You are on page 1of 60

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title

Assessor Internal Verifier


Unit 13: Computing Research Project
Unit(s)
Final Research
Assignment title
B.Kaushika
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:

• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N

• Identifying opportunities for


improved performance? Y/N

• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?
Assessor signature Date

Internal Verifier signature Date


Programme Leader signature(if
Date
required)

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Confirm action completed
Remedial action taken

Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Higher Nationals - Summative Assignment Feedback Form

Student Name/ID B.Kaushika_NEG/A-013776


Unit Title
Assignment Number Assessor
Date Received 1st
Submission Date
submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:

LO2 Conduct and analyse research relevant to a chosen computing research project

Pass, Merit & Distinction P3 P4 M2 D1


Descripts

LO3 Communicate the outcomes of a research project to identified stakeholders

Pass, Merit & Distinction P5 M3 D2


Descripts

LO4 Reflect on the application of research methodologies and concepts

Pass, Merit & Distinction P6 P7 M4 D3


Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor signature Date

Student signature Date

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Assignment 01

General Guidelines

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and be sure to fill the details correctly.
2. This entire brief should be attached in first before you start answering.
3. All the assignments should prepare using word processing software.
4. All the assignments should print in A4 sized paper, and make sure to only use one side printing.
5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for binging.

Word Processing Rules

1. Use a font type that will make easy for your examiner to read. The font size should be 12 point, and should
be in the style of Time New Roman.
2. Use 1.5 line word-processing. Left justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help edit your assignment.

Important Points:

1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply
(in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to
complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference
them, using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty
of plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be
excluded from the course.

Student Declaration

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this
program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and
where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement
between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to the
attached.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)
b.kaushika200106@gmail.com 23/12/2020

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Assignment Brief
Student Name /ID Number B.kaushika_NEG/A-013776

Unit Number and Title Unit 13 – Computing Research Project

Academic Year

Unit Tutor

Assignment Title Final Research Project Proposal

Issue Date

Submission Date

IV Name & Date

Submission Format:

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system.
Report format- Please provide a referencing list using the Harvard referencing system. The
recommended word limit is minimum 4,500 words

Unit Learning Outcomes:

LO1 Examine appropriate research methodologies and approaches as part of the


research process.

LO2. Conduct and analyse research relevant to a chosen computing research project

LO3. Communicate the outcomes of a research project to identified stakeholders

LO4. Reflect on the application of research methodologies and concepts

Assignment Brief and Guidance:

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Learner is now required to provide a comprehensive research project report based on the findings of secondary
and primary researches carried out on the project proposal submitted in the previous section.

The Learner requires to produce a detailed research project report covering following areas

 Conduct primary and secondary research using appropriate methods for a


computing research project that consider costs, access and ethical issues.
 Carry out your research and apply appropriate analytical tools to analyse research
findings and data.
 Draw conclusion based on the research findings.
 Communicate the outcomes of your research project to the identified audience.
 Reflect on the success of your research project and your performance at the end of the
project with the inclusion of a project evaluation and recommendations (Consider
alternative research methodologies and lessons learnt in view of the outcomes)

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Grading Rubric

Grading Criteria Achieved Feedback

P3 Conduct primary and secondary research using


appropriate methods for a computing research project that
consider costs, access and ethical issues

P4 Apply appropriate analytical tools to analyse research


findings and data.

M2 Discuss merits, limitations and pitfalls of approaches to


data collection and analysis.

P5 Communicate research outcomes in an appropriate


manner for the intended audience.

M3 Coherently and logically communicate outcomes to the


intended audience, demonstrating how outcomes meet set
research objectives.

D2 Communicate critical analysis of the outcomes and


make valid, justified recommendations.

P6 Reflect on the effectiveness of research methods applied


for meeting objectives of the computing research project.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


P7 Consider alternative research methodologies and lessons
learnt in view of the outcomes.

M4 Provide critical reflection and insight that results in


recommended actions for improvements and future research
considerations.

