SlideShare a Scribd company logo
1 of 13
FA C E
S C O P E
Brainwaves team
‫هللا‬ ‫بسم‬ ‫يال‬
I N T R O D U C T I O N
Face recognition technology is a biometric
identification method that uses an individual's facial
features to identify and verify their identity. The technology
has become increasingly popular in recent years as a more
secure and convenient alternative to traditional
identification methods like passwords and PINs.
One application of face recognition technology is in the
context of attendance tracking. With the use of face
recognition, organizations can automate attendance
tracking by allowing employees or students to simply scan
their faces to mark their attendance instead of manually
signing in or using a card-based system.
Using face recognition for attendance tracking has many
benefits. It eliminates the need for physical touch and
reduces the risk of fraud, as it is difficult to forge
someone's face. It also saves time and reduces errors, as
the attendance data is automatically collected and
processed.
5/10/2023 Sample Footer Text 3
M A C H I N E L E A R N I N G
Machine learning is a subset of artificial intelligence that involves
training algorithms to learn patterns and make predictions or
decisions based on data. It is a way of teaching computers to
recognize patterns in data and use that knowledge to make
decisions or predictions about new data.
At its core, machine learning involves using mathematical
models and algorithms to analyze data, identify patterns, and
make predictions or decisions. The algorithms are designed to
iteratively learn from the data they are fed, adjusting their models
to improve accuracy and reduce errors over time.
Machine learning is used in a wide range of applications, from
image recognition and natural language processing to fraud
detection and predictive analytics. Some common examples
include recommendation systems, chatbots, and autonomous
vehicles.
There are several different types of machine learning, including
supervised learning, unsupervised learning, and reinforcement
learning. Each type of machine learning involves different
methods for training algorithms to learn from data and make
5/10/2023 Sample Footer Text 4
Machine learning
Deep learning
D E E P L E A R N I N G
Deep learning is a subfield of machine learning that is inspired
by the structure and function of the human brain. It uses artificial
neural networks to learn and model complex patterns in data.
In deep learning, neural networks are composed of multiple
layers of interconnected nodes, which are called neurons. Each
neuron receives input from multiple other neurons in the previous
layer and produces an output that is passed on to the next layer.
By adjusting the weights of the connections between neurons, the
network can learn to recognize patterns and make predictions.
Deep learning has been applied successfully in a variety of
domains, including computer vision, natural language processing,
and speech recognition. For example, deep learning models can
be trained to recognize objects in images, translate text from one
language to another, or transcribe speech into text.
One of the key advantages of deep learning is its ability to
automatically extract useful features from raw data, without the
need for manual feature engineering. This makes it particularly
useful for handling large and complex datasets, where it can
discover hidden patterns and relationships that might be difficult
for humans to identify.
5/10/2023 Sample Footer Text 6
S T E P S O F F A C E
R E C .
1) Face Detection: The first step in face recognition is to locate and
extract the face from an image or video frame. This is done using face
detection algorithms that identify the presence and location of faces in
an image.
2) Face Alignment: Once the face is detected, it is important to align it in
a standard position and scale to ensure consistent and accurate
feature extraction. This is done using techniques such as
normalization, pose estimation, and landmark detection.
3) Feature Extraction: The next step is to extract meaningful features
from the aligned face image. This is typically done by using deep
learning models, which can learn to identify and extract relevant
features from the face, such as the shape of the eyes, nose, and
mouth.
4) Feature Matching: Once the features are extracted, the next step is to
compare them with the features of known faces in the database to find
a match. This is done using algorithms such as the Euclidean distance,
cosine similarity, or support vector machines.
5) Recognition: Finally, based on the feature matching results, the face
is identified and labeled with the corresponding name or identity. In
some cases, the system may also perform additional verification steps,
such as asking the user to perform a secondary authentication factor,
to ensure the accuracy and security of the recognition result
5/10/2023 Sample Footer Text 7
‫ليفة‬ ‫يا‬ ‫خش‬
U I ( U S E R I N T E R F A C E )
Tkinter is a Python library used for creating graphical user
interfaces (GUI). It provides a set of tools and widgets for building
desktop applications that can run on multiple platforms, including
Windows, macOS, and Linux.
With Tkinter, you can create windows, buttons, labels, textboxes,
and other GUI elements that allow users to interact with your
application. Tkinter also supports event-driven programming,
which means that your application can respond to user actions,
such as button clicks or key presses.
Some of the key features of Tkinter include:
Cross-platform compatibility: Tkinter is included with Python,
which means that your application can run on any platform that
supports Python.
Easy to use: Tkinter has a simple and intuitive interface, making
it easy to learn and use even for beginners.
Customizable widgets: Tkinter provides a variety of widgets that
can be customized to fit your application's needs. You can also
create your own custom widgets if needed.
Support for event-driven programming: Tkinter supports the use
of events and callbacks, which makes it easy to respond to user
actions and update the GUI in real-time.
5/10/2023 Sample Footer Text 9
U I ( C O N T. )
PIL (Python Imaging Library) is a Python library used for working with
images. It provides a wide range of image processing functionalities, such
as opening and saving images in various formats, manipulating images,
applying filters and transformations, and generating image thumbnails.
PIL is a powerful tool for working with images in Python, and it is often
used in computer vision and machine learning applications that involve
image processing. Some of the key features of PIL include:
1. Image I/O: PIL provides support for opening and saving images in a
variety of formats, including JPEG, PNG, BMP, TIFF, and GIF.
2. Image manipulation: PIL provides a set of tools for manipulating
images, such as resizing, cropping, rotating, and flipping.
3. Image filtering: PIL includes a range of filters that can be applied to
images, such as blurring, sharpening, and edge detection.
4. Image transformations: PIL provides support for transforming images,
such as changing the color space, adjusting brightness and contrast, and
applying geometric transformations.
5. Image enhancement: PIL includes tools for enhancing images, such as
histogram equalization and color balance adjustment.
Overall, PIL is a powerful library for working with images in Python.
Whether you're building a computer vision application, a machine learning
model, or simply working with images in your Python project, PIL can
provide the tools you need to manipulate and process images efficiently.
5/10/2023 Sample Footer Text 10
back
UI
back
B A C K
`Encodings : encodings refer to the process of
representing data in a specific format, such as binary or
ASCII. An encoding is a mapping between a set of
characters or symbols and their binary representations.
converts each image from BGR format (which OpenCV
uses by default) to RGB format
obtain the facial features for each face present in the
image
marks the attendance  CSV file
reads the existing lines in the CSV file
strftime()
bounding box around detected faces
bounding box around detected faces
extracts the region of interest (ROI) for each face
level greater than 60% , 50-60%, a red bounding box
Sample Footer Text 12
B A C K
`1. Imports the reperforms real-time face recognition
using the LBPH
quired libraries (`cv2` for computer vision and `time` for measuring FPS).
video capture was successful. The function detects faces in the image,
draws a rectangle around them, and returns the image.
3. Loads the pre-trained classifier from a file.
Calls the `findEncodings` method to encode the images of known faces.
Starts capturing video from the default camera (`cv2.VideoCapture(0)`).
. In an infinite loop:
1. Reads a frame from the video capture.
2. Calls the `recognize` function to detect faces and draw rectangles around
them.
3. Calculates the FPS (frames per second) and displays it on the screen.
4. Displays the processed image on the screen.
5. Waits for a key press to quit the loop.
7. Releases the video capture and destroys all windows. Sample Footer Text 13

