Professional Documents
Culture Documents
Preprint Not Peer Reviewed: Face Mask Detection Using Machine Learning
Preprint Not Peer Reviewed: Face Mask Detection Using Machine Learning
ed
Mr.Kalla.Kiran1, Bokka Vamsi Kiran 2, Devarapalli Cheswanth Sai 3 , Gaggala Vijay Vamsi 4 Pitta Rani Salomi 5
1
Associate Professor& HoD, Dept. of AI&DS, 217ME1A0506, 317ME1A0511, 417ME1A0515,
5
17ME1A0547
Ramachandra College of Engineering, A.P., India
iew
ABSTRACT
The purpose of the project “Face Mask Detection Using Machine Learning” is to create a tool that
identifies the image of a human that can calculate the probability that he/she wearing a mask or not.
Due to COVID, wearing a face mask is must in order to stay safe. As the country starts going through
v
various stages of reopening, face masks have become an important element of our daily lives to stay
safe. Wearing face masks will be required in order to socialize or conduct business. So, this
re
application utilizes a camera to detect if a person is wearing a mask or not.
detect masks on those faces. Face detection is laws were developed as an action to the
one of the applications of object detection and exponential growth in cases and deaths in
can be used in many areas like security, many areas. However, the process of
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
monitoring large groups of people is becoming are one of the personal protective equipment.
more difficult in public areas. So we will People wear face masks once they step out of
ed
create a automation process for detecting the their homes and authorities strictly ensure that
faces. people are wearing face masks while they are
in groups and public places.
Here we introduce a facemask detection model
that is based on computer vision and deep 2.3 PROPOSED SYSTEM:
iew
learning. The proposed model can be
To overcome the drawbacks of the existing
integrated with Surveillance Cameras to
system, the proposed system has been evolved.
impede the COVID-19 transmission by
This projects aim is to monitor that people are
allowing the detection of people who are
following the basic safety principles. This is
wearing masks not wearing face masks. The
done by developing a face mask detector
model is integration between deep learning
v
system.
and classical machine learning techniques with
Open cv, Tensor flow and Keras. 3. SOFTWARE DESCRIPTION
re
2.2 EXISTING SYSTEM: 3.1 CODE EDITORS:
The year 2020 has shown mankind some 3.1.1 PyCharm
mind-boggling series of events amongst which
er
the COVID-19 pandemic is the most life- PyCharm is an integrated development
changing event which has startled the world environment (IDE) used In computer
since the year began. Affecting the health and programming, specifically for the Python
lives of masses, COVID-19 has called for language. It is developed by the Czech
pe
strict measures to be followed in order to company JetBrains (formerly known as
prevent the spread of disease. From the very IntelliJ). It provides code analysis, a graphical
basic hygiene standards to the treatments in debugger, an integrated unit tester, integration
the hospitals, people are doing all they can for with version control systems (VCSes), and
their own and the society’s safety; face masks supports web development with Django as
ot
• Coding assistance and analysis, with code jumping between files, classes, methods and
completion, syntax and error highlighting, usages
linter integration, and quick fixes
Pr
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
• Support for web frameworks: Django, mathematics, and rich representations of
web2py and Flask[professional edition only] resulting objects. These documents are
ed
internally JSON files and are saved with the
• Integrated Python debugger
.ipynb extension. Since JSON is a plain text
• Integrated unit testing, with line-by-line code format, they can be version- controlled and
coverage shared with colleagues.
iew
• Google App Engine Python development 3.2 DEVELOPMENT TOOLS AND
TECHNOLOGIES:
• Version control integration: unified user
interface for Mercurial, Git, Subversion, 4.2.1 PYTHON:
Perforce and CVS with change lists and merge
Python is an interpreter, interactive, object-
• Support for scientific tools like matplotlib, oriented programming language. It
v
numpy and scipy[professional edition only] incorporates modules, exceptions, dynamic
typing, very high level dynamic data types,
re
3.1.2 Notepad ++ and classes. Python combines remarkable
Notepad++ is a free (as in “free speech” and power with very clear syntax. It has interfaces
also as in “free beer”) source code editor and to many system calls and libraries, as well as
Notepad replacement that supports several er to various window systems, and is extensible
languages. Running in the MS Windows in C or C++. It is also usable as an extension
environment, its use is governed by GNU language for applications that need a
General Public License. Based on the powerful programmable interface. Finally, Python is
portable: it runs on many Unix variants, on the
pe
editing component Scintilla, Notepad++ is
written in C++ and uses pure Win32 API and Mac, and on Windows 2000 and later. When
STL which ensures a higher execution speed he began implementing Python, Guido van
and smaller program size. By optimizing as Rossum was also reading the published scripts
many routines as possible without losing user from “Monty Python’s Flying Circus”, a BBC
friendliness, Notepad++ is trying to reduce the comedy series from the 1970s.
ot
greener environment.
Due to the COVID-19 pandemic, our daily
3.1.3 Jupyter habits have suddenly changed. Gatherings are
forbidden and, even when it is possible to
The Jupyter Notebook is an open-source web leave the home for health or work reasons, it is
rin
application that allows you to create and share necessary to wear a face mask to reduce the
documents that contain live code, equations, possibility of contagion. In this context, it is
visualizations and narrative text. Uses include: crucial to detect violations by people who do
data cleaning and transformation, numerical not wear a face mask. ace Mask detection has
simulation, statistical modelling, data
ep
is not meant for execution. In this way, face to be revealed with very high precision.
notebook files can serve as a complete
computational record of a session, interleaving 4.2 PROJECT OVERVIEW:
executable code with explanatory text,
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
To access the application authentication is module. Admin can have the control over the
provided. The user have username and student module. Admin can see the fee status
ed
password. User is two types, one admin and and take the no due form of a particular
student. After login, it enters into different student if the due is cleared. A student can also
type of module, at the time of login it is view the fee status and take his/her no- due
decide. If the user is admin it logon into admin form. They both can change their passwords.
iew
module, otherwise it logon into the student
4.3 ARCHITECTURE:
v
re
er
pe
ot
tn
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
ed
v iew
re
Figure 5.4.1.1- Flow Diagram
5. SCREEN SHOTS
TRAINING MODULE:
er
pe
ot
tn
rin
DETECTION MODULE:
ep
Pr
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
ed
v iew
re
Figure :5.2 DETECTION MODULE
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736
REFERENCES [4] https://www.python.org/
ed
[1] https://blog.keras.io/keras-as-a-simplified- [5]
interface-to-tensorflow-tutorial.html https://ieeexplore.ieee.org/document/9216386
iew
-899X/1070/1/012061/meta
https://www.datacamp.com/community/tutoria
ls/tensorflow-tutorial
v
re
er
pe
ot
tn
rin
ep
Pr
This preprint research paper has not been peer reviewed. Electronic copy available at: https://ssrn.com/abstract=3925736