SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
Self-X: Geo Fencing and Face Recognition based Smart Attendance
Management Application
Siddhesh Chotaliya1
, Ishika Vaish2
, Prince Kanojia3, Saurabh Suman4
1,2,3 Department of information Technology, Shree LR Tiwari College of Engineering, Maharashtra, India
4 Professor, Department of information Technology, Shree LR Tiwari College of Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The attendance system, primarily in colleges or
organizations, is necessary to monitor students discipline and
attendance. Some biometric, barcode, and QR Code-based
attendance systems haven't been able to eliminate the need
for students to stand in line in front of the attendance
machine, rendering the attendance procedure more
cumbersome. With the use of a mobile application based on
geofencing and facial recognition, this study aims to develop a
Llexible attendance system that mayoptimize and accelerate
the process, saving the organizationmoney by eliminating the
need to purchase high tech equipment. A mobile application is
utilized by the system as a presence device.
Key Words: Geo-Fencing, Face recognition, Face detection,
mobile-based application system.
1.INTRODUCTION
Prior to the advent of computers and mobile devices, usinga
pen and paper was the most typical way to take attendance
in classrooms at our institutions. Traditionally, the
attendance system comprises calling out student’s names or
circulating an attendance sheet around the class,where each
student is asked to sign it to attest to their actual present.
In the industrial era, all activities can be connected to and
accessed by utilising a smartphone and the internet,
although technology is now evolving very rapidly. The
attendance system is expanding as well to make it simpler
for students to use and to enhance student monitoring.
2. LITERATURE REVIEW
2.1. Fingerprint Based Recognition System
The portable fingerprint device needs to be pre-configured
with each individual's fingerprints in advance for a
departure system that uses fingerprints. The student should
leave fingerprints on the suspended device before or after
teaching hours to confirm their daily attendance. The idea is
that people's eyes should be distracted while they are
studying.
2.2. RFID (Radio Frequency Identification)
Based Recognition System
Co-ed should always carry proper identity and place an
ID with a cardboard reader to record their daily presence in
an RFID-based system that is already in place. The device
may establish an RS232 connection and log participants ona
previously visited website. There's a chance that someone
could gain access fraudulently. When the real student is not
there, some students may use another student's ID to prove
their presence, or they may even attempt to abuse it
occasionally.
2.3. Iris Based Recognition System
The student should rotate in front of the camera duringan
Iris-based student travel programme so that the cameracan
read the Iris code. The specific data saved on the website is
compared to the scanned iris, and any discrepancies should
be corrected. As a result, fewer college members of the
organisation use paper and pens. Additionally, it helps
preserve safe code records and lowers the likelihood of
representation in the classroom. It is a wireless biometric
technique that addresses the issue of fake existence and, as a
result, the challenge of establishinga functional network.
2.4. Face Based Recognition System
The student should rotate in front of the camera duringan
Iris-based student travel programme so that the cameracan
read the Iris code. The specific data saved on the website is
compared to the scanned iris, and any discrepancies should
be corrected. As a result, fewer college members of the
organisation use paper and pens. Additionally, it helps
preserve safe code records and lowers the likelihood of
representation in the classroom. It is a wireless biometric
technique that addresses the issue of fake existence and, as a
result, the challenge of establishinga functional network.
3. PROPOSED SYSTEM
3.1. Dataset Creation
A phone camera is used to take pictures of the students. A
single student will be captured in numerous pictures from
various perspectives and motions. There is pre-processing
done to these pictures. To acquire the Region of Interest
(ROI), which will be used in the recognition procedure, the
photos are cropped. The clipped photos must then be
resized to a speciRic pixel position. Then, these RGB photos
will be transformed to grayscale versions. And after that,
these pictures will be saved in a folder with the names of
the respective students.
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1170
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
Fig -1: Dataset Creation
3.2. Face Detection
Finding human faces in visual material mechanically is a
technique called face detection. We can Rind people in a
picture, recognise important facial characteristics, and
obtain the contours of faces that have been found using the
face detection API provided by ML Kit. We can obtain the
data we need to carry out tasks like enhancing selRies and
images or creating avatars from a user's photo using facial
recognition. We can use ML Kit in programmes like video
chat or games that react to the player's facial emotions
because it can conduct face recognition in real-time.When a
visage is discovered, its location, size, and direction are
recorded. Once a visage has been identiRied, it can be
probed for features like the eyes and nostrils.
3.3. Face Recognition
Preparing training data, training the face recognizer, and
prediction are the three processes in the face recognition
process. The photographs in the dataset will serve as the
training data in this case. They will be given an integer label
designating which student they belong to. Face recognition
software is then used to these pictures.
A individual can be identiRied using facial recognition, a
well-known technology Google Ml Kit, from their digital
image or a video frame that is kept in our database. They are
typically carried out by choosing particular facial
characteristics from the picture with captured faces in our
database. It is also described as a biometric AI-based tool
that can recognise a person by their distinctive facial form
and texture after examining speciRic patterns. Facial
recognition is used in this module to recognise the picture
and match it to the source information. A video frame or
digital picture is taken from a video source, and that is
how the individual is recognised.
Fig -2: ML-Kit
3.4. Geo Fencing Authentication
The system compares the current student location's
longitude and latitude with the geofencing information that
has been stored using the GPS data. The system will lock the
presence button until the location Rits the geofencing
if location data are inconsistent with the stored data. The
suggested library trust_location 2.0.13 that can detect Fake
GPS users in order to prevent the GPS position in
smartphones from being modiRied by an employing a Fake
GPS application. Every few seconds, this library maintains
longitude and latitude data, and if the data changes as a
result of a fake GPS, the system can refuse to utilise it.
Fig -3: Geo-Fence
3.5. Attendance Updation
Following the face recognition process, the excel sheet will
have the recognised faces marked as present and the
remaining faces marked as absent. The list of absentees will
then be mailed to the appropriate faculties. At theconclusion
of each month, faculties will receive an update with their
monthly attendance sheet.
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1171
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
4. Flow Chart
Fig -4: Flowchart
5. Results
Fig 5- Welcome Page
Fig 6- Registration Page
Fig 7- Dashboard Page
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1172
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
Fig 8- Attendance Page
Our project introduces a smart, geofencing based
attendance monitoring system which use Face Recognitionfor
the validation of the student. The area is set for tracking
using GPS coordinate inside the area border depicts where
lecture is to take place. We developed this system for Mobile
app. We have planned to implement system for various
applications like employees attendance or seminar
attendance. Moreover can also build robust attendance
management system.
6. CONCLUSIONS
REFERENCES
1. Jacob, I. Jeena. "Capsule network based
biometric recognition system." Journal of
ArtiRicial Intelligence 1,2019.
2. Rajat Kumar Chauhan, Vivekanand Pandey, Lokanath M,
“Smart Attendance System Using CNN”, International
Journal of Pure and Applied Mathematics,2018.
3. Samridhi Dev, Tushar Patnaik,"Student Attendance
System using Face Recognition ", International
Conference on Smart Electronics and Communication
(ICOSEC 2020)
4. Enikuomehin* A.O, Dosumu** O.U, Attendance
Monitoring System, International Journal of Engineering
And Science
5. IEEE, Design of Attendance Monitoring System Using
RFID(9441704), 2021
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1173