D3 Demonstrate reflection and engagement in the resource


process leading to recommended actions for future
improvement.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Acknowledgement
I am further happy to mention that as it really provides me with a massive opportunity to upgrade my skills
and to exhibit creativity where needed as I faced with challenges such that I had to investigate and write
things that I’ve never heard of, as if I were very familiar with them. But I do certify that I haven’t in any
case included wrong information or anything that could harm the organization I selected. Finally, I would
like to thank all of the lecturers including the HND Coordinator at ESOFT, and my team mate who helped
me a lot in making this assignment a success. In preparation of my assignment, I had to take the help and
guidance of some respected persons, who deserve my deepest gratitude. As the completion of this
assignment gave me much pleasure, I would like to show my gratitude on ESOFT Metro Campus, for giving
me a good guideline for assignment throughout numerous consultations. I would also like to expand my
gratitude to all those who have directly and indirectly guided me in writing this assignment

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Content
Acknowledgement ...................................................................................................................................... 12
Content....................................................................................................................................................... 13
content of figure ......................................................................................................................................... 14
Content of table .......................................................................................................................................... 14
Activity 01 ................................................................................................................................................... 15
1.1 Introduce your system/ survey .......................................................................................................... 15
1.1.1 Introduction ............................................................................................................................... 15
1.1.2 Online attendance marking system ............................................................................................ 16
1.1.3 Proposed System ........................................................................................................................ 17
1.2 Objectives or aims of the research .................................................................................................... 18
1.2.1 Aims ........................................................................................................................................... 18
1.2.2 Objectives .................................................................................................................................. 18
1.3 Introduce the hypothesis .................................................................................................................. 19
1.3.1 Types of research hypotheses .................................................................................................... 19
1.3.2 Hypothesis of the system ........................................................................................................... 19
1.3 Provide a brief introduce to AI .......................................................................................................... 20
Four types of artificial intelligence ...................................................................................................... 20
1.3.1 AI in Facial recognition attendance marking ............................................................................... 20
CHAPTER 2 - Literature Review ................................................................................................................... 21
2.1 Introduce the processes .................................................................................................................... 21
2.2 Briefly talk about what technologies are going to be used in the system and How the technology
behind you're project works. .................................................................................................................. 22
2.2.1 System description ..................................................................................................................... 22
2.2.2 System algorithms ...................................................................................................................... 23
2.2.4 Technical requirements .............................................................................................................. 23
2.3 Discuss about the existing systems (similar systems) of your project and talk about the positives and
negatives of those systems. .................................................................................................................... 24
2.3.1 Advantages and disadvantages of existing systems .................................................................... 24
CHAPTER 3 - Methodology .......................................................................................................................... 25
3.1How you conducted the Primary Research and explain what it is ....................................................... 25
3.1.1 Primary research ........................................................................................................................ 25
3.1.2 Questionnaire and requirement gathering of my technology ..................................................... 26
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
3.2 How you conducted secondary research and explain what it is ......................................................... 29
3.2.1 Secondary Research ................................................................................................................... 29
3.3 How you developed the system and explain what it is....................................................................... 30
3.4 System architecture .......................................................................................................................... 31
3.5 Flow diagrams ................................................................................................................................... 32
3.6 Budgets ............................................................................................................................................. 33
CHAPTER 4 - Results and Discussion ............................................................................................................ 34
4.1 Analyze the data you get from primary and secondary research methods .................................... 34
4.2 Ethical issues ................................................................................................................................ 37
4.3 Recommendations ............................................................................................................................ 38
4.3 Conclusions ....................................................................................................................................... 38
Gant chart................................................................................................................................................... 39
References .................................................................................................................................................. 40
Proposal...................................................................................................................................................... 41

content of figure
Figure 1.face recognition ............................................................................................................................ 16
Figure 2.Questionnaire ............................................................................................................................... 26
Figure 3.Questionnaire ............................................................................................................................... 27
Figure 4.Questionnaire ............................................................................................................................... 28
Figure 5.System architecture ...................................................................................................................... 31
Figure 6.Flow diagram................................................................................................................................. 32
Figure 7.Gender .......................................................................................................................................... 34
Figure 8.Age ................................................................................................................................................ 35
Figure 9.technology satisfaction.................................................................................................................. 35
Figure 10.Technology safety ....................................................................................................................... 36
Figure 11.Improvement of technology ........................................................................................................ 36

