In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39856.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39856/face-recognition-based-attendance-system-using-machine-learning/benazir-begum-a
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
Smart application for ams using face recognitioncseij
Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone.
It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images produced recently and secondly, recognition of human who are strange to the environment i.e. an unauthorized person
For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide more accuracy in matching the image databases and has an ability to recognize a subject at different view angles.
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
Smart application for ams using face recognitioncseij
Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone.
It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images produced recently and secondly, recognition of human who are strange to the environment i.e. an unauthorized person
For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide more accuracy in matching the image databases and has an ability to recognize a subject at different view angles.
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
Asistencia | Live Face Recognition | Python Naomi Kulkarni
Asistencia is a project based on Live Face Recongition of a student and marking of an automated attendance undertaken as a part of the 6th semester final year presentation in Maharaja Sayajirao University of Baroda.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
Abstract
The face of a human is crucial for conveying identity.
Computer scientists, Neuro
scientists, and psychologists, all exploits this human feature using image processing
techniques for commercial, and law enforcement applications. Likewise, this feature
can be invited into classrooms to maintain records of students’ attendance.
Con-
temporary traditional way of recording attendance involves human intervention and
requires cooperation of the students which is hectic and contribute towards waste of
class time.
An automated real-time classroom attendance system detects students
from still image or video frame coming from a digital camera, and marks his/her
attendance by recognizing them.
The system utilizes Viola–Jones object detection
framework which is capable of processing images extremely rapidly with high detec-
tion rates. In the next stage, the detected face in the image is recognized using Local
Binary Patterns Histogram.
Keywords– Computer
vision; face detection; face recognition; feature extraction;
image processing; Local Binary Patterns Histogram; object detection; Viola-Jones
object detection.
Human face detection and recognition is an important technology used in various applications such as video monitor system. Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students, there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the student.
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
In this project autonomous face detection and face recognition was achieved in MatLab through a standalone computer with web-cam. Face detection is utilized to locate the position of face region within the frame captured and face recognition is used for identification of the individual and the automate the attendance process. The database of all the students in the class is stored and when the face of the individual student matches with one of the faces stored in the database then the attendance is recorded.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
An organized and systematic office solution is essential for all universities and organizations. There are many departments of administration for the maintenance of college information and student databases in any institution. All these departments provide various records regarding students. Most of these track records need to maintain information about the students. This information could be the general details like student name, address, performance, attendance etc or specific information related to departments like collection of data. All the modules in college administration are interdependent. They are maintained manually. So they need to be automated and centralized as, Information from one module will be needed by other modules. For example when a student needs his course completion certificate it needs to check many details about the student like his name, reg number, year of study, exams he attended and many other details. So it needs to contact all the modules that are office, department and examination and result of students.
The slide was prepared on the purpose of presentation of our project face detection highlighting the basics of theory used and project details like goal, approach. Hope it's helpful.
Attendance management system using face recognitionIAESIJAI
Traditional attendance systems consist of registers marked by teachers, leading to human error and a lot of maintenance. Time consumption is a key point in this system. We wanted to revolutionize the digital tools available in today's time i.e., facial recognition. This project has revolutionized to overcome the problems of the traditional system. Face recognition and marking the present is our project. A database of all students in the class is kept in single folder, and attendance is marked if each student's face matches with one of the stored faces. Otherwise, the face is ignored and not marked for attendance. In our project, face detection (machine learning) is used.
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
Asistencia | Live Face Recognition | Python Naomi Kulkarni
Asistencia is a project based on Live Face Recongition of a student and marking of an automated attendance undertaken as a part of the 6th semester final year presentation in Maharaja Sayajirao University of Baroda.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
Abstract
The face of a human is crucial for conveying identity.
Computer scientists, Neuro
scientists, and psychologists, all exploits this human feature using image processing
techniques for commercial, and law enforcement applications. Likewise, this feature
can be invited into classrooms to maintain records of students’ attendance.
Con-
temporary traditional way of recording attendance involves human intervention and
requires cooperation of the students which is hectic and contribute towards waste of
class time.
An automated real-time classroom attendance system detects students
from still image or video frame coming from a digital camera, and marks his/her
attendance by recognizing them.
The system utilizes Viola–Jones object detection
framework which is capable of processing images extremely rapidly with high detec-
tion rates. In the next stage, the detected face in the image is recognized using Local
Binary Patterns Histogram.
Keywords– Computer
vision; face detection; face recognition; feature extraction;
image processing; Local Binary Patterns Histogram; object detection; Viola-Jones
object detection.
Human face detection and recognition is an important technology used in various applications such as video monitor system. Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students, there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the student.
