SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 643
Face Recognition Based Intelligent Door Control System
San San Naing, Thiri Oo Kywe, Ni Ni San Hlaing
Department of Electronic Engineering, Technological University Kyaukse, Myanmar
How to cite this paper: San San Naing |
Thiri Oo Kywe | Ni Ni San Hlaing "Face
Recognition Based Intelligent Door
Control System" Published in
International Journal of Trend in
Scientific Research and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.643-648, URL:
https://www.ijtsrd.
com/papers/ijtsrd2
3893.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
This paper presents the intelligent door control system based on face detection
and recognition. This system can avoid the need to control by persons with the
use of keys, security cards, password or pattern to open the door. The main
objective is to develop a simple and fast recognition system for personal
identification and face recognition to provide the security system. Face is a
complex multidimensional structure and needs good computing techniques for
recognition. The system is composed of two main parts: face recognition and
automatic door access control. It needs to detect the face before recognizing the
face of the person. In face detection step, Viola Jones face detection algorithm is
applied to detect the human face. Face recognition is implemented by using the
Principal Component Analysis (PCA) and Neural Network. Image processing
toolbox which is in MATLAB 2013a is used for the recognition process in this
research. The PIC microcontroller is used to automatic door access control
system by programming MikroC language. The door is opened automaticallyfor
the known person according to the result of verification in the MATLAB. On the
other hand, the door remains closed for the unknown person.
Keywords: Viola Jones, Neural Network, Principle Component Analysis, MATLAB,
PIC Microcontroller
1. INTRODUCTION
Nowadays, automatic personal identification in access control has become
popular by using biometrics data instead of using fingerprint, pattern, signature
etc, because the target objects have to touch with the
required hardware in the stage of data collection. The
advantage of this system is that face recognition does not
require to be touched with any hardware. When a person
stands at a certain distance from the camera, faceis detected
by using face detection technique and face recognition is
completed without touching any hardware. These systems
can be used for crime prevention, person verification, and
similar security activities.
In this system, the first portion is thefacerecognitionsystem
and the second one is the intelligent door access control
system. MATLAB software installed on PC is used to
implement face recognition system. The USB to RS232serial
converter is used as the interface between the PC and
PIC16F887 microcontroller. The process of lighting and
alarm system are mainly works with an algorithm which is
loaded in microcontroller and on the basis of serialportdata
which is sent by PC after verifying the facebyMATLABs. The
overall block diagram of this system is shown in Figure 1.
Figure1. Overall Block Diagram of the System
1.1 FACE DETECTION AND RECOGNITION
Face recognition is implemented by using MATLABinstalled
on Personal Computer (PC). In this system, firstly connect
webcam with MatLab to capture photos and save in the
database for training and testing images. In real time, the
image of human in front of the door with acertaindistanceis
acquired through web cam. Firstly, the image data
acquisition is performed and detected the facial part of the
image by using Viola Jones algorithm. The detected facial
part is cropped and resized to the same size to all images for
both training and testing processes. The facial features are
extracted from the detected human face using Neural
Network. PCA method is used to match the features of
trained image and test image for face classification or
recognition [1]. The block diagram of face recognition
system is described in Figure 2. The door control system
starts after recognition process in this research.
Figure2. Block Diagram of Face Recognition
IJTSRD23893
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 644
2. METHODOLOGY
2.1 Viola Jones Face Detection
There are three main ideas in Viola-Jones face detector. they
make it possible to build a successful face detector that can
run in real time: the image integral, classifier learning with
AdaBoost, and the attentional cascade structure [4].
Firstly, the Viola-Jones face detection algorithmistoturnthe
input image into an integral image. Integral image, also
known as a summed area table, allows a very fast feature
evaluation. The used features are reminiscent of Haar basis
functions. Viola-Jones method is used to detect the features
consisting of two or more rectangles. Each featuregenerates
a single value which is calculated by subtracting the sum of
the white rectangle(s) from the sum of the black
rectangle(s). The different types of features are shown in
Figure 3.
The integral image can be computed from an image by using