Content of table
Table 1.Advantages and disadvantages of existing system .......................................................................... 24

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Activity 01

1.1 Introduce your system/ survey

1.1.1 Introduction
Maintaining the attendance is significant in all the institutes for checking the execution of students. Each
foundation has its own method in this regard. Some are gauging participation attendance manually utilizing
the old paper or document based approach and some have received methods of automatic attendance
utilizing some biometric techniques. Be that as it may, in these methods students need to sit tight for long
time in causing a line at time they to enter the classroom. Numerous biometric systems are accessible yet the
key authentications are same is all the techniques. Each biometric system comprises of enrolment measure in
which special features of an individual is put away in the database and afterward there are cycles of
identification and verification. These two cycles analyze the biometric highlight of an individual with
recently put away layout caught at the hour of enrollment. Biometric templates can be of numerous sorts like
Fingerprints, Eye Iris, Face, Hand Geometry, Signature, Gait and voice. Our system utilizes the face
recognition approach for the automatic attendance of students in the class room. Face recognition comprises
of two stages, in initial step faces are detected in the image and afterward these detected faces are contrasted
and the database for verification. The efficiency of face recognition algorithm can be expanded with the
quick face detection algorithm. In all the above methods SURF is generally productive. Our system used this
algorithm for the detection of faces in the class room image. Face recognition techniques can be Divided
into two kinds Appearance based which use texture features that is applied to entire face or some specific
Regions, other is Feature based which utilizes geometric features like mouth, nose, eyes, eye brows, cheeks
and Relation between them. Statistical tools, for example, Linear Discriminant Analysis (LDA), Principal
Component Analysis (PCA), Kernel Methods, and Neural Networks, Eigen-faces have been utilized for
construction of face templates. Illumination invariant algorithm is used for eliminating the lighting effect
inside the class room.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1.1.2 Online attendance marking system
Online attendance system for students is designed for managing online live class stage to keep a record of
attendance for students. In current scenario, an online attendance system for students help teachers tracks the
presence of students. A student online attendance system makes database for keeping attendance records and
boosting students' participation. Online education is probably going to that the student participation rate
proceeds with a similar path as in normal classes at school.

A student attendance management system monitors attendance of its students for purposes, for example,
tracking student's advancement as far as class-wise attendance and social analysis. An online attendance
management system for students facilitates the assignment of attendance taking other than assisting schools
with managing data on real time basis.

Beside managing attendance, an online attendance system serves as an effective tool of communication
between students, teachers and parents for updating purposes too. Online attendance system for students can
be integrated with your existing virtual classroom programming to manage grades, social reports, timesheet,
and so on Most such platforms help in keeping up attendance records based on class savvy, day astute and
subject insightful basis.

Figure 1.face recognition

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1.1.3 Proposed System
Face recognition-based attendance system the errand of the proposed system was to catch the face of every
student and to store it in the database for their attendance. Attendance management utilizing facial
recognition the proposed system endeavors to grow out of the requirements of the existing systems and gives
features, for example, detecting and recognizing faces will be more because of utilization of bigger number
of highlight and analysis of student's attendance the system accuracy in detecting and recognizing faces will
be more because of utilization of bigger number of features of the face. It chiefly utilized algorithms like
Eigen face, line edge map, Histogram of oriented gradients (HOG) for detecting faces. The face of the
student should be captured in such a way that all the component of the students' face requires to be
identified; even the seating and the stance of the student should be perceived. There is no requirement for
the educator to manually gauge participation attendance in the class in light of the fact that the system
records a video and through additional processing steps the face is being perceived and the attendance
database is updated.

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1.2 Objectives or aims of the research

1.2.1 Aims
To eliminate duplicate data entry and errors in time and attendance entries also to make the attendance
marking system more efficiency and effectives. Increased security and confidentiality with role-based
permissions to users

1.2.2 Objectives
● finding better tech in Face recognition
● survey existing systems
● Improve visibility to track and manage student attendance
● Improve the efficiency and effectiveness
● preventing attendance fraud

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1.3 Introduce the hypothesis
A hypothesis (plural hypotheses) is a precise, testable statement of what the researcher(s) predict will be the
outcome of the study.

