Professional Documents
Culture Documents
NAME OF STUDENTS ID NO
1. GOSA NEGASH CIR/145/08
2. GOSA NEGASH CIR/146/08
3. HELEN SEKO CIR/162/08
4. TIGIST ABEBAW CIR/280/08
5. MICHAEL HARKISO CIR/214/08
6. NATINAEL ENGIDA CIR/230/08
BY
NAME OF STUDENTS ID NO
1. GOSA NEGASH CIR/145/08
2. GOSA NEGASH CIR/146/08
3. HELEN SEKO CIR/162/08
4. TIGIST ABEBAW CIR/280/08
5. MICHAEL HARKISO CIR/214/08
6. NATINAEL ENGIDA CIR/230/08
No part of the project work has been reproduced illegally (copy and paste) which can be
considered as Plagiarism. All referenced parts have been used to argue the idea and have been
cited properly. We will be responsible and liable for any consequence if violation of this
declaration is proven.
Date: ___________________
Group Members:
ID: Identification
The current entrance system of the wolkite university is supported by both manual and
computerized system. The computerized part of entrance system is digital identification card
which is implemented in the context of the barcode reader. This system has drawback such as,
does not prohibit someone if he/she uses others student digital identification card, the barcode on
digital identification card is easily broken, blacken and scratched if this happen the barcode
reader does not read the barcode on digital identification card. Another drawback of barcode
reader is does not read the barcode from far.
The general objective of proposed project is to design and develop face recognition system for
student identification in wolkite university entrance to support the work process of wolkite
university entrance security guards. The methodology we used to develop this project is
observation and interview, in observation we gather requirements directly by observing the
workflow and perform activity of the existing system without interference of third person and we
interview student union, student and ICT application developer to gathering requirements. After
we identify the problem of existing system, we proposed and design the new and more automated
system which is called student identification using face recognition which avoid the current
problem of entrance system.
1. INTRODUCTION
Face recognition is an important project and research topic in image processing field of study
because of its application in different environments and disciplines like the field of computing,
psychology, and neurology for a different purpose. On the other hand, face recognition plays its
own role in the field of security on different levels from identification to authentication for
systems. Face recognition in the field of security applies different techniques for analyzing and
processing a face image. Here, in this project, an analytical technique for face recognition is used
for extracting feature components of a face for face identification.
The current entrance system of the wolkite university is supported by both manual and
computerized system. The manual-based is provided for student until they obtain digital
identification card and the computerized part of entrance system is digital identification card
which is implemented in the context of the barcode reader. The digital identification card has
barcode which contain the information of student on it. This barcode reader has drawbacks. Such
as, the system does not prohibit if someone uses another student’s identification card, if barcode
becomes broken, blacken and scratched the barcode reader cannot read the barcode.
We motivate to develop automated system which is called student identification using face
recognition for wolkite university and to give a solution for the problem of existing system to
enhance security. This system is a technology capable of identifying or verifying a person based
on their facial characteristics. To identify the students the system process through preprocessing
and post preprocessing, in processing the face of students is detected by applying detection
algorithm which called haar cascade classifier OpenCV (open computer vision) library using
camera and the detected face is captured.
In postprocessing the captured face extracted using LBPH (local binary pattern histogram)
algorithm and match the extracted face with store in dataset finally identify and display the
results. It focusses on interest part of faces such as eye, nose, mouth, forehead. In general, the
system identifies the student by comparing selected facial features within is stored in database.
We can this use system in a large organization such as a university, college, and company.
The digital student identification is computerized and its better secured than the paper-based, but
it has some drawbacks. such as the id may be lost, broken, the barcode reader may scratch due to
age or lack of care, so when all this are happening students are obliged to get new identification
card this situation can cause economic extravagance for both students and university the other
drawback of the existing system is another person can enter in to university by the other
identification card. Because of this, we will initiate to develop another system that fixes those
problems which are called students identification using face recognition. This system is work by
capturing the image of students and verify that image if it is in the database after it verifies if it
exists display student information and if it is not displayed an alert.
In the planning phase, we plan how to achieve this project by dividing our activities on
time and how to perform in our group.
Requirements
Planning
Design
Initialization
Implementation
Evaluation Test
Deployment
While using unit testing is done at the source or code level for language-specific programming
errors such as bad syntax, logic errors, or to test particular functions or code modules. The unit
test cases shall be designed to test the validity of the program’s correctness.
In this level of the testing process, the face recognition developers test the different sub
procedures and functions.
Sample Tests
Integration testing
In this level of testing, we have examined how the different procedures work together to achieve
the goal of the subsystem. The type of integration testing that we have follow bottom up. So, we
integrate each component from single function to the main function incrementally.
Sample Tests
1. Check the interaction between individual functionality which performs the specific tasks.
2. Evaluate the functionality of the subsystem after combination all individual functionality.
3. Identify the Independence of each subsystem with another subsystem.
System testing
In this level of testing process, we have examined how the whole subsystems of face recognition
work together to achieve the desired goal (user’s requirements of the system). The goals of system
testing are to detect faults that can only be exposed by testing the entire integrated system or some
major part of it. Generally, under this testing is mainly concerned with areas such as performance,
security, validation, load/stress, and configuration sensitivity of face recognition. But we will
more focus only on function validation and performance.
Sample Tests
Windows operating system Will be used for the system since it is readily available in
laboratories.
Students are the user of the existing system who attend education in the university. The
responsibilities of students are described as the following:
System administrator is user of existing system who is responsible for managing student
information and who perform following activity:
Campus police is the user of the existing system who performs the following activity:
The campus police Order students who have digital identification card to read their
identification card by system to check its validity.
Check student’s identification card when they enter from outside.
System controller
System controller is the user of the existing system who perform the following activity:
Items Details
Name Digital identification card
Id BR1
Description The student must have valid digital identification card.
Only one identification card allows for student.
Keep the identification card from damage, lost and broken.
If the identification is damage, lost and broken ask for a replacement.
Items Details
Name Add student information
Id BR2
Descriptio System administrators have responsible for import student information
n from currently existing database
Items Details
Name Deactivate student information
Id BR3
Description System administrator have a responsible for deactivate student
information when student complete education and leave from university
Items Details
Name Create account
Id BR4
Description System administrator has responsibility for creating account for system
controller.
Items Details
Name Update student information
Id BR5
Description System administrator has responsibility for updating student information
when its required
Items Details
Name Activate student information
Id BR6
Descriptio System administrator has responsibility for activate student information
n when its required
3. PROPOSED SYSTEM
Face recognition is an important project and research topic because of its application in different
environments and disciplines like the field of computing, psychology, and neurology for a
different purpose. On the other hand, face recognition plays its own role in the field of security on
different levels from identification to authentication for systems. Face recognition in the field of
security applies different techniques for analyzing and processing a face image. Here, in this
project, an analytical technique for face recognition is used for extracting feature components of a
face for face identification.
The system we are going to develop is desktop application which is called student identification
using face recognition for Wolkite university. Face recognition is the process of identifying a
student based on their facial characteristics. To identify the students the system process through
preprocessing and postprocessing. In preprocessing system detect face, in face detection the
system find face (location and size) in an image, the face is detected by applying detection
algorithm which called haar cascade classifier OpenCV (Open Computer Vision) library using
camera and the system capture the detected face.
In postprocessing, the captured face is extracted using LBPH (Local Binary Pattern Histogram)
algorithm and match the extracted face with store in dataset and identify the student and staff
member, finally display the information of recognized face from database. This system linked
within a current exist database which manage information of student and we develop document
database where the captured image is stored.
Face detection
Face detection has the objective of finding the faces (location and size) in an image and extract
them to be used by the face recognition algorithm. This system uses haar cascades classifiers
OpenCV (open computer vision) library for face detection. This algorithm used for finding the
location of the human faces in a frame or image and gives the coordinates of x, y, w, h which
makes a rectangle box in the picture to show the location of the face or we can say that to show the
region of interest in the image. After this, it can make a rectangle box in the area of interest where
it detects the face.
asdfghj
Update information
The system allows system administrator to update information of users when it required.
Manages user account
The system allows system administrator to manage user account such as create account.
Record threat
The system allows system controller to record threat
Guest control
The system will provide a guest control and tracking service while the guest enter form outside
into university.
Tracking service
The system will record the number of users exit and entering at entrance point.
The hardware that required after develop the system is basically the following: -
4. SYSTEM ANALYSIS
4.1. System Model
To produce a correct, complete and consistent model of the system we construct the analysis
model which focuses on structuring and formalizing the requirements of the system. Analysis
model of this system contains three models: functional, object and dynamic models. The
functional model of this system described by use case diagrams. The class diagrams of this system
describe the object model. The dynamic model of this system can also describe in terms of
sequence, state chart and activity diagrams.
The following use cases have been identified from the system specification
Face detection
Upload image
Capture face
Training data
Display alert
Control camera
Login
Logout
Create account
Actors
The identified actors that will be participating in the system are:
Staff member
Student
Campus police
System controller
System administrator
Precondition No precondition
Description In this use case Administrator, can creates accounts for system
controller.
Post-condition System send delivery notification for affirmation if the message sent
successful
Normal follow Actor action System response
Step 1. System administrator or Step 2. System display send
controller select send message message form
from message page Step 4. System validate the filled
Step 3. System administrator or information
controller write message and fill Step 6. System display delivery
the provided text field notification for affirmation if the
Step 5. System administrator or message sent or not
controller click on send button
Student SystemAdmin
SystemController
Image viewAlert() addInformation()
Id updateImage() importInformation()
displayValidatePass() searchStudentInformation() blockInformation()
Name
staffMember
Message
staffMemeber_id TrainingData
role messageId
sender train()
receiver
date
sendMessage()
viewMessage()
5. SYSTEM DESIGN
5.1. Design Goals
5.1.1. Performance
System will have good performance as much as possible this will be attained via easily loadable
information and fast response time in searching, updating and viewing information because we
will use good algorithm and minimize a line of code to perform specific function.