a few operations per pixel. The integral image at locationx,y
contains the sum of the pixels above and to the left of x, y. It
can be calculated by the following equation,
where, ii(x ,y) is the integral image and i(x ,y) is the original
image [3].
The sum of the pixels within rectangle D can be calculated
with four array references. The value of theintegralimageat
location 1 is the sum of the pixels in rectangle A. The valueat
location 2 results in A + B, at location 3 is A + C, and at
location 4 is A + B + C + D. The sum within D can be achieved
as 4 + 1 – (2 + 3).
Figure3. Six Types of Haar-like Rectangle Features [3]
The second part is a method for constructing a classifier by
selecting a small number of important features using
AdaBoost learning algorithm.Withinanyimagesub-window
the total number of Harr-like features isverylarge, farlarger
than the number of pixels. In Adaboost, although the weak
learner is nothing, it is a feature selector. By combining a
collection of weak classification functions, a stronger
classifier can be formed [5]. A weak classifier h(x) containsa
feature f, a thresholdθ, and a parity p indicatingthedirection
of inequality sign:
(2)
In the third part more complex classifiers are combined in a
cascade structure, increasing the speed of the detector by
moving the most complex processing on promising regions
of the image. By combination of cascaded classifiers, most of
true negatives are rejected very fast at the first few stages.
The cascade combinationclassifieris shown inFigure4.High
detection rate and low false positive rate can be kept in this
system.
Figure4. Cascaded Combination Classifier [5]
2.2 Neural Network
A Neural Network is an interconnected group of biological
neurons. In modern usage, theterm can alsoreferto artificial
neural networks, which are constituted of artificial neurons.
A Neural Network is an immensely parallel distributed
processor that has a natural propensity for storing
experiential knowledge and making it available for use. It
looks like the brain. It performs in two respects: knowledge
is attained by the network through a learning process and
the knowledge is stored by using interneuron connection
strengths known as synaptic weights.
Neural Networks are made of input units, output units and
hidden units called nodes. There is a threshold in each node.
If this threshold is reached, the node will "fire", that means
that all its connections will get activated. There is also
strength in each connection.Thestrengthisrepresented bya
weight. A node adds up the weights of the its connections to
determine its response and then compares it to itsthreshold
[7]. Neural Network models in artificial intelligence are
usually referred to as Artificial Neural Networks (ANNs).
2.3 PCA Feature Extraction
There are two main steps in PCA: Initialization process and
Recognition process. The Initialization processinvolvesface
image acquisition, the Eigenfacescalculation, and calculation
of distribution of training face space [6]. Firstly, it acquires
the initial set of face images called as training set. Then, it
calculates the Eigenfaces from the training set by keeping
only the highest Eigen values.TheseMimagesdefinetheface
space. The Eigenfaces can be updated or recalculated
because the new faces are experienced. And then,
distribution is calculated in this training face space for each
known person by projecting faceimagesontothisface-space.
Recognition process involves the following operation. A set
of weights can be calculated based on the input image and
the M Eigenfaces by projecting the input image onto each of
the Eigenfaces. The result is determined if the imageisaface
at all (known or unknown) by checking that the image is
sufficiently close to a “free space”. If it is a face, then it
classifies the calculated eigenface as either a known person
or an unknown person [8].
2.4 Classification or Recognition
Classification is the finding the minimum distance between
the training image and the test images. The face with
minimum Euclidian distance shows the similarity to test
image. Euclidean distance is the distance of test image Ω to
each training image and it is defined by,
(3)
By choosing a threshold value that is the maximum
acceptable value for known images and comparing it with
the minimum Euclidian distance ઽk, test image can be
recognized as known or unknown face image.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 645
If ઽk (min) ≥ , the test image is recognized an unknown face.
If ઽk (min) < , the test image is a known face [2].
2.5 PIC 16F887 Microcontroller
This system used PIC 16F887 microcontroller because of its
good features and integrated peripherals. The
microcontroller is used to receive the signal sent from PC
and to send a command back either to the door motor circuit
or to the alarm circuit. The PIC 16F887 microcontroller
which is utilized in this door control system is depicted in
Figure 5.
Figure5. PIC 16F887 microcontroller
2.5.1. USB to RS232 Converter
This converter is used to interface the personal computer
and PIC microcontroller. It adjusts the voltage between the
personal computer and microcontroller. The USB to RS232