This usually involves proposing a possible relationship between two variables: the independent variable
(what the researcher changes) and the dependent variable (what the research measures).

1.3.1 Types of research hypotheses


1. Alternative hypothesis
2. Null hypothesis
3. Non-directional hypothesis
4. Directional hypothesis

1.3.2 Hypothesis of the system


AI based face recognition system for attendance marking in E-Learning

How reliable is the AI based system


in Attendance marking

HO = Not reliable H1 = very reliable

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


1.3 Provide a brief introduce to AI
Artificial Intelligence is an approach to make a computer, a robot, or a product to think how smart human
think. AI is a study of how human brain think, learn, decide and work, when it tries to solve problems. And
finally this study outputs intelligent software systems. The aim of AI is to improve computer functions
which are related to human knowledge, for example, reasoning, learning, and problem-solving.

Four types of artificial intelligence


1. Reactive machines
2. Limited memory
3. Theory of mind
4. Self-awareness

1.3.1 AI in Facial recognition attendance marking


1. Facial recognition is turning out to be more famous today for some reasons. The popularity of facial
recognition skyrocketed when Face ID was presented as a trade for Touch ID for unlocking iPhones.
The technology has demonstrated to be exceptionally sound and stable. Thus face recognition
participation systems have gotten mainstream for enforcing accountability inside numerous
businesses. Face recognition is utilized in zones, for example, student participation systems, tracking
participation at events, access control and some more.
2. You are likely perusing since you are looking for a face recognition based participation framework
for your business or group. There are numerous facial recognition time tracking applications
available today so my group and I decided to do the examination homework and save you a ton of
valuable time.
3. The AI empowered facial recognition participation framework/selfie-based participation makes it
brisk and idiot proof for the HR to direct participation the board. The feature prevents any proxy or
manipulated information and provides right information about participation of a representative
utilizing facial recognition participation software.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


CHAPTER 2 - Literature Review

2.1 Introduce the processes


Attendance marking in a classroom during a talk isn't just difficult yet in addition a time consuming task.
Because of a typical large number of students present in the auditorium there is consistently a chance of
intermediary attendance. It is amazingly hard for teachers to physically recognize the students who avoid
their talks on ordinary premise. Attendance the executives of students through the conventional strategies
had been a challenge in the new year’s. The growing need of productive and programmed techniques of
marking attendance is a growing challenge in the region of face recognition. Lately, the issue of
programmed attendance marking has been generally tended to using standard biometrics. In any case,
majority of the recently proposed techniques do not have the component of reliability. The focal point of this
research is to analyze and critically assess the new attendance marking techniques utilizing face recognition
strategies. Literature review uncovers the way that the intelligent application of iterative facial recognition
techniques can make attendance the executives frameworks more solid. In this paper, we propose a
calculated model for automated attendance framework through facial recognition. Our proposed model uses
an integral validation process which upgrades the reliability of your model.

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


2.2 Briefly talk about what technologies are going to be used in the system and How
the technology behind you're project works.

2.2.1 System description


The system comprises of a camera that captures the images of the employee and sends it to the image
improvement module. After upgrade the image comes in the Face Detection and Recognition modules and
afterward the attendance is marked on the database server. At the hour of enrolment, templates of face
images of individual employees are put away in the Face database. Here all the faces are identified from the
input image and the calculation contrasts them individually and the face database. In the event that any face
is recognized the attendance is marked on the server from where anybody can access and utilize it for
various purposes.

In this manner a ton of time is saved and this is exceptionally secure process nobody can mark the
attendance of other. Attendance is kept up on the server so anybody can get to it for purposes like
administration, employees themselves. To stay away from the false detection we are utilizing the skin
classification technique. Utilizing this technique upgrade the proficiency and accuracy of the detection
process.
In this process first the skin is arranged and afterward just skin pixels remains and any remaining pixels in
the image are set to black, this extraordinarily improve the accuracy of face detection process. Two
databases are shown in the exploratory arrangement. Face Database is the collection of face images and
extricated highlights at the hour of enrolment process and the second attendance database contains the
information about the employees and furthermore uses to mark attendance.