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
In this project autonomous face detection and face recognition was achieved in MatLab through a standalone computer with web-cam. Face detection is utilized to locate the position of face region within the frame captured and face recognition is used for identification of the individual and the automate the attendance process. The database of all the students in the class is stored and when the face of the individual student matches with one of the faces stored in the database then the attendance is recorded.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
An organized and systematic office solution is essential for all universities and organizations. There are many departments of administration for the maintenance of college information and student databases in any institution. All these departments provide various records regarding students. Most of these track records need to maintain information about the students. This information could be the general details like student name, address, performance, attendance etc or specific information related to departments like collection of data. All the modules in college administration are interdependent. They are maintained manually. So they need to be automated and centralized as, Information from one module will be needed by other modules. For example when a student needs his course completion certificate it needs to check many details about the student like his name, reg number, year of study, exams he attended and many other details. So it needs to contact all the modules that are office, department and examination and result of students.
The slide was prepared on the purpose of presentation of our project face detection highlighting the basics of theory used and project details like goal, approach. Hope it's helpful.
Attendance management system using face recognitionIAESIJAI
Traditional attendance systems consist of registers marked by teachers, leading to human error and a lot of maintenance. Time consumption is a key point in this system. We wanted to revolutionize the digital tools available in today's time i.e., facial recognition. This project has revolutionized to overcome the problems of the traditional system. Face recognition and marking the present is our project. A database of all students in the class is kept in single folder, and attendance is marked if each student's face matches with one of the stored faces. Otherwise, the face is ignored and not marked for attendance. In our project, face detection (machine learning) is used.
Profile Identification through Face Recognitionijtsrd
This project is Profile identification through facial recognition system using machine learning, based on K neighbors algorithm. The K neighbours algorithm has high detection rate and fast processing time. Once the face is detected, feature extraction on the face is performed using histogram of oriented gradients which essentially stores the edges of the face as well as the directionality of those edges. Histogram of oriented gradients is an effective form of feature extraction due its high performance in normalizing local contrast. Lastly, training and classification of the facial databases is done where each unique face in the facial database is a class. We attempt to use this facial recognition system on two sets of databases and will analyse the results and then provide the profile of an individual which is written in the Data base created in Firebase. Mr. B. Ravinder Reddy | V. Akhil | G. Sai Preetham | P. Sai Poojitha ""Profile Identification through Face Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23439.pdf
Paper URL: https://www.ijtsrd.com/computer-science/other/23439/profile-identification-through-face-recognition/mr-b-ravinder-reddy
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...Editor IJMTER
Web mining techniques are used to analyze the web page contents and usage details. Human facial
images are shared in the internet and tagged with additional information. Auto face annotation techniques are used
to annotate facial images automatically. Annotations are used in online photo search and management.
Classification techniques are used to assign the facial annotation. Supervised or semi-supervised machine learning
techniques are used to train the classification models. Facial images with labels are used in the training process.
Noisy and incomplete labels are referred as weak labels. Search-based face annotation (SBFA) is assigned by
mining weakly labeled facial images available on the World Wide Web (WWW). Unsupervised label refinement
(ULR) approach is used for refining the labels of web facial images with machine learning techniques. ULR
scheme is used to enhance the label quality using graph-based and low-rank learning approach. The training phase
is designed with facial image collection, facial feature extraction, feature indexing and label refinement learning
steps. Similar face retrieval and voting based face annotation tasks are carried out under the testing phase.
Clustering-Based Approximation (CBA) algorithm is applied to improve the scalability. Bisecting K-means
clustering based algorithm (BCBA) and divisive clustering based algorithm (DCBA) are used to group up the
facial images. Multi step Gradient Algorithm is used for label refinement process. The web face annotation scheme
is enhanced to improve the label quality with low refinement overhead. Noise reduction is method is integrated
with the label refinement process. Duplicate name removal process is integrated with the system. The indexing
scheme is enhanced with weight values for the labels. Social contextual information is used to manage the query
facial image relevancy issues.