serial converter is illustrated in Figure 6.
Figure6. USB to RS232 Serial Converter
2.5.2. RS232 to TTL Serial Port Converter Module DB9
Connector
The RS232 serial port to TTL converter module is a board
with the MAX3232 transceiver integrated circuit (IC),which
facilitates serial communication between TTL and RS232
ports by providingthenecessaryelectricalsignal conversion.
It is necessary to place in between USB to RS232 serial
converter and PC. The RS232 to TTL serial module is
described in Figure 7.
Figure7. RS232 to TTL Serial Module
3. IMPLEMENTATION
The implementation of face detection and face recognition
system is using by MATLAB 2013a for coding. To build the
database, take photos for 10 persons, 10 different facial
images of each person weretaken byusingexternal webcam.
In the database folder, 70 different facial photos of ten
persons are used as the training images and 30 for testing
images.
3.1. Implementation of Face Detection and
Recognition
While making the database folder, the captured images are
applied with 640x480 resolutions andRGB color(red, green,
blue).
All the detected face are resized into 238x268 images by
using imresize MATLAB built-in function and save in the
train folder for training images. For instance, nine training
images of three person with different facial images are
shown in Figure 8.
Figure8. Facial Images of Three Persons from Training
Images
Training images are needed to convert grayscale images by
using rgb2gray function in MATLAB. These images are
expressed in Figure 9.
Figure9. Gray Scale of Some Training Images
In the condition of testing, Computer VisionSystemToolbox,
face detection is implemented by Viola Jones face detection
code and then cropped in order to obtain the only facial
parts of all images using BB (Bounding Box).
PCA for face recognition is to express the large 1-D vector of
pixels constructed from 2-D facial image into the compact
principle components of the feature space.Thiscanbecalled
eigenspace projection.
Mean face or average face vector can be calculated by
averaging all training images. Meancentered (or subtracted)
images (A) are evaluated by subtracting averageimagefrom
the original training image. Eigen values are calculated and
represented as an Eigen vector. The eigenvectors
corresponding to the covariance matrix or so-called the
"Eigenfaces" which look like ghostly faces.
ome Eigenfaces of the training images are described in
Figure 10.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 646
Figure10. Some Eigenfaces of the Training Images
The trained and test images are projected onto the face-
space where the Eigenfaces are the coordinates or
dimensions to find their respective Euclidian distance. By
comparing the Euclidian distance of all projected trained
images with the projected test image, minimum distance
between them which shows similarity to test image is
obtained. By this way, the facial image recognitionwasdone.
4.3. Implementation of Door Control System Based on
Face Recognition
There are two parts in this system. The first is the
implementation of face detection and recognition system.
The entire face detection and recognition system is
accomplished by using Matlab. And the second is MikroC
program implementation for door control system.
The hardware implementation of this systemis composed of
PIC 16F887 microcontroller, USB to RS232 converter, LEDs,
buzzer and DC motor. USB to RS232 converter is used as the
interface between personal computer and the
microcontroller.
It is necessary to select port number which is used in
controller and connect the available baud rate between the
MATLAB and microcontroller control device (PIC) via USB
cable to RS232 serial converter. In order to adjust the
voltage level between PC and the microcontroller, the
converter of USB to RS232 is used. It needs to install the
driver on PC that converts the USB connection into a Virtual
Communications Port, which makes theUSBconnectionthat
looks like a serial port on the PC.
In microcontroller process, the command from Matlab to
identify the detected person is vital. When the detected
person’s face is ‘Known’ face which included in database,the
microcontroller starts to run DC motor to open the door and
the room lighting process performs one by one opening.
After the delay times, the DC motor rotated in reverse
direction. When the face is not included in database, the
buzzer is ringing to alarm the unidentified face detection. If
the entire person who wants to go out from the room will
need to press the Exit button in GUI,thedoorisopened again
with the delay times. The Flow Chart of Microcontroller
Process is shown in Figure 11.
Known or Unknown
Face
Known Face?
Run DC Motor and Light on
Open Door
Alarm Buzzer
No
Yes
Close Door
Exit Switch?
Delay Time
Run DC Motor and Light off
Open Door
Delay Time
Close Door
End
Yes
No
Start
Figure11. The Flow Chart of Microcontroller Process
5. TESTS AND RESULTS
In classification, todetermineknownorunknownpersonthe
detected face from the face detection step by using PCA
method and neural network. Face is recognized as known
