Professional Documents
Culture Documents
A Research Project
Presented to the Faculty of
Technical Education Department
In Partial Fulfillment of
the requirements for the 3 Year TESDA Diploma Program
Submitted by:
Jay Alpuerto
Hana Loren G. Balberan
Honeylyn Baylon
Jezamie V. Bayron
Joshua Rama
MAY 2023
APPROVAL SHEET
ACKNOWLEDGEMENT
DEDICATION
ABSTRACT
TABLE OF CONTENTS
Approval Sheet...............................................................................................................1
Acknowledgement..........................................................................................................2
Dedication......................................................................................................................3
Abstract..........................................................................................................................4
Table of Contents...........................................................................................................5
CHAPTER 1...................................................................................................................8
INTRODUCTION..........................................................................................................8
1.3 Objectives.............................................................................................................8
1.5.1 Scope.............................................................................................................8
1.5.2 Limitation......................................................................................................8
CHAPTER 2...................................................................................................................9
REVIEW OF RELATED LITERATURE.....................................................................9
CHAPTER 3.................................................................................................................10
Chapter 4......................................................................................................................11
Chapter 5......................................................................................................................12
5.2 Conclusions........................................................................................................12
5.3 Recommendation................................................................................................12
Bibliography.................................................................................................................13
Appendices...................................................................................................................14
LIST OF TABLES / FIGURE / NOTATIONS
CHAPTER 1
INTRODUCTION
lives more convenient. Instead of having to bother to write for personal details, for
example, or needing to show ID for manual entry process, our faces will be enough
techniques are used to identify people to clear, stable images. According to the
report, when utilized in this manner, face recognition algorithms can achieve
accuracy rates are typically lower in the real world particularly when people weren’t
addition, attendance issue are among the most challenging issues in different aspects
Journals, ”The system will save time decrease the measure of work needed to do
and will supplant the stationary materials with a computer based system.” Claro et.
al(2019).
of Butuan for all the employees’ entry process. Therefore, the researchers want to
system. This study will test the accuracy and capabilities of existing facial
The researchers would like to know if the facial recognition is effective upon
face.
recognition?
a. Time consumed
b. Data security
1.3 OBJECTIVES
Students Assistant of ACLC College of Butuan. In order to test how capable existing
facial recognition can manage the attendance management system to address the
problem.
Faculty and Staff. This study would be beneficial to the faculty for them to know
how effective and secured facial recognition to their day to day entry process in the
school premises.
Student. This study would be beneficial to students for them to understand the
realities about the school operations and the importance of facial recognition and the
School Administration. The results may provide information as basis for policy
College of Butuan. This may help stakeholders to provide assistance in the provision
Future Researchers. This may serve as basis for those research enthusiasts to
conduct further inquiry regarding school service quality and employees satisfaction.
The respondents of this study will be the Employees of ACLC College of Butuan
Employees – faculty, staff, utility, student assistant members who are using
the existing facial recognition and the persons who are the respondents of the study.
Entry Process – the procedure in which the employees do the time in and
This research was based on the study of Jadhav et al. (2017) in Automated
Systems based on face recognition techniques thus proved to be time saving and
secured. This system can also be used to identify an unknown person”. They used
Viola-Jones Algorithm face detection which detect human face using cascade
classifier and Principal Component Analysis (PCA) algorithm for feature selection
and Support Vector Machine (SVM) for classification. When compared to traditional
attendance marking this system saves the time and also helps to monitor the persons
on the organization
2.2 CONCEPTUAL FRAMEWORK
The Conceptual Framework, will help the researchers understand how
Butuan. The researcher will begin by collecting the average number of employees
who go through entry process of entering the school premises. Followed by the
identify people based on information about their faces. Face recognition software
offers a distinct technical benefit (Jiang, 2019). The are a number of existing systems
closely related to the proposed idea of marking attendance in work space by making
use of facial recognition techniques and algorithms. Based on the uniqueness and
home and abroad have started extensive research. Clyde Gomes, Sagar Chanchal,
Tanmay Desai, and Dipti Jadha develop a system that make use of DNN to detect the
faces of employees and PCA and LDA algorithm for image matching and a SVM and
CNN. With a database of eleven photos, they were able to reach an accuracy of 86%.
The database was generated by taking individual frames from a picture of the
employees and storing them in the database. The authors created a system that
camera module that is mounted on the door.f an image captured by the Raspberry Pi
satisfies the criteria for the Local Binary pattern algorithm, it is mage stored in the
Improved security is one of the most significant benefits of facial recognition systems,
example, most email accounts use an MFA system; the most common is a text
message sent with a unique code. Biometric authentication can also be used as part of
building. Facial recognition software records the faces of everyone who has access,
and the software can recognize employees who have the correct access permissions.
uses facial recognition will keep information safer than a manual attendance system
ever could. Facial recognition will also keep employees’ schedules, wage information,
and other sensitive information confidential and accessible only to that employee.