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


2.2.2 System algorithms
● The algorithm consists of the following steps.
● Image acquisition
● Histogram normalization
● Noise removal
● Skin classification
● Face detection
● Attendance

In the initial step image is captured from the camera. There are brightening impacts in the captured image
due to various lighting conditions and some noise which is to be eliminated prior to going to the subsequent
stages. Histogram normalization is utilized for contrast enhancement in the spatial domain. There are
different procedures like FFT and low pass filter for noise removal and smoothing of the images yet median
filter gives good outcomes.

2.2.4 Technical requirements


Hardware Requirements

 A standalone computer needs to be installed in the office room where the system is to be deployed.

 Camera must be positioned in the office room to obtain the snapshots. Optimum Resolution: 512 by
512 pixels.

 Secondary memory to store all the images and database


Software requirements

 MATLAB Version 7.6(R2008a) or higher

 Windows XP(Service Pack 2) or higher

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


2.3 Discuss about the existing systems (similar systems) of your project and talk about
the positives and negatives of those systems.

2.3.1 Advantages and disadvantages of existing systems

Advantages Disadvantages

Collect and store data automatically Not effective in monitoring buddy punching

Serve as a helping hand to administrative tasks Increased equipment expense

Helps to eliminate errors caused by humans Difficult to maintain and repair

Possible to update and maintain attendance records System is ineffective if there is no power
supply

Saves money by improving employee performance Inaccurate and subject to manipulation (‘time
and productivity theft’)

Shows accurate timings Calculating payroll and pulling employee data


is laborious

Simple to operate High possibility of human error

No technology expenses Low scalability and no integration with other


systems

Simple to implement and administer Require basic computer literacy and language
skills from all workers
Table 1.Advantages and disadvantages of existing system

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


CHAPTER 3 - Methodology

3.1How you conducted the Primary Research and explain what it is

3.1.1 Primary research


Primary research will be research you act (or recruit somebody to accomplish for you.) It includes going
directly to a source normally customers and prospective customers in your target market – to pose inquiries
and gather information. Primary research for the most part costs more and frequently takes more time to lead
than secondary research, yet it gives definitive outcomes. Instances of primary research are:

 Interviews
Interviews are one-on-one or little gathering question and answer sessions. Interviews will give a great deal
of information from few people and are helpful when you need to hear a specialist or knowledgeable point
of view on a subject.

 Surveys
Surveys are a type of questioning that is more inflexible than interviews and that include bigger gatherings
of people. Surveys will give a restricted measure of information from a huge gathering of people and are
valuable when you need to realize what a bigger populace thinks.

 Questionnaires
Observations include taking coordinated notes about events in the world. Observations give you
understanding about explicit people, events, or locales and are helpful when you need to study an occasion
without the one-sided viewpoint of a meeting.

 Analysis
Analysis includes collecting data and putting together it in some fashion dependent on criteria you create.
They are helpful when you need to discover some pattern or example. A sort of analysis is record
commercials on three significant television networks and analyze gender roles.

Two basic kinds of information:


1. Exploratory. This research is general and open-finished, and typically includes protracted interviews
with an individual or little gathering.

2. Specific. This research is more exact, and is utilized to take care of an issue recognized in
exploratory research. It includes more structured, formal interviews.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.1.2 Questionnaire and requirement gathering of my technology
Using this questionnaire I gather feedback from the user to make changes or improvements of the system
which I have created.

Figure 2.Questionnaire

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Figure 3.Questionnaire

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Figure 4.Questionnaire

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.2 How you conducted secondary research and explain what it is

3.2.1 Secondary Research


Secondary research is a sort of research that has just been accumulated, gathered, organized and distributed
by others. It incorporates reports and studies by government offices, exchange affiliations or different
organizations your industry. For private ventures with restricted budgets, most research is typically
secondary, since it tends to be gotten quicker and more affordably than primary research.

Data for secondary research can be gotten to from the internet, archive, libraries, educational institutions and
organizational reports. Notwithstanding, additional consideration should be taken by the researcher to
guarantee that the data is substantial as this can negatively affect the research process and results.

Advantages

 Already gathered so may be quicker to collect.

 May be gathered on a much larger scale than possible for the firm.

 In some cases it can be very cheap or free to access.

Disadvantages

 Information may be out dated, therefore inaccurate.

