Professional Documents
Culture Documents
A Seminar Report on
Submitted By
Name of the student: DAGADE OM SANJAY
Roll No- 20CO020
CERTIFICATE
in Engineering.
ACKNOWLEDGEMENT
Date-
SEMINAR APPROVAL
The Seminar entitled
DAGADE OM SANJAY
(20CO020)
Bachelor of Engineering
In
Computer Engineering
Examiner 1 Examiner 2
Name and Signature Name and Signature
Date:
Place:
ABSTRACT
CONTENTS
Certificate 2
Acknowledgement 3
Seminar Approval 4
Abstract 5
Contents 6
1. Introduction 8
1.1 Background
1.2 Motivation
1.4 Objectives
2. Literature Survey 10
3. Project Description 12
4. Details of Design/Technology 14
6.2 Applications
7. Plagiarism Report 19
8. Future Aspect 20
9. Conclusion 21
10. References 22
INTRODUCTION
1.1 BACKGROUND
The human face is a sophisticated multidimensional structure that can convey a lot of
information about the individual, including expression, feeling, and facial features.
Effectively and efficiently analyzing the features related to facial information is a
challenging task that requires lot of time and efforts. Recently, many facial recognition-
based algorithms for automatic attendance management has been proposed and also new
algorithms developed or some existing algorithms improved or combined with other
methods, techniques, or algorithms to build facial recognition systems or applications.
Maintaining attendance is very important in all learning institutes for checking the
performance of students. In most learning institutions, student attendances are manually
taken by the use of attendance sheets issued by the department heads as part of regulation.
The students sign in these sheets which are then filled or manually logged in to a computer
for future analysis. This method is tedious, time consuming and inaccurate as some students
often sign for their absent colleagues. This method also makes it difficult to track the
attendance of individual students in a large classroom environment. In this project, we
propose the design and use of a face detection and recognition system to automatically
detect students attending a lecture in a classroom and mark their attendance by recognizing
their faces. While other biometric methods of identification (such as iris scans or
fingerprints) can be more accurate, students usually have to queue for long at the time they
enter the classroom. Face recognition is chosen owing to its non-intrusive nature and
familiarity as people primarily recognize other people based on their facial features. This
(facial) biometric system will consist of an enrollment process in which the unique features
of a persons’ face will be stored in a database and then the processes of identification and
verification. In these, the detected face in an image (obtained from the camera) will be
compared with the previously stored faces captured at the time of enrolment.
1.2 MOTIVATION
In present academic system, regular class attendance of students' plays a significant role in
performance assessment and quality monitoring. The conventional methods practiced in
most of the institutions are by calling names or signing on papers, which is highly time-
consuming and insecure. This article presents the automatic attendance management system
for convenience or data reliability.
1.4 OBJECTIVES
The overall objective is to develop an automated class attendance management system
comprising of a desktop application working in conjunction with a mobile application to
perform the following tasks:
2. LITERATURE SURVEY
Year Title Details
3. PROJECT DESCRIPTION
While other biometric methods of identification (such as iris scans or fingerprints) can be
more accurate, students usually have to queue for long at the time they enter the
classroom. Face recognition is chosen owing to its non-intrusive nature and familiarity as
people primarily recognize other people based on their facial features. This (facial)
biometric system will consist of an enrollment process in which the unique features of a
persons’ face will be stored in a database and then the processes of identification and
verification. In these, the detected face in an image (obtained from the camera) will be
compared with the previously stored faces captured at the time of enrollment. Block
diagram of proposed system is shown in figure below:
Input image: Camera captures image of face and is feed as input to the Python for further
processing. Pre-processing: Pre-processing of image commonly involves removing low-
frequency background noise, normalizing the intensity of the individual particles images,
removing reflections, and masking portions of images. Image pre-processing is the
technique of enhancing data images prior to computational processing. Feature
extraction: Feature extraction involves reducing the amount of resources required to
describe a large set of data. When performing analysis of complex data one of the major
problems stems from the number of variables involved. Classification: Image
AISSMS COE PUNE 12 | P a g e
FACE RECOGNITION ATTENDANCE MONITORING SYSTEM 2022-23
classification refers to the task of extracting information classes from two or many class
of image. Face is detected and recognized in this phase. When face is recognized, a tick
mark is created against name of student whose face is recognized. Data is stored in excel
sheet. At the end of the month, attendance of student is sent to parent’s Email.