Load time: this system will be loading the information in a second.
Throughput: depends on number of cameras the system performs many operations at given time.
Response time: This system give response to the user according to the delivery of message and
notification reaches in a second. The system shall support multiple users at a time depend on the
number of camera and it works very well with short response time.
5.1.2. Dependability
This system should achieve the following dependability characteristics in order to resist crash and
be available and reliable.
5.1.3. Maintenance
The system should be maintainable if there is failure in system or when the system need
modification that means we will develop this system by dividing the system into different module
which is loosely coupled and high cohesive. To be maintainable the system should meet the
following maintenance criteria:
Request
Response
LAN
Client
Database
Application server server
Web camera
capture image
Request
Response
LAN
Client
display information
Database
Application server server
Screen
Send View
message message
Connection
Control
subsystem Update
camera
image
Database
Recognition
subsystem
Display
alert
Face detection
capture Face
face recognition
• User interface and processing management will be deployed on the client machine.
• Student identification using face recognition will present the Graphical User Interface
(GUI) which is used for display user information.
• Student identification using face recognition use existing database which deployed on
the server.
• The data collection module deployed on any computer.
Authentication
Face
detection
qu
er
y
install driver
Web Camera
receive
image
Face
recognition query Database
query
Send
ery
messaga qu
install driver
infomation
Computer y
display
er
qu
ery uery
View
q
message
qu
View alert
Update
image
Screen Display
validate pass
+detectFace():blob
+capture():blob
+compare():String have
+displayAlert():void have
User
1 *
+firstName:String
+lastName:String
view
Name
recognize
* *
*
recognize
1 1
1 1 1 1 1
Student SystemAdmin
SystemController
+Image:blob
+addInformation():void
+Id:int +viewAlert():void +importInformation():void
+displayValidatePass +updateImage():void +blockInformation():void
(firstName:String,Id:int):void +searchStudentInformation
1
():void *
1
Name 1
* * update 1 view
add
view
*
staffMember 1
Message *
+staffMemeber_id:int TrainingData
+role:String +messageId:int
+sender:String +train()
+receiver:string
+date:date
+sendMessage():void
+viewMessage():void
SystemAdmin Message
SystemAdmin<<Table>>
+firstName:string +messageId:int Message<<Table>>
+lastName:String firstName +sender:String
+userName +receiver:String messageId<<primary key>>
lastName
password:String +date:date sender
userName
receiver
password<<primary key>>
date
+addStudentInformation():void sendMessage():void
+importStudentInformation():void viewMessaage:void
+blockStudentInformation():void
+login():void
StaffMember
+firstName:string StaffMember<<Table>>
+lastName:String
+image:blob firstName
+staffmemberId:int lastName
+role:String image
+displayValidatePass staffMemberId<<primary
(firstName:String,staff key>>
memberId:int):void role
Operation
Guard - - - - - - -
System - - - -
controller
System - -
administrator
System Controller
View update
View alert
System message image
Adminstrator
Training
Add student
data
information
Recognition
View
message
face
student capture face
detection
Student class
Example: -
Validating entered input in login field.
Test procedure are:
Check if both are empty space.
Sample Tests
1. Check the interaction between individual functionality which performs the specific tasks.
2. Evaluate the functionality of the subsystem after combination all individual functionality.
3. Identify the Independence of each subsystem with another subsystem.
Sample Tests
7.1. Conclusion
Currently Wolkite university is using digital identification in entrance, the system is developed in
web-based application implemented through barcode reader which use to read information from
digital identification using barcode on it. This system has drawback, so we plan to develop new
system which solve the drawbacks of existing system which is called student identification using
face recognition its desktop application, it has high security, reliability and accuracy.
7.2. Recommendation
The proposed system is does identify identical twins, so we recommended for any revision to
solve this problem during modification.
Bruegge, B. (n.d.). System Design. Aerobate PDF writer 4.0 for Power Macintosh.
[2] Design system using object-oriented design techniques. (2002). Acrobat Distiller 4.0 for
windows.
[3] Face detection using OpenCV and Python. ( 2017).
[4] Ibrahim, Syed. (2018). Automatic Attendance System Using Facial Detection and
Recognition. SudhaNarang, 24372-24376.
[5] Introduction to biometrics. (n.d.). West Virginia : James .
[6] Prado, K. S. ( 2017). Face Recognition: Understanding LBPH Algorithm. Face Recognition:
Understanding LBPH Algorithm.
[7] Prado, K. S. (2017, Nov 08). Face Recognition: Understanding LBPH Algorithm. pp. 1-25.
[8] Schach, S. R. (2011). Object-Oriented and Classical Software Engineering. New York: Hill
Companies. Retrieved from https://medium.com/@smagid_allThings/uml-class-diagrams-
tutorial-step-by-step-520fd83b300b.
[9] wikipedia.org. (n.d.). Retrieved from https://en.wikipedia.org:
https://en.wikipedia.org/wiki/Facial_recognition_system