 The data may be biased and it is hard to know if the information was collected is accurate.

 The data was not gathered for the specific purpose the firm needs or is not relevant to the original
context.

 In some cases it can be costly.e.g marketing firm reports.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.3 How you developed the system and explain what it is
To achieve our set objectives, the components were developed as a window service application utilizing E-
Learning on a Python framework. The system is designed to move compute intensive tasks like face
detection and recognition to the on-premise local server which uses TensorFlow framework to further work
upon, since image processing could be very compute intensive especially when large data is involved. This
enables client local server to be any product hardware when implementing the system. The window service
component is a lightweight application that sudden spikes in demand for the foundation of the on-premise
local server and a front end interface utilizing a GUI component. It is responsible for listening to attendance
request, beginning the camera and continuous acquisition of images from anywhere. The service sends all
acquired images to the local server for storage through web service mechanism where they are processed
and updated in a mutable excel sheet. The GUI aspect of the system is developed to provide an intuitive and
simple self-service interface for users to interact with the system. It performs all the tasks of image storage,
image processing (face enrolment, face detection, face recognition) and attendance management. It likewise
enables users perform every administrative undertaking. One of the key features of this system is, it does not
permit any type of presentation assaults, for example, identity parodying, that could be forced upon the
interface. This represents the significance of liveness detection of the automated attendance system.

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.4 System architecture

Figure 5.System architecture

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.5 Flow diagrams

Figure 6.Flow diagram

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


3.6 Budgets
The cost of the entire project will depend simply on the expenditure incurred for the hardware requirements.
The software requirements can be easily fulfilled without any cost. Equipment: Cost:

 Standalone PC: Rs. 30000/-

 Camera: Rs. 3000 per camera

 Total Value 330000/-

[Space kept intentionally]

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


CHAPTER 4 - Results and Discussion

4.1 Analyze the data you get from primary and secondary research methods

Figure 7.Gender

When we consider about the above chart, we can identify the gender. Most of male 62.5% answer this
questionnaire because males are mainly considering about E learning and most of there jobs . 37.5% female
also answer questionnaire And the special thing is we can see most of males are considering AI agricultural
field.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Figure 8.Age

When we consider about the above chart, we can identify the youngsters in the age 18 – 25. And the special
thing is another category have got the amount of percentage that is 25%. So we can identify the importance
of AI E-learning from this figure very well.

Figure 9.technology satisfaction

From the satisfaction rate also we can how reliable the system is, so the success rate is 75% according to the
respondents’ feedbacks. 75% respondents have said that the system is satisfied. So we can identify the
system is very reliable.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Figure 10.Technology safety

Safety is a main requirement in measuring the reliability of the system. So in here we can identify the rate of
the safety level of the system. So we can tell there is a good safety for the customers with the system.

Figure 11.Improvement of technology

In this Chart we can suggest more improvement for the system So from looking to all of these feedbacks of
the respondents we can measure the reliability of the system and according to that we can say that the
system is more reliable. So from that we can tell this system is a successful system. We can identify from the
above comparisons how helpful the questionnaires are. And there are some other ways that questionnaires
are helpful.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


4.2 Ethical issues
Academicians were regularly wary about broadcasting the ethical quandaries they faced in their research and
academic work, however that environment is evolving today. Psychologists in academe are more liable to
search out the guidance of their partners on issues going from supervising graduate students to how to deal
with sensitive research data.

 Discuss intellectual property frankly


Academe's competitive "publish-or-perish" outlook can be a formula for inconvenience with regards to who
gets credit for authorship. The most ideal approach to keep away from disagreements about who ought to get
credit and in what order is to discuss these issues toward the start of a working relationship, despite the fact
that numerous individuals frequently feel uncomfortable about such subjects.

 Be conscious of multiple roles


APA's Ethics Code says psychologists ought to keep away from relationships that could sensibly disable
their expert performance or could adventure or damage others. In any case, it likewise noticed that numerous
sorts of various relationships aren't unethical- - insofar as they're not sensibly expected to have unfavorable
impacts.

 Follow informed-consent rules


At the point when done appropriately, the assent process guarantees that individuals are voluntarily taking
an interest in the research with full knowledge of pertinent risks and benefits.