4. DETAILS OF DESIGN/TECHNOLOGY
4.1 PYTHON
Python is a general-purpose interpreted, interactive, object-oriented, and high-level
programming language. Python was developed by Guido van Rossum in the late eighties
and early nineties at the National Research Institute for Mathematics and Computer
Science in the Netherlands. Python is derived from many other languages, including
ABC, Modula-3, C, C++, Algol-68, SmallTalk, and Unix shell and other scripting
languages. Python is copyrighted. Like Perl, Python source code is now available under
the GNU General Public License (GPL). Python is now maintained by a core
development team at the institute, although Guido van Rossum still holds avital role in
directing its progress.
• It can be used as a scripting language or can be compiled to byte-code for building large
applications.
• It provides very high-level dynamic data types and supports dynamic type checking.
• It can be easily integrated with C, C++, COM, ActiveX, CORBA, and Java.
A Python identifier is a name used to identify a variable, function, class, module or other
object. An identifier starts with a letter A to Z or a to z or an underscore (_) followed by
zero or more letters, underscores and digits (0 to 9). Python does not allow punctuation
characters such as @, $, and % within identifiers. Python is a case sensitive programming
language. Thus, Manpower and manpower are two different identifiers in Python.
• Class names start with an uppercase letter. All other identifiers start with a lowercase
letter.
• Starting an identifier with a single leading underscore indicates that the identifier is
private.
• If the identifier also ends with two trailing underscores, the identifier is a language-
defined special name.
The following list shows the Python keywords. These are reserved words and you cannot
use them as constant or variable or any other identifier names. All the Python keywords
contain lowercase letters only and exec not def if return assert finally or del import try
break for pass elif in while class from print else is with continue global raise except
lambda yield.
The data stored in memory can be of many types. For example, a person's age is stored as
a numeric value and his or her address is stored as alphanumeric characters. Python has
various standard data types that are used to define the operations possible on them and the
storage method for each of them.
• Numbers
• String
• List
• Tuple
• Dictionary
• Python Strings
• Arithmetic Operators
• Assignment Operators
• Logical Operators
• Bitwise Operators
• Membership Operators
• Identity Operators
• TFLearn – Deep learning library featuring a higher-level API for TensorFlow used to
create layers of our CNN
• tqdm – Instantly make your loops show a smart progress meter, just for simple
designing sake
• open-cv – To process the image like converting them to grayscale and etc.
• os – To access the file system to read the image from the train and test directory from
our machines
• tensorflow – Just to use the tensorboard to compare the loss and adam curve our result
data or obtained log.
In literature survey [2], they have built smart digital monitoring for attendance
system. In this project it takes the attendance automatically using facial
recognition method. The construction of this project is dependent facial
recognition and is used for whole classroom. The project involves capturing
individual student image in the class and compared it with the stored images of
the students in the database, if student face is matched attendance will be
updated.
6.1 ADVANTAGES
1. Ease in maintaining attendance.
5. Increased productivity
6.2 Applications
1. To verify identities in Government organizations.
2. Enterprises.
5. Industries.
7. PLAGIARISM REPORT
8. FUTURE PROSPECT
Further work can be done on this project to alert the student by sending SMS regarding the
attendance. For this purpose GSM module can be used. SMS alert can be given to the
parent of the student. We can implement this system in various offices and companies for
attendance purpose. This system can used in banks, IT companies, government offices,
hospitals, etc.
9. CONCLUSION
It can be concluded that a reliable, secure, fast and an efficient class attendance
management system has been developed replacing a manual and unreliable system. This
face detection and recognition system will save time reduce the amount of work done by
the administration and replace the stationery material currently in use with already
existent electronic equipment. There is no need for specialized hardware for installing the
system as it only uses a computer and a camera. The camera plays a crucial role in the
working of the system hence the image quality and performance of the camera in real
time scenario must be tested especially if the system is operated from a live camera feed.
The system can also be used in permission based systems and secure access
authentication (restricted facilities) for access management, home video surveillance
systems for personal security or law enforcement.
10. REFERENCES
https://ieeexplore.ieee.org/document/8433537
https://ieeexplore.ieee.org/document/9009166
https://ieeexplore.ieee.org/document/8899418
https://ieeexplore.ieee.org/document/9297374
https://ieeexplore.ieee.org/document/8080587