image by comparing the images present in the training
database.
The graphical user interface (GUI) is implemented to
perform the face recognition process and to connect the
microcontroller. The detection the face of applying the test
image to the GUI is shown in Figure 12.
Figure12. Face Detection By Using Bounding Box
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 647
The detected area is cropped as shown in Figure 13.
Figure13. Cropped Image of Detected Area
The features of the cropped and resized image are extracted
to distinguish the different people. The extracted image is
shown in Figure 14.
Figure14. Extracted Image By Using Eigen Face
If the test image is known person, Matlab sends a signal to
the microcontroller. According to the input signal,
microcontroller sends a commandtothedoor’smotordriver
to drive the door motor for opening the door during the
delay 3 second. When the person entered into the room, the
lighting processes are operated automatically. The door
open condition for known person is shown in Figure 15 and
Figure 16.
Figure15. Door Opening and Lighting Condition for Known
Person
Figure16. The Door Closed Condition and Lighting Still
Opened Condition
If the face of the person is hidden by something or
unidentified facial condition, he or she cannot pass through
the door. Although that person wants to enter the door in
this condition, the door opening operation is not performed
and the alarm is operated. The result of this condition is
illustrated in Figure 17.
Figure17. Door Closing and Alarm Ringing Condition Test
for No Face Detection
The person whose face is not included in the training
database, the door cannot open in this contidion. The result
shows ‘Unknown’ and the buzzer is alarming. Figure 18
shows the testing of door closing and alarm ringing
contidion for unknown person.
Figure18. Testing The Door Closing and Alarm Ringing
Condition for Unknown Person
When the person who want to exit, she need to press the
‘Exit’. If the ‘Exit’ is pressed in GUI, the door will openduring
delay times. After that, the door is closed and lightingsystem
is still opened. Therefore, the light off buttonmustbeclicked
before exiting the system operation. Figure19 shows exiting
condition of the room control system from Matlab GUI.
Figure19. Exiting Condition of The Room Control System
from Matlab GUI
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 648
6. CONCLUSIONS
This paper is mainly focused ondesigningand implementing
of an intelligent door control system based on face
recognition. The wholesystemiscomposedof capturephoto,
image acquisition, face detection, facial feature extraction
and face recognition linking with microcontroller for door
control system. Viola-Jones face detection method is used to
detect the location of the face in an image. Since this
detection method can detect only face images for frontal
view correctly, this system has limitations in head
orientation. Face recognition system is linking with the
motor control system to allow the opening and closingofthe
door security system and lighting system. PIC
microcontroller is used to connect thehardwaredevicesand
personal computer (PC) via USB to RS232 serial converter
for interfacing with computer. This system can be used for
security applications such as crime prevention, person
verification, attendance system and so on.
7. ACKNOWLEDGMENT
The author would like to express her gratitude to all her
teachers from Electronic Engineering Department,
Technological University (Kyaukse). The author wishes to
express special thanks and sincere gratitude to her
supervisor, Dr. San San Naing, Lecturer of Electronic
Engineering Department, Kyaukse Technological University
for her kind advices and encouragements in the route of
carrying out this paper. And, the author especially thanks to
her teachers and friends for giving the chance to take their
face images utilized in this paper.
8. REFERENCES
[1] “Face recognition system with face detection",
Technological University Kakinada, the author of
M.Vineetha Sai, G.VARALAKSHMI, G.BALAKUMAR,
J.PRASD.
[2] “Automtic Door Access System Using Face
Recognition”, international journal of scientific &
technology research volume 4, issue 06, june 2015.
[3] “Design And Implementation Of Face Detection Using
Adaboost Algorithm”, Journal of Theoretical and
Applied InformationTechnology 31stJuly2014Vol.65
No.3.
[4] Study of Viola-Jones Real Time Face Detector,
a. KaiqiCen,https://github.com/JackCen/CS231A.
[5] P.Viola and M.Jones. rapid object detection using a
boosted cascade of simple features. In computer vision
and patternRecognition, 2001.CVPR2001.Proceedings
of the 2001 IEEE Computer Society Conference on,
volume 1, pages I–511.IEEE,2001.
[6] Face Recognition Using Principal Component Analysis
Method, International Journal of Advanced Researchin
Computer Engineering & Technology (IJARCET)
Volume 1, Issue 9, November 2012.
[7] Mohamed Rizon, Muhammad Firdaus Hashim, Face
Recognition using Eigenfaces and Neural Networks.
[8] Face Recognition Using PCA and Eigen Face Approach,
Department of Computer Science and Engineering
National Institute of Technology,India.

More Related Content

What's hot

Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender Detection
AbhiAchalla
 
Term11566
Term11566Term11566
Term11566
Mukesh0420
 
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
IRJET Journal
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
eSAT Publishing House
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paperSmriti Tikoo
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET Journal
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
IRJET Journal
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET Journal
 
An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance System
IJERDJOURNAL
 
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
IAEME Publication
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
ijtsrd
 
Face Recognition using PCA and MSNN
Face Recognition using PCA and MSNNFace Recognition using PCA and MSNN
Face Recognition using PCA and MSNN
RABI GAYAN
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET Journal
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
International Journal of Technical Research & Application
 

What's hot (19)

Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender Detection
 
Term11566
Term11566Term11566
Term11566
 
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
K011138084
K011138084K011138084
K011138084
 
G011134454
G011134454G011134454
G011134454
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance System
 
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
 
Face Recognition using PCA and MSNN
Face Recognition using PCA and MSNNFace Recognition using PCA and MSNN
Face Recognition using PCA and MSNN
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 

Similar to Face Recognition Based Intelligent Door Control System

Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
MuhammadAsfandyarJan1
 
FaceDetectionforColorImageBasedonMATLAB.pdf
FaceDetectionforColorImageBasedonMATLAB.pdfFaceDetectionforColorImageBasedonMATLAB.pdf
FaceDetectionforColorImageBasedonMATLAB.pdf
Anita Pal
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
csandit
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
cscpconf
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
Reallykul Kuul
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
IRJET Journal
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...
TELKOMNIKA JOURNAL
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
eSAT Publishing House
 
Report face recognition : ArganRecogn
Report face recognition :  ArganRecognReport face recognition :  ArganRecogn
Report face recognition : ArganRecogn
Ilyas CHAOUA
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
IRJET Journal
 
I017525560
I017525560I017525560
I017525560
IOSR Journals
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
IRJET Journal
 
IRJET- Facial Expression Recognition using GPA Analysis
IRJET-  	  Facial Expression Recognition using GPA AnalysisIRJET-  	  Facial Expression Recognition using GPA Analysis
IRJET- Facial Expression Recognition using GPA Analysis
IRJET Journal
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environment
IJECEIAES
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
nooriasukmaningtyas
 
IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using Biometrics
IRJET Journal
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
ijceronline
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face Recognition
Kathryn Patel
 

Similar to Face Recognition Based Intelligent Door Control System (20)

Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
FaceDetectionforColorImageBasedonMATLAB.pdf
FaceDetectionforColorImageBasedonMATLAB.pdfFaceDetectionforColorImageBasedonMATLAB.pdf
FaceDetectionforColorImageBasedonMATLAB.pdf
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
Report face recognition : ArganRecogn
Report face recognition :  ArganRecognReport face recognition :  ArganRecogn
Report face recognition : ArganRecogn
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
I017525560
I017525560I017525560
I017525560
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
IRJET- Facial Expression Recognition using GPA Analysis
IRJET-  	  Facial Expression Recognition using GPA AnalysisIRJET-  	  Facial Expression Recognition using GPA Analysis
IRJET- Facial Expression Recognition using GPA Analysis
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environment
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using Biometrics
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face Recognition
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Face Recognition Based Intelligent Door Control System