 Respect confidentiality and privacy


Upholding individuals' privileges to classification and privacy is a focal principle of each clinician's work.
Nonetheless, numerous privacy issues are idiosyncratic to the research populace, composes Susan Folkman,
PhD, in "Ethics in Research with Human Participants" (APA, 2000). For example, researchers need to
devise approaches to find out if participants are eager to discuss sensitive subjects without placing them in
off-kilter circumstances, state specialists. That could mean they give a bunch of progressively point by point
interview questions so participants can stop on the off chance that they feel uncomfortable.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


4.3 Recommendations
Later on this system can be implemented as a piece of the smart classroom objective. Automated Attendance
System can be implemented in larger areas like in a seminar hall where it helps in detecting the presence of
numerous people. Now and again the helpless lighting state of the classroom may influence image quality
which by implication debases system execution, this can be defeated in the last stage by improving the
quality of the video or by utilizing a few algorithms However, the efficiency could be improved by
coordinating rapid computers with a decent RAM and here are a portion of the manners by which the entire
system can be improved:

1. Hardware Enhancement
Usage of high speed storage drivers and extended RAM could fetch us faster training time and turn-around
time for requests made to the TensorFlow engine.

2. Camera Enhancement
Usage of a good quality video camera capable of capturing live feed in 720p resolution or 4K quality can
help the built model to extract high level features. The software however, is another aspect yet the most
significant one to be considered for improvement.

4.3 Conclusions
Automated Attendance System has been envisioned to decrease the blunders that happen in the traditional
(manual) attendance taking system. The point is to robotize and make a system that is helpful to the
organization, for example, an establishment. The efficient and accurate method of attendance in the
classroom climate that can supplant the old manual methods. This method is adequately secure, reliable and
accessible for use. No requirement for specific hardware for installing the system in the office. It very well
may be developed utilizing a camera and computer.

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Gant chart

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


References
Smitha, pavithra s hegde, afshin . 2020. Researchgate. [Online]. [may 5]. Available from:
https://www.researchgate.net/publication/341876647_Face_Recognition_based_Attendance_Man
agement_System

Somya gupta. 2020. Techjockey. [Online]. [October 15]. Available from:


https://www.techjockey.com/blog/best-online-attendance-system-for-students

Sharanya t , sucharith p , trisheeka mahesh , ujwal kasturi, dhivya v. 2020. Ijert. [Online]. [12
june]. Available from: https://www.ijert.org/online-attendance-using-facial-recognition

Saul mcleod. 2018. Simplypsychology. [Online]. [August 10]. Available from:


https://www.simplypsychology.org/what-is-a-hypotheses.html

Thushara. no date. Bloggreythr. [Online]. [no date]. Available from: https://blog.greythr.com/10-


advantages-of-using-an-attendance-management-system

Thehartford. no date. Thehartford. [Online]. [no date]. Available from:


https://www.thehartford.com/business-insurance/strategy/market-research/primary-second-
research

Formpl. no date. Formpl. [Online]. [December 07]. Available from:


https://www.formpl.us/blog/primary-secondary-research

Geogt002. 2017. Getrevising. [Online]. [24 march]. Available from:


https://getrevising.co.uk/grids/advantages-and-disdvanges-of-secondary-research

Owlpurdueedu. no date. Owlpurdueedu. [Online]. [no date]. Available from:


https://owl.purdue.edu/owl/research_and_citation/conducting_research/conducting_primary_rese
arch/index.html

Meruja selvamanikkam. 2018. Becominghuman. [Online]. [August 29]. Available from:


https://becominghuman.ai/introduction-to-artificial-intelligence-5fba0148ec99

Nandhini r, duraimurugan n, spchokkalingam. 2019. Ijeat. [Online]. [February ]. Available


from: https://www.ijeat.org/wp-content/uploads/papers/v8i3S/C11230283S19.pdf

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Ksenthamil selvi , pchitrakala , aantony jenitha. 2014. Ijcsmc. [Online]. [February ]. Available from:
https://ijcsmc.com/docs/papers/February2014/V3I2201468.pdf

Proposal

Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project


Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project
Name: B.kaushika Reg No: NEG/A-013776 Unit: Computing research project

You might also like