Jiang J., Chen C., Huang K., Cai Z., Hu R. Noise robust position-patch based
Chrysos G. G., Antonakos E., Snape P., Asthana A., Zafeiriou S. The author first used
the newly introduced 300 VW benchmark to fully evaluate the most advanced
deformed face tracking pipeline. Many different architectures were then analyzed that
focused on web-based face tracking. In particular, the authors compared the following
general strategies: (a) universal face recognition plus general face landmark location,
(b) general model-free tracking and general face orientation, and (c) mixed advanced
face recognition. , model free tracking and face orientation localization techniques.
In Zhao Q., Ge S. S., Ye M., Liu S., He W. Learning saliency features for face
detection and recognition using multi-task network, the authors propose a key feature
learning method that responds only in the face region. Based on the main features, the
authors also developed a joint face detection and recognition pipeline as part of the
human-computer interaction (HRI) system for SRU robots. An experimental paper
analyzes the effect of the visibility term on face recognition and the ability to
distinguish LFW salient features. And the experimental results of FDDB confirm the
effectiveness of the proposed method in face recognition. In Bong K., Choi S., Kim
convolution neural network (CNN) for user recognition in smart devices. The system
consists of two chips: an always-on CMOS image sensor (CIS) for imaging and face
detection, and a low-power CNN processor (CNNP) for face verification (FV). The
research results show that the CIS function integrated in the FD accelerator can
realize face image event-driven chip communication only when a face is present.
Grys B. T., Lo D. S., Sahin N., et al. Machine learning and computer vision
approaches for phenotype profiling, the author applied computer vision technology
for cell segmentation and feature extraction. The authors outline common computer
vision and machine learning methods for phenotype profiling and classification, and
the growing need for efficient computational strategies to analyze large-scale image-
based data. Computer vision techniques have been developed to aid in phenotype
threads, the author applied computer vision technology to visual inspection systems,
presented a vision system for automatic measurement and detection of most wire
types, and developed many image processing and computer vision algorithms for
recognition, most of the content consists of three parts, namely face feature
how the face is displayed and defines the incremental detection and recognition
algorithm. Evaluate face recognition that considers shape and texture information to
speak images based on local binary patterns for personalized free face recognition. In
analysis (PCA), the authors plan to create facial patterns stored in a digital image
database. The process of pattern formation and face recognition starts from object
face image, side detection, pattern generation to face pattern-like detection and then
face recognition. In this study, a program was developed to test some face data
samples stored in a digital image database to ensure the similarity of detected face
changing the environment. According to Gray et al., (2013), descriptive designs may
when, where, and how questions regarding this research about Effectiveness of
This study will use simple random sampling in conducting the survey
because the researcher will just distribute the survey questionnaire randomly to
The participants of this study are the employee including the Staff, Utility
and Students Assistant of ACLC College of Butuan. The table below shows the
distribution of participants.
CED 10 5
TED 10 5
BED 10 5
GED 10 5
S.A 10 5
UTILITY 10 5
STAFF 10 5
3.5 DATA GATHERING
Director will be secured. Then, letter permission from School Administrator will be
secured to conduct the study on effectiveness of facial recognition. After the approval,
the researchers prepared the letter addressed to the employee to formally conduct the
survey.
of the study and they will be requested to answer the questionnaire honestly so that
valid and reliable data could be elicited. Prior to the distribution of the instrument, the
researcher explained the purpose of conducting the survey. One hundred percent
between means of two unrelated groups on the same continuous dependent variable.
The Pearson correlation coefficient is the most common and widely use measure of
5.2 CONCLUSIONS
5.3 RECOMMENDATION
BIBLIOGRAPHY
APPENDICES
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE
COMPETENCY SYPNOSIS
Visual Graphic Design NC II holder
Web Development NC II holder
PERSONAL INFORMATION
Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:
SECONDARY:
PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE
COMPETENCY SYPNOSIS
Visual Graphic Design NC II holder
Web Development NC II holder
PERSONAL INFORMATION
Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:
SECONDARY:
PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE
COMPETENCY SYPNOSIS
Visual Graphic Design NC II holder
Web Development NC II holder
PERSONAL INFORMATION
Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:
SECONDARY:
PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE
COMPETENCY SYPNOSIS
Visual Graphic Design NC II holder
Web Development NC II holder
PERSONAL INFORMATION
Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:
SECONDARY:
PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE
COMPETENCY SYPNOSIS
Visual Graphic Design NC II holder
Web Development NC II holder
PERSONAL INFORMATION
Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:
SECONDARY:
PRIMARY: