Professional Documents
Culture Documents
By
BACHELOR OF SCIENCE
IN
COMPUTER SCIENCE
Table of Contents
Table of
Contents ...........................................................................................................................2
Revision History ........................................................................................................................... 3
1. Introduction .............................................................................................................................. 4
1.1 General Information.............................................................................................................. 4
1.2 Purpose................................................................................................................................ 5
1.3 Document Conventions ...................................................................................................... 5
1.4 Project Objective ................................................................................................................ 6
1.5 Intended Audience and Reading Suggestions.................................................................... 7
1.6 Project Scope ..................................................................................................................... 7
2. Overall Description ................................................................................................................ 8
2.1 Product Perspective........................................................................................................... 8
2.2 Product Features................................................................................................................ 8
2.3 User Classes and Characteristics...................................................................................... 8
2.4 Operating Environment..................................................................................................... 8
2.5 Design and Implementation Constraints ......................................................................... 9
2.6 User Documentation......................................................................................................... 9
2.7 Assumptions and Dependencies........................................................................................ 9
3. System Features ...................................................................................................................... 10
3.1 System Feature 1............................................................................................................... 10
4. External Interface Requirements......................................................................................... 10
4.1 User Interfaces................................................................................................................... 11
4.2 Hardware Interfaces ......................................................................................................... 11
4.3 Software Interfaces .......................................................................................................... 11
4.4 Communications Interfaces .............................................................................................. 12
Government College University Faisalabad Page 3
Revision History
1. Introduction
The year 2020 has shown mankind some mind-boggling series of events amongst which the
COVID- 19 pandemic is the most life-changing event which has startled the world since the year
began. Affecting the health and lives of masses, COVID-19 has called for strict measures to be
followed in order to prevent the spread of disease. From the very basic hygiene standards to the
treatments in the hospitals, people are doing all they can for their own and the society’s safety; face
masks are one of the personal protective equipment. People wear face masks once they step out of
their homes and authorities strictly ensure that people are wearing face masks while they are in
groups and public places. To monitor that people are following this basic safety principle, a strategy
should be developed. A face mask detector system can be implemented to check this. Face mask
detection means to identify whether a person is wearing a mask or not. The first step to recognize
the presence of a mask on the face is to detect the face, which makes the strategy divided into two
parts: to detect faces and to detect masks on those faces.
Face detection is one of the applications of object detection and can be used in many areas like
security, biometrics, law enforcement and more. There are many detect- tor systems developed
around the world and being implemented. However, all this science needs optimization; a better,
more precise detector, because the world cannot afford any more increase in corona cases. In this
project, we will be developing a face mask detector that is able to distinguish between faces with
masks and faces with no masks. In this report, we have proposed a detector which employs SSD for
face detection and a neural network to detect presence of a face mask. The implementation of the
algorithm is on images, videos and live video streams. The rest of the report is organized as follows.
1.2 Purpose
The Face Mask Detection System can be used at offices, institutes and other public places
to detect if employees are maintaining safety standards at work. After the breakout of the
worldwide pandemic COVID-19, there arises a severe need of protection mechanisms, face mask
being the primary one. The basic aim of the project is to detect the presence of a face mask on
human faces on live streaming video as well as on images. We have used deep learning to
develop our face detector model. Alongside this, we have used basic concepts of transfer learning
in neural networks to finally output presence or absence of a face mask in an image.
The external oversight committee must approve the project performance measurement plan.
To collect the dataset from Kaggle The objective is to train the model to
Distributing the dataset for Testing detect the face mask from the person’s
and Training face
Filtering dataset in order to change its Detection of facemask from both
size and resolution in order to equally genders.
treat every image of dataset. Giving the percentage of mask position,
Training the dataset using Deep i.e. giving 100% if mask is properly on
learning the face.
Testing the accuracy of the model Providing output in form rectangle about
Validating model by giving random status of facemask(i.e. Green rectangle if
picture as an Input mask is properly on the face and red
otherwise)
Government College University Faisalabad Page 7
2. Overall Description
We introduce a mask face detection model that is based on computer vision and deep learning.
The proposed model can be integrated with surveillance cameras to impede the COVID-19
transmission by allowing the detection of people who are wearing masks and not wearing face
masks. The model is integration between deep learning and classical machine learning
techniques with Opencv, tensor flow, mobilenetv2 and keras. We have used deep transfer
leering for feature extractions and combined it with three classical machine learning algorithms.
We introduced a comparison between them to find the most suitable algorithm that achieved the
highest accuracy and consumed the least time in the process of training and detection.
the corner where device, a process or a system in sufficient detail to a human operator has to find
the comers, his geometric height and width lip envelope description. Implicitly uses the global
shape of mouth. He follows only work with the area around the lips. Because of all Outputs are
independently normalized in the range parameterization for later identification. [5, 6]. We have
pictures were taken with the seated people and at the predefined block of 245 by 245 pixels. Same
distance, this area is selected in all picture in the same position, i.e., we suppose that the lips area
inside a system works. Design is process of applying the various techniques and principles for the
purpose of defining a The MLP used was trained with back propagation the detailed design of the
system describes the data the upper and lower edges extend them when they are, they intersect. We
propose an adjustment process that works the same way. Detection is the first step in LISP..
The implementation methodology outlines key activities that should be considered and planned for
when developing or implementing an underwriting system. It begins with the design and
development activities involved in obtaining policy details, as a specification, provides a guideline
to develop and implement underwriting system.
3. System Features
The External Interface Requirements can be described as follow:
Our system is real time face detection model, also scan more than one faces at the same time and
alert the on duty man, we don’t need any extra hardware to install.
Functional requirements reflect the core functionality of the model. The functional
requirements are detecting the face mask from person face. Identifying the position
of the face mask. Finally notifying about that either the mask is on the face or not.
have very basic knowledge and also other people who are not much aware of this types of system
can easily handle. We include sample screen images.
Python language
Visual Studio Code IDE
The non-functional requirements can be detection of face mask at night. Designing the interface to
operate this model in easy sense. That is why bright color schemes and attractive graphics are the
part of non-functional requirements.
Face Mask detection using the deep learning is a real-time project to detect the face masks. The
mask will be detected from the faces of both genders. The work flow of this model is given in
figure
Government College University Faisalabad Page 14
Opencv
Tenserflow
Keras
MobileNet2
7.1Programming Language
Python
7.2Dataset
For this model dataset is taken from Keras an online free data source for machine learning
purpose.
Appendix A: Glossary
Keras: Online datasource
V. Interface Requirements
VII. WBS
Comments:__________________________ Comments:__________________________
___________________________________ ___________________________________
___________________________________ ___________________________________
___________________________________ ___________________________________
___________________________________ ___________________________________
---------------------------------------------------------------------
Date:_____________
➢ Rejected
Remarks:
_____________________________________________________________________________
______
_____________________________________________________________________________
______
_____________________________________________________________________________
______
_____________________________________________________________________________
______
________________________________________________________________________________
____
__________________________
__
Project Coordinator