More Related Content

Similar to Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Application

Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
bkbk37
 

Similar to Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Application (20)

FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial IntelligenceIRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
 
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring System
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...
 
A novel method for Smart school bus tracking system using Machine learning an...
A novel method for Smart school bus tracking system using Machine learning an...A novel method for Smart school bus tracking system using Machine learning an...
A novel method for Smart school bus tracking system using Machine learning an...
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password AuthenticationIRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password Authentication
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Student Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition AlgorithmStudent Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition Algorithm
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Attendance Monitoring Using Face Recognition with Message Alert
Attendance Monitoring Using Face Recognition with Message AlertAttendance Monitoring Using Face Recognition with Message Alert
Attendance Monitoring Using Face Recognition with Message Alert
 
IRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face Recognition
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Recently uploaded (20)

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 

Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Application Siddhesh Chotaliya1 , Ishika Vaish2 , Prince Kanojia3, Saurabh Suman4 1,2,3 Department of information Technology, Shree LR Tiwari College of Engineering, Maharashtra, India 4 Professor, Department of information Technology, Shree LR Tiwari College of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The attendance system, primarily in colleges or organizations, is necessary to monitor students discipline and attendance. Some biometric, barcode, and QR Code-based attendance systems haven't been able to eliminate the need for students to stand in line in front of the attendance machine, rendering the attendance procedure more cumbersome. With the use of a mobile application based on geofencing and facial recognition, this study aims to develop a Llexible attendance system that mayoptimize and accelerate the process, saving the organizationmoney by eliminating the need to purchase high tech equipment. A mobile application is utilized by the system as a presence device. Key Words: Geo-Fencing, Face recognition, Face detection, mobile-based application system. 1.INTRODUCTION Prior to the advent of computers and mobile devices, usinga pen and paper was the most typical way to take attendance in classrooms at our institutions. Traditionally, the attendance system comprises calling out student’s names or circulating an attendance sheet around the class,where each student is asked to sign it to attest to their actual present. In the industrial era, all activities can be connected to and accessed by utilising a smartphone and the internet, although technology is now evolving very rapidly. The attendance system is expanding as well to make it simpler for students to use and to enhance student monitoring. 2. LITERATURE REVIEW 2.1. Fingerprint Based Recognition System The portable fingerprint device needs to be pre-configured with each individual's fingerprints in advance for a departure system that uses fingerprints. The student should leave fingerprints on the suspended device before or after teaching hours to confirm their daily attendance. The idea is that people's eyes should be distracted while they are studying. 2.2. RFID (Radio Frequency Identification) Based Recognition System Co-ed should always carry proper identity and place an ID with a cardboard reader to record their daily presence in an RFID-based system that is already in place. The device may establish an RS232 connection and log participants ona previously visited website. There's a chance that someone could gain access fraudulently. When the real student is not there, some students may use another student's ID to prove their presence, or they may even attempt to abuse it occasionally. 2.3. Iris Based Recognition System The student should rotate in front of the camera duringan Iris-based student travel programme so that the cameracan read the Iris code. The specific data saved on the website is compared to the scanned iris, and any discrepancies should be corrected. As a result, fewer college members of the organisation use paper and pens. Additionally, it helps preserve safe code records and lowers the likelihood of representation in the classroom. It is a wireless biometric technique that addresses the issue of fake existence and, as a result, the challenge of establishinga functional network. 2.4. Face Based Recognition System The student should rotate in front of the camera duringan Iris-based student travel programme so that the cameracan read the Iris code. The specific data saved on the website is compared to the scanned iris, and any discrepancies should be corrected. As a result, fewer college members of the organisation use paper and pens. Additionally, it helps preserve safe code records and lowers the likelihood of representation in the classroom. It is a wireless biometric technique that addresses the issue of fake existence and, as a result, the challenge of establishinga functional network. 3. PROPOSED SYSTEM 3.1. Dataset Creation A phone camera is used to take pictures of the students. A single student will be captured in numerous pictures from various perspectives and motions. There is pre-processing done to these pictures. To acquire the Region of Interest (ROI), which will be used in the recognition procedure, the photos are cropped. The clipped photos must then be resized to a speciRic pixel position. Then, these RGB photos will be transformed to grayscale versions. And after that, these pictures will be saved in a folder with the names of the respective students. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1170
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 Fig -1: Dataset Creation 3.2. Face Detection Finding human faces in visual material mechanically is a technique called face detection. We can Rind people in a picture, recognise important facial characteristics, and obtain the contours of faces that have been found using the face detection API provided by ML Kit. We can obtain the data we need to carry out tasks like enhancing selRies and images or creating avatars from a user's photo using facial recognition. We can use ML Kit in programmes like video chat or games that react to the player's facial emotions because it can conduct face recognition in real-time.When a visage is discovered, its location, size, and direction are recorded. Once a visage has been identiRied, it can be probed for features like the eyes and nostrils. 3.3. Face Recognition Preparing training data, training the face recognizer, and prediction are the three processes in the face recognition process. The photographs in the dataset will serve as the training data in this case. They will be given an integer label designating which student they belong to. Face recognition software is then used to these pictures. A individual can be identiRied using facial recognition, a well-known technology Google Ml Kit, from their digital image or a video frame that is kept in our database. They are typically carried out by choosing particular facial characteristics from the picture with captured faces in our database. It is also described as a biometric AI-based tool that can recognise a person by their distinctive facial form and texture after examining speciRic patterns. Facial recognition is used in this module to recognise the picture and match it to the source information. A video frame or digital picture is taken from a video source, and that is how the individual is recognised. Fig -2: ML-Kit 3.4. Geo Fencing Authentication The system compares the current student location's longitude and latitude with the geofencing information that has been stored using the GPS data. The system will lock the presence button until the location Rits the geofencing if location data are inconsistent with the stored data. The suggested library trust_location 2.0.13 that can detect Fake GPS users in order to prevent the GPS position in smartphones from being modiRied by an employing a Fake GPS application. Every few seconds, this library maintains longitude and latitude data, and if the data changes as a result of a fake GPS, the system can refuse to utilise it. Fig -3: Geo-Fence 3.5. Attendance Updation Following the face recognition process, the excel sheet will have the recognised faces marked as present and the remaining faces marked as absent. The list of absentees will then be mailed to the appropriate faculties. At theconclusion of each month, faculties will receive an update with their monthly attendance sheet. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1171
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 4. Flow Chart Fig -4: Flowchart 5. Results Fig 5- Welcome Page Fig 6- Registration Page Fig 7- Dashboard Page © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1172
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 Fig 8- Attendance Page Our project introduces a smart, geofencing based attendance monitoring system which use Face Recognitionfor the validation of the student. The area is set for tracking using GPS coordinate inside the area border depicts where lecture is to take place. We developed this system for Mobile app. We have planned to implement system for various applications like employees attendance or seminar attendance. Moreover can also build robust attendance management system. 6. CONCLUSIONS REFERENCES 1. Jacob, I. Jeena. "Capsule network based biometric recognition system." Journal of ArtiRicial Intelligence 1,2019. 2. Rajat Kumar Chauhan, Vivekanand Pandey, Lokanath M, “Smart Attendance System Using CNN”, International Journal of Pure and Applied Mathematics,2018. 3. Samridhi Dev, Tushar Patnaik,"Student Attendance System using Face Recognition ", International Conference on Smart Electronics and Communication (ICOSEC 2020) 4. Enikuomehin* A.O, Dosumu** O.U, Attendance Monitoring System, International Journal of Engineering And Science 5. IEEE, Design of Attendance Monitoring System Using RFID(9441704), 2021 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1173