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 643 Face Recognition Based Intelligent Door Control System San San Naing, Thiri Oo Kywe, Ni Ni San Hlaing Department of Electronic Engineering, Technological University Kyaukse, Myanmar How to cite this paper: San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing "Face Recognition Based Intelligent Door Control System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.643-648, URL: https://www.ijtsrd. com/papers/ijtsrd2 3893.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts: face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis (PCA) and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automaticallyfor the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. Keywords: Viola Jones, Neural Network, Principle Component Analysis, MATLAB, PIC Microcontroller 1. INTRODUCTION Nowadays, automatic personal identification in access control has become popular by using biometrics data instead of using fingerprint, pattern, signature etc, because the target objects have to touch with the required hardware in the stage of data collection. The advantage of this system is that face recognition does not require to be touched with any hardware. When a person stands at a certain distance from the camera, faceis detected by using face detection technique and face recognition is completed without touching any hardware. These systems can be used for crime prevention, person verification, and similar security activities. In this system, the first portion is thefacerecognitionsystem and the second one is the intelligent door access control system. MATLAB software installed on PC is used to implement face recognition system. The USB to RS232serial converter is used as the interface between the PC and PIC16F887 microcontroller. The process of lighting and alarm system are mainly works with an algorithm which is loaded in microcontroller and on the basis of serialportdata which is sent by PC after verifying the facebyMATLABs. The overall block diagram of this system is shown in Figure 1. Figure1. Overall Block Diagram of the System 1.1 FACE DETECTION AND RECOGNITION Face recognition is implemented by using MATLABinstalled on Personal Computer (PC). In this system, firstly connect webcam with MatLab to capture photos and save in the database for training and testing images. In real time, the image of human in front of the door with acertaindistanceis acquired through web cam. Firstly, the image data acquisition is performed and detected the facial part of the image by using Viola Jones algorithm. The detected facial part is cropped and resized to the same size to all images for both training and testing processes. The facial features are extracted from the detected human face using Neural Network. PCA method is used to match the features of trained image and test image for face classification or recognition [1]. The block diagram of face recognition system is described in Figure 2. The door control system starts after recognition process in this research. Figure2. Block Diagram of Face Recognition IJTSRD23893
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 644 2. METHODOLOGY 2.1 Viola Jones Face Detection There are three main ideas in Viola-Jones face detector. they make it possible to build a successful face detector that can run in real time: the image integral, classifier learning with AdaBoost, and the attentional cascade structure [4]. Firstly, the Viola-Jones face detection algorithmistoturnthe input image into an integral image. Integral image, also known as a summed area table, allows a very fast feature evaluation. The used features are reminiscent of Haar basis functions. Viola-Jones method is used to detect the features consisting of two or more rectangles. Each featuregenerates a single value which is calculated by subtracting the sum of the white rectangle(s) from the sum of the black rectangle(s). The different types of features are shown in Figure 3. The integral image can be computed from an image by using a few operations per pixel. The integral image at locationx,y contains the sum of the pixels above and to the left of x, y. It can be calculated by the following equation, where, ii(x ,y) is the integral image and i(x ,y) is the original image [3]. The sum of the pixels within rectangle D can be calculated with four array references. The value of theintegralimageat location 1 is the sum of the pixels in rectangle A. The valueat location 2 results in A + B, at location 3 is A + C, and at location 4 is A + B + C + D. The sum within D can be achieved as 4 + 1 – (2 + 3). Figure3. Six Types of Haar-like Rectangle Features [3] The second part is a method for constructing a classifier by selecting a small number of important features using AdaBoost learning algorithm.Withinanyimagesub-window the total number of Harr-like features isverylarge, farlarger than the number of pixels. In Adaboost, although the weak learner is nothing, it is a feature selector. By combining a collection of weak classification functions, a stronger classifier can be formed [5]. A weak classifier h(x) containsa feature f, a thresholdθ, and a parity p indicatingthedirection of inequality sign: (2) In the third part more complex classifiers are combined in a cascade structure, increasing the speed of the detector by moving the most complex processing on promising regions of the image. By combination of cascaded classifiers, most of true negatives are rejected very fast at the first few stages. The cascade combinationclassifieris shown inFigure4.High detection rate and low false positive rate can be kept in this system. Figure4. Cascaded Combination Classifier [5] 2.2 Neural Network A Neural Network is an interconnected group of biological neurons. In modern usage, theterm can alsoreferto artificial neural networks, which are constituted of artificial neurons. A Neural Network is an immensely parallel distributed processor that has a natural propensity for storing experiential knowledge and making it available for use. It looks like the brain. It performs in two respects: knowledge is attained by the network through a learning process and the knowledge is stored by using interneuron connection strengths known as synaptic weights. Neural Networks are made of input units, output units and hidden units called nodes. There is a threshold in each node. If this threshold is reached, the node will "fire", that means that all its connections will get activated. There is also strength in each connection.Thestrengthisrepresented bya weight. A node adds up the weights of the its connections to determine its response and then compares it to itsthreshold [7]. Neural Network models in artificial intelligence are usually referred to as Artificial Neural Networks (ANNs). 2.3 PCA Feature Extraction There are two main steps in PCA: Initialization process and Recognition process. The Initialization processinvolvesface image acquisition, the Eigenfacescalculation, and calculation of distribution of training face space [6]. Firstly, it acquires the initial set of face images called as training set. Then, it calculates the Eigenfaces from the training set by keeping only the highest Eigen values.TheseMimagesdefinetheface space. The Eigenfaces can be updated or recalculated because the new faces are experienced. And then, distribution is calculated in this training face space for each known person by projecting faceimagesontothisface-space. Recognition process involves the following operation. A set of weights can be calculated based on the input image and the M Eigenfaces by projecting the input image onto each of the Eigenfaces. The result is determined if the imageisaface at all (known or unknown) by checking that the image is sufficiently close to a “free space”. If it is a face, then it classifies the calculated eigenface as either a known person or an unknown person [8]. 2.4 Classification or Recognition Classification is the finding the minimum distance between the training image and the test images. The face with minimum Euclidian distance shows the similarity to test image. Euclidean distance is the distance of test image Ω to each training image and it is defined by, (3) By choosing a threshold value that is the maximum acceptable value for known images and comparing it with the minimum Euclidian distance ઽk, test image can be recognized as known or unknown face image.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 645 If ઽk (min) ≥ , the test image is recognized an unknown face. If ઽk (min) < , the test image is a known face [2]. 2.5 PIC 16F887 Microcontroller This system used PIC 16F887 microcontroller because of its good features and integrated peripherals. The microcontroller is used to receive the signal sent from PC and to send a command back either to the door motor circuit or to the alarm circuit. The PIC 16F887 microcontroller which is utilized in this door control system is depicted in Figure 5. Figure5. PIC 16F887 microcontroller 2.5.1. USB to RS232 Converter This converter is used to interface the personal computer and PIC microcontroller. It adjusts the voltage between the personal computer and microcontroller. The USB to RS232 serial converter is illustrated in Figure 6. Figure6. USB to RS232 Serial Converter 2.5.2. RS232 to TTL Serial Port Converter Module DB9 Connector The RS232 serial port to TTL converter module is a board with the MAX3232 transceiver integrated circuit (IC),which facilitates serial communication between TTL and RS232 ports by providingthenecessaryelectricalsignal conversion. It is necessary to place in between USB to RS232 serial converter and PC. The RS232 to TTL serial module is described in Figure 7. Figure7. RS232 to TTL Serial Module 3. IMPLEMENTATION The implementation of face detection and face recognition system is using by MATLAB 2013a for coding. To build the database, take photos for 10 persons, 10 different facial images of each person weretaken byusingexternal webcam. In the database folder, 70 different facial photos of ten persons are used as the training images and 30 for testing images. 3.1. Implementation of Face Detection and Recognition While making the database folder, the captured images are applied with 640x480 resolutions andRGB color(red, green, blue). All the detected face are resized into 238x268 images by using imresize MATLAB built-in function and save in the train folder for training images. For instance, nine training images of three person with different facial images are shown in Figure 8. Figure8. Facial Images of Three Persons from Training Images Training images are needed to convert grayscale images by using rgb2gray function in MATLAB. These images are expressed in Figure 9. Figure9. Gray Scale of Some Training Images In the condition of testing, Computer VisionSystemToolbox, face detection is implemented by Viola Jones face detection code and then cropped in order to obtain the only facial parts of all images using BB (Bounding Box). PCA for face recognition is to express the large 1-D vector of pixels constructed from 2-D facial image into the compact principle components of the feature space.Thiscanbecalled eigenspace projection. Mean face or average face vector can be calculated by averaging all training images. Meancentered (or subtracted) images (A) are evaluated by subtracting averageimagefrom the original training image. Eigen values are calculated and represented as an Eigen vector. The eigenvectors corresponding to the covariance matrix or so-called the "Eigenfaces" which look like ghostly faces. ome Eigenfaces of the training images are described in Figure 10.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 646 Figure10. Some Eigenfaces of the Training Images The trained and test images are projected onto the face- space where the Eigenfaces are the coordinates or dimensions to find their respective Euclidian distance. By comparing the Euclidian distance of all projected trained images with the projected test image, minimum distance between them which shows similarity to test image is obtained. By this way, the facial image recognitionwasdone. 4.3. Implementation of Door Control System Based on Face Recognition There are two parts in this system. The first is the implementation of face detection and recognition system. The entire face detection and recognition system is accomplished by using Matlab. And the second is MikroC program implementation for door control system. The hardware implementation of this systemis composed of PIC 16F887 microcontroller, USB to RS232 converter, LEDs, buzzer and DC motor. USB to RS232 converter is used as the interface between personal computer and the microcontroller. It is necessary to select port number which is used in controller and connect the available baud rate between the MATLAB and microcontroller control device (PIC) via USB cable to RS232 serial converter. In order to adjust the voltage level between PC and the microcontroller, the converter of USB to RS232 is used. It needs to install the driver on PC that converts the USB connection into a Virtual Communications Port, which makes theUSBconnectionthat looks like a serial port on the PC. In microcontroller process, the command from Matlab to identify the detected person is vital. When the detected person’s face is ‘Known’ face which included in database,the microcontroller starts to run DC motor to open the door and the room lighting process performs one by one opening. After the delay times, the DC motor rotated in reverse direction. When the face is not included in database, the buzzer is ringing to alarm the unidentified face detection. If the entire person who wants to go out from the room will need to press the Exit button in GUI,thedoorisopened again with the delay times. The Flow Chart of Microcontroller Process is shown in Figure 11. Known or Unknown Face Known Face? Run DC Motor and Light on Open Door Alarm Buzzer No Yes Close Door Exit Switch? Delay Time Run DC Motor and Light off Open Door Delay Time Close Door End Yes No Start Figure11. The Flow Chart of Microcontroller Process 5. TESTS AND RESULTS In classification, todetermineknownorunknownpersonthe detected face from the face detection step by using PCA method and neural network. Face is recognized as known image by comparing the images present in the training database. The graphical user interface (GUI) is implemented to perform the face recognition process and to connect the microcontroller. The detection the face of applying the test image to the GUI is shown in Figure 12. Figure12. Face Detection By Using Bounding Box
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 647 The detected area is cropped as shown in Figure 13. Figure13. Cropped Image of Detected Area The features of the cropped and resized image are extracted to distinguish the different people. The extracted image is shown in Figure 14. Figure14. Extracted Image By Using Eigen Face If the test image is known person, Matlab sends a signal to the microcontroller. According to the input signal, microcontroller sends a commandtothedoor’smotordriver to drive the door motor for opening the door during the delay 3 second. When the person entered into the room, the lighting processes are operated automatically. The door open condition for known person is shown in Figure 15 and Figure 16. Figure15. Door Opening and Lighting Condition for Known Person Figure16. The Door Closed Condition and Lighting Still Opened Condition If the face of the person is hidden by something or unidentified facial condition, he or she cannot pass through the door. Although that person wants to enter the door in this condition, the door opening operation is not performed and the alarm is operated. The result of this condition is illustrated in Figure 17. Figure17. Door Closing and Alarm Ringing Condition Test for No Face Detection The person whose face is not included in the training database, the door cannot open in this contidion. The result shows ‘Unknown’ and the buzzer is alarming. Figure 18 shows the testing of door closing and alarm ringing contidion for unknown person. Figure18. Testing The Door Closing and Alarm Ringing Condition for Unknown Person When the person who want to exit, she need to press the ‘Exit’. If the ‘Exit’ is pressed in GUI, the door will openduring delay times. After that, the door is closed and lightingsystem is still opened. Therefore, the light off buttonmustbeclicked before exiting the system operation. Figure19 shows exiting condition of the room control system from Matlab GUI. Figure19. Exiting Condition of The Room Control System from Matlab GUI
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23893 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 648 6. CONCLUSIONS This paper is mainly focused ondesigningand implementing of an intelligent door control system based on face recognition. The wholesystemiscomposedof capturephoto, image acquisition, face detection, facial feature extraction and face recognition linking with microcontroller for door control system. Viola-Jones face detection method is used to detect the location of the face in an image. Since this detection method can detect only face images for frontal view correctly, this system has limitations in head orientation. Face recognition system is linking with the motor control system to allow the opening and closingofthe door security system and lighting system. PIC microcontroller is used to connect thehardwaredevicesand personal computer (PC) via USB to RS232 serial converter for interfacing with computer. This system can be used for security applications such as crime prevention, person verification, attendance system and so on. 7. ACKNOWLEDGMENT The author would like to express her gratitude to all her teachers from Electronic Engineering Department, Technological University (Kyaukse). The author wishes to express special thanks and sincere gratitude to her supervisor, Dr. San San Naing, Lecturer of Electronic Engineering Department, Kyaukse Technological University for her kind advices and encouragements in the route of carrying out this paper. And, the author especially thanks to her teachers and friends for giving the chance to take their face images utilized in this paper. 8. REFERENCES [1] “Face recognition system with face detection", Technological University Kakinada, the author of M.Vineetha Sai, G.VARALAKSHMI, G.BALAKUMAR, J.PRASD. [2] “Automtic Door Access System Using Face Recognition”, international journal of scientific & technology research volume 4, issue 06, june 2015. [3] “Design And Implementation Of Face Detection Using Adaboost Algorithm”, Journal of Theoretical and Applied InformationTechnology 31stJuly2014Vol.65 No.3. [4] Study of Viola-Jones Real Time Face Detector, a. KaiqiCen,https://github.com/JackCen/CS231A. [5] P.Viola and M.Jones. rapid object detection using a boosted cascade of simple features. In computer vision and patternRecognition, 2001.CVPR2001.Proceedings of the 2001 IEEE Computer Society Conference on, volume 1, pages I–511.IEEE,2001. [6] Face Recognition Using Principal Component Analysis Method, International Journal of Advanced Researchin Computer Engineering & Technology (IJARCET) Volume 1, Issue 9, November 2012. [7] Mohamed Rizon, Muhammad Firdaus Hashim, Face Recognition using Eigenfaces and Neural Networks. [8] Face Recognition Using PCA and Eigen Face Approach, Department of Computer Science and Engineering National Institute of Technology,India.