International Journal of Emerging
Technology and Advanced Engineering, vol. 4, issue 3,
March, 2015
[20] Sumayyah Redhwan Allaam, Bayan Ali Saad Al-
Ghamdi. Human Face by Face Recognition System with
3D. Journal of Information & Communication Technology,
2010.