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
Face recognition has been a rapidly creating, testing and fascinating area with
respect to consistent applications. The task of face acknowledgment has been viably
asked about lately. With data and information gathering in abundance, there is an
urgent necessity for high security. Face acknowledgment has been a rapidly creating,
testing and interesting area concerning persistent applications. This paper gives a
cutting edge review of critical human face acknowledgment investigate
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
Person re identification Re ID is the task of matching a target person across different cameras, which has drawn extensive attention in computer vision and has become an essential component in the video surveillance system. Pried can be considered as a problem of image retrieval. Existing person re identification methods depend mostly on single scale appearance information. In this work, to address issues, we demonstrate the benefits of a deep model with Multi scale Feature Representation Learning MFRL using Convolutional Neural Networks CNN and Random Batch Feature Mask RBFM is proposed for pre id in this study. The RBFM is enlightened by the drop block and Batch Drop Block BDB dropout based approaches. However, great challenges are being faced in the pre id task. First, in different scenarios, appearance of the same pedestrian changes dramatically by reason of the body misalignment frequently, various background clutters, large variations of camera views and occlusion. Second, in a public space, different pedestrians wear the same or similar clothes. Therefore, the distinctions between different pedestrian images are subtle. These make the topic of pre id a huge challenge. The proposed methods are only performed in the training phase and discarded in the testing phase, thus, enhancing the effectiveness of the model. Our model achieves the state of the art on the popular benchmark datasets including Market 1501, duke mtmc re id and CUHK03. Besides, we conduct a set of ablation experiments to verify the effectiveness of the proposed methods. Mrs. D. Radhika | D. Harini | N. Kirujha | Dr. M. Duraipandiyan | M. Kavya "Adversarial Multi-Scale Features Learning for Person Re-Identification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42562.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/42562/adversarial-multiscale-features-learning-for-person-reidentification/mrs-d-radhika
Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image. The goal is to implement the system model for a particular face and distinguish it from a large number of stored faces with some real-time variations as well. The Eigenface approach uses Principal Component Analysis PCA algorithm for the recognition of the images. It gives us efficient way to find the lower dimensional space. In todays world, face recognition is an important part for the purpose of security and surveillance. Hence there is a need for an efficient and cost effective system. Our goal is to explore the feasibility of implementing Raspberry Pi based face recognition system using conventional face detection and recognition techniques such as Haar detection and PCA. This paper aims at taking face recognition to a level in which the system can replace the use of passwords and RF I-Cards for access to high security systems and buildings. With the use of the Raspberry Pi kit, we aim at making the system cost effective and easy to use, with high performance. Amit Deshwal | Mohnish Chandiramani | Umesh Jagtap | Prof. Amruta Surana "Smart Door Access using Facial Recognition" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21363.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/21363/smart-door-access-using-facial-recognition/amit-deshwal
Cosmetics are defined as “items with mild action on the human body for the purpose of cleaning, beautifying, adding to the attractiveness, altering the appearance, or keeping or promoting the skin or hair in good condition- while functional cosmetics, even if falling under the cosmetic definition, are designated as “items fulfilling specific actions like skin whitening, minimizing the appearance of lines in the face and body, protecting from the sun and sun tanning-. Ahiya Noor | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "Cosmetic Science: An Overview" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45135.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45135/cosmetic-science-an-overview/ahiya-noor
Standardization and Formulations of Calotropis ProceraYogeshIJTSRD
Plants growing in arid regions have elicited increased attention, because the hostile environment, in which these plants survive, forces them to develop chemical protective systems through adaptation which is rarely found in vegetation of other ecosystems. Furthermore, many of the plants grow in areas, where the dependence on traditional, plant based medicines over industrially produced pharmaceuticals persists to this day. The two plants, Calotopris Procera giant milkweed, also named C. Persica and Calotropis gigantea crown ower , have been used widely in traditional medicine in North Africa, the Middle East, and South and South East Asia. This has led to extensive research on the chemical constituents of the plants. Both plants are known to be sources of cardenolides, and newer research has yielded a number of interesting cancer active constituents. In addition, extracts of both plants have remarkable nematocidal, molluscidal and insecticidal activities. In many regions, the wood of Calotropis plants has been used as a building material and as a source of fuel. In addition, certain parts of the plants have been used as feed for livestock. In other regions, Calotropis plants are seen as invasive species that threaten local plant life and that due to their toxicity also pose a threat to grazing eld animals. Jaffar Khan | Pankaj Chasta | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "Standardization and Formulations of Calotropis Procera" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45145.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45145/standardization-and-formulations-of-calotropis-procera/jaffar-khan
Review of the Diagnosis and Treatment of ParalysisYogeshIJTSRD
Paralysis is a complete loss of motor power in any muscle group. When paralysis affects all four extremities, it is called quadriplegia when it affects only the lower extremities, paraplegia and when it affects the extremities on one side of the body, hemiplegic. For this reason, the term paralysis is generally reserved for more focal, less stereotyped weakness, for instance, affecting all the muscles innervated by a peripheral nerve. Many different anatomical lesions and etiologies can cause paralysis and determine its treatment. Bikash Debsingha | Dr. Gourav Kr. Sharma | Dr. Kausal Kishore Chandrul "Review of the Diagnosis and Treatment of Paralysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45108.pdf Paper URL: https://www.ijtsrd.com/pharmacy/pharmacology-/45108/review-of-the-diagnosis-and-treatment-of-paralysis/bikash-debsingha
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...YogeshIJTSRD
Cooling towers make use of evaporation whereby some of the water is evaporated into a moving air stream and subsequently discharged into the atmosphere which results in cooling of the remainder water. The current research reviews various studies conducted on cooling tower using experimental and numerical techniques. Different design configuration and operating conditions on cooling towers are evaluated by various researchers. Significant findings from researches have shown new and improved design of cooling tower with much better performance as compared to conventional design. Neetish Kumar Sao | Dr. Surendra K. Dwivedi "Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45100.pdf Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/45100/comparative-analysis-of-forced-draft-cooling-tower-using-two-design-methods-a-review/neetish-kumar-sao
Criminology Educators Triumphs and StrugglesYogeshIJTSRD
This research study is geared on determining the triumphs and struggles of criminology educators. Included on the aim is to know their experiences and story being considered as teacher by accident. A qualitative research design was applied in this study. Researchers conducted a personal interview with the respondents with the aid of a guide questions which all points to main issue of this study. The findings of the study revealed that out of seven respondents, four are on the age bracket of 21 to 25 years old, two respondents are on the age bracket of 26 to 30 years old and a single respondent is on the age bracket of 36 to 40 years. Most of the respondents find enthusiasm in teaching and are aware that there is a need for them to proceed in post graduate studies for them to have a considerable salary. As to financial stability, only 1out of 7 considers herself as financially stable. The rest are saying that as of the moment, they are not yet financially stable basing on the rate of their salary. Qualification matters a lot in the field of academe because this was being shared by one of the respondents who considers herself as financially stable. Also, all of the respondents do not consider teaching as their first career of choice but most of them does not have any plan of shifting to another career. Girlie N. Cañete | Harry Santiago P. Achas | Pamela N. Cañete "Criminology Educators: Triumphs and Struggles" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45082.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/education/45082/criminology-educators-triumphs-and-struggles/girlie-n-cañete
A Review Herbal Drugs Used in Skin DisorderYogeshIJTSRD
The human bodys skin is an organ that allows it to interact with the environment while also shielding it from harmful external influences. People of all ages suffer from skin diseases all over the world. Its vital to keep your skin in good form for a healthy physique. Plants have been employed in some form or another since the beginning of time. This research has highlighted some prevalent skin disease issues, as well as the herbals utilized in disease therapy and the various formulations accessible in the pharmaceutical industry. Some medicinal plants have been shown to be quite effective in removing or reducing skin infection disorders. Chandramita Borah | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "A Review: Herbal Drugs Used in Skin Disorder" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45118.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45118/a-review-herbal-drugs-used-in-skin-disorder/chandramita-borah
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...YogeshIJTSRD
The aim of information retrieval systems is to retrieve relevant information according to the query provided. The queries are often vague and uncertain. Thus, to improve the system, we propose an Automatic Query Expansion technique, to expand the query by adding new terms to the user s initial query so as to minimize query mismatch and thereby improving retrieval performance. Most of the existing techniques for expanding queries do not take into account the degree of semantic relationship among words. In this paper, the query is expanded by exploring terms which are semantically similar to the initial query terms as well as considering the degree of relationship, that is, “fuzzy membership- between them. The terms which seemed most relevant are used in expanded query and improve the information retrieval process. The experiments conducted on the queries set show that the proposed Automatic query expansion approach gave a higher precision, recall, and F measure then non fuzzy edge weights. Tarun Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectivity Measures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45074.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/45074/automatic-query-expansion-using-word-embedding-based-on-fuzzy-graph-connectivity-measures/tarun-goyal
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
This paper proposes a Smartphone based system for the detection of drowsiness in automotive drivers. The proposed system uses three stage drowsiness detection technique. The first stage uses the percentage of eyelid closure PERCLOS which is obtained by capturing images with the front camera of the Smartphone with a modified eye state classification method. The system uses near infrared lighting for illuminating the face of the driver during night driving. The second step uses the voiced to the unvoiced ratio VUR obtained from the speech data from the microphone, in the event PERCLOS crosses the threshold. The VUR is also compared with a threshold and if it is a value greater than that of the threshold, it moves on to the next verification stage. In the final verification stage, touch response is required within the stipulated time to declare whether the driver is drowsy or not and subsequently sound an alarm. To awake the driver, a vibrating mechanism is done and also the live GPS location is also sent to an emergency contact. We have studied eight other reference papers for the literature review. The system has three advantages over existing drowsiness detection systems. First, the three stage verification process makes the system more reliable. The second advantage is its implementation on an Android smart phone, which is readily available to most drivers or cab owners as compared to other general purpose embedded platforms. The third advantage is the use of SMS service to inform the control room as well as the passenger regarding the loss of attention of the driver. Abishek K Biju | Godwin Jolly | Asif Mohammed C A | Dr. Paul P Mathai | Derek Joseph "A New Proposal for Smartphone-Based Drowsiness Detection and Warning System for Automotive Drivers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45083.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/45083/a-new-proposal-for-smartphonebased-drowsiness-detection-and-warning-system-for-automotive-drivers/abishek-k-biju
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal
Antimicrobial and Phytochemical Screening of Phyllantus NiruriYogeshIJTSRD
Theorigin of Phyllanthus niruri is tropical America from there it spread as a weed to other tropic and sub tropics. It is a tropical annual herb shrub which grows as weed in moist humid waste land. Phyllanthus niruri is among more than 500 Phyllanthus species that are widely spread in temperate and tropical climates region Lizuka et al., 2007. It grows 30 40 cm in height, has small leaves and yellow flowers the stem has green capsule, and blooms with flowers with 5 white sepals and apical acute anther.38g of Mueller Hinton Agar was dissolved in 1000ml distilled water in a conical flask, the mouth of the conical flask was plugged with cotton woo wrapped in aluminium foil. This was sterilized in an autoclave at 121oC for 15mns. The media was removed and allowed to cool to 45oC, later poured into a sterilized plastic petri plates which were appropriately labeled. The present study revealed the antimicrobial activity and phytochemical screening of phyllanthus niruri. The antimicrobial activity of phyllanthus niruri shows great significant against pathogens which are responsible for common infections of skin, respiratory, urinary and gastrointestinal tracts. The phytochemical screening of oxalate, terpenoids, tannins, phenols, quinones, flavonoids, alkaloids, saponins and steroids were all found to be active within the plant. This bioactive phytochemicals present in P. niruri can be useful for further researches on the plant P. nururi since the phytochemicals have shown preclinical efficacies for treating human diseases’ which include hepatitis and HIV AIDS. This work has compiled the chemical constituents present and can be useful for further researches Dr. Mohammed Musa Lawan | Yusuf Sale Baba "Antimicrobial and Phytochemical Screening of Phyllantus Niruri" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44948.pdf Paper URL: https://www.ijtsrd.com/chemistry/other/44948/antimicrobial-and-phytochemical-screening-of-phyllantus-niruri/dr-mohammed-musa-lawan
There is a need for temperature drop in a buried pipeline based on the media and process. Need of some methodology and design requirement for a set of conditions by reducing pipeline surface temperature and the temperature drops to atmospheric temperature at a particular distance of pipeline. Based on the conduction principle, desire reduction up to atmospheric temperature can be possible. Let us understand by below methods and design of Heat sink for buried pipe line. Natvarbhai Prabhudas Gajjar "Heat Sink for Underground Pipe Line" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45117.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45117/heat-sink-for-underground-pipe-line/natvarbhai-prabhudas-gajjar
Newly Proposed Multi Channel Fiber Optic Cable CoreYogeshIJTSRD
Fiber optic cables have single core and multiple core options, but single and multiple core fiber cable -˜s core design need to be updated. Newly proposed design gives facilities to multiple usage than traditional design of cable core. Cable core design needs improvement by using present technology for decreasing material and cost and by improving efficiency of cable. Research need to be carried out in this direction. What do you think Natvarbhai Prabhudas Gajjar "Newly Proposed Multi Channel Fiber-Optic Cable Core" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45116.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45116/newly-proposed-multi-channel-fiberoptic-cable-core/natvarbhai-prabhudas-gajjar
Security Sector Reform toward Professionalism of Military and PoliceYogeshIJTSRD
The need to understand and at the same time give prescriptions for the direction of security reform in Third world countries after the end of World War II has prompted the emergence of a big project called the study of security reform SSR . Within this framework emerge various theories and strategies for security reform, with various variations, including ideological variations that underlie these theories. The reform of the structural aspect is a reform of the institutional and structure of an institution, the instrumental reform includes the reform of the system, laws and regulations, while the reform of the cultural aspect is a reform of the habits or organizational culture in institutions in general and in particular the Timor Leste’s security institutions, both military and police. Arquimino Ramos "Security Sector Reform toward Professionalism of Military and Police" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45061.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/political-science/45061/security-sector-reform-toward-professionalism-of-military-and-police/arquimino-ramos
Stress An Undetachable Condition of LifeYogeshIJTSRD
Stressful life events affects human body, which may lead to cardiovascular diseases and effect metabolism and immune system. Recent studies showed increase in stress levels in developing countries. This study aimed to determine the stress levels in MBBS students. The objectives of the study are a To determine the current stress level, b To assess relation between stress level and lifestyle of college students. The present study was carried out in Ahmedabad City of Gujarat State. A total of 400 medical students were included in the study, which were selected using multi stage sampling aged between 18 years to 25 years. Students were questioned regarding their socioeconomic and life style parameters. The results showed that physical activity such as walking, exercise, yoga, meditation etc. were associated to stress levels. College students showed high stress levels with more satisfaction were mostly smokers. Their major reason for eating junk food and smoking was, increase in stress. Conclusion Majority of students suffered from moderate stress levels. Despite of having stress they were happy and satisfied with life with less no internet addiction. Spirituality and stress scales had a positive correlation as most of the students were averagely highly spiritual. Discriminant function can be used to determine the stress level of a person using age, BMI, internet addiction, spirituality, happiness scale and life satisfaction scale of that person. Jayshree N. Tolani | Dr. Nitinkumar D. Shah "Stress: An Undetachable Condition of Life" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45054.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45054/stress-an-undetachable-condition-of-life/jayshree-n-tolani
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...YogeshIJTSRD
The study sought to determine the extent to which the usage of social media in the marketing of agricultural products in South West Nigeria can enhance farmers turnover. It employed the survey research design to collect data with the help of a structured questionnaire to elicit information from respondents selected from six 6 south western states. Research data were analysed using structural equation modelling. The results showed that the use of social media WhatsApp and Facebook in marketing of agricultural products significantly enhances farmers turnover. The managerial implication is that use of Whatsapp and Facebook in the marketing of agricultural products for the enhancement of farmers’ turnover was found to have significant influence on the enhancement in farmers’ turnover from agricultural products. Policy makers in government should provide the enabling environment for the telecommunication companies to enhance their reach by installing their facilities across the length and breadth of the country so that the network coverage will be strong at all times so that the benefits of social media usage will not be constrained. Egejuru, Leonard O | Akubugwo, Emmanuel I | Ugorji, Beatrice N "Comparative Studies of Diabetes in Adult Nigerians: Lipid Profile and Antioxidants Vitamins (A and C)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45021.pdf Paper URL: https://www.ijtsrd.com/biological-science/biochemistry/45021/comparative-studies-of-diabetes-in-adult-nigerians-lipid-profile-and-antioxidants-vitamins-a-and-c/egejuru-leonard-o
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...YogeshIJTSRD
The severity and mortality of COVID 19 cases has been associated with the Three category such as vaccination status, severity of disease and outcome. Objective presently study was aimed to assess the severity and mortality among covid 19 patients. Methods Using simple lottery random method 100 samples were selected. From these 100 patients, 50 patients were randomly assigned to case group and 50 patients in control group after informed consents of relative obtained. Patients in the case group who being died after got COVID 19 whereas 50 patients in the control group participated who were survive after got infected from COVID 19 patients. Result It has three categories such as a Vaccination status For the vaccination status we have seen 59 patients were not vaccinated and 41 patients was vaccinated out of 100. b Incidence There were 41 patients were vaccinated whereas 59 patients were not vaccinated. c Severity In the case of mortality we selected 50 patients who were died from the Corona and I got to know that out of 50 patients there were 12 24 patients were vaccinated whereas 38 76 patients were non vaccinated. Although for the 50 control survival group total 29 58 patients were vaccinated and 21 42 patients was not vaccinated all graph start. Conclusion we have find out that those people who got vaccinated were less infected and mortality rate very low. Prof. (Dr) Binod Kumar Singh | Dr. Saroj Kumar | Ms. Anuradha Sharma "To Assess the Severity and Mortality among Covid-19 Patients after Having Vaccinated: A Retrospective Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45065.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45065/to-assess-the-severity-and-mortality-among-covid19-patients-after-having-vaccinated-a-retrospective-study/prof-dr-binod-kumar-singh
Novel Drug Delivery System An OverviewYogeshIJTSRD
In present scenario evolution of an existing drug molecule from a old form to a novel delivery system can significantly improve its performance in terms of patient compliance, safety and efficacy. In the form of a control drug delivery system an existing drug molecule can get a new life. An appropriately designed Novel Drug Delivery System can be a major advance for solving the problems related towards the release of the drug at specific site with specific rate. The porpuse for delivering drugs to patients efficiently and with fewer side effects has prompted pharmaceutical companies to engage in the development of new drug delivery system. This article covers the basic information regarding Novel Drug Delivery Systems and also advantages, factor etc. Chiranjit Barman | Dr. Gaurav Kumar Sharma | Dr. Kausal Kishore Chandrul "Novel Drug Delivery System: An Overview" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45068.pdf Paper URL: https://www.ijtsrd.com/pharmacy/novel-drug-delivery-sys/45068/novel-drug-delivery-system-an-overview/chiranjit-barman
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
Comparative Analysis of Different Numerical Methods for the Solution of Initi...YogeshIJTSRD
A mathematical equation which involves a function and its derivatives is called a differential equation. We consider a real life situation, from this form a mathematical model, solve that model using some mathematical concepts and take interpretation of solution. It is a well known and popular concept in mathematics because of its massive application in real world problems. Differential equations are one of the most important mathematical tools used in modeling problems in Physics, Biology, Economics, Chemistry, Engineering and medical Sciences. Differential equation can describe many situations viz exponential growth and de cay, the population growth of species, the change in investment return over time. We can solve differential equations using classical as well as numerical methods, In this paper we compare numerical methods of solving initial valued first order ordinary differential equations namely Euler method, Improved Euler method, Runge Kutta method and their accuracy level. We use here Scilab Software to obtain direct solution for these methods. Vibahvari Tukaram Dhokrat "Comparative Analysis of Different Numerical Methods for the Solution of Initial Value Problems in First Order Ordinary Differential Equations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45066.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/45066/comparative-analysis-of-different-numerical-methods-for-the-solution-of-initial-value-problems-in-first-order-ordinary-differential-equations/vibahvari-tukaram-dhokrat
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentYogeshIJTSRD
Bituminous mixes are most commonly used all over the world in flexible pavement construction. It consists of asphalt or bitumen used as a binder and mineral aggregate which are mixed together, laid down in layers and then compacted. Under normal circumstances, conventional bituminous pavements if designed and executed properly perform quite satisfactorily but the performance of bituminous mixes is very poor under various situations. Today’s asphaltic concrete pavements are expected to perform better as they are experiencing increased volume of traffic, increased loads and increased variations in daily or seasonal temperature over what has been experienced in the past. In addition, the performance of bituminous pavements is found to be very poor in moisture induced situations. Considering this a lot of work has been done on use of additives in bituminous mixtures and as well as on modification of bitumen. Research has indicated that the addition of polymers to asphalt binders helps to increase the interfacial cohesiveness of the bond between the aggregate and the binder which can enhance many properties of the asphalt pavements to help meet these increased demands. However, the additive that is to be used for modification of mix or binder should satisfy both the strength requirements as well as economical aspects. Naveen Kumar | Ms. Shivani "Evaluation of Different Paving Mixes Using Optimum Stabilizing Content" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45089.pdf Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/45089/evaluation-of-different-paving-mixes-using-optimum-stabilizing-content/naveen-kumar
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 365
Fig1.1 In the above fig shows the flowchart of the
project.
II. METHODS
2(i) Django
Django is a python-based free and open-source web
framework that follows the model-template-views (MTV)
architectural pattern. It is maintained by the Django
Software Foundation (DSF), an American independent
organization established.
Django's primary goal is to ease the creation of complex,
database-driven websites. The framework emphasizes
reusability and "pluggability" of components, less code, low
coupling, rapid development, and the principle of don't
repeat yourself. Python isusedthroughout, evenforsettings,
files, and data models. Django also provides an optional
administrative create, read, update and delete interfacethat
is generated dynamically through introspection and
configured via admin models.
3(ii)SQL
SQL is a domain-specific language used inprogrammingand
designed for managing data held in a relational database
management system (RDBMS), or for stream processing in
a relational data stream management system (RDSMS). It is
particularly useful in handling structured data, that is data
incorporating relations among entities and variables.SQL
offers two main advantages over older read–write APIs such
as ISAM or VSAM. Firstly, it introduced the concept of
accessing many records with one singlecommand.Secondly,
it eliminates the need to specify how to reach a record, e.g.
with or without an index.
3(iii) React (JavaScript library)
React (also known as React.js or ReactJS) is an open-
source, front end, JavaScript library for building user
interfaces or UI components. It is maintained by Facebook
and a community of individual developers and companies.
React can be used as a base in the development of single-
page or mobile applications. However, React is only
concerned with state management and rendering that state
to the DOM, so creating React applications usually requires
the use of additional libraries for routing. React Router is an
example of such a library.
3(iv) System implementation
The proposed system has beenimplementedwiththehelpof
three basic steps: A. detect and extract face image and save
the face information in an xml file for future references. B.
Learn and train the face image and calculate eigen value and
eigen vector of that image. C. Recognise and match face
images with existing face images information stored in xml
file .
3(v). Python
Python is an interpreted, high-level and general-purpose
programming language. Python's design philosophy
emphasizes code readability with its notable use
of significantindentation.Its languageconstructs and object-
oriented approach aim to help programmers write clear,
logical code for small and large-scale projects. Python
is dynamically-typed and garbage-collected. It supports
multiple programming paradigms, including structured
(particularly, procedural), object-oriented and functional
programming. Python is often described as a "batteries
included" language due to its comprehensive standard
library.
III. PROPOSED SYSTEM
Fig 1: Block Diagram for Attendance Monitoring
System Using Face Recognition
For the training data collection, multiple photographs of
students are taken. This dataset isusedtocompare real-time
photos recorded in the classroom with matched data and to
mark attendance. Preprocessing is applied to the captured
images. The aim of image preprocessing is to improveimage
data by suppressing unwanted distortions or enhancing
certain image features that are important for further
processing .Image pre-processing includes background
subtraction and conversion of image into grayscale.
Generally the background of an image does not move i.e. it
remains static. Hence the backgroundissubtractedina setof
image. Before subtracting the background, image is
converted into grayscale. Thisisdonetogetgoodaccuracyin
detecting faces. Features are extracted from detected faces
and cropped images of faces are stored for comparison.
Feature extraction is a type of dimensionality reductionthat
efficiently represents interesting parts of an image as a
compact feature vector. This approach is useful when image
sizes are large and a reduced feature representation is
required to quickly complete tasks such as image matching
and retrieval. After that images of students in classroom are
captured to mark attendance of students present in the
classroom. These images also goesthroughpreprocessingas
well as face detection process. Faces detected in classroom
images are compared with the images in original dataset. If
the match is found then that students roll number and name
will be added in lit of present students. Face recognition
technique is used for matching purpose.
Face Detection: Face detection is a computer technology
being used in a variety of applications that identifies human
faces in digital images. Face detection step will detect faces
in captured images so that these faces can be used for
comparison. For facedetectionViola-Jonesalgorithmisused.
Viola-Jones Algorithm: The Viola-Jones algorithm is a
widely used mechanism for object detection. The main
property of this algorithm is that training is slow, but
detection is fast. This algorithm uses Haar basis feature
filters. The efficiency of the Viola-Jones algorithm can be
significantly increased by first generatingtheintegral image.
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 366
There are four main contributions of object detection
framework which are listed below
1. Haar features
2. Integral Image
3. Adaboost algorithm
4. Cascading
Face Recognition: With the facial images alreadyextracted,
cropped, resized and usually converted tograyscale,theface
recognition algorithm is responsible for finding
characteristics which best describe the image. ▪ There are
different types of face recognition algorithms, for example:
Eigen faces, LBPH (Local binary patternshistograms),Fisher
faces. Out of these algorithms LBPH is most suitable for the
proposed system.
Local Binary Pattern (LBP) is a simple yet very efficient
texture operator which labels the pixels of an image by
thresholding the neighbourhood of each pixel and considers
the result as a binary number.
Steps involved in LBPH:
1. Parameters: Radius, Neighbour, Grid X, Grid Y.
2. Training the algorithm
3. Applying the LBP operation
4. Extracting the histograms
5. Performing the face recognition
IV. USES AND POTENTIAL RISKS OF FACIAL
RECOGNITION ALGORITHMS
Fields of application of facial recognition for machine
learning and AI are plenty. The most common ones are
related to security and surveillance (law enforcement
agencies or airports), social media (selling data,
personalization), banking and payments, smart homes and
for providing personalizedmarketingexperiences.Although,
it is not the whole picture. There are more subtle ways in
which face recognition algorithms are changing our
everyday life in meaningful ways too, proving that this
technology is still far from infallible.
A famous deep fakes software, which swaps faces of
individuals in videos, has alreadybeenused bya politicianof
India's ruling party to gain favor in elections. In China, facial
recognition system mistook a famous businesswoman'sface
printed on the bus for a jaywalker and automatically wrote
her a fine. Numerous studies in the USA and UK proved that
facial recognition AI has significant troubles recognizing
non-white faces, is often biased on gender and identifies
"false positives" the majority of time, increasing probability
of grievous consequences.
V. FLOWCHART
A flowchart is a diagram that depicts a process, system or
computer algorithm. They are widely used in multiple fields
to document, study, plan, improve and communicate often
complex processes in clear, easy-to-understand diagrams.
Flowcharts, sometimesspelledasflowcharts,userectangles,
ovals, diamonds and potentially numerous other shapes to
define the type of step, along with connecting arrows to
define flow and sequence.Theycanrangefromsimple,hand-
drawn charts to comprehensive computer-drawn diagrams
depicting multiple steps and routes. If we consider all the
various forms of flowcharts, they are one of the most
common diagrams on the planet, used by both technical and
non-technical people in numerous fields.
In the fig 7.1 is the brief flowchart for the face recognization.
A. Face Detection and Extract
B. Learn and Train Face Images
C. Recognise and Identification
Flow Chart
Fig 7.1
VI. EXPERIMENT AND RESULT
For face recognition implementation, the following results
were obtained –
6.1. User Interface
It contains list of menu items which can be accessed to have
the complete view of the system. The system takes the input
such as Id and name of the students for registrationpurpose.
The ‘Take Images’ button is used to capturetheimagesofthe
students. ‘Train System’ button is used to train the captured
images. ‘Take Attendance’ button is used to store the
attendance results in an excel sheet. Fig 2 shows the
registration page
Fig 2 User Interface
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 367
6.2. Face Detection
Multiple images of the students are captured and the images are pre-processed for detecting onlythefacesofthestudents.Fig
3 shows Face Detection.
Fig 3 Face Detecction
6.3. Training
The captured images of the students are stored in a local database. The stored images are trained and are assigned
corresponding labels such as Id and name. Fig 4 shows multiple images stored in a database.
Fig 4 Dataset of Images
6.4. Face Recognition
On carrying out the recognition process, feature comparisontakesplacewithrespecttothefeaturesstoredinthedatabase.The
face is displayed along with corresponding roll no and the name of the student and used for marking the attendance. Fig 5
shows the Face Recognition.
Fig 5 Face Recognition
6.5. Attendance Results stored in an excel sheet
The corresponding attendance of the students is stored in an excel sheet. Fig 6 shows the Attendance Results.