More Related Content

Similar to Face Scope.pptx

Image recognition
Image recognitionImage recognition
Image recognitionJoel Jose
 
Top 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfTop 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfthe knowledge
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionIRJET Journal
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabKamal Pradhan
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentationSakshamTurki
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemIRJET Journal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Vidyut Singhania
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...Editor IJMTER
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 

Similar to Face Scope.pptx (20)

Image recognition
Image recognitionImage recognition
Image recognition
 
Top 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfTop 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdf
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlab
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentation
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
G041041047
G041041047G041041047
G041041047
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
A guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdfA guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdf
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Face Scope.pptx

  • 1. FA C E S C O P E Brainwaves team
  • 3. I N T R O D U C T I O N Face recognition technology is a biometric identification method that uses an individual's facial features to identify and verify their identity. The technology has become increasingly popular in recent years as a more secure and convenient alternative to traditional identification methods like passwords and PINs. One application of face recognition technology is in the context of attendance tracking. With the use of face recognition, organizations can automate attendance tracking by allowing employees or students to simply scan their faces to mark their attendance instead of manually signing in or using a card-based system. Using face recognition for attendance tracking has many benefits. It eliminates the need for physical touch and reduces the risk of fraud, as it is difficult to forge someone's face. It also saves time and reduces errors, as the attendance data is automatically collected and processed. 5/10/2023 Sample Footer Text 3
  • 4. M A C H I N E L E A R N I N G Machine learning is a subset of artificial intelligence that involves training algorithms to learn patterns and make predictions or decisions based on data. It is a way of teaching computers to recognize patterns in data and use that knowledge to make decisions or predictions about new data. At its core, machine learning involves using mathematical models and algorithms to analyze data, identify patterns, and make predictions or decisions. The algorithms are designed to iteratively learn from the data they are fed, adjusting their models to improve accuracy and reduce errors over time. Machine learning is used in a wide range of applications, from image recognition and natural language processing to fraud detection and predictive analytics. Some common examples include recommendation systems, chatbots, and autonomous vehicles. There are several different types of machine learning, including supervised learning, unsupervised learning, and reinforcement learning. Each type of machine learning involves different methods for training algorithms to learn from data and make 5/10/2023 Sample Footer Text 4
  • 6. D E E P L E A R N I N G Deep learning is a subfield of machine learning that is inspired by the structure and function of the human brain. It uses artificial neural networks to learn and model complex patterns in data. In deep learning, neural networks are composed of multiple layers of interconnected nodes, which are called neurons. Each neuron receives input from multiple other neurons in the previous layer and produces an output that is passed on to the next layer. By adjusting the weights of the connections between neurons, the network can learn to recognize patterns and make predictions. Deep learning has been applied successfully in a variety of domains, including computer vision, natural language processing, and speech recognition. For example, deep learning models can be trained to recognize objects in images, translate text from one language to another, or transcribe speech into text. One of the key advantages of deep learning is its ability to automatically extract useful features from raw data, without the need for manual feature engineering. This makes it particularly useful for handling large and complex datasets, where it can discover hidden patterns and relationships that might be difficult for humans to identify. 5/10/2023 Sample Footer Text 6
  • 7. S T E P S O F F A C E R E C . 1) Face Detection: The first step in face recognition is to locate and extract the face from an image or video frame. This is done using face detection algorithms that identify the presence and location of faces in an image. 2) Face Alignment: Once the face is detected, it is important to align it in a standard position and scale to ensure consistent and accurate feature extraction. This is done using techniques such as normalization, pose estimation, and landmark detection. 3) Feature Extraction: The next step is to extract meaningful features from the aligned face image. This is typically done by using deep learning models, which can learn to identify and extract relevant features from the face, such as the shape of the eyes, nose, and mouth. 4) Feature Matching: Once the features are extracted, the next step is to compare them with the features of known faces in the database to find a match. This is done using algorithms such as the Euclidean distance, cosine similarity, or support vector machines. 5) Recognition: Finally, based on the feature matching results, the face is identified and labeled with the corresponding name or identity. In some cases, the system may also perform additional verification steps, such as asking the user to perform a secondary authentication factor, to ensure the accuracy and security of the recognition result 5/10/2023 Sample Footer Text 7
  • 9. U I ( U S E R I N T E R F A C E ) Tkinter is a Python library used for creating graphical user interfaces (GUI). It provides a set of tools and widgets for building desktop applications that can run on multiple platforms, including Windows, macOS, and Linux. With Tkinter, you can create windows, buttons, labels, textboxes, and other GUI elements that allow users to interact with your application. Tkinter also supports event-driven programming, which means that your application can respond to user actions, such as button clicks or key presses. Some of the key features of Tkinter include: Cross-platform compatibility: Tkinter is included with Python, which means that your application can run on any platform that supports Python. Easy to use: Tkinter has a simple and intuitive interface, making it easy to learn and use even for beginners. Customizable widgets: Tkinter provides a variety of widgets that can be customized to fit your application's needs. You can also create your own custom widgets if needed. Support for event-driven programming: Tkinter supports the use of events and callbacks, which makes it easy to respond to user actions and update the GUI in real-time. 5/10/2023 Sample Footer Text 9
  • 10. U I ( C O N T. ) PIL (Python Imaging Library) is a Python library used for working with images. It provides a wide range of image processing functionalities, such as opening and saving images in various formats, manipulating images, applying filters and transformations, and generating image thumbnails. PIL is a powerful tool for working with images in Python, and it is often used in computer vision and machine learning applications that involve image processing. Some of the key features of PIL include: 1. Image I/O: PIL provides support for opening and saving images in a variety of formats, including JPEG, PNG, BMP, TIFF, and GIF. 2. Image manipulation: PIL provides a set of tools for manipulating images, such as resizing, cropping, rotating, and flipping. 3. Image filtering: PIL includes a range of filters that can be applied to images, such as blurring, sharpening, and edge detection. 4. Image transformations: PIL provides support for transforming images, such as changing the color space, adjusting brightness and contrast, and applying geometric transformations. 5. Image enhancement: PIL includes tools for enhancing images, such as histogram equalization and color balance adjustment. Overall, PIL is a powerful library for working with images in Python. Whether you're building a computer vision application, a machine learning model, or simply working with images in your Python project, PIL can provide the tools you need to manipulate and process images efficiently. 5/10/2023 Sample Footer Text 10
  • 12. B A C K `Encodings : encodings refer to the process of representing data in a specific format, such as binary or ASCII. An encoding is a mapping between a set of characters or symbols and their binary representations. converts each image from BGR format (which OpenCV uses by default) to RGB format obtain the facial features for each face present in the image marks the attendance  CSV file reads the existing lines in the CSV file strftime() bounding box around detected faces bounding box around detected faces extracts the region of interest (ROI) for each face level greater than 60% , 50-60%, a red bounding box Sample Footer Text 12
  • 13. B A C K `1. Imports the reperforms real-time face recognition using the LBPH quired libraries (`cv2` for computer vision and `time` for measuring FPS). video capture was successful. The function detects faces in the image, draws a rectangle around them, and returns the image. 3. Loads the pre-trained classifier from a file. Calls the `findEncodings` method to encode the images of known faces. Starts capturing video from the default camera (`cv2.VideoCapture(0)`). . In an infinite loop: 1. Reads a frame from the video capture. 2. Calls the `recognize` function to detect faces and draw rectangles around them. 3. Calculates the FPS (frames per second) and displays it on the screen. 4. Displays the processed image on the screen. 5. Waits for a key press to quit the loop. 7. Releases the video capture and destroys all windows. Sample